auth 50 examples/auth/auth_skel.c (*auth_method)->auth = check_skel_security; auth 1567 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->auth)); auth 1585 librpc/gen_ndr/ndr_netlogon.c if (r->auth) { auth 1587 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->auth, r->auth_size)); auth 1619 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->auth); auth 1621 librpc/gen_ndr/ndr_netlogon.c r->auth = NULL; auth 1644 librpc/gen_ndr/ndr_netlogon.c if (r->auth) { auth 1646 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->auth, 0); auth 1647 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_array_size(ndr, &r->auth)); auth 1648 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC_N(ndr, r->auth, ndr_get_array_size(ndr, &r->auth)); auth 1649 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->auth, ndr_get_array_size(ndr, &r->auth))); auth 1659 librpc/gen_ndr/ndr_netlogon.c if (r->auth) { auth 1660 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_check_array_size(ndr, (void*)&r->auth, r->auth_size)); auth 1682 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "auth", r->auth); auth 1684 librpc/gen_ndr/ndr_netlogon.c if (r->auth) { auth 1685 librpc/gen_ndr/ndr_netlogon.c ndr_print_array_uint8(ndr, "auth", r->auth, r->auth_size); auth 204 librpc/gen_ndr/netlogon.h uint8_t *auth;/* [unique,size_is(auth_size)] */ auth 61 nsswitch/libwbclient/wbc_pam.c i->user_flags = resp->data.auth.info3.user_flgs; auth 63 nsswitch/libwbclient/wbc_pam.c i->account_name = talloc_strdup(i, resp->data.auth.info3.user_name); auth 66 nsswitch/libwbclient/wbc_pam.c i->full_name = talloc_strdup(i, resp->data.auth.info3.full_name); auth 68 nsswitch/libwbclient/wbc_pam.c i->domain_name = talloc_strdup(i, resp->data.auth.info3.logon_dom); auth 72 nsswitch/libwbclient/wbc_pam.c i->acct_flags = resp->data.auth.info3.acct_flags; auth 74 nsswitch/libwbclient/wbc_pam.c resp->data.auth.user_session_key, auth 77 nsswitch/libwbclient/wbc_pam.c resp->data.auth.first_8_lm_hash, auth 80 nsswitch/libwbclient/wbc_pam.c i->logon_count = resp->data.auth.info3.logon_count; auth 81 nsswitch/libwbclient/wbc_pam.c i->bad_password_count = resp->data.auth.info3.bad_pw_count; auth 83 nsswitch/libwbclient/wbc_pam.c i->logon_time = resp->data.auth.info3.logon_time; auth 84 nsswitch/libwbclient/wbc_pam.c i->logoff_time = resp->data.auth.info3.logoff_time; auth 85 nsswitch/libwbclient/wbc_pam.c i->kickoff_time = resp->data.auth.info3.kickoff_time; auth 86 nsswitch/libwbclient/wbc_pam.c i->pass_last_set_time = resp->data.auth.info3.pass_last_set_time; auth 87 nsswitch/libwbclient/wbc_pam.c i->pass_can_change_time = resp->data.auth.info3.pass_can_change_time; auth 88 nsswitch/libwbclient/wbc_pam.c i->pass_must_change_time= resp->data.auth.info3.pass_must_change_time; auth 90 nsswitch/libwbclient/wbc_pam.c i->logon_server = talloc_strdup(i, resp->data.auth.info3.logon_srv); auth 92 nsswitch/libwbclient/wbc_pam.c i->logon_script = talloc_strdup(i, resp->data.auth.info3.logon_script); auth 94 nsswitch/libwbclient/wbc_pam.c i->profile_path = talloc_strdup(i, resp->data.auth.info3.profile_path); auth 96 nsswitch/libwbclient/wbc_pam.c i->home_directory= talloc_strdup(i, resp->data.auth.info3.home_dir); auth 98 nsswitch/libwbclient/wbc_pam.c i->home_drive = talloc_strdup(i, resp->data.auth.info3.dir_drive); auth 102 nsswitch/libwbclient/wbc_pam.c i->num_sids += resp->data.auth.info3.num_groups; auth 103 nsswitch/libwbclient/wbc_pam.c i->num_sids += resp->data.auth.info3.num_other_sids; auth 108 nsswitch/libwbclient/wbc_pam.c wbc_status = wbcStringToSid(resp->data.auth.info3.dom_sid, auth 125 nsswitch/libwbclient/wbc_pam.c resp->data.auth.info3.user_rid, auth 129 nsswitch/libwbclient/wbc_pam.c resp->data.auth.info3.group_rid, auth 139 nsswitch/libwbclient/wbc_pam.c for (j=0; j < resp->data.auth.info3.num_groups; j++) { auth 163 nsswitch/libwbclient/wbc_pam.c for (j=0; j < resp->data.auth.info3.num_other_sids; j++) { auth 217 nsswitch/libwbclient/wbc_pam.c e->nt_status = resp->data.auth.nt_status; auth 218 nsswitch/libwbclient/wbc_pam.c e->pam_error = resp->data.auth.pam_error; auth 219 nsswitch/libwbclient/wbc_pam.c e->nt_string = talloc_strdup(e, resp->data.auth.nt_status_string); auth 222 nsswitch/libwbclient/wbc_pam.c e->display_string = talloc_strdup(e, resp->data.auth.error_string); auth 243 nsswitch/libwbclient/wbc_pam.c i->min_passwordage = resp->data.auth.policy.min_passwordage; auth 244 nsswitch/libwbclient/wbc_pam.c i->min_length_password = resp->data.auth.policy.min_length_password; auth 245 nsswitch/libwbclient/wbc_pam.c i->password_history = resp->data.auth.policy.password_history; auth 246 nsswitch/libwbclient/wbc_pam.c i->password_properties = resp->data.auth.policy.password_properties; auth 247 nsswitch/libwbclient/wbc_pam.c i->expire = resp->data.auth.policy.expire; auth 270 nsswitch/libwbclient/wbc_pam.c if (resp->data.auth.krb5ccname) { auth 275 nsswitch/libwbclient/wbc_pam.c (uint8_t *)resp->data.auth.krb5ccname, auth 276 nsswitch/libwbclient/wbc_pam.c strlen(resp->data.auth.krb5ccname)+1); auth 280 nsswitch/libwbclient/wbc_pam.c if (resp->data.auth.unix_username) { auth 285 nsswitch/libwbclient/wbc_pam.c (uint8_t *)resp->data.auth.unix_username, auth 286 nsswitch/libwbclient/wbc_pam.c strlen(resp->data.auth.unix_username)+1); auth 352 nsswitch/libwbclient/wbc_pam.c snprintf(request.data.auth.user, auth 353 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.user)-1, auth 359 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth.user, auth 361 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.user)-1); auth 364 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth.pass, auth 366 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.pass)-1); auth 465 nsswitch/libwbclient/wbc_pam.c if (response.data.auth.nt_status != 0) { auth 519 nsswitch/libwbclient/wbc_pam.c if (response.data.auth.nt_status != 0) { auth 606 nsswitch/libwbclient/wbc_pam.c if (response.data.auth.nt_status != 0) { auth 835 nsswitch/libwbclient/wbc_pam.c if (response.data.auth.nt_status != 0) { auth 853 nsswitch/libwbclient/wbc_pam.c *reject_reason = response.data.auth.reject_reason; auth 944 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth.user, auth 946 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.user)-1); auth 948 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth.pass, auth 950 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.pass)-1); auth 956 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth.krb5_cc_type, auth 958 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.krb5_cc_type) - 1); auth 965 nsswitch/libwbclient/wbc_pam.c memcpy(&request.data.auth.uid, auth 967 nsswitch/libwbclient/wbc_pam.c MIN(sizeof(request.data.auth.uid), auth 988 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth.require_membership_of_sid, auth 990 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.require_membership_of_sid) - 1); auth 1000 nsswitch/libwbclient/wbc_pam.c if (response.data.auth.nt_status != 0) { auth 1195 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username); auth 1196 nsswitch/wbinfo.c fstrcpy(request.data.auth.pass, p + 1); auth 1199 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username); auth 1201 nsswitch/wbinfo.c fstrcpy(request.data.auth.pass, password); auth 1207 nsswitch/wbinfo.c fstrcpy(request.data.auth.krb5_cc_type, cctype); auth 1209 nsswitch/wbinfo.c request.data.auth.uid = geteuid(); auth 1218 nsswitch/wbinfo.c if (response.data.auth.nt_status) auth 1220 nsswitch/wbinfo.c response.data.auth.nt_status_string, auth 1221 nsswitch/wbinfo.c response.data.auth.nt_status, auth 1222 nsswitch/wbinfo.c response.data.auth.error_string); auth 1227 nsswitch/wbinfo.c if (response.data.auth.info3.user_flgs & NETLOGON_CACHED_ACCOUNT) { auth 1232 nsswitch/wbinfo.c if (response.data.auth.krb5ccname[0] != '\0') { auth 1233 nsswitch/wbinfo.c d_printf("credentials were put in: %s\n", response.data.auth.krb5ccname); auth 1272 nsswitch/wbinfo.c if (response.data.auth.nt_status) auth 1274 nsswitch/wbinfo.c response.data.auth.nt_status_string, auth 1275 nsswitch/wbinfo.c response.data.auth.nt_status, auth 1276 nsswitch/wbinfo.c response.data.auth.error_string); auth 1405 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username); auth 1406 nsswitch/wbinfo.c fstrcpy(request.data.auth.pass, p + 1); auth 1409 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username); auth 1410 nsswitch/wbinfo.c fstrcpy(request.data.auth.pass, getpass("Password: ")); auth 1422 nsswitch/wbinfo.c if (response.data.auth.nt_status) auth 1424 nsswitch/wbinfo.c response.data.auth.nt_status_string, auth 1425 nsswitch/wbinfo.c response.data.auth.nt_status, auth 1426 nsswitch/wbinfo.c response.data.auth.error_string); auth 544 nsswitch/wbinfo4.c response.data.auth.nt_status_string, auth 545 nsswitch/wbinfo4.c response.data.auth.nt_status); auth 736 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username); auth 737 nsswitch/wbinfo4.c fstrcpy(request.data.auth.pass, p + 1); auth 740 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username); auth 744 nsswitch/wbinfo4.c fstrcpy(request.data.auth.krb5_cc_type, cctype); auth 746 nsswitch/wbinfo4.c request.data.auth.uid = geteuid(); auth 755 nsswitch/wbinfo4.c if (response.data.auth.nt_status) auth 757 nsswitch/wbinfo4.c response.data.auth.nt_status_string, auth 758 nsswitch/wbinfo4.c response.data.auth.nt_status, auth 759 nsswitch/wbinfo4.c response.data.auth.error_string); auth 764 nsswitch/wbinfo4.c if (response.data.auth.info3.user_flgs & NETLOGON_CACHED_ACCOUNT) { auth 769 nsswitch/wbinfo4.c if (response.data.auth.krb5ccname[0] != '\0') { auth 770 nsswitch/wbinfo4.c d_printf("credentials were put in: %s\n", response.data.auth.krb5ccname); auth 797 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username); auth 798 nsswitch/wbinfo4.c fstrcpy(request.data.auth.pass, p + 1); auth 801 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username); auth 810 nsswitch/wbinfo4.c if (response.data.auth.nt_status) auth 812 nsswitch/wbinfo4.c response.data.auth.nt_status_string, auth 813 nsswitch/wbinfo4.c response.data.auth.nt_status, auth 814 nsswitch/wbinfo4.c response.data.auth.error_string); auth 917 nsswitch/wbinfo4.c if (response.data.auth.nt_status) auth 919 nsswitch/wbinfo4.c response.data.auth.nt_status_string, auth 920 nsswitch/wbinfo4.c response.data.auth.nt_status, auth 921 nsswitch/wbinfo4.c response.data.auth.error_string); auth 884 nsswitch/winbind_nss_aix.c STRCPY_RET(request.data.auth.user, r_user); auth 885 nsswitch/winbind_nss_aix.c STRCPY_RET(request.data.auth.pass, pass); auth 254 nsswitch/winbind_struct_protocol.h } auth; /* pam_winbind auth module */ auth 451 nsswitch/winbind_struct_protocol.h } auth; auth 258 source3/auth/auth.c result = auth_method->auth(auth_context, auth_method->private_data, mem_ctx, user_info, server_info); auth 58 source3/auth/auth_builtin.c (*auth_method)->auth = check_guest_security; auth 110 source3/auth/auth_builtin.c (*auth_method)->auth = check_name_to_ntstatus_security; auth 159 source3/auth/auth_builtin.c (*auth_method)->auth = check_fixed_challenge_security; auth 431 source3/auth/auth_domain.c (*auth_method)->auth = check_ntdomain_security; auth 533 source3/auth/auth_domain.c (*auth_method)->auth = check_trustdomain_security; auth 34 source3/auth/auth_netlogond.c struct cli_pipe_auth_data *auth; auth 50 source3/auth/auth_netlogond.c schannel_key, &auth); auth 58 source3/auth/auth_netlogond.c status = rpc_pipe_bind(p, auth); auth 163 source3/auth/auth_netlogond.c struct cli_pipe_auth_data *auth; auth 226 source3/auth/auth_netlogond.c status = rpccli_anon_bind_data(p, &auth); auth 233 source3/auth/auth_netlogond.c status = rpc_pipe_bind(p, auth); auth 308 source3/auth/auth_netlogond.c (*auth_method)->auth = check_netlogond_security; auth 383 source3/auth/auth_sam.c (*auth_method)->auth = check_sam_security; auth 440 source3/auth/auth_sam.c (*auth_method)->auth = check_samstrict_security; auth 129 source3/auth/auth_script.c (*auth_method)->auth = script_check_user_credentials; auth 461 source3/auth/auth_server.c (*auth_method)->auth = check_smbserver_security; auth 138 source3/auth/auth_unix.c (*auth_method)->auth = check_unix_security; auth 142 source3/auth/auth_wbc.c (*auth_method)->auth = check_wbc_security; auth 97 source3/auth/auth_winbind.c return auth_method->auth(auth_context, auth_method->private_data, auth 136 source3/auth/auth_winbind.c (*auth_method)->auth = check_winbind_security; auth 72 source3/include/ads.h } auth; auth 109 source3/include/auth.h NTSTATUS (*auth)(const struct auth_context *auth_context, auth 135 source3/include/client.h struct cli_pipe_auth_data *auth; auth 224 source3/include/ntdomain.h struct pipe_auth_data auth; auth 2825 source3/include/proto.h bool spnego_parse_auth(DATA_BLOB blob, DATA_BLOB *auth); auth 2830 source3/include/proto.h DATA_BLOB *auth); auth 5270 source3/include/proto.h struct cli_pipe_auth_data *auth); auth 5273 source3/include/proto.h struct cli_pipe_auth_data *auth); auth 117 source3/lib/netapi/joindomain.c &pipe_cli->auth->user_session_key, auth 243 source3/lib/netapi/joindomain.c &pipe_cli->auth->user_session_key, auth 363 source3/lib/netapi/joindomain.c SAFE_FREE(ads->auth.user_name); auth 365 source3/lib/netapi/joindomain.c ads->auth.user_name = SMB_STRDUP(r->in.account); auth 367 source3/lib/netapi/joindomain.c ads->auth.user_name = SMB_STRDUP(ctx->username); auth 370 source3/lib/netapi/joindomain.c SAFE_FREE(ads->auth.password); auth 372 source3/lib/netapi/joindomain.c ads->auth.password = SMB_STRDUP(r->in.password); auth 374 source3/lib/netapi/joindomain.c ads->auth.password = SMB_STRDUP(ctx->password); auth 419 source3/lib/netapi/joindomain.c &pipe_cli->auth->user_session_key, auth 461 source3/lib/netapi/joindomain.c &pipe_cli->auth->user_session_key, auth 453 source3/lib/netapi/user.c &pipe_cli->auth->user_session_key, auth 1856 source3/lib/netapi/user.c &pipe_cli->auth->user_session_key, auth 409 source3/lib/popt_common.c XFILE *auth; auth 414 source3/lib/popt_common.c if ((auth=x_fopen(file, O_RDONLY, 0)) == NULL) auth 421 source3/lib/popt_common.c while (!x_feof(auth)) auth 424 source3/lib/popt_common.c if (!x_fgets(buf, sizeof(buf), auth)) auth 458 source3/lib/popt_common.c x_fclose(auth); auth 149 source3/libads/ads_struct.c ads->auth.flags = wrap_flags; auth 170 source3/libads/ads_struct.c SAFE_FREE((*ads)->auth.realm); auth 171 source3/libads/ads_struct.c SAFE_FREE((*ads)->auth.password); auth 172 source3/libads/ads_struct.c SAFE_FREE((*ads)->auth.user_name); auth 173 source3/libads/ads_struct.c SAFE_FREE((*ads)->auth.kdc_server); auth 296 source3/libads/kerberos.c if (ads->auth.flags & ADS_AUTH_USER_CREDS) { auth 297 source3/libads/kerberos.c account_name = ads->auth.user_name; auth 313 source3/libads/kerberos.c account_name = ads->auth.user_name; auth 317 source3/libads/kerberos.c if (asprintf(&s, "%s@%s", account_name, ads->auth.realm) == -1) { auth 321 source3/libads/kerberos.c if (!ads->auth.password) { auth 326 source3/libads/kerberos.c ret = kerberos_kinit_password_ext(s, ads->auth.password, ads->auth.time_offset, auth 327 source3/libads/kerberos.c &ads->auth.tgt_expire, NULL, NULL, False, False, ads->auth.renewable, auth 832 source3/libads/krb5_setpw.c status = ads_krb5_set_password(ads->auth.kdc_server, principal, auth 833 source3/libads/krb5_setpw.c password, ads->auth.time_offset); auth 341 source3/libads/ldap.c if (!