pass 364 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth.pass, pass 366 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.pass)-1); pass 948 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth.pass, pass 950 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.pass)-1); pass 1662 nsswitch/pam_winbind.c const char *pass, pass 1767 nsswitch/pam_winbind.c logon.password = pass; pass 2100 nsswitch/pam_winbind.c const char **pass) pass 2113 nsswitch/pam_winbind.c *pass = token = NULL; pass 2139 nsswitch/pam_winbind.c *pass = item; pass 2246 nsswitch/pam_winbind.c *pass = item; pass 1196 nsswitch/wbinfo.c fstrcpy(request.data.auth.pass, p + 1); pass 1201 nsswitch/wbinfo.c fstrcpy(request.data.auth.pass, password); pass 1297 nsswitch/wbinfo.c char *pass; pass 1304 nsswitch/wbinfo.c pass = SMB_STRDUP(p + 1); pass 1306 nsswitch/wbinfo.c pass = wbinfo_prompt_pass(NULL, username); pass 1332 nsswitch/wbinfo.c if (!SMBNTLMv2encrypt(name_user, name_domain, pass, &server_chal, pass 1337 nsswitch/wbinfo.c SAFE_FREE(pass); pass 1347 nsswitch/wbinfo.c ok = SMBencrypt(pass, params.password.response.challenge, pass 1354 nsswitch/wbinfo.c SMBNTencrypt(pass, params.password.response.challenge, pass 1382 nsswitch/wbinfo.c SAFE_FREE(pass); pass 1406 nsswitch/wbinfo.c fstrcpy(request.data.auth.pass, p + 1); pass 1410 nsswitch/wbinfo.c fstrcpy(request.data.auth.pass, getpass("Password: ")); pass 737 nsswitch/wbinfo4.c fstrcpy(request.data.auth.pass, p + 1); pass 798 nsswitch/wbinfo4.c fstrcpy(request.data.auth.pass, p + 1); pass 828 nsswitch/wbinfo4.c fstring pass; pass 840 nsswitch/wbinfo4.c fstrcpy(pass, p + 1); pass 873 nsswitch/wbinfo4.c if (!SMBNTLMv2encrypt(mem_ctx, name_user, name_domain, pass, &server_chal, pass 898 nsswitch/wbinfo4.c && SMBencrypt(pass, request.data.auth_crap.chal, pass 904 nsswitch/wbinfo4.c SMBNTencrypt(pass, request.data.auth_crap.chal, pass 860 nsswitch/winbind_nss_aix.c static int wb_aix_authenticate(char *user, char *pass, pass 868 nsswitch/winbind_nss_aix.c logit("authenticate '%s' response='%s'\n", user, pass); pass 885 nsswitch/winbind_nss_aix.c STRCPY_RET(request.data.auth.pass, pass); pass 250 nsswitch/winbind_struct_protocol.h fstring pass; pass 426 source3/auth/auth_server.c struct passwd *pass; pass 428 source3/auth/auth_server.c if ( (pass = smb_getpwnam( NULL, user_info->internal_username, pass 433 source3/auth/auth_server.c nt_status = smb_pam_accountcheck(pass->pw_name); pass 438 source3/auth/auth_server.c nt_status = make_server_info_pw(server_info, pass->pw_name, pass); pass 440 source3/auth/auth_server.c TALLOC_FREE(pass); pass 92 source3/auth/auth_unix.c struct passwd *pass = NULL; pass 95 source3/auth/auth_unix.c pass = Get_Pwnam_alloc(talloc_tos(), user_info->internal_username); pass 100 source3/auth/auth_unix.c nt_status = pass_check(pass, pass 101 source3/auth/auth_unix.c pass ? pass->pw_name : user_info->internal_username, pass 111 source3/auth/auth_unix.c if (pass) { pass 114 source3/auth/auth_unix.c nt_status = smb_pam_accountcheck(pass->pw_name); pass 118 source3/auth/auth_unix.c make_server_info_pw(server_info, pass->pw_name, pass); pass 126 source3/auth/auth_unix.c TALLOC_FREE(pass); pass 929 source3/auth/auth_util.c struct passwd *pass; pass 948 source3/auth/auth_util.c pass = getpwuid_alloc(tmp_ctx, *uid); pass 949 source3/auth/auth_util.c if (pass == NULL) { pass 955 source3/auth/auth_util.c if (!getgroups_unix_user(tmp_ctx, username, pass->pw_gid, pass 983 source3/auth/auth_util.c *found_username = talloc_strdup(mem_ctx, pass->pw_name); pass 650 source3/auth/pass_check.c NTSTATUS pass_check(const struct passwd *pass, const char *user, const char *password, pass 685 source3/auth/pass_check.c if (!pass) { pass 694 source3/auth/pass_check.c if (set_this_crypted(pass->pw_passwd) == NULL) { pass 697 source3/auth/pass_check.c if (set_this_salt(pass->pw_passwd) == NULL) { pass 710 source3/auth/pass_check.c spass = getspnam(pass->pw_name); pass 727 source3/auth/pass_check.c if (ia_openinfo(pass->pw_name, &uinfo) != -1) pass 728 