password           88 examples/auth/crackcheck/crackcheck.c 	char *password;
password          114 examples/auth/crackcheck/crackcheck.c 	password = fgets(f, sizeof(f), stdin);
password          116 examples/auth/crackcheck/crackcheck.c 	if (password == NULL) {
password          122 examples/auth/crackcheck/crackcheck.c 		ret = complexity(password);
password          132 examples/auth/crackcheck/crackcheck.c 	reply = FascistCheck(password, dictionary);
password           18 examples/libsmbclient/get_auth_data_fn.h     char            password[256] = { '\0' };
password           29 examples/libsmbclient/get_auth_data_fn.h         strncpy(pPassword, password, maxLenPassword - 1);
password           79 examples/libsmbclient/get_auth_data_fn.h     strncpy(password, pPassword, sizeof(password) - 1);
password           15 examples/libsmbclient/testbrowse2.c char	*password	= "";
password           88 examples/libsmbclient/testbrowse2.c     strncpy(passwd, password, passwdlen - 1); passwd[passwdlen - 1] = 0;
password          600 examples/libsmbclient/tree.c 	char *password, int pwmaxlen)
password          604 examples/libsmbclient/tree.c    strncpy(password, "test", pwmaxlen);
password          241 lib/zlib/contrib/minizip/miniunz.c int do_extract_currentfile(uf,popt_extract_without_path,popt_overwrite,password)
password          245 lib/zlib/contrib/minizip/miniunz.c     const char* password;
password          299 lib/zlib/contrib/minizip/miniunz.c         err = unzOpenCurrentFilePassword(uf,password);
password          405 lib/zlib/contrib/minizip/miniunz.c int do_extract(uf,opt_extract_without_path,opt_overwrite,password)
password          409 lib/zlib/contrib/minizip/miniunz.c     const char* password;
password          424 lib/zlib/contrib/minizip/miniunz.c                                       password) != UNZ_OK)
password          441 lib/zlib/contrib/minizip/miniunz.c int do_extract_onefile(uf,filename,opt_extract_without_path,opt_overwrite,password)
password          446 lib/zlib/contrib/minizip/miniunz.c     const char* password;
password          457 lib/zlib/contrib/minizip/miniunz.c                                       password) == UNZ_OK)
password          470 lib/zlib/contrib/minizip/miniunz.c     const char *password=NULL;
password          516 lib/zlib/contrib/minizip/miniunz.c                         password=argv[i+1];
password          577 lib/zlib/contrib/minizip/miniunz.c             return do_extract(uf,opt_do_extract_withoutpath,opt_overwrite,password);
password          580 lib/zlib/contrib/minizip/miniunz.c                                       opt_do_extract_withoutpath,opt_overwrite,password);
password          199 lib/zlib/contrib/minizip/minizip.c     const char* password=NULL;
password          228 lib/zlib/contrib/minizip/minizip.c                         password=argv[i+1];
password          348 lib/zlib/contrib/minizip/minizip.c                 if ((password != NULL) && (err==ZIP_OK))
password          357 lib/zlib/contrib/minizip/minizip.c                                  password,crcFile);
password         1047 lib/zlib/contrib/minizip/unzip.c extern int ZEXPORT unzOpenCurrentFile3 (file, method, level, raw, password)
password         1052 lib/zlib/contrib/minizip/unzip.c     const char* password;
password         1063 lib/zlib/contrib/minizip/unzip.c     if (password != NULL)
password         1167 lib/zlib/contrib/minizip/unzip.c     if (password != NULL)
password         1171 lib/zlib/contrib/minizip/unzip.c         init_keys(password,s->keys,s->pcrc_32_tab);
password         1198 lib/zlib/contrib/minizip/unzip.c extern int ZEXPORT unzOpenCurrentFilePassword (file, password)
password         1200 lib/zlib/contrib/minizip/unzip.c     const char* password;