(ads->auth.flags & ADS_AUTH_NO_BIND)) { auth 453 source3/libads/ldap.c ads->auth.flags = ADS_AUTH_NO_BIND; auth 623 source3/libads/ldap.c if (!ads->auth.user_name) { auth 627 source3/libads/ldap.c if (asprintf(&ads->auth.user_name, "%s$", global_myname() ) == -1) { auth 629 source3/libads/ldap.c ads->auth.user_name = NULL; auth 633 source3/libads/ldap.c if (!ads->auth.realm) { auth 634 source3/libads/ldap.c ads->auth.realm = SMB_STRDUP(ads->config.realm); auth 637 source3/libads/ldap.c if (!ads->auth.kdc_server) { auth 639 source3/libads/ldap.c ads->auth.kdc_server = SMB_STRDUP(addr); auth 648 source3/libads/ldap.c setenv(env, ads->auth.kdc_server, 1); auth 656 source3/libads/ldap.c if (ads->auth.flags & ADS_AUTH_NO_BIND) { auth 701 source3/libads/ldap.c if (ads->auth.flags & ADS_AUTH_ANON_BIND) { auth 706 source3/libads/ldap.c if (ads->auth.flags & ADS_AUTH_SIMPLE_BIND) { auth 707 source3/libads/ldap.c status = ADS_ERROR(ldap_simple_bind_s(ads->ldap.ld, ads->auth.user_name, ads->auth.password)); auth 732 source3/libads/ldap.c ads->auth.flags |= ADS_AUTH_USER_CREDS; auth 2825 source3/libads/ldap.c ads_s->auth.flags = ADS_AUTH_ANON_BIND; auth 2848 source3/libads/ldap.c ads->auth.time_offset = ads->config.current_time - time(NULL); auth 2849 source3/libads/ldap.c DEBUG(4,("time offset is %d seconds\n", ads->auth.time_offset)); auth 2887 source3/libads/ldap.c ads_s->auth.flags = ADS_AUTH_ANON_BIND; auth 57 source3/libads/ldap_utils.c if (ads->auth.flags & ADS_AUTH_ANON_BIND) { auth 94 source3/libads/ldap_utils.c if (ads->auth.flags & ADS_AUTH_ANON_BIND) { auth 55 source3/libads/ndr.c ndr_print_string(ndr, "realm", r->auth.realm); auth 57 source3/libads/ndr.c ndr_print_string(ndr, "password", r->auth.password); auth 61 source3/libads/ndr.c ndr_print_string(ndr, "user_name", r->auth.user_name); auth 62 source3/libads/ndr.c ndr_print_string(ndr, "kdc_server", r->auth.kdc_server); auth 63 source3/libads/ndr.c ndr_print_ads_auth_flags(ndr, "flags", r->auth.flags); auth 64 source3/libads/ndr.c ndr_print_uint32(ndr, "time_offset", r->auth.time_offset); auth 65 source3/libads/ndr.c ndr_print_time_t(ndr, "tgt_expire", r->auth.tgt_expire); auth 66 source3/libads/ndr.c ndr_print_time_t(ndr, "tgs_expire", r->auth.tgs_expire); auth 67 source3/libads/ndr.c ndr_print_time_t(ndr, "renewable", r->auth.renewable); auth 140 source3/libads/sasl.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, ads->auth.user_name))) { auth 143 source3/libads/sasl.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_domain(ntlmssp_state, ads->auth.realm))) { auth 146 source3/libads/sasl.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_password(ntlmssp_state, ads->auth.password))) { auth 155 source3/libads/sasl.c if (ads->auth.flags & ADS_AUTH_SASL_FORCE) { auth 466 source3/libads/sasl.c if (ads->auth.flags & ADS_AUTH_SASL_FORCE) { auth 481 source3/libads/sasl.c if (ads->auth.flags & ADS_AUTH_SASL_FORCE) { auth 696 source3/libads/sasl.c rc = spnego_gen_negTokenTarg(principal, ads->auth.time_offset, &blob, &session_key, 0, auth 697 source3/libads/sasl.c &ads->auth.tgs_expire); auth 792 source3/libads/sasl.c if (!(ads->auth.flags & ADS_AUTH_DISABLE_KERBEROS) && auth 827 source3/libads/sasl.c !(ads->auth.flags & ADS_AUTH_ALLOW_NTLMSSP)) { auth 1099 source3/libads/sasl.c if (ads->auth.flags & ADS_AUTH_SASL_SEAL) { auth 1101 source3/libads/sasl.c } else if (ads->auth.flags & ADS_AUTH_SASL_SIGN) { auth 38 source3/libads/util.c ret = kerberos_set_password(ads->auth.kdc_server, host_principal, password, host_principal, new_password, ads->auth.time_offset); auth 665 source3/libgpo/gpo_util.c ads->auth.user_name, NULL, auth 666 source3/libgpo/gpo_util.c ads->auth.password, auth 112 source3/libnet/libnet_join.c SAFE_FREE(my_ads->auth.user_name); auth 113 source3/libnet/libnet_join.c my_ads->auth.user_name = SMB_STRDUP(user_name); auth 117 source3/libnet/libnet_join.c SAFE_FREE(my_ads->auth.password); auth 118 source3/libnet/libnet_join.c my_ads->auth.password = SMB_STRDUP(password); auth 55 source3/libnet/libnet_samsync_keytab.c ads->auth.user_name = SMB_STRDUP(username); auth 56 source3/libnet/libnet_samsync_keytab.c ads->auth.password = SMB_STRDUP(password); auth 495 source3/libsmb/clispnego.c bool spnego_parse_auth(DATA_BLOB blob, DATA_BLOB *auth) auth 513 source3/libsmb/clispnego.c *auth = data_blob_talloc(talloc_tos(), auth 575 source3/libsmb/clispnego.c DATA_BLOB *auth) auth 600 source3/libsmb/clispnego.c *auth = data_blob_null; auth 609 source3/libsmb/clispnego.c asn1_read_OctetString(data, NULL, auth); auth 636 source3/libsmb/clispnego.c data_blob_free(auth); auth 77 source3/libsmb/namequery_dc.c ads->auth.flags |= ADS_AUTH_NO_BIND; auth 3340 source3/printing/nt_printing.c SAFE_FREE(ads->auth.password); auth 3341 source3/printing/nt_printing.c ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), auth 3382 source3/printing/nt_printing.c SAFE_FREE(ads->auth.password); auth 3383 source3/printing/nt_printing.c ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), auth 555 source3/rpc_client/cli_pipe.c NTLMSSP_STATE *ntlmssp_state = cli->auth->a_u.ntlmssp_state; auth 563 source3/rpc_client/cli_pipe.c if (cli->auth->auth_level == PIPE_AUTH_LEVEL_NONE auth 564 source3/rpc_client/cli_pipe.c || cli->auth->auth_level == PIPE_AUTH_LEVEL_CONNECT) { auth 608 source3/rpc_client/cli_pipe.c switch (cli->auth->auth_level) { auth 641 source3/rpc_client/cli_pipe.c "auth level %d\n", cli->auth->auth_level)); auth 678 source3/rpc_client/cli_pipe.c cli->auth->a_u.schannel_auth; auth 681 source3/rpc_client/cli_pipe.c if (cli->auth->auth_level == PIPE_AUTH_LEVEL_NONE auth 682 source3/rpc_client/cli_pipe.c || cli->auth->auth_level == PIPE_AUTH_LEVEL_CONNECT) { auth 729 source3/rpc_client/cli_pipe.c cli->auth->auth_level, auth 790 source3/rpc_client/cli_pipe.c switch(cli->auth->auth_type) { auth 823 source3/rpc_client/cli_pipe.c cli->auth->auth_type )); auth 1480 source3/rpc_client/cli_pipe.c struct kerberos_auth_struct *a = cli->auth->a_u.kerberos_auth; auth 1546 source3/rpc_client/cli_pipe.c nt_status = ntlmssp_update(cli->auth->a_u.ntlmssp_state, auth 1592 source3/rpc_client/cli_pipe.c nt_status = ntlmssp_update(cli->auth->a_u.ntlmssp_state, auth 1632 source3/rpc_client/cli_pipe.c if (!cli->auth->domain || !cli->auth->domain[0]) { auth 1633 source3/rpc_client/cli_pipe.c cli->auth->domain = talloc_strdup(cli, lp_workgroup()); auth 1634 source3/rpc_client/cli_pipe.c if (cli->auth->domain == NULL) { auth 1639 source3/rpc_client/cli_pipe.c init_rpc_auth_schannel_neg(&schannel_neg, cli->auth->domain, auth 1825 source3/rpc_client/cli_pipe.c if (!cli->auth->a_u.ntlmssp_state) { auth 1832 source3/rpc_client/cli_pipe.c cli->auth->auth_type), auth 1833 source3/rpc_client/cli_pipe.c cli->auth->auth_level, auth 1843 source3/rpc_client/cli_pipe.c switch (cli->auth->auth_level) { auth 1846 source3/rpc_client/cli_pipe.c status = ntlmssp_seal_packet(cli->auth->a_u.ntlmssp_state, auth 1860 source3/rpc_client/cli_pipe.c status = ntlmssp_sign_packet(cli->auth->a_u.ntlmssp_state, auth 1903 source3/rpc_client/cli_pipe.c struct schannel_auth_struct *sas = cli->auth->a_u.schannel_auth; auth 1913 source3/rpc_client/cli_pipe.c map_pipe_auth_type_to_rpc_auth_type(cli->auth->auth_type), auth 1914 source3/rpc_client/cli_pipe.c cli->auth->auth_level, auth 1923 source3/rpc_client/cli_pipe.c switch (cli->auth->auth_level) { auth 1930 source3/rpc_client/cli_pipe.c cli->auth->auth_level, auth 1975 source3/rpc_client/cli_pipe.c switch (cli->auth->auth_level) { auth 1988 source3/rpc_client/cli_pipe.c switch(cli->auth->auth_type) { auth 2188 source3/rpc_client/cli_pipe.c switch (state->cli->auth->auth_type) { auth 2555 source3/rpc_client/cli_pipe.c struct cli_pipe_auth_data *auth) auth 2568 source3/rpc_client/cli_pipe.c (unsigned int)auth->auth_type, auth 2569 source3/rpc_client/cli_pipe.c (unsigned int)auth->auth_level )); auth 2578 source3/rpc_client/cli_pipe.c cli->auth = talloc_move(cli, &auth); auth 2585 source3/rpc_client/cli_pipe.c cli->auth->auth_type, auth 2586 source3/rpc_client/cli_pipe.c cli->auth->auth_level); auth 2661 source3/rpc_client/cli_pipe.c switch(state->cli->auth->auth_type) { auth 2695 source3/rpc_client/cli_pipe.c (unsigned int)state->cli->auth->auth_type)); auth 2733 source3/rpc_client/cli_pipe.c status = ntlmssp_update(state->cli->auth->a_u.ntlmssp_state, auth 