source3/auth/pass_check.c ia_get_logpwd(uinfo, &(pass->pw_passwd)); pass 734 source3/auth/pass_check.c struct pr_passwd *pr_pw = getprpwnam(pass->pw_name); pass 778 source3/auth/pass_check.c AUTHORIZATION *ap = getauthuid(pass->pw_uid); pass 3793 source3/client/client.c char *pass = getpass("Password: "); pass 3794 source3/client/client.c if (pass) { pass 3795 source3/client/client.c l_password = talloc_strdup(ctx,pass); pass 768 source3/client/mount.cifs.c char *pass; pass 776 source3/client/mount.cifs.c (pass = *ppasswrd); pass 778 source3/client/mount.cifs.c len = strlen(pass); pass 781 source3/client/mount.cifs.c if(pass[i] == ',') pass 798 source3/client/mount.cifs.c new_pass_buf[j] = pass[i]; pass 799 source3/client/mount.cifs.c if(pass[i] == ',') { pass 801 source3/client/mount.cifs.c new_pass_buf[j] = pass[i]; pass 171 source3/include/proto.h NTSTATUS pass_check(const struct passwd *pass, const char *user, const char *password, pass 1691 source3/include/proto.h const char *pass, pass 1702 source3/include/proto.h const char *pass, pass 2290 source3/include/proto.h const char *pass, const char *user_domain, pass 2295 source3/include/proto.h const char *pass, int passlen, pass 2307 source3/include/proto.h const char *pass, int passlen); pass 2310 source3/include/proto.h const char *dev, const char *pass, int passlen); pass 2341 source3/include/proto.h const char *service, const char *pass, const char *dev, pass 2585 source3/include/proto.h const char *pass, pass 4696 source3/include/proto.h bool secrets_store_machine_password(const char *pass, const char *domain, uint32 sec_channel); pass 6174 source3/include/proto.h bool chgpasswd(const char *name, const struct passwd *pass, pass 6176 source3/include/proto.h bool chgpasswd(const char *name, const struct passwd *pass, pass 70 source3/include/secrets.h fstring pass; /* trust relationship's password */ pass 347 source3/lib/popt_common.c char pass[128]; pass 371 source3/lib/popt_common.c for(p = pass, *p = '\0'; /* ensure that pass is null-terminated */ pass 372 source3/lib/popt_common.c p && p - pass < sizeof(pass);) { pass 380 source3/lib/popt_common.c if (p - pass) { pass 400 source3/lib/popt_common.c set_cmdline_auth_info_password(auth_info, pass); pass 586 source3/lib/substitute.c struct passwd *pass; pass 591 source3/lib/substitute.c pass = Get_Pwnam_alloc(tmp_ctx, r); pass 592 source3/lib/substitute.c if (pass != NULL) { pass 595 source3/lib/substitute.c gidtoname(pass->pw_gid)); pass 597 source3/lib/substitute.c TALLOC_FREE(pass); pass 37 source3/lib/username.c struct passwd *pass; pass 42 source3/lib/username.c pass = Get_Pwnam_alloc(mem_ctx, user); pass 44 source3/lib/username.c if (!pass) pass 49 source3/lib/username.c result = talloc_move(mem_ctx, &pass->pw_dir); pass 51 source3/lib/username.c TALLOC_FREE(pass); pass 438 source3/lib/util.c char *pass = NULL; pass 454 source3/lib/util.c pass = secrets_fetch_machine_password(lp_workgroup(), NULL, NULL); pass 455 source3/lib/util.c if (!pass) { pass 464 source3/lib/util.c set_cmdline_auth_info_password(auth_info, pass); pass 467 source3/lib/util.c SAFE_FREE(pass); pass 479 source3/lib/util.c char *pass; pass 491 source3/lib/util.c pass = getpass(label); pass 492 source3/lib/util.c if (pass) { pass 493 source3/lib/util.c set_cmdline_auth_info_password(auth_info, pass); pass 1382 source3/lib/util.c struct passwd *pass = NULL; pass 1384 source3/lib/util.c pass = getpwuid_alloc(ctx,uid); pass 1385 source3/lib/util.c if (pass) { pass 1386 source3/lib/util.c name = talloc_strdup(ctx,pass->pw_name); pass 1387 source3/lib/util.c TALLOC_FREE(pass); pass 1421 source3/lib/util.c struct passwd *pass; pass 1425 source3/lib/util.c pass = getpwnam_alloc(talloc_autofree_context(), name); pass 1426 source3/lib/util.c if (pass) { pass 1427 source3/lib/util.c u = pass->pw_uid; pass 1428 source3/lib/util.c TALLOC_FREE(pass); pass 343 source3/libads/authdata.c const char *pass, pass 367 source3/libads/authdata.c if (!name || !pass) { pass 388 source3/libads/authdata.c pass, pass 482 source3/libads/authdata.c