password         1202 lib/zlib/contrib/minizip/unzip.c     return unzOpenCurrentFile3(file, NULL, NULL, 0, password);
password          259 lib/zlib/contrib/minizip/unzip.h                                                   const char* password));
password          283 lib/zlib/contrib/minizip/unzip.h                                            const char* password));
password          695 lib/zlib/contrib/minizip/zip.c                                          password, crcForCrypting)
password          710 lib/zlib/contrib/minizip/zip.c     const char* password;
password          720 lib/zlib/contrib/minizip/zip.c     if (password != NULL)
password          765 lib/zlib/contrib/minizip/zip.c     if (password != NULL)
password          878 lib/zlib/contrib/minizip/zip.c     if ((err==Z_OK) && (password != NULL))
password          886 lib/zlib/contrib/minizip/zip.c         sizeHead=crypthead(password,bufHead,RAND_HEAD_LEN,zi->ci.keys,zi->ci.pcrc_32_tab,crcForCrypting);
password          193 lib/zlib/contrib/minizip/zip.h                                             const char* password,
password          403 libcli/ldap/ldap_message.c 			asn1_write(data, r->creds.password,
password          404 libcli/ldap/ldap_message.c 				   strlen(r->creds.password));
password         1154 libcli/ldap/ldap_message.c 			r->creds.password = "";
password         1168 libcli/ldap/ldap_message.c 				r->creds.password = pw;
password           67 libcli/ldap/ldap_message.h 		const char *password;
password         1568 librpc/gen_ndr/cli_netlogon.c 				       struct samr_Password *password /* [out] [ref] */,
password         1605 librpc/gen_ndr/cli_netlogon.c 	*password = *r.out.password;
password         2101 librpc/gen_ndr/cli_netlogon.c 					     struct samr_Password *password /* [out] [ref] */,
password         2138 librpc/gen_ndr/cli_netlogon.c 	*password = *r.out.password;
password          259 librpc/gen_ndr/cli_netlogon.h 				       struct samr_Password *password /* [out] [ref] */,
password          334 librpc/gen_ndr/cli_netlogon.h 					     struct samr_Password *password /* [out] [ref] */,
password         2345 librpc/gen_ndr/cli_samr.c 					    struct samr_CryptPassword *password /* [in] [unique] */,
password         2354 librpc/gen_ndr/cli_samr.c 	r.in.password = password;
password          306 librpc/gen_ndr/cli_samr.h 					    struct samr_CryptPassword *password /* [in] [unique] */,
password          519 librpc/gen_ndr/cli_svcctl.c 					    const char *password /* [in] [unique,charset(UTF16)] */,
password          535 librpc/gen_ndr/cli_svcctl.c 	r.in.password = password;
password          586 librpc/gen_ndr/cli_svcctl.c 				      uint8_t *password /* [in] [unique,size_is(password_size)] */,
password          608 librpc/gen_ndr/cli_svcctl.c 	r.in.password = password;
password         1167 librpc/gen_ndr/cli_svcctl.c 					    const char *password /* [in] [unique,charset(UTF16)] */,
password         1183 librpc/gen_ndr/cli_svcctl.c 	r.in.password = password;
password         1233 librpc/gen_ndr/cli_svcctl.c 				      const char *password /* [in] [unique,charset(UTF16)] */,
password         1251 librpc/gen_ndr/cli_svcctl.c 	r.in.password = password;
password           71 librpc/gen_ndr/cli_svcctl.h 					    const char *password /* [in] [unique,charset(UTF16)] */,
password           89 librpc/gen_ndr/cli_svcctl.h 				      uint8_t *password /* [in] [unique,size_is(password_size)] */,
password          179 librpc/gen_ndr/cli_svcctl.h 					    const char *password /* [in] [unique,charset(UTF16)] */,
password          196 librpc/gen_ndr/cli_svcctl.h 				      const char *password /* [in] [unique,charset(UTF16)] */,