2745 source3/rpc_client/cli_pipe.c state->cli->auth->auth_type, auth 2746 source3/rpc_client/cli_pipe.c state->cli->auth->auth_level, auth 2829 source3/rpc_client/cli_pipe.c status = ntlmssp_update(state->cli->auth->a_u.ntlmssp_state, auth 2854 source3/rpc_client/cli_pipe.c state->cli->auth->auth_level, auth 2940 source3/rpc_client/cli_pipe.c struct cli_pipe_auth_data *auth) auth 2952 source3/rpc_client/cli_pipe.c req = rpc_pipe_bind_send(frame, ev, cli, auth); auth 3000 source3/rpc_client/cli_pipe.c if ((rpc_cli->auth->auth_type == PIPE_AUTH_TYPE_NTLMSSP) auth 3001 source3/rpc_client/cli_pipe.c || (rpc_cli->auth->auth_type == PIPE_AUTH_TYPE_SPNEGO_NTLMSSP)) { auth 3002 source3/rpc_client/cli_pipe.c memcpy(nt_hash, rpc_cli->auth->a_u.ntlmssp_state->nt_hash, 16); auth 3038 source3/rpc_client/cli_pipe.c static int cli_auth_ntlmssp_data_destructor(struct cli_pipe_auth_data *auth) auth 3040 source3/rpc_client/cli_pipe.c ntlmssp_end(&auth->a_u.ntlmssp_state); auth 3153 source3/rpc_client/cli_pipe.c static int cli_auth_kerberos_data_destructor(struct kerberos_auth_struct *auth) auth 3155 source3/rpc_client/cli_pipe.c data_blob_free(&auth->session_key); auth 3290 source3/rpc_client/cli_pipe.c struct cli_pipe_auth_data *auth = NULL; auth 3315 source3/rpc_client/cli_pipe.c status = rpccli_anon_bind_data(tmp_ctx, &auth); auth 3320 source3/rpc_client/cli_pipe.c status = rpc_pipe_bind(epm_pipe, auth); auth 3578 source3/rpc_client/cli_pipe.c struct cli_pipe_auth_data *auth; auth 3608 source3/rpc_client/cli_pipe.c status = rpccli_anon_bind_data(result, &auth); auth 3616 source3/rpc_client/cli_pipe.c status = rpc_pipe_bind(result, auth); auth 3659 source3/rpc_client/cli_pipe.c struct cli_pipe_auth_data *auth; auth 3667 source3/rpc_client/cli_pipe.c status = rpccli_anon_bind_data(result, &auth); auth 3681 source3/rpc_client/cli_pipe.c TALLOC_FREE(auth->user_name); auth 3682 source3/rpc_client/cli_pipe.c TALLOC_FREE(auth->domain); auth 3684 source3/rpc_client/cli_pipe.c auth->user_name = talloc_strdup(auth, cli->user_name); auth 3685 source3/rpc_client/cli_pipe.c auth->domain = talloc_strdup(auth, cli->domain); auth 3686 source3/rpc_client/cli_pipe.c auth->user_session_key = data_blob_talloc(auth, auth 3690 source3/rpc_client/cli_pipe.c if ((auth->user_name == NULL) || (auth->domain == NULL)) { auth 3695 source3/rpc_client/cli_pipe.c status = rpc_pipe_bind(result, auth); auth 3746 source3/rpc_client/cli_pipe.c struct cli_pipe_auth_data *auth; auth 3756 source3/rpc_client/cli_pipe.c password, &auth); auth 3763 source3/rpc_client/cli_pipe.c status = rpc_pipe_bind(result, auth); auth 3930 source3/rpc_client/cli_pipe.c struct cli_pipe_auth_data *auth; auth 3939 source3/rpc_client/cli_pipe.c pdc->sess_key, &auth); auth 3947 source3/rpc_client/cli_pipe.c status = rpc_pipe_bind(result, auth); auth 4109 source3/rpc_client/cli_pipe.c struct cli_pipe_auth_data *auth; auth 4118 source3/rpc_client/cli_pipe.c username, password, &auth); auth 4126 source3/rpc_client/cli_pipe.c status = rpc_pipe_bind(result, auth); auth 4150 source3/rpc_client/cli_pipe.c if (!cli->auth) { auth 4154 source3/rpc_client/cli_pipe.c switch (cli->auth->auth_type) { auth 4157 source3/rpc_client/cli_pipe.c cli->auth->a_u.schannel_auth->sess_key, 16); auth 4162 source3/rpc_client/cli_pipe.c cli->auth->a_u.ntlmssp_state->session_key.data, auth 4163 source3/rpc_client/cli_pipe.c cli->auth->a_u.ntlmssp_state->session_key.length); auth 4168 source3/rpc_client/cli_pipe.c cli->auth->a_u.kerberos_auth->session_key.data, auth 4169 source3/rpc_client/cli_pipe.c cli->auth->a_u.kerberos_auth->session_key.length); auth 4173 source3/rpc_client/cli_pipe.c cli->auth->user_session_key.data, auth 4174 source3/rpc_client/cli_pipe.c cli->auth->user_session_key.length); auth 49 source3/rpc_client/cli_spoolss.c level1.user = cli->auth->user_name; auth 166 source3/rpc_client/cli_spoolss.c level1.user = cli->auth->user_name; auth 269 source3/rpc_server/srv_lsa_hnd.c if (p->pipe_bound && (p->auth.auth_type == PIPE_AUTH_TYPE_SCHANNEL)) { auth 945 source3/rpc_server/srv_lsa_nt.c if (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) { auth 1227 source3/rpc_server/srv_lsa_nt.c if (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) { auth 677 source3/rpc_server/srv_netlog_nt.c if ( (lp_server_schannel() == True) && (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) ) { auth 798 source3/rpc_server/srv_netlog_nt.c if ( (lp_server_schannel() == True) && (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) ) { auth 874 source3/rpc_server/srv_netlog_nt.c if ( (lp_server_schannel() == True) && (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) ) { auth 1076 source3/rpc_server/srv_netlog_nt.c if ((p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) auth 1077 source3/rpc_server/srv_netlog_nt.c || (p->auth.a_u.schannel_auth == NULL)) { auth 1080 source3/rpc_server/srv_netlog_nt.c memcpy(pipe_session_key, p->auth.a_u.schannel_auth->sess_key, 16); auth 1099 source3/rpc_server/srv_netlog_nt.c if (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) { auth 37 source3/rpc_server/srv_pipe.c static void free_pipe_ntlmssp_auth_data(struct pipe_auth_data *auth) auth 39 source3/rpc_server/srv_pipe.c AUTH_NTLMSSP_STATE *a = auth->a_u.auth_ntlmssp_state; auth 44 source3/rpc_server/srv_pipe.c auth->a_u.auth_ntlmssp_state = NULL; auth 68 source3/rpc_server/srv_pipe.c AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state; auth 192 source3/rpc_server/srv_pipe.c if (p->auth.auth_type == PIPE_AUTH_TYPE_NTLMSSP) { auth 197 source3/rpc_server/srv_pipe.c if (p->auth.auth_level == PIPE_AUTH_LEVEL_PRIVACY) { auth 213 source3/rpc_server/srv_pipe.c switch (p->auth.auth_level) { auth 414 source3/rpc_server/srv_pipe.c p->auth.auth_level == PIPE_AUTH_LEVEL_PRIVACY ? auth 425 source3/rpc_server/srv_pipe.c schannel_encode(p->auth.a_u.schannel_auth, auth 426 source3/rpc_server/srv_pipe.c p->auth.auth_level, SENDER_IS_ACCEPTOR, &verf, auth 436 source3/rpc_server/srv_pipe.c p->auth.a_u.schannel_auth->seq_num++; auth 575 source3/rpc_server/srv_pipe.c switch(p->auth.auth_level) { auth 582 source3/rpc_server/srv_pipe.c switch(p->auth.auth_type) { auth 594 source3/rpc_server/srv_pipe.c (unsigned int)p->auth.auth_level, auth 595 source3/rpc_server/srv_pipe.c (unsigned int)p->auth.auth_type)); auth 610 source3/rpc_server/srv_pipe.c AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state; auth 634 source3/rpc_server/srv_pipe.c if (p->auth.auth_level == PIPE_AUTH_LEVEL_INTEGRITY) { auth 642 source3/rpc_server/srv_pipe.c if (p->auth.auth_level == PIPE_AUTH_LEVEL_PRIVACY) { auth 769 source3/rpc_server/srv_pipe.c free_pipe_ntlmssp_auth_data(&p->auth); auth 770 source3/rpc_server/srv_pipe.c p->auth.a_u.auth_ntlmssp_state = NULL; auth 824 source3/rpc_server/srv_pipe.c if (p->auth.auth_data_free_func) { auth 825 source3/rpc_server/srv_pipe.c (*p->auth.auth_data_free_func)(&p->auth); auth 827 source3/rpc_server/srv_pipe.c p->auth.auth_level = PIPE_AUTH_LEVEL_NONE; auth 828 source3/rpc_server/srv_pipe.c p->auth.auth_type = PIPE_AUTH_TYPE_NONE; auth 1150 source3/rpc_server/srv_pipe.c if (p->auth.auth_type == PIPE_AUTH_TYPE_SPNEGO_NTLMSSP && p->auth.a_u.auth_ntlmssp_state) { auth 1152 source3/rpc_server/srv_pipe.c free_pipe_ntlmssp_auth_data(&p->auth); auth 1200 source3/rpc_server/srv_pipe.c p->auth.a_u.auth_ntlmssp_state = a; auth 1201 source3/rpc_server/srv_pipe.c p->auth.auth_data_free_func = &free_pipe_ntlmssp_auth_data; auth 1202 source3/rpc_server/srv_pipe.c p->auth.auth_type = PIPE_AUTH_TYPE_SPNEGO_NTLMSSP; auth 1219 source3/rpc_server/srv_pipe.c p->auth.a_u.auth_ntlmssp_state = NULL; auth 1236 source3/rpc_server/srv_pipe.c AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state; auth 1247 source3/rpc_server/srv_pipe.c if (p->auth.auth_type != PIPE_AUTH_TYPE_SPNEGO_NTLMSSP || !a) { auth 1312 source3/rpc_server/srv_pipe.c free_pipe_ntlmssp_auth_data(&p->auth); auth 