const char *pass, pass 498 source3/libads/authdata.c pass, pass 532 source3/libads/authdata.c const char *pass, pass 547 source3/libads/authdata.c pass, pass 649 source3/libnet/libnet_join.c const char *pass, pass 659 source3/libnet/libnet_join.c if (use_kerberos && pass) { pass 669 source3/libnet/libnet_join.c pass, pass 59 source3/libsmb/cliconnect.c const char *pass, size_t passlen, pass 86 source3/libsmb/cliconnect.c if (!SMBencrypt(pass, cli->secblob.data,(uchar *)lm_response.data)) { pass 92 source3/libsmb/cliconnect.c lm_response = data_blob(pass, passlen); pass 95 source3/libsmb/cliconnect.c passlen = clistr_push(cli, pword, pass, sizeof(pword), STR_TERMINATE); pass 96 source3/libsmb/cliconnect.c lm_response = data_blob(pass, passlen); pass 294 source3/libsmb/cliconnect.c const char *user, const char *pass, pass 321 source3/libsmb/cliconnect.c p += clistr_push(cli, p, pass, -1, STR_TERMINATE); /* password */ pass 332 source3/libsmb/cliconnect.c p += clistr_push(cli, p, pass, -1, STR_UNICODE|STR_TERMINATE); /* unicode password */ pass 382 source3/libsmb/cliconnect.c const char *pass, size_t passlen, pass 408 source3/libsmb/cliconnect.c if (!SMBNTLMv2encrypt(user, workgroup, pass, &server_chal, pass 420 source3/libsmb/cliconnect.c E_md4hash(pass, nt_hash); pass 426 source3/libsmb/cliconnect.c SMBNTencrypt(pass,cli->secblob.data,nt_response.data); pass 431 source3/libsmb/cliconnect.c if (!SMBencrypt(pass,cli->secblob.data, lm_response.data)) { pass 444 source3/libsmb/cliconnect.c E_deshash(pass, session_key.data); pass 456 source3/libsmb/cliconnect.c lm_response = data_blob(pass, passlen); pass 800 source3/libsmb/cliconnect.c const char *pass, const char *domain) pass 823 source3/libsmb/cliconnect.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_password(ntlmssp_state, pass))) { pass 928 source3/libsmb/cliconnect.c const char *pass, const char *user_domain, pass 988 source3/libsmb/cliconnect.c if (pass && *pass) { pass 992 source3/libsmb/cliconnect.c ret = kerberos_kinit_password(user, pass, 0 /* no time correction for now */, NULL); pass 1080 source3/libsmb/cliconnect.c return ADS_ERROR_NT(cli_session_setup_ntlmssp(cli, account, pass, user_domain)); pass 1091 source3/libsmb/cliconnect.c const char *pass, int passlen, pass 1127 source3/libsmb/cliconnect.c if (!lp_client_lanman_auth() && passlen != 24 && (*pass)) { pass 1134 source3/libsmb/cliconnect.c !lp_client_plaintext_auth() && (*pass)) { pass 1140 source3/libsmb/cliconnect.c return cli_session_setup_lanman2(cli, user, pass, passlen, pass 1161 source3/libsmb/cliconnect.c if (!lp_client_plaintext_auth() && (*pass)) { pass 1166 source3/libsmb/cliconnect.c return cli_session_setup_plaintext(cli, user, pass, workgroup); pass 1172 source3/libsmb/cliconnect.c ADS_STATUS status = cli_session_setup_spnego(cli, user, pass, pass 1182 source3/libsmb/cliconnect.c status = cli_session_setup_nt1(cli, user, pass, passlen, pass 1231 source3/libsmb/cliconnect.c const char *pass, int passlen) pass 1244 source3/libsmb/cliconnect.c pass = ""; pass 1245 source3/libsmb/cliconnect.c } else if (pass == NULL) { pass 1252 source3/libsmb/cliconnect.c *pass && passlen != 24) { pass 1265 source3/libsmb/cliconnect.c SMBencrypt(pass, cli->secblob.data, (uchar *)pword); pass 1270 source3/libsmb/cliconnect.c if (!lp_client_plaintext_auth() && (*pass)) { pass 1281 source3/libsmb/cliconnect.c passlen = clistr_push(cli, pword, pass, sizeof(pword), pass 1289 source3/libsmb/cliconnect.c memcpy(pword, pass, passlen); pass 1399 source3/libsmb/cliconnect.c const char *dev, const char *pass, int passlen) pass 1420 source3/libsmb/cliconnect.c req = cli_tcon_andx_send(frame, ev, cli, share, dev, pass, passlen); pass 2237 source3/libsmb/cliconnect.c const char *service, const char *pass, const char *dev, pass 2242 source3/libsmb/cliconnect.c if (!lp_client_plaintext_auth() && (*pass)) { pass 2257 source3/libsmb/cliconnect.c *p++ = 4; p += clistr_push(cli, p, pass, -1, STR_TERMINATE | STR_NOALIGN); pass 537 source3/libsmb/clifsinfo.c const char *pass, pass 