password          811 librpc/gen_ndr/cli_wkssvc.c 				      const char *password /* [in] [unique,charset(UTF16)] */,
password          823 librpc/gen_ndr/cli_wkssvc.c 	r.in.password = password;
password          862 librpc/gen_ndr/cli_wkssvc.c 					const char *password /* [in] [unique,charset(UTF16)] */,
password          872 librpc/gen_ndr/cli_wkssvc.c 	r.in.password = password;
password          912 librpc/gen_ndr/cli_wkssvc.c 						 const char *password /* [in] [unique,charset(UTF16)] */,
password          923 librpc/gen_ndr/cli_wkssvc.c 	r.in.password = password;
password          117 librpc/gen_ndr/cli_wkssvc.h 				      const char *password /* [in] [unique,charset(UTF16)] */,
password          124 librpc/gen_ndr/cli_wkssvc.h 					const char *password /* [in] [unique,charset(UTF16)] */,
password          132 librpc/gen_ndr/cli_wkssvc.h 						 const char *password /* [in] [unique,charset(UTF16)] */,
password          274 librpc/gen_ndr/drsblobs.h 	struct samr_Password password;
password          279 librpc/gen_ndr/drsblobs.h 	uint8_t *password;
password          511 librpc/gen_ndr/lsa.h 	struct lsa_DATA_BUF *password;/* [unique] */
password          597 librpc/gen_ndr/lsa.h 	struct lsa_TrustDomainInfoPassword password;/* [case(LSA_TRUSTED_DOMAIN_INFO_PASSWORD)] */
password         2344 librpc/gen_ndr/ndr_drsblobs.c 		NDR_CHECK(ndr_push_samr_Password(ndr, NDR_SCALARS, &r->password));
password         2356 librpc/gen_ndr/ndr_drsblobs.c 		NDR_CHECK(ndr_pull_samr_Password(ndr, NDR_SCALARS, &r->password));
password         2368 librpc/gen_ndr/ndr_drsblobs.c 	ndr_print_samr_Password(ndr, "password", &r->password);
password         2377 librpc/gen_ndr/ndr_drsblobs.c 		NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->password, r->size));
password         2389 librpc/gen_ndr/ndr_drsblobs.c 		NDR_PULL_ALLOC_N(ndr, r->password, r->size);
password         2390 librpc/gen_ndr/ndr_drsblobs.c 		NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->password, r->size));
password         2402 librpc/gen_ndr/ndr_drsblobs.c 	ndr_print_array_uint8(ndr, "password", r->password, r->size);
password         2973 librpc/gen_ndr/ndr_lsa.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->password));
password         2977 librpc/gen_ndr/ndr_lsa.c 		if (r->password) {
password         2978 librpc/gen_ndr/ndr_lsa.c 			NDR_CHECK(ndr_push_lsa_DATA_BUF(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password         2997 librpc/gen_ndr/ndr_lsa.c 			NDR_PULL_ALLOC(ndr, r->password);
password         2999 librpc/gen_ndr/ndr_lsa.c 			r->password = NULL;
password         3009 librpc/gen_ndr/ndr_lsa.c 		if (r->password) {
password         3011 librpc/gen_ndr/ndr_lsa.c 			NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
password         3012 librpc/gen_ndr/ndr_lsa.c 			NDR_CHECK(ndr_pull_lsa_DATA_BUF(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password         3029 librpc/gen_ndr/ndr_lsa.c 	ndr_print_ptr(ndr, "password", r->password);
password         3031 librpc/gen_ndr/ndr_lsa.c 	if (r->password) {
password         3032 librpc/gen_ndr/ndr_lsa.c 		ndr_print_lsa_DATA_BUF(ndr, "password", r->password);
password         3630 librpc/gen_ndr/ndr_lsa.c 				NDR_CHECK(ndr_push_lsa_TrustDomainInfoPassword(ndr, NDR_SCALARS, &r->password));
password         3688 librpc/gen_ndr/ndr_lsa.c 				NDR_CHECK(ndr_push_lsa_TrustDomainInfoPassword(ndr, NDR_BUFFERS, &r->password));
password         3757 librpc/gen_ndr/ndr_lsa.c 				NDR_CHECK(ndr_pull_lsa_TrustDomainInfoPassword(ndr, NDR_SCALARS, &r->password));
password         3814 librpc/gen_ndr/ndr_lsa.c 				NDR_CHECK(ndr_pull_lsa_TrustDomainInfoPassword(ndr, NDR_BUFFERS, &r->password));
password         3878 librpc/gen_ndr/ndr_lsa.c 			ndr_print_lsa_TrustDomainInfoPassword(ndr, "password", &r->password);