1313 source3/rpc_server/srv_pipe.c p->auth.a_u.auth_ntlmssp_state = NULL; auth 1353 source3/rpc_server/srv_pipe.c p->auth.a_u.schannel_auth = talloc(p, struct schannel_auth_struct); auth 1354 source3/rpc_server/srv_pipe.c if (!p->auth.a_u.schannel_auth) { auth 1359 source3/rpc_server/srv_pipe.c memset(p->auth.a_u.schannel_auth->sess_key, 0, sizeof(p->auth.a_u.schannel_auth->sess_key)); auth 1360 source3/rpc_server/srv_pipe.c memcpy(p->auth.a_u.schannel_auth->sess_key, pdcinfo->sess_key, auth 1365 source3/rpc_server/srv_pipe.c p->auth.a_u.schannel_auth->seq_num = 0; auth 1419 source3/rpc_server/srv_pipe.c p->auth.auth_data_free_func = NULL; auth 1420 source3/rpc_server/srv_pipe.c p->auth.auth_type = PIPE_AUTH_TYPE_SCHANNEL; auth 1486 source3/rpc_server/srv_pipe.c p->auth.a_u.auth_ntlmssp_state = a; auth 1487 source3/rpc_server/srv_pipe.c p->auth.auth_data_free_func = &free_pipe_ntlmssp_auth_data; auth 1488 source3/rpc_server/srv_pipe.c p->auth.auth_type = PIPE_AUTH_TYPE_NTLMSSP; auth 1503 source3/rpc_server/srv_pipe.c free_pipe_ntlmssp_auth_data(&p->auth); auth 1504 source3/rpc_server/srv_pipe.c p->auth.a_u.auth_ntlmssp_state = NULL; auth 1649 source3/rpc_server/srv_pipe.c p->auth.auth_level = PIPE_AUTH_LEVEL_INTEGRITY; auth 1652 source3/rpc_server/srv_pipe.c p->auth.auth_level = PIPE_AUTH_LEVEL_PRIVACY; auth 1688 source3/rpc_server/srv_pipe.c p->auth.auth_type = PIPE_AUTH_TYPE_NONE; auth 1690 source3/rpc_server/srv_pipe.c p->auth.auth_level = PIPE_AUTH_LEVEL_NONE; auth 1996 source3/rpc_server/srv_pipe.c AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state; auth 2005 source3/rpc_server/srv_pipe.c if (p->auth.auth_level == PIPE_AUTH_LEVEL_NONE || p->auth.auth_level == PIPE_AUTH_LEVEL_CONNECT) { auth 2053 source3/rpc_server/srv_pipe.c switch (p->auth.auth_level) { auth 2165 source3/rpc_server/srv_pipe.c if (!schannel_decode(p->auth.a_u.schannel_auth, auth 2166 source3/rpc_server/srv_pipe.c p->auth.auth_level, auth 2185 source3/rpc_server/srv_pipe.c p->auth.a_u.schannel_auth->seq_num++; auth 2251 source3/rpc_server/srv_pipe.c ((p->auth.auth_type == PIPE_AUTH_TYPE_NTLMSSP) || auth 2252 source3/rpc_server/srv_pipe.c (p->auth.auth_type == PIPE_AUTH_TYPE_SPNEGO_NTLMSSP))) { auth 386 source3/rpc_server/srv_pipe_hnd.c switch(p->auth.auth_type) { auth 412 source3/rpc_server/srv_pipe_hnd.c DEBUG(0,("process_request_pdu: unknown auth type %u set.\n", (unsigned int)p->auth.auth_type )); auth 918 source3/rpc_server/srv_pipe_hnd.c if (p->auth.auth_data_free_func) { auth 919 source3/rpc_server/srv_pipe_hnd.c (*p->auth.auth_data_free_func)(&p->auth); auth 2837 source3/rpc_server/srv_samr_nt.c if (p->auth.auth_type != PIPE_AUTH_TYPE_NTLMSSP || p->auth.auth_type != PIPE_AUTH_TYPE_SPNEGO_NTLMSSP) { auth 2841 source3/rpc_server/srv_samr_nt.c if (p->auth.auth_level != PIPE_AUTH_LEVEL_PRIVACY) { auth 341 source3/rpcclient/rpcclient.c if ((tmp_set->rpc_pipe->auth->auth_type auth 343 source3/rpcclient/rpcclient.c || (tmp_set->rpc_pipe->auth->auth_level auth 552 source3/smbd/seal.c DATA_BLOB auth = data_blob_null; auth 565 source3/smbd/seal.c if (!spnego_parse_auth(blob, &auth)) { auth 570 source3/smbd/seal.c status = auth_ntlmssp_update(ec->auth_ntlmssp_state, auth, &auth_reply); auth 571 source3/smbd/seal.c data_blob_free(&auth); auth 848 source3/smbd/sesssetup.c DATA_BLOB auth = data_blob_null; auth 853 source3/smbd/sesssetup.c if (!spnego_parse_auth(blob1, &auth)) { auth 865 source3/smbd/sesssetup.c if (auth.data[0] == ASN1_APPLICATION(0)) { auth 869 source3/smbd/sesssetup.c status = parse_spnego_mechanisms(auth, &secblob, &kerb_mech); auth 887 source3/smbd/sesssetup.c data_blob_free(&auth); auth 926 source3/smbd/sesssetup.c auth, &auth_reply); auth 928 source3/smbd/sesssetup.c data_blob_free(&auth); auth 194 source3/utils/net_ads.c d_printf("KDC server: %s\n", ads->auth.kdc_server ); auth 195 source3/utils/net_ads.c d_printf("Server time offset: %d\n", ads->auth.time_offset ); auth 253 source3/utils/net_ads.c SAFE_FREE(ads->auth.password); auth 254 source3/utils/net_ads.c ads->auth.password = smb_xstrdup(c->opt_password); auth 257 source3/utils/net_ads.c ads->auth.flags |= auth_flags; auth 258 source3/utils/net_ads.c SAFE_FREE(ads->auth.user_name); auth 259 source3/utils/net_ads.c ads->auth.user_name = smb_xstrdup(c->opt_user_name); auth 266 source3/utils/net_ads.c if ((cp = strchr_m(ads->auth.user_name, '@'))!=0) { auth 268 source3/utils/net_ads.c SAFE_FREE(ads->auth.realm); auth 269 source3/utils/net_ads.c ads->auth.realm = smb_xstrdup(cp); auth 270 source3/utils/net_ads.c strupper_m(ads->auth.realm); auth 342 source3/utils/net_ads.c ads->auth.flags |= ADS_AUTH_NO_BIND; auth 491 source3/utils/net_ads.c status = ads_krb5_set_password(ads->auth.kdc_server, upn, argv[1], auth 492 source3/utils/net_ads.c ads->auth.time_offset); auth 1319 source3/utils/net_ads.c if (asprintf( &ads_dns->auth.user_name, "%s$", global_myname()) == -1) { auth 1322 source3/utils/net_ads.c ads_dns->auth.password = secrets_fetch_machine_password( auth 1324 source3/utils/net_ads.c ads_dns->auth.realm = SMB_STRDUP( r->out.dns_domain_name ); auth 1325 source3/utils/net_ads.c strupper_m(ads_dns->auth.realm ); auth 1878 source3/utils/net_ads.c ret = kerberos_set_password(ads->auth.kdc_server, auth_principal, auth 1879 source3/utils/net_ads.c auth_password, user, new_password, ads->auth.time_offset); auth 1063 source3/utils/net_rpc_printer.c pipe_hnd->auth->user_name, auth 1250 source3/utils/net_rpc_printer.c PRINTER_ALL_ACCESS, pipe_hnd->auth->user_name, &hnd)) auth 1853 source3/utils/net_rpc_printer.c pipe_hnd->auth->user_name, auth 299 source3/utils/ntlm_auth.c fstrcpy(request.data.auth.user, user); auth 300 source3/utils/ntlm_auth.c fstrcpy(request.data.auth.pass, pass); auth 302 source3/utils/ntlm_auth.c strlcpy(request.data.auth.require_membership_of_sid, auth 304 source3/utils/ntlm_auth.c sizeof(request.data.auth.require_membership_of_sid)); auth 312 source3/utils/ntlm_auth.c if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) { auth 317 source3/utils/ntlm_auth.c response.data.auth.nt_status_string, auth 318 source3/utils/ntlm_auth.c response.data.auth.error_string, auth 319 source3/utils/ntlm_auth.c response.data.auth.nt_status); auth 321 source3/utils/ntlm_auth.c if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) { auth 326 source3/utils/ntlm_auth.c response.data.auth.nt_status_string, auth 327 source3/utils/ntlm_auth.c response.data.auth.error_string, auth 328 source3/utils/ntlm_auth.c response.data.auth.nt_status)); auth 405 source3/utils/ntlm_auth.c if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) { auth 413 source3/utils/ntlm_auth.c nt_status = (NT_STATUS(response.data.auth.nt_status)); auth 416 source3/utils/ntlm_auth.c *error_string = smb_xstrdup(response.data.auth.error_string); auth 422 source3/utils/ntlm_auth.c memcpy(lm_key, response.data.auth.first_8_lm_hash, auth 423 source3/utils/ntlm_auth.c sizeof(response.data.auth.first_8_lm_hash)); auth 426 source3/utils/ntlm_auth.c memcpy(user_session_key, response.data.auth.user_session_key, auth 427 source3/utils/ntlm_auth.c sizeof(response.data.auth.user_session_key)); auth 431 source3/utils/ntlm_auth.c *unix_name = SMB_STRDUP(response.data.auth.unix_username); auth 499 source3/utils/ntlm_auth.c if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) auth 508 source3/utils/ntlm_auth.c nt_status = (NT_STATUS(response.data.auth.nt_status)); auth 512 source3/utils/ntlm_auth.c *error_string = smb_xstrdup(response.data.auth.error_string); auth 82 source3/winbindd/idmap_ad.c expire = MIN(ads->auth.tgt_expire, ads->auth.tgs_expire); auth 131 source3/winbindd/idmap_ad.c SAFE_FREE(ads->auth.password); auth 132 source3/winbindd/idmap_ad.c ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), NULL, NULL); auth 134 source3/winbindd/idmap_ad.c SAFE_FREE(ads->auth.realm); auth 135 source3/winbindd/idmap_ad.c ads->auth.realm = SMB_STRDUP(lp_realm()); auth 