563 source3/libsmb/clifsinfo.c if (!NT_STATUS_IS_OK(status = ntlmssp_set_password(es->s.ntlmssp_state, pass))) { pass 197 source3/pam_smbpass/pam_smb_auth.c const char *pass = NULL; pass 201 source3/pam_smbpass/pam_smb_auth.c retval = _pam_get_item( pamh, PAM_AUTHTOK, &pass ); pass 207 source3/pam_smbpass/pam_smb_auth.c } else if (pass == NULL) { pass 214 source3/pam_smbpass/pam_smb_auth.c pass, &err_str, &msg_str)); pass 220 source3/pam_smbpass/pam_smb_auth.c pass = NULL; pass 229 source3/pam_smbpass/pam_smb_auth.c pass, &err_str, &msg_str)); pass 240 source3/pam_smbpass/pam_smb_auth.c pass = NULL; pass 505 source3/pam_smbpass/support.c const char *prompt2, const char *data_name, char **pass ) pass 519 source3/pam_smbpass/support.c *pass = token = NULL; pass 535 source3/pam_smbpass/support.c *pass = item; pass 648 source3/pam_smbpass/support.c *pass = item; pass 416 source3/passdb/secrets.c struct machine_acct_pass *pass; pass 419 source3/passdb/secrets.c if (!(pass = (struct machine_acct_pass *)secrets_fetch( pass 425 source3/passdb/secrets.c if (size != sizeof(*pass)) { pass 427 source3/passdb/secrets.c SAFE_FREE(pass); pass 432 source3/passdb/secrets.c *pass_last_set_time = pass->mod_time; pass 434 source3/passdb/secrets.c memcpy(ret_pwd, pass->hash, 16); pass 442 source3/passdb/secrets.c if (pass->mod_time > 0 && time(NULL) > (pass->mod_time + pass 448 source3/passdb/secrets.c SAFE_FREE(pass); pass 567 source3/passdb/secrets.c TRUSTED_DOM_PASS* pass) pass 573 source3/passdb/secrets.c if (!pass) { pass 579 source3/passdb/secrets.c pass->uni_name_len); pass 587 source3/passdb/secrets.c pass->uni_name[idx]); pass 594 source3/passdb/secrets.c len += tdb_pack(p, remaining_space, "dPd", pass->pass_len, pass 595 source3/passdb/secrets.c pass->pass, pass->mod_time); pass 602 source3/passdb/secrets.c len += tdb_sid_pack(p, remaining_space, &pass->domain_sid); pass 622 source3/passdb/secrets.c TRUSTED_DOM_PASS* pass) pass 627 source3/passdb/secrets.c if (!pack_buf || !pass) return -1; pass 630 source3/passdb/secrets.c len += tdb_unpack(pack_buf, bufsize - len, "d", &pass->uni_name_len); pass 634 source3/passdb/secrets.c &pass->uni_name[idx]); pass 637 source3/passdb/secrets.c &pass->pass_len, &passp, &pass->mod_time); pass 639 source3/passdb/secrets.c fstrcpy(pass->pass, passp); pass 645 source3/passdb/secrets.c &pass->domain_sid); pass 657 source3/passdb/secrets.c struct trusted_dom_pass pass; pass 664 source3/passdb/secrets.c ZERO_STRUCT(pass); pass 674 source3/passdb/secrets.c pass_len = tdb_trusted_dom_pass_unpack(pass_buf, size, &pass); pass 684 source3/passdb/secrets.c *pwd = SMB_STRDUP(pass.pass); pass 691 source3/passdb/secrets.c if (pass_last_set_time) *pass_last_set_time = pass.mod_time; pass 694 source3/passdb/secrets.c if (sid != NULL) sid_copy(sid, &pass.domain_sid); pass 720 source3/passdb/secrets.c struct trusted_dom_pass pass; pass 721 source3/passdb/secrets.c ZERO_STRUCT(pass); pass 729 source3/passdb/secrets.c strncpy_w(pass.uni_name, uni_dom_name, sizeof(pass.uni_name) - 1); pass 730 source3/passdb/secrets.c pass.uni_name_len = strlen_w(uni_dom_name)+1; pass 734 source3/passdb/secrets.c pass.mod_time = time(NULL); pass 737 source3/passdb/secrets.c pass.pass_len = strlen(pwd); pass 738 source3/passdb/secrets.c fstrcpy(pass.pass, pwd); pass 741 source3/passdb/secrets.c sid_copy(&pass.domain_sid, sid); pass 744 source3/passdb/secrets.c pass_len = tdb_trusted_dom_pass_pack(NULL, 0, &pass); pass 749 source3/passdb/secrets.c pass_len = tdb_trusted_dom_pass_pack(pass_buf, pass_len, &pass); pass 795 source3/passdb/secrets.c bool secrets_store_machine_password(const char *pass, const char *domain, uint32 sec_channel) pass 801 source3/passdb/secrets.c ret = secrets_store(machine_password_keystr(domain), pass, strlen(pass)+1); pass 958 source3/passdb/secrets.c struct trusted_dom_pass pass; pass 971 source3/passdb/secrets.c rec->value.dptr, rec->value.dsize, &pass); pass 978 source3/passdb/secrets.c if (pass.domain_sid.num_auths != 4) { pass 981 source3/passdb/secrets.c