password          663 librpc/gen_ndr/ndr_netlogon.c 				NDR_CHECK(ndr_push_unique_ptr(ndr, r->password));
password          671 librpc/gen_ndr/ndr_netlogon.c 				NDR_CHECK(ndr_push_unique_ptr(ndr, r->password));
password          679 librpc/gen_ndr/ndr_netlogon.c 				NDR_CHECK(ndr_push_unique_ptr(ndr, r->password));
password          687 librpc/gen_ndr/ndr_netlogon.c 				NDR_CHECK(ndr_push_unique_ptr(ndr, r->password));
password          698 librpc/gen_ndr/ndr_netlogon.c 				if (r->password) {
password          699 librpc/gen_ndr/ndr_netlogon.c 					NDR_CHECK(ndr_push_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password          710 librpc/gen_ndr/ndr_netlogon.c 				if (r->password) {
password          711 librpc/gen_ndr/ndr_netlogon.c 					NDR_CHECK(ndr_push_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password          722 librpc/gen_ndr/ndr_netlogon.c 				if (r->password) {
password          723 librpc/gen_ndr/ndr_netlogon.c 					NDR_CHECK(ndr_push_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password          734 librpc/gen_ndr/ndr_netlogon.c 				if (r->password) {
password          735 librpc/gen_ndr/ndr_netlogon.c 					NDR_CHECK(ndr_push_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password          764 librpc/gen_ndr/ndr_netlogon.c 					NDR_PULL_ALLOC(ndr, r->password);
password          766 librpc/gen_ndr/ndr_netlogon.c 					r->password = NULL;
password          784 librpc/gen_ndr/ndr_netlogon.c 					NDR_PULL_ALLOC(ndr, r->password);
password          786 librpc/gen_ndr/ndr_netlogon.c 					r->password = NULL;
password          804 librpc/gen_ndr/ndr_netlogon.c 					NDR_PULL_ALLOC(ndr, r->password);
password          806 librpc/gen_ndr/ndr_netlogon.c 					r->password = NULL;
password          824 librpc/gen_ndr/ndr_netlogon.c 					NDR_PULL_ALLOC(ndr, r->password);
password          826 librpc/gen_ndr/ndr_netlogon.c 					r->password = NULL;
password          837 librpc/gen_ndr/ndr_netlogon.c 				if (r->password) {
password          839 librpc/gen_ndr/ndr_netlogon.c 					NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
password          840 librpc/gen_ndr/ndr_netlogon.c 					NDR_CHECK(ndr_pull_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password          855 librpc/gen_ndr/ndr_netlogon.c 				if (r->password) {
password          857 librpc/gen_ndr/ndr_netlogon.c 					NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
password          858 librpc/gen_ndr/ndr_netlogon.c 					NDR_CHECK(ndr_pull_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password          873 librpc/gen_ndr/ndr_netlogon.c 				if (r->password) {
password          875 librpc/gen_ndr/ndr_netlogon.c 					NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
password          876 librpc/gen_ndr/ndr_netlogon.c 					NDR_CHECK(ndr_pull_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password          891 librpc/gen_ndr/ndr_netlogon.c 				if (r->password) {
password          893 librpc/gen_ndr/ndr_netlogon.c 					NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
password          894 librpc/gen_ndr/ndr_netlogon.c 					NDR_CHECK(ndr_pull_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password          913 librpc/gen_ndr/ndr_netlogon.c 			ndr_print_ptr(ndr, "password", r->password);
password          915 librpc/gen_ndr/ndr_netlogon.c 			if (r->password) {
password          916 librpc/gen_ndr/ndr_netlogon.c 				ndr_print_netr_PasswordInfo(ndr, "password", r->password);
password          931 librpc/gen_ndr/ndr_netlogon.c 			ndr_print_ptr(ndr, "password", r->password);
password          933 librpc/gen_ndr/ndr_netlogon.c 			if (r->password) {