116 source3/winbindd/idmap_adex/gc_util.c ads->auth.flags = ADS_AUTH_NO_BIND; auth 81 source3/winbindd/idmap_adex/idmap_adex.c ads->auth.password = auth 83 source3/winbindd/idmap_adex/idmap_adex.c ads->auth.realm = SMB_STRDUP(lp_realm()); auth 276 source3/winbindd/idmap_adex/likewise_cell.c ads->auth.password = auth 278 source3/winbindd/idmap_adex/likewise_cell.c ads->auth.realm = SMB_STRDUP(lp_realm()); auth 55 source3/winbindd/winbindd_ads.c expire = MIN(ads->auth.tgt_expire, ads->auth.tgs_expire); auth 83 source3/winbindd/winbindd_ads.c SAFE_FREE(ads->auth.password); auth 84 source3/winbindd/winbindd_ads.c SAFE_FREE(ads->auth.realm); auth 90 source3/winbindd/winbindd_ads.c if ( !pdb_get_trusteddom_pw( domain->name, &ads->auth.password, &sid, &last_set_time ) ) { auth 94 source3/winbindd/winbindd_ads.c ads->auth.realm = SMB_STRDUP( ads->server.realm ); auth 95 source3/winbindd/winbindd_ads.c strupper_m( ads->auth.realm ); auth 100 source3/winbindd/winbindd_ads.c ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), NULL, NULL); auth 109 source3/winbindd/winbindd_ads.c ads->auth.realm = SMB_STRDUP( our_domain->alt_name ); auth 110 source3/winbindd/winbindd_ads.c strupper_m( ads->auth.realm ); auth 113 source3/winbindd/winbindd_ads.c ads->auth.realm = SMB_STRDUP( lp_realm() ); auth 116 source3/winbindd/winbindd_ads.c ads->auth.renewable = WINBINDD_PAM_AUTH_KRB5_RENEW_TIME; auth 194 source3/winbindd/winbindd_ccache_access.c DATA_BLOB initial, challenge, auth; auth 262 source3/winbindd/winbindd_ccache_access.c initial, challenge, &auth); auth 272 source3/winbindd/winbindd_ccache_access.c state->response.extra_data.data = smb_xmemdup(auth.data, auth.length); auth 277 source3/winbindd/winbindd_ccache_access.c state->response.length += auth.length; auth 278 source3/winbindd/winbindd_ccache_access.c state->response.data.ccache_ntlm_auth.auth_blob_len = auth.length; auth 280 source3/winbindd/winbindd_ccache_access.c data_blob_free(&auth); auth 1101 source3/winbindd/winbindd_cm.c ads->auth.flags |= ADS_AUTH_NO_BIND; auth 2203 source3/winbindd/winbindd_cm.c conn->lsa_pipe_tcp->auth->auth_level == PIPE_AUTH_LEVEL_PRIVACY && auth 92 source3/winbindd/winbindd_misc.c state->response.data.auth.nt_status_string)); auth 40 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.logon_time = auth 42 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.logoff_time = auth 44 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.kickoff_time = auth 46 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.pass_last_set_time = auth 48 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.pass_can_change_time = auth 50 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.pass_must_change_time = auth 53 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.logon_count = info3->base.logon_count; auth 54 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.bad_pw_count = info3->base.bad_password_count; auth 56 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.user_rid = info3->base.rid; auth 57 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.group_rid = info3->base.primary_gid; auth 58 source3/winbindd/winbindd_pam.c sid_to_fstring(state->response.data.auth.info3.dom_sid, info3->base.domain_sid); auth 60 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.num_groups = info3->base.groups.count; auth 61 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.user_flgs = info3->base.user_flags; auth 63 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.acct_flags = info3->base.acct_flags; auth 64 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.num_other_sids = info3->sidcount; auth 66 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.info3.user_name, auth 68 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.info3.full_name, auth 70 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.info3.logon_script, auth 72 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.info3.profile_path, auth 74 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.info3.home_dir, auth 76 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.info3.dir_drive, auth 79 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.info3.logon_srv, auth 81 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.info3.logon_dom, auth 178 source3/winbindd/winbindd_pam.c fill_domain_username(state->response.data.auth.unix_username, auth 182 source3/winbindd/winbindd_pam.c state->response.data.auth.unix_username)); auth 387 source3/winbindd/winbindd_pam.c r->data.auth.policy.min_length_password = auth 389 source3/winbindd/winbindd_pam.c r->data.auth.policy.password_history = auth 391 source3/winbindd/winbindd_pam.c r->data.auth.policy.password_properties = auth 393 source3/winbindd/winbindd_pam.c r->data.auth.policy.expire = auth 395 source3/winbindd/winbindd_pam.c r->data.auth.policy.min_passwordage = auth 519 source3/winbindd/winbindd_pam.c const char *type = state->request.data.auth.krb5_cc_type; auth 521 source3/winbindd/winbindd_pam.c state->response.data.auth.krb5ccname[0] = '\0'; auth 534 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.krb5ccname, cc); auth 543 source3/winbindd/winbindd_pam.c uid = state->request.data.auth.uid; auth 589 source3/winbindd/winbindd_pam.c state->request.data.auth.krb5_cc_type, auth 590 source3/winbindd/winbindd_pam.c state->request.data.auth.uid, auth 602 source3/winbindd/winbindd_pam.c time_offset = ads->auth.time_offset; auth 609 source3/winbindd/winbindd_pam.c parse_domain_user(state->request.data.auth.user, name_domain, name_user); auth 636 source3/winbindd/winbindd_pam.c state->request.data.auth.pass, auth 668 source3/winbindd/winbindd_pam.c state->request.data.auth.user, auth 709 source3/winbindd/winbindd_pam.c if (!NT_STATUS_IS_OK(remove_ccache(state->request.data.auth.user))) { auth 712 source3/winbindd/winbindd_pam.c state->request.data.auth.user)); auth 754 source3/winbindd/winbindd_pam.c memcpy(state->response.data.auth.user_session_key, auth 756 source3/winbindd/winbindd_pam.c sizeof(state->response.data.auth.user_session_key) auth 761 source3/winbindd/winbindd_pam.c memcpy(state->response.data.auth.first_8_lm_hash, auth 763 source3/winbindd/winbindd_pam.c sizeof(state->response.data.auth.first_8_lm_hash) auth 819 source3/winbindd/winbindd_pam.c state->request.data.auth.user auth 820 source3/winbindd/winbindd_pam.c [sizeof(state->request.data.auth.user)-1]='\0'; auth 823 source3/winbindd/winbindd_pam.c state->request.data.auth.pass auth 824 source3/winbindd/winbindd_pam.c [sizeof(state->request.data.auth.pass)-1]='\0'; auth 827 source3/winbindd/winbindd_pam.c state->request.data.auth.user)); auth 837 source3/winbindd/winbindd_pam.c state->request.data.auth.user, auth 847 source3/winbindd/winbindd_pam.c fstrcpy(mapped_user, state->request.data.auth.user); auth 868 source3/winbindd/winbindd_pam.c state->request.data.auth.user, auth 869 source3/winbindd/winbindd_pam.c state->response.data.auth.nt_status_string, auth 870 source3/winbindd/winbindd_pam.c state->response.data.auth.pam_error)); auth 901 source3/winbindd/winbindd_pam.c parse_domain_user(state->request.data.auth.user, name_domain, name_user); auth 931 source3/winbindd/winbindd_pam.c E_md4hash(state->request.data.auth.pass, new_nt_pass); auth 1020 source3/winbindd/winbindd_pam.c state->request.data.auth.krb5_cc_type, auth 1021 source3/winbindd/winbindd_pam.c state->request.data.auth.uid, auth 1047 source3/winbindd/winbindd_pam.c state->request.data.auth.user, auth 1072 source3/winbindd/winbindd_pam.c state->request.data.auth.user, auth 1073 source3/winbindd/winbindd_pam.c state->request.data.auth.pass, auth 1120 source3/winbindd/winbindd_pam.c state->request.data.auth.user, auth 1144 source3/winbindd/winbindd_pam.c parse_domain_user(state->request.data.auth.user, name_domain, name_user); auth 1151 source3/winbindd/winbindd_pam.c state->request.data.auth.user, name_domain, name_user, name_domain)); auth 1166 