sid_string_dbg(&pass.domain_sid), pass 982 source3/passdb/secrets.c pass.domain_sid.num_auths)); pass 991 source3/passdb/secrets.c if (!pull_ucs2_talloc(dom_info, &dom_info->name, pass.uni_name, pass 998 source3/passdb/secrets.c sid_copy(&dom_info->sid, &pass.domain_sid); pass 302 source3/rpc_server/srv_netlog_nt.c const uint8 *pass; pass 386 source3/rpc_server/srv_netlog_nt.c if ((pass = pdb_get_nt_passwd(sampass)) == NULL) { pass 392 source3/rpc_server/srv_netlog_nt.c memcpy(md4pw, pass, 16); pass 4805 source3/rpc_server/srv_samr_nt.c static bool set_user_info_pw(uint8 *pass, struct samu *pwd) pass 4817 source3/rpc_server/srv_samr_nt.c pass, pass 125 source3/smbd/chgpasswd.c static int dochild(int master, const char *slavedev, const struct passwd *pass, pass 134 source3/smbd/chgpasswd.c if (pass == NULL) pass 141 source3/smbd/chgpasswd.c gid = pass->pw_gid; pass 142 source3/smbd/chgpasswd.c uid = pass->pw_uid; pass 373 source3/smbd/chgpasswd.c static bool chat_with_program(char *passwordprogram, const struct passwd *pass, pass 382 source3/smbd/chgpasswd.c if (pass == NULL) { pass 389 source3/smbd/chgpasswd.c DEBUG(3, ("chat_with_program: Cannot Allocate pty for password change: %s\n", pass->pw_name)); pass 401 source3/smbd/chgpasswd.c DEBUG(3, ("chat_with_program: Cannot fork() child for password change: %s\n", pass->pw_name)); pass 414 source3/smbd/chgpasswd.c DEBUG(3, ("chat_with_program: Child failed to change password: %s\n", pass->pw_name)); pass 471 source3/smbd/chgpasswd.c DEBUG(3, ("chat_with_program: Dochild for user %s (uid=%d,gid=%d) (as_root = %s)\n", pass->pw_name, pass 473 source3/smbd/chgpasswd.c chstat = dochild(master, slavedev, pass, passwordprogram, as_root); pass 488 source3/smbd/chgpasswd.c (chstat ? "" : "un"), pass->pw_name)); pass 492 source3/smbd/chgpasswd.c bool chgpasswd(const char *name, const struct passwd *pass, pass 551 source3/smbd/chgpasswd.c if (pass) { pass 552 source3/smbd/chgpasswd.c ret = smb_pam_passchange(pass->pw_name, oldpass, newpass); pass 570 source3/smbd/chgpasswd.c if (pass == NULL) { pass 620 source3/smbd/chgpasswd.c pass, pass 627 source3/smbd/chgpasswd.c bool chgpasswd(const char *name, const struct passwd *pass, pass 1087 source3/smbd/chgpasswd.c struct passwd *pass = NULL; pass 1149 source3/smbd/chgpasswd.c pass = Get_Pwnam_alloc(talloc_tos(), username); pass 1150 source3/smbd/chgpasswd.c if (!pass) { pass 1167 source3/smbd/chgpasswd.c TALLOC_FREE(pass); pass 1185 source3/smbd/chgpasswd.c !chgpasswd(username, pass, old_passwd, new_passwd, as_root)) { pass 1186 source3/smbd/chgpasswd.c TALLOC_FREE(pass); pass 1190 source3/smbd/chgpasswd.c TALLOC_FREE(pass); pass 1541 source3/smbd/sesssetup.c char *pass = NULL; pass 1549 source3/smbd/sesssetup.c &pass, pass 1557 source3/smbd/sesssetup.c &pass, pass 1562 source3/smbd/sesssetup.c if (!pass) { pass 1568 source3/smbd/sesssetup.c plaintext_password = data_blob(pass, strlen(pass)+1); pass 32 source3/smbd/uid.c struct passwd *pass; pass 34 source3/smbd/uid.c pass = getpwnam_alloc(talloc_autofree_context(), lp_guestaccount()); pass 35 source3/smbd/uid.c if (!pass) { pass 42 source3/smbd/uid.c initgroups(pass->pw_name, pass->pw_gid); pass 45 source3/smbd/uid.c set_sec_ctx(pass->pw_uid, pass->pw_gid, 0, NULL, NULL); pass 50 source3/smbd/uid.c TALLOC_FREE(pass); pass 224 source3/torture/locktest.c char *pass = getpass("Password: "); pass 225 source3/torture/locktest.c if (pass) { pass 226 source3/torture/locktest.c fstrcpy(password[0], pass); pass 227 source3/torture/locktest.c fstrcpy(password[1], pass); pass 177 source3/torture/locktest2.c char *pass = getpass("Password: "); pass 178 source3/torture/locktest2.c if (pass) { pass 179 source3/torture/locktest2.c fstrcpy(password, pass); pass 224 source3/torture/masktest.c char *pass = getpass("Password: "); pass 225 source3/torture/masktest.c if (pass) { pass 226 source3/torture/masktest.c fstrcpy(password, pass); pass 541 source3/utils/net_util.c const char *pass = NULL; pass 559 source3/utils/net_util.c pass = getpass(prompt); pass 562 