password          934 librpc/gen_ndr/ndr_netlogon.c 				ndr_print_netr_PasswordInfo(ndr, "password", r->password);
password          949 librpc/gen_ndr/ndr_netlogon.c 			ndr_print_ptr(ndr, "password", r->password);
password          951 librpc/gen_ndr/ndr_netlogon.c 			if (r->password) {
password          952 librpc/gen_ndr/ndr_netlogon.c 				ndr_print_netr_PasswordInfo(ndr, "password", r->password);
password          967 librpc/gen_ndr/ndr_netlogon.c 			ndr_print_ptr(ndr, "password", r->password);
password          969 librpc/gen_ndr/ndr_netlogon.c 			if (r->password) {
password          970 librpc/gen_ndr/ndr_netlogon.c 				ndr_print_netr_PasswordInfo(ndr, "password", r->password);
password         13714 librpc/gen_ndr/ndr_netlogon.c 		if (r->out.password == NULL) {
password         13717 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_push_samr_Password(ndr, NDR_SCALARS, r->out.password));
password         13775 librpc/gen_ndr/ndr_netlogon.c 		NDR_PULL_ALLOC(ndr, r->out.password);
password         13776 librpc/gen_ndr/ndr_netlogon.c 		ZERO_STRUCTP(r->out.password);
password         13787 librpc/gen_ndr/ndr_netlogon.c 			NDR_PULL_ALLOC(ndr, r->out.password);
password         13790 librpc/gen_ndr/ndr_netlogon.c 		NDR_PULL_SET_MEM_CTX(ndr, r->out.password, LIBNDR_FLAG_REF_ALLOC);
password         13791 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_pull_samr_Password(ndr, NDR_SCALARS, r->out.password));
password         13830 librpc/gen_ndr/ndr_netlogon.c 		ndr_print_ptr(ndr, "password", r->out.password);
password         13832 librpc/gen_ndr/ndr_netlogon.c 		ndr_print_samr_Password(ndr, "password", r->out.password);
password         15208 librpc/gen_ndr/ndr_netlogon.c 		if (r->out.password == NULL) {
password         15211 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_push_samr_Password(ndr, NDR_SCALARS, r->out.password));
password         15274 librpc/gen_ndr/ndr_netlogon.c 		NDR_PULL_ALLOC(ndr, r->out.password);
password         15275 librpc/gen_ndr/ndr_netlogon.c 		ZERO_STRUCTP(r->out.password);
password         15288 librpc/gen_ndr/ndr_netlogon.c 			NDR_PULL_ALLOC(ndr, r->out.password);
password         15291 librpc/gen_ndr/ndr_netlogon.c 		NDR_PULL_SET_MEM_CTX(ndr, r->out.password, LIBNDR_FLAG_REF_ALLOC);
password         15292 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_pull_samr_Password(ndr, NDR_SCALARS, r->out.password));
password         15338 librpc/gen_ndr/ndr_netlogon.c 		ndr_print_ptr(ndr, "password", r->out.password);
password         15340 librpc/gen_ndr/ndr_netlogon.c 		ndr_print_samr_Password(ndr, "password", r->out.password);
password         3007 librpc/gen_ndr/ndr_samr.c 		NDR_CHECK(ndr_push_samr_CryptPassword(ndr, NDR_SCALARS, &r->password));
password         3020 librpc/gen_ndr/ndr_samr.c 		NDR_CHECK(ndr_pull_samr_CryptPassword(ndr, NDR_SCALARS, &r->password));
password         3033 librpc/gen_ndr/ndr_samr.c 	ndr_print_samr_CryptPassword(ndr, "password", &r->password);
password         3041 librpc/gen_ndr/ndr_samr.c 		NDR_CHECK(ndr_push_samr_CryptPassword(ndr, NDR_SCALARS, &r->password));
password         3053 librpc/gen_ndr/ndr_samr.c 		NDR_CHECK(ndr_pull_samr_CryptPassword(ndr, NDR_SCALARS, &r->password));
password         3065 librpc/gen_ndr/ndr_samr.c 	ndr_print_samr_CryptPassword(ndr, "password", &r->password);
password         3120 librpc/gen_ndr/ndr_samr.c 		NDR_CHECK(ndr_push_samr_CryptPasswordEx(ndr, NDR_SCALARS, &r->password));
password         3133 librpc/gen_ndr/ndr_samr.c 		NDR_CHECK(ndr_pull_samr_CryptPasswordEx(ndr, NDR_SCALARS, &r->password));
password         3146 librpc/gen_ndr/ndr_samr.c 	ndr_print_samr_CryptPasswordEx(ndr, "password", &r->password);
password         3154 librpc/gen_ndr/ndr_samr.c 		NDR_CHECK(ndr_push_samr_CryptPasswordEx(ndr, NDR_SCALARS, &r->password));