source3/winbindd/winbindd_pam.c state->request.data.auth.user, name_domain, name_user, name_domain)); auth 1227 source3/winbindd/winbindd_pam.c parse_domain_user(state->request.data.auth.user, name_domain, name_user); auth 1247 source3/winbindd/winbindd_pam.c state->request.data.auth.pass, auth 1268 source3/winbindd/winbindd_pam.c && SMBencrypt(state->request.data.auth.pass, auth 1277 source3/winbindd/winbindd_pam.c SMBNTencrypt(state->request.data.auth.pass, auth 1291 source3/winbindd/winbindd_pam.c state->request.data.auth.user, name_domain, name_user, name_domain)); auth 1471 source3/winbindd/winbindd_pam.c state->request.data.auth.user[sizeof(state->request.data.auth.user)-1]='\0'; auth 1474 source3/winbindd/winbindd_pam.c state->request.data.auth.pass[sizeof(state->request.data.auth.pass)-1]='\0'; auth 1477 source3/winbindd/winbindd_pam.c state->request.data.auth.user)); auth 1487 source3/winbindd/winbindd_pam.c state->request.data.auth.user, auth 1496 source3/winbindd/winbindd_pam.c mapped_user = state->request.data.auth.user; auth 1501 source3/winbindd/winbindd_pam.c if ( mapped_user != state->request.data.auth.user ) { auth 1503 source3/winbindd/winbindd_pam.c safe_strcpy( state->request.data.auth.user, domain_user, auth 1504 source3/winbindd/winbindd_pam.c sizeof(state->request.data.auth.user)-1 ); auth 1650 source3/winbindd/winbindd_pam.c state->request.data.auth.require_membership_of_sid))) { auth 1652 source3/winbindd/winbindd_pam.c state->request.data.auth.user, auth 1653 source3/winbindd/winbindd_pam.c state->request.data.auth.require_membership_of_sid)); auth 1665 source3/winbindd/winbindd_pam.c result = winbindd_add_memory_creds(state->request.data.auth.user, auth 1667 source3/winbindd/winbindd_pam.c state->request.data.auth.pass); auth 1677 source3/winbindd/winbindd_pam.c state->request.data.auth.user, auth 1678 source3/winbindd/winbindd_pam.c state->request.data.auth.pass, auth 1683 source3/winbindd/winbindd_pam.c winbindd_delete_memory_creds(state->request.data.auth.user); auth 1728 source3/winbindd/winbindd_pam.c state->request.data.auth.user, auth 1729 source3/winbindd/winbindd_pam.c state->response.data.auth.nt_status_string, auth 1730 source3/winbindd/winbindd_pam.c state->response.data.auth.pam_error)); auth 1765 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.error_string, error_string); auth 1802 source3/winbindd/winbindd_pam.c state->response.data.auth.nt_status_string, auth 1803 source3/winbindd/winbindd_pam.c state->response.data.auth.pam_error)); auth 2008 source3/winbindd/winbindd_pam.c state->response.data.auth.nt_status_string, auth 2009 source3/winbindd/winbindd_pam.c state->response.data.auth.pam_error)); auth 2048 source3/winbindd/winbindd_pam.c state->request.data.auth.user, auth 2049 source3/winbindd/winbindd_pam.c state->response.data.auth.nt_status_string, auth 2050 source3/winbindd/winbindd_pam.c state->response.data.auth.pam_error)); auth 2081 source3/winbindd/winbindd_pam.c state->request.data.auth.user)); auth 2093 source3/winbindd/winbindd_pam.c state->response.data.auth.reject_reason = Undefined; auth 2117 source3/winbindd/winbindd_pam.c state->response.data.auth.reject_reason = auth 2216 source3/winbindd/winbindd_pam.c state->response.data.auth.nt_status_string, auth 2217 source3/winbindd/winbindd_pam.c state->response.data.auth.pam_error)); auth 2281 source3/winbindd/winbindd_pam.c state->response.data.auth.nt_status_string, auth 2282 source3/winbindd/winbindd_pam.c state->response.data.auth.pam_error)); auth 2386 source3/winbindd/winbindd_pam.c state->response.data.auth.nt_status_string, auth 2387 source3/winbindd/winbindd_pam.c state->response.data.auth.pam_error)); auth 2495 source3/winbindd/winbindd_pam.c state->response.data.auth.nt_status_string, auth 2496 source3/winbindd/winbindd_pam.c state->response.data.auth.pam_error)); auth 1691 source3/winbindd/winbindd_util.c resp->data.auth.nt_status = NT_STATUS_V(result); auth 1692 source3/winbindd/winbindd_util.c fstrcpy(resp->data.auth.nt_status_string, nt_errstr(result)); auth 1695 source3/winbindd/winbindd_util.c if (*resp->data.auth.error_string == '\0') auth 1696 source3/winbindd/winbindd_util.c fstrcpy(resp->data.auth.error_string, auth 1698 source3/winbindd/winbindd_util.c resp->data.auth.pam_error = nt_status_to_pam(result); auth 121 source4/auth/ntlm/auth_winbind.c nt_status = NT_STATUS(response.data.auth.nt_status); auth 613 source4/client/smbmount.c FILE *auth; auth 618 source4/client/smbmount.c if ((auth=sys_fopen(filename, "r")) == NULL) auth 625 source4/client/smbmount.c while (!feof(auth)) auth 628 source4/client/smbmount.c if (!fgets (buf, sizeof(buf), auth)) auth 663 source4/client/smbmount.c fclose(auth); auth 346 source4/heimdal/kdc/kerberos4.c krb5_data auth; auth 355 source4/heimdal/kdc/kerberos4.c krb5_data_zero(&auth); auth 409 source4/heimdal/kdc/kerberos4.c auth.data = buf; auth 410 source4/heimdal/kdc/kerberos4.c auth.length = pos; auth 417 source4/heimdal/kdc/kerberos4.c ret = _krb5_krb_rd_req(context, &auth, "krbtgt", realm, auth 940 source4/heimdal/kdc/krb5tgs.c krb5_authenticator auth; auth 947 source4/heimdal/kdc/krb5tgs.c krb5_auth_con_getauthenticator(context, ac, &auth); auth 948 source4/heimdal/kdc/krb5tgs.c if(auth->cksum == NULL){ auth 959 source4/heimdal/kdc/krb5tgs.c !krb5_checksum_is_keyed(context, auth->cksum->cksumtype) auth 962 source4/heimdal/kdc/krb5tgs.c !krb5_checksum_is_collision_proof(context, auth->cksum->cksumtype)) { auth 964 source4/heimdal/kdc/krb5tgs.c auth->cksum->cksumtype); auth 995 source4/heimdal/kdc/krb5tgs.c auth->cksum); auth 1004 source4/heimdal/kdc/krb5tgs.c free_Authenticator(auth); auth 1005 source4/heimdal/kdc/krb5tgs.c free(auth); auth 1174 source4/heimdal/kdc/krb5tgs.c krb5_authenticator auth; auth 1176 source4/heimdal/kdc/krb5tgs.c ret = krb5_auth_con_getauthenticator(context, ac, &auth); auth 1180 source4/heimdal/kdc/krb5tgs.c krb5_free_authenticator(context, &auth); auth 1184 source4/heimdal/kdc/krb5tgs.c **csec = auth->ctime; auth 1187 source4/heimdal/kdc/krb5tgs.c krb5_free_authenticator(context, &auth); auth 1191 source4/heimdal/kdc/krb5tgs.c **cusec = auth->cusec; auth 1192 source4/heimdal/kdc/krb5tgs.c krb5_free_authenticator(context, &auth); auth 112 source4/heimdal/lib/krb5/build_auth.c Authenticator *auth; auth 119 source4/heimdal/lib/krb5/build_auth.c auth = calloc(1, sizeof(*auth)); auth 120 source4/heimdal/lib/krb5/build_auth.c if (auth == NULL) { auth 125 source4/heimdal/lib/krb5/build_auth.c auth->authenticator_vno = 5; auth 126 source4/heimdal/lib/krb5/build_auth.c copy_Realm(&cred->client->realm, &auth->crealm); auth 127 source4/heimdal/lib/krb5/build_auth.c copy_PrincipalName(&cred->client->name, &auth->cname); auth 129 source4/heimdal/lib/krb5/build_auth.c krb5_us_timeofday (context, &auth->ctime, &auth->cusec); auth 131 source4/heimdal/lib/krb5/build_auth.c ret = krb5_auth_con_getlocalsubkey(context, auth_context, &auth->subkey); auth 140 source4/heimdal/lib/krb5/build_auth.c ALLOC(auth->seq_number, 1); auth 141 source4/heimdal/lib/krb5/build_auth.c if(auth->seq_number == NULL) { auth 145 source4/heimdal/lib/krb5/build_auth.c *auth->seq_number = auth_context->local_seqnumber; auth 147 source4/heimdal/lib/krb5/build_auth.c auth->seq_number = NULL; auth 148 source4/heimdal/lib/krb5/build_auth.c auth->authorization_data = NULL; auth 149 source4/heimdal/lib/krb5/build_auth.c auth->cksum = cksum; auth 156 source4/heimdal/lib/krb5/build_auth.c ret = make_etypelist(context, &auth->authorization_data); auth 163 source4/heimdal/lib/krb5/build_auth.c auth_context->authenticator->ctime = auth->ctime; auth 164 source4/heimdal/lib/krb5/build_auth.c auth_context->authenticator->cusec = auth->cusec; auth 166 source4/heimdal/lib/krb5/build_auth.c ASN1_MALLOC_ENCODE(Authenticator, buf, buf_size, auth, &len, ret); auth 189 source4/heimdal/lib/krb5/build_auth.c *auth_result = auth; auth 192 source4/heimdal/lib/krb5/build_auth.c