source3/utils/net_util.c return pass; pass 90 source3/utils/netlookup.c char *pass = getpass("Password:"); pass 91 source3/utils/netlookup.c if (pass) { pass 92 source3/utils/netlookup.c opt_password = SMB_STRDUP(pass); pass 283 source3/utils/ntlm_auth.c static bool check_plaintext_auth(const char *user, const char *pass, pass 300 source3/utils/ntlm_auth.c fstrcpy(request.data.auth.pass, pass); pass 1035 source3/utils/ntlm_auth.c char *user, *pass; pass 1038 source3/utils/ntlm_auth.c pass=(char *)memchr(buf,' ',length); pass 1039 source3/utils/ntlm_auth.c if (!pass) { pass 1044 source3/utils/ntlm_auth.c *pass='\0'; pass 1045 source3/utils/ntlm_auth.c pass++; pass 1049 source3/utils/ntlm_auth.c rfc1738_unescape(pass); pass 1052 source3/utils/ntlm_auth.c if (check_plaintext_auth(user, pass, False)) { pass 49 source3/utils/ntlm_auth_diagnostics.c bool pass = True; pass 121 source3/utils/ntlm_auth_diagnostics.c pass = False; pass 132 source3/utils/ntlm_auth_diagnostics.c pass = False; pass 142 source3/utils/ntlm_auth_diagnostics.c pass = False; pass 145 source3/utils/ntlm_auth_diagnostics.c return pass; pass 173 source3/utils/ntlm_auth_diagnostics.c bool pass = True; pass 220 source3/utils/ntlm_auth_diagnostics.c pass = False; pass 228 source3/utils/ntlm_auth_diagnostics.c pass = False; pass 230 source3/utils/ntlm_auth_diagnostics.c return pass; pass 239 source3/utils/ntlm_auth_diagnostics.c bool pass = True; pass 291 source3/utils/ntlm_auth_diagnostics.c pass = False; pass 300 source3/utils/ntlm_auth_diagnostics.c pass = False; pass 304 source3/utils/ntlm_auth_diagnostics.c return pass; pass 313 source3/utils/ntlm_auth_diagnostics.c bool pass = True; pass 383 source3/utils/ntlm_auth_diagnostics.c pass = False; pass 385 source3/utils/ntlm_auth_diagnostics.c return pass; pass 596 source3/utils/ntlm_auth_diagnostics.c bool pass = True; pass 601 source3/utils/ntlm_auth_diagnostics.c pass = False; pass 605 source3/utils/ntlm_auth_diagnostics.c return pass; pass 102 source3/utils/smbget.c char *prompt, *pass; pass 106 source3/utils/smbget.c pass = getpass(prompt); pass 108 source3/utils/smbget.c strncpy(pw, pass, pwlen-1); pass 341 source3/web/cgi.c struct passwd *pass = NULL; pass 370 source3/web/cgi.c pass = getpwnam_alloc(talloc_autofree_context(), user); pass 376 source3/web/cgi.c if NT_STATUS_IS_OK(pass_check(pass, user, user_pass, pass 379 source3/web/cgi.c if (pass) { pass 384 source3/web/cgi.c if ( initgroups(pass->pw_name, pass->pw_gid) != 0 ) pass 387 source3/web/cgi.c become_user_permanently(pass->pw_uid, pass->pw_gid); pass 391 source3/web/cgi.c TALLOC_FREE(pass); pass 401 source3/web/cgi.c TALLOC_FREE(pass); pass 381 source3/winbindd/winbindd.h char *pass; pass 127 source3/winbindd/winbindd_cred_cache.c if (cred_ptr && cred_ptr->pass) { pass 132 source3/winbindd/winbindd_cred_cache.c cred_ptr->pass, pass 313 source3/winbindd/winbindd_cred_cache.c if (!cred_ptr || !cred_ptr->pass) { pass 330 source3/winbindd/winbindd_cred_cache.c cred_ptr->pass, pass 765 source3/winbindd/winbindd_cred_cache.c const char *pass) pass 775 source3/winbindd/winbindd_cred_cache.c if (pass) { pass 776 source3/winbindd/winbindd_cred_cache.c memcredp->len += strlen(pass)+1; pass 812 source3/winbindd/winbindd_cred_cache.c E_md4hash(pass, memcredp->nt_hash); pass 813 source3/winbindd/winbindd_cred_cache.c E_deshash(pass, memcredp->lm_hash); pass 815 source3/winbindd/winbindd_cred_cache.c if (pass) { pass 816 source3/winbindd/winbindd_cred_cache.c memcredp->pass = (char *)memcredp->lm_hash + LM_HASH_LEN; pass 817 source3/winbindd/winbindd_cred_cache.c memcpy(memcredp->pass, pass, pass 843 source3/winbindd/winbindd_cred_cache.c memcredp->pass = NULL; pass 854 source3/winbindd/winbindd_cred_cache.c const char *pass) pass 860 source3/winbindd/winbindd_cred_cache.c return store_memory_creds(memcredp, pass); pass 869 source3/winbindd/winbindd_cred_cache.c const char *pass) pass 899 source3/winbindd/winbindd_cred_cache.c return winbindd_replace_memory_creds_internal(memcredp, pass); pass 912 source3/winbindd/winbindd_cred_cache.c