password         3166 librpc/gen_ndr/ndr_samr.c 		NDR_CHECK(ndr_pull_samr_CryptPasswordEx(ndr, NDR_SCALARS, &r->password));
password         3178 librpc/gen_ndr/ndr_samr.c 	ndr_print_samr_CryptPasswordEx(ndr, "password", &r->password);
password         5078 librpc/gen_ndr/ndr_samr.c 		NDR_CHECK(ndr_push_lsa_StringLarge(ndr, NDR_SCALARS, &r->password));
password         5086 librpc/gen_ndr/ndr_samr.c 		NDR_CHECK(ndr_push_lsa_StringLarge(ndr, NDR_BUFFERS, &r->password));
password         5098 librpc/gen_ndr/ndr_samr.c 		NDR_CHECK(ndr_pull_lsa_StringLarge(ndr, NDR_SCALARS, &r->password));
password         5106 librpc/gen_ndr/ndr_samr.c 		NDR_CHECK(ndr_pull_lsa_StringLarge(ndr, NDR_BUFFERS, &r->password));
password         5118 librpc/gen_ndr/ndr_samr.c 	ndr_print_lsa_StringLarge(ndr, "password", &r->password);
password         5131 librpc/gen_ndr/ndr_samr.c 		NDR_CHECK(ndr_push_lsa_StringLarge(ndr, NDR_SCALARS, &r->password));
password         5138 librpc/gen_ndr/ndr_samr.c 		NDR_CHECK(ndr_push_lsa_StringLarge(ndr, NDR_BUFFERS, &r->password));
password         5150 librpc/gen_ndr/ndr_samr.c 		NDR_CHECK(ndr_pull_lsa_StringLarge(ndr, NDR_SCALARS, &r->password));
password         5157 librpc/gen_ndr/ndr_samr.c 		NDR_CHECK(ndr_pull_lsa_StringLarge(ndr, NDR_BUFFERS, &r->password));
password         5169 librpc/gen_ndr/ndr_samr.c 	ndr_print_lsa_StringLarge(ndr, "password", &r->password);
password         10631 librpc/gen_ndr/ndr_samr.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password));
password         10632 librpc/gen_ndr/ndr_samr.c 		if (r->in.password) {
password         10633 librpc/gen_ndr/ndr_samr.c 			NDR_CHECK(ndr_push_samr_CryptPassword(ndr, NDR_SCALARS, r->in.password));
password         10677 librpc/gen_ndr/ndr_samr.c 			NDR_PULL_ALLOC(ndr, r->in.password);
password         10679 librpc/gen_ndr/ndr_samr.c 			r->in.password = NULL;
password         10681 librpc/gen_ndr/ndr_samr.c 		if (r->in.password) {
password         10683 librpc/gen_ndr/ndr_samr.c 			NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0);
password         10684 librpc/gen_ndr/ndr_samr.c 			NDR_CHECK(ndr_pull_samr_CryptPassword(ndr, NDR_SCALARS, r->in.password));
password         10726 librpc/gen_ndr/ndr_samr.c 		ndr_print_ptr(ndr, "password", r->in.password);
password         10728 librpc/gen_ndr/ndr_samr.c 		if (r->in.password) {
password         10729 librpc/gen_ndr/ndr_samr.c 			ndr_print_samr_CryptPassword(ndr, "password", r->in.password);
password         4078 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->password));
password         4099 librpc/gen_ndr/ndr_srvsvc.c 		if (r->password) {
password         4100 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16)));
password         4102 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16)));
password         4103 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->password, ndr_charset_length(r->password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password         4145 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->password);
password         4147 librpc/gen_ndr/ndr_srvsvc.c 			r->password = NULL;
password         4187 librpc/gen_ndr/ndr_srvsvc.c 		if (r->password) {
password         4189 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
password         4190 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->password));
password         4191 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->password));
password         4192 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->password) > ndr_get_array_size(ndr, &r->password)) {
password         4193 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->password), ndr_get_array_length(ndr, &r->password));