auth->cksum = NULL; auth 193 source4/heimdal/lib/krb5/build_auth.c free_Authenticator (auth); auth 194 source4/heimdal/lib/krb5/build_auth.c free (auth); auth 198 source4/heimdal/lib/krb5/build_auth.c free_Authenticator (auth); auth 199 source4/heimdal/lib/krb5/build_auth.c free (auth); auth 443 source4/heimdal/lib/krb5/get_cred.c self.auth = estrdup("Kerberos"); auth 447 source4/heimdal/lib/krb5/get_cred.c free(self.auth); auth 453 source4/heimdal/lib/krb5/get_cred.c free(self.auth); auth 468 source4/heimdal/lib/krb5/get_cred.c free(self.auth); auth 473 source4/heimdal/lib/krb5/get_cred.c free(self.auth); auth 72 source4/heimdal/lib/krb5/misc.c size = strlen(self->auth); auth 73 source4/heimdal/lib/krb5/misc.c ssize = krb5_storage_write(sp, self->auth, size); auth 181 source4/heimdal/lib/krb5/replay.c checksum_authenticator(Authenticator *auth, void *data) auth 187 source4/heimdal/lib/krb5/replay.c MD5_Update (&md5, auth->crealm, strlen(auth->crealm)); auth 188 source4/heimdal/lib/krb5/replay.c for(i = 0; i < auth->cname.name_string.len; i++) auth 189 source4/heimdal/lib/krb5/replay.c MD5_Update(&md5, auth->cname.name_string.val[i], auth 190 source4/heimdal/lib/krb5/replay.c strlen(auth->cname.name_string.val[i])); auth 191 source4/heimdal/lib/krb5/replay.c MD5_Update (&md5, &auth->ctime, sizeof(auth->ctime)); auth 192 source4/heimdal/lib/krb5/replay.c MD5_Update (&md5, &auth->cusec, sizeof(auth->cusec)); auth 724 source4/heimdal/lib/krb5/store.c krb5_store_authdata(krb5_storage *sp, krb5_authdata auth) auth 728 source4/heimdal/lib/krb5/store.c ret = krb5_store_int32(sp, auth.len); auth 730 source4/heimdal/lib/krb5/store.c for(i = 0; i < auth.len; i++){ auth 731 source4/heimdal/lib/krb5/store.c ret = krb5_store_int16(sp, auth.val[i].ad_type); auth 733 source4/heimdal/lib/krb5/store.c ret = krb5_store_data(sp, auth.val[i].ad_data); auth 740 source4/heimdal/lib/krb5/store.c krb5_ret_authdata(krb5_storage *sp, krb5_authdata *auth) auth 748 source4/heimdal/lib/krb5/store.c ALLOC_SEQ(auth, tmp); auth 749 source4/heimdal/lib/krb5/store.c if (auth->val == NULL && tmp != 0) auth 754 source4/heimdal/lib/krb5/store.c auth->val[i].ad_type = tmp2; auth 755 source4/heimdal/lib/krb5/store.c ret = krb5_ret_data(sp, &auth->val[i].ad_data); auth 220 source4/librpc/rpc/dcerpc.c struct dcerpc_auth auth; auth 271 source4/librpc/rpc/dcerpc.c ndr_err = ndr_pull_dcerpc_auth(ndr, NDR_SCALARS|NDR_BUFFERS, &auth); auth 285 source4/librpc/rpc/dcerpc.c raw_packet->length - auth.credentials.length, auth 286 source4/librpc/rpc/dcerpc.c &auth.credentials); auth 298 source4/librpc/rpc/dcerpc.c raw_packet->length - auth.credentials.length, auth 299 source4/librpc/rpc/dcerpc.c &auth.credentials); auth 313 source4/librpc/rpc/dcerpc.c if (pkt->u.response.stub_and_verifier.length < auth.auth_pad_length) { auth 316 source4/librpc/rpc/dcerpc.c pkt->u.response.stub_and_verifier.length -= auth.auth_pad_length; auth 43 source4/rpc_server/dcesrv_auth.c struct dcesrv_auth *auth = &dce_conn->auth_state; auth 85 source4/rpc_server/dcesrv_auth.c &auth->gensec_security); auth 87 source4/rpc_server/dcesrv_auth.c status = gensec_start_mech_by_authtype(auth->gensec_security, auth->auth_info->auth_type, auth 88 source4/rpc_server/dcesrv_auth.c auth->auth_info->auth_level); auth 92 source4/rpc_server/dcesrv_auth.c (int)auth->auth_info->auth_type, auth 93 source4/rpc_server/dcesrv_auth.c (int)auth->auth_info->auth_level, auth 99 source4/rpc_server/dcesrv_auth.c gensec_want_feature(auth->gensec_security, GENSEC_FEATURE_SIGN_PKT_HEADER); auth 290 source4/rpc_server/dcesrv_auth.c struct dcerpc_auth auth; auth 348 source4/rpc_server/dcesrv_auth.c ndr_err = ndr_pull_dcerpc_auth(ndr, NDR_SCALARS|NDR_BUFFERS, &auth); auth 362 source4/rpc_server/dcesrv_auth.c full_packet->length-auth.credentials.length, auth 363 source4/rpc_server/dcesrv_auth.c &auth.credentials); auth 375 source4/rpc_server/dcesrv_auth.c full_packet->length-auth.credentials.length, auth 376 source4/rpc_server/dcesrv_auth.c &auth.credentials); auth 390 source4/rpc_server/dcesrv_auth.c if (pkt->u.request.stub_and_verifier.length < auth.auth_pad_length) { auth 394 source4/rpc_server/dcesrv_auth.c pkt->u.request.stub_and_verifier.length -= auth.auth_pad_length; auth 588 source4/torture/rpc/netlogon.c struct netr_Authenticator auth, auth2; auth 639 source4/torture/rpc/netlogon.c r.in.credential = &auth; auth 650 source4/torture/rpc/netlogon.c creds_client_authenticator(creds, &auth); auth 57 source4/torture/rpc/remote_pac.c struct netr_Authenticator auth, auth2; auth 171 source4/torture/rpc/remote_pac.c creds_client_authenticator(creds, &auth); auth 172 source4/torture/rpc/remote_pac.c r.in.credential = &auth; auth 193 source4/torture/rpc/remote_pac.c creds_client_authenticator(creds, &auth); auth 194 source4/torture/rpc/remote_pac.c r.in.credential = &auth; auth 215 source4/torture/rpc/remote_pac.c creds_client_authenticator(creds, &auth); auth 216 source4/torture/rpc/remote_pac.c r.in.credential = &auth; auth 262 source4/torture/rpc/remote_pac.c creds_client_authenticator(creds, &auth); auth 263 source4/torture/rpc/remote_pac.c r.in.credential = &auth; auth 309 source4/torture/rpc/remote_pac.c creds_client_authenticator(creds, &auth); auth 310 source4/torture/rpc/remote_pac.c r.in.credential = &auth; auth 65 source4/torture/rpc/samlogon.c struct netr_Authenticator auth, auth2; auth 156 source4/torture/rpc/samlogon.c creds_client_authenticator(samlogon_state->creds, &samlogon_state->auth); auth 214 source4/torture/rpc/samlogon.c creds_client_authenticator(samlogon_state->creds, &samlogon_state->auth); auth 1361 source4/torture/rpc/samlogon.c samlogon_state.r_flags.in.credential = &samlogon_state.auth; auth 1379 source4/torture/rpc/samlogon.c samlogon_state.r.in.credential = &samlogon_state.auth; auth 2684 source4/torture/rpc/samr.c struct netr_Authenticator auth, auth2; auth 2737 source4/torture/rpc/samr.c r.in.credential = &auth; auth 2747 source4/torture/rpc/samr.c creds_client_authenticator(creds, &auth); auth 59 source4/torture/rpc/samsync.c struct netr_Authenticator auth, auth2; auth 95 source4/torture/rpc/samsync.c r.in.credential = &auth; auth 103 source4/torture/rpc/samsync.c creds_client_authenticator(creds, &auth); auth 231 source4/torture/winbind/struct_based.c strlen(rep.data.auth.nt_status_string)>0, auth 235 source4/torture/winbind/struct_based.c nt_errstr(NT_STATUS(rep.data.auth.nt_status)), auth 236 source4/torture/winbind/struct_based.c rep.data.auth.nt_status_string, auth 237 source4/torture/winbind/struct_based.c rep.data.auth.error_string, auth 238 source4/torture/winbind/struct_based.c rep.data.auth.pam_error); auth 243 source4/torture/winbind/struct_based.c NT_STATUS(rep.data.auth.nt_status), auth 247 source4/torture/winbind/struct_based.c rep.data.auth.nt_status_string, auth 252 source4/torture/winbind/struct_based.c rep.data.auth.error_string, auth 257 source4/torture/winbind/struct_based.c rep.data.auth.pam_error, auth 51 source4/winbind/wb_samba3_cmd.c WBSRV_SAMBA3_SET_STRING(resp->data.auth.nt_status_string, auth 53 source4/winbind/wb_samba3_cmd.c WBSRV_SAMBA3_SET_STRING(resp->data.auth.error_string, auth 56 source4/winbind/wb_samba3_cmd.c resp->data.auth.pam_error = nt_status_to_pam(status); auth 57 source4/winbind/wb_samba3_cmd.c resp->data.auth.nt_status = NT_STATUS_V(status); auth 536 source4/winbind/wb_samba3_cmd.c memcpy(s3call->response.data.auth.user_session_key, auth 538 source4/winbind/wb_samba3_cmd.c sizeof(s3call->response.data.auth.user_session_key)); auth 547 source4/winbind/wb_samba3_cmd.c memcpy(s3call->response.data.auth.first_8_lm_hash, auth 549 source4/winbind/wb_samba3_cmd.c sizeof(s3call->response.data.auth.first_8_lm_hash)); auth 579 source4/winbind/wb_samba3_cmd.c s3call->request.data.auth.user, auth 592 source4/winbind/wb_samba3_cmd.c cli_credentials_set_password(credentials, s3call->request.data.auth.pass, CRED_SPECIFIED);