status = store_memory_creds(memcredp, pass); pass 938 source3/winbindd/winbindd_cred_cache.c const char *pass) pass 943 source3/winbindd/winbindd_cred_cache.c status = winbindd_add_memory_creds_internal(username, uid, pass); pass 1012 source3/winbindd/winbindd_cred_cache.c const char *pass) pass 1026 source3/winbindd/winbindd_cred_cache.c return winbindd_replace_memory_creds_internal(memcredp, pass); pass 58 source3/winbindd/winbindd_creds.c const char *pass, pass 95 source3/winbindd/winbindd_creds.c if (pass) { pass 118 source3/winbindd/winbindd_creds.c E_md4hash(pass, nt_pass); pass 140 source3/winbindd/winbindd_creds.c const char *pass, pass 143 source3/winbindd/winbindd_creds.c return winbindd_store_creds(domain, mem_ctx, user, pass, info3, NULL); pass 149 source3/winbindd/winbindd_creds.c const char *pass) pass 151 source3/winbindd/winbindd_creds.c return winbindd_store_creds(domain, mem_ctx, NULL, pass, NULL, sid); pass 157 source3/winbindd/winbindd_creds.c const char *pass) pass 159 source3/winbindd/winbindd_creds.c return winbindd_store_creds(domain, mem_ctx, user, pass, NULL, NULL); pass 636 source3/winbindd/winbindd_pam.c state->request.data.auth.pass, pass 823 source3/winbindd/winbindd_pam.c state->request.data.auth.pass pass 824 source3/winbindd/winbindd_pam.c [sizeof(state->request.data.auth.pass)-1]='\0'; pass 931 source3/winbindd/winbindd_pam.c E_md4hash(state->request.data.auth.pass, new_nt_pass); pass 1073 source3/winbindd/winbindd_pam.c state->request.data.auth.pass, pass 1247 source3/winbindd/winbindd_pam.c state->request.data.auth.pass, pass 1268 source3/winbindd/winbindd_pam.c && SMBencrypt(state->request.data.auth.pass, pass 1277 source3/winbindd/winbindd_pam.c SMBNTencrypt(state->request.data.auth.pass, pass 1474 source3/winbindd/winbindd_pam.c state->request.data.auth.pass[sizeof(state->request.data.auth.pass)-1]='\0'; pass 1667 source3/winbindd/winbindd_pam.c state->request.data.auth.pass); pass 1678 source3/winbindd/winbindd_pam.c state->request.data.auth.pass, pass 259 source3/winbindd/winbindd_proto.h const char *pass); pass 262 source3/winbindd/winbindd_proto.h const char *pass); pass 275 source3/winbindd/winbindd_proto.h const char *pass, pass 281 source3/winbindd/winbindd_proto.h const char *pass, pass 286 source3/winbindd/winbindd_proto.h const char *pass); pass 290 source3/winbindd/winbindd_proto.h const char *pass); pass 49 source4/auth/credentials/credentials_files.c char pass[128]; pass 51 source4/auth/credentials/credentials_files.c for(p = pass, *p = '\0'; /* ensure that pass is null-terminated */ pass 52 source4/auth/credentials/credentials_files.c p && p - pass < sizeof(pass);) { pass 61 source4/auth/credentials/credentials_files.c if (p - pass) { pass 77 source4/auth/credentials/credentials_files.c cli_credentials_set_password(credentials, pass, obtained); pass 195 source4/client/smbmount.c char *pass = getpass("Password: "); pass 196 source4/client/smbmount.c if (pass) { pass 197 source4/client/smbmount.c pstrcpy(password, pass); pass 559 source4/client/smbmount.c char pass[128]; pass 577 source4/client/smbmount.c for(p = pass, *p = '\0'; /* ensure that pass is null-terminated */ pass 578 source4/client/smbmount.c p && p - pass < sizeof(pass);) { pass 586 source4/client/smbmount.c if (p - pass) { pass 602 source4/client/smbmount.c pstrcpy(password, pass); pass 1552 source4/dsdb/common/util.c static bool samdb_password_complexity_ok(const char *pass) pass 1554 source4/dsdb/common/util.c return check_password_quality(pass); pass 154 source4/libcli/auth/credentials.c void creds_des_encrypt(struct creds_CredentialState *creds, struct samr_Password *pass) pass 157 source4/libcli/auth/credentials.c des_crypt112_16(tmp.hash, pass->hash, creds->session_key, 1); pass 158 source4/libcli/auth/credentials.c *pass = tmp; pass 164 source4/libcli/auth/credentials.c void creds_des_decrypt(struct creds_CredentialState *creds, struct samr_Password *pass) pass 167 source4/libcli/auth/credentials.c des_crypt112_16(tmp.hash, pass->hash, creds->session_key, 0); pass 168 source4/libcli/auth/credentials.c *pass = tmp; pass 143 source4/ntvfs/cifs/vfs_cifs.c const char *host, *user, *pass, *domain, *remote_share; pass 157 source4/ntvfs/cifs/vfs_cifs.c pass = share_string_option(scfg, CIFS_PASSWORD, NULL); pass 178 source4/ntvfs/cifs/vfs_cifs.c if (user && pass) { pass 189 source4/ntvfs/cifs/vfs_cifs.c cli_credentials_set_password(credentials, pass, CRED_SPECIFIED); pass 161 source4/ntvfs/smb2/vfs_smb2.c const char *host, *user, *pass, *domain, *remote_share; pass 175 source4/ntvfs/smb2/vfs_smb2.c pass = share_string_option(scfg, SMB2_PASSWORD, NULL); pass 196 source4/ntvfs/smb2/vfs_smb2.c if (user && pass) { pass 207 source4/ntvfs/smb2/vfs_smb2.c cli_credentials_set_password(credentials, pass, CRED_SPECIFIED); pass 44 source4/rpc_server/remote/dcesrv_remote.c const char *user, *pass, *domain; pass 64 source4/rpc_server/remote/dcesrv_remote.c pass = lp_parm_string(dce_call->conn->dce_ctx->lp_ctx, NULL, "dcerpc_remote", "password"); pass 73 source4/rpc_server/remote/dcesrv_remote.c if (user && pass) { pass 84 source4/rpc_server/remote/dcesrv_remote.c cli_credentials_set_password(credentials, pass, CRED_SPECIFIED); pass 166 source4/torture/locktest2.c char *pass = getpass("Password: "); pass 167 source4/torture/locktest2.c if (pass) { pass 168 source4/torture/locktest2.c password = talloc_strdup(mem_ctx, pass); pass 272 source4/torture/rpc/samlogon.c bool pass = true; pass 345 source4/torture/rpc/samlogon.c pass = false; pass 361 source4/torture/rpc/samlogon.c pass = false; pass 373 source4/torture/rpc/samlogon.c pass = false; pass 376 source4/torture/rpc/samlogon.c return pass; pass 405 source4/torture/rpc/samlogon.c bool pass = true; pass 462 source4/torture/rpc/samlogon.c pass = false; pass 473 source4/torture/rpc/samlogon.c pass = false; pass 488 source4/torture/rpc/samlogon.c pass = false; pass 491 source4/torture/rpc/samlogon.c return pass; pass 500 source4/torture/rpc/samlogon.c bool pass = true; pass 562 source4/torture/rpc/samlogon.c pass = false; pass 571 source4/torture/rpc/samlogon.c pass = false; pass 575 source4/torture/rpc/samlogon.c return pass; pass 592 source4/torture/rpc/samlogon.c bool pass = true; pass 674 source4/torture/rpc/samlogon.c pass = false; pass 683 source4/torture/rpc/samlogon.c pass = false; pass 696 source4/torture/rpc/samlogon.c pass = false; pass 704 source4/torture/rpc/samlogon.c pass = false; pass 716 source4/torture/rpc/samlogon.c pass = false; pass 723 source4/torture/rpc/samlogon.c pass = false; pass 728 source4/torture/rpc/samlogon.c return pass; pass 740 source4/torture/rpc/samlogon.c bool pass = true; pass 841 source4/torture/rpc/samlogon.c pass = false; pass 850 source4/torture/rpc/samlogon.c pass = false; pass 861 source4/torture/rpc/samlogon.c pass = false; pass 871 source4/torture/rpc/samlogon.c pass = false; pass 882 source4/torture/rpc/samlogon.c pass = false; pass 894 source4/torture/rpc/samlogon.c pass = false; pass 903 source4/torture/rpc/samlogon.c pass = false; pass 907 source4/torture/rpc/samlogon.c return pass; pass 1045 source4/torture/rpc/samlogon.c bool pass = true; pass 1121 source4/torture/rpc/samlogon.c pass = false; pass 1132 source4/torture/rpc/samlogon.c pass = false; pass 1141 source4/torture/rpc/samlogon.c pass = false; pass 1143 source4/torture/rpc/samlogon.c return pass; pass 176 source4/utils/ntlm_auth.c static bool check_plaintext_auth(const char *user, const char *pass, pass 179 source4/utils/ntlm_auth.c return (strcmp(pass, opt_password) == 0); pass 254 source4/utils/ntlm_auth.c char *user, *pass; pass 257 source4/utils/ntlm_auth.c pass = memchr(buf, ' ', length); pass 258 source4/utils/ntlm_auth.c if (!pass) { pass 263 source4/utils/ntlm_auth.c *pass='\0'; pass 264 source4/utils/ntlm_auth.c pass++; pass 268 source4/utils/ntlm_auth.c rfc1738_unescape(pass); pass 271 source4/utils/ntlm_auth.c if (check_plaintext_auth(user, pass, false)) { pass 592 source4/winbind/wb_samba3_cmd.c cli_credentials_set_password(credentials, s3call->request.data.auth.pass, CRED_SPECIFIED);