password         4195 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t)));
password         4196 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->password, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t), CH_UTF16));
password         4229 librpc/gen_ndr/ndr_srvsvc.c 	ndr_print_ptr(ndr, "password", r->password);
password         4231 librpc/gen_ndr/ndr_srvsvc.c 	if (r->password) {
password         4232 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_string(ndr, "password", r->password);
password         4520 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->password));
password         4542 librpc/gen_ndr/ndr_srvsvc.c 		if (r->password) {
password         4543 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16)));
password         4545 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16)));
password         4546 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->password, ndr_charset_length(r->password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password         4589 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->password);
password         4591 librpc/gen_ndr/ndr_srvsvc.c 			r->password = NULL;
password         4632 librpc/gen_ndr/ndr_srvsvc.c 		if (r->password) {
password         4634 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
password         4635 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->password));
password         4636 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->password));
password         4637 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->password) > ndr_get_array_size(ndr, &r->password)) {
password         4638 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->password), ndr_get_array_length(ndr, &r->password));
password         4640 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t)));
password         4641 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->password, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t), CH_UTF16));
password         4675 librpc/gen_ndr/ndr_srvsvc.c 	ndr_print_ptr(ndr, "password", r->password);
password         4677 librpc/gen_ndr/ndr_srvsvc.c 	if (r->password) {
password         4678 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_string(ndr, "password", r->password);
password         2175 librpc/gen_ndr/ndr_svcctl.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password));
password         2176 librpc/gen_ndr/ndr_svcctl.c 		if (r->in.password) {
password         2177 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password         2179 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password         2180 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.password, ndr_charset_length(r->in.password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password         2303 librpc/gen_ndr/ndr_svcctl.c 			NDR_PULL_ALLOC(ndr, r->in.password);
password         2305 librpc/gen_ndr/ndr_svcctl.c 			r->in.password = NULL;
password         2307 librpc/gen_ndr/ndr_svcctl.c 		if (r->in.password) {
password         2309 librpc/gen_ndr/ndr_svcctl.c 			NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0);
password         2310 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password));
password         2311 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->in.password));
password         2312 librpc/gen_ndr/ndr_svcctl.c 			if (ndr_get_array_length(ndr, &r->in.password) > ndr_get_array_size(ndr, &r->in.password)) {
password         2313 librpc/gen_ndr/ndr_svcctl.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.password), ndr_get_array_length(ndr, &r->in.password));
password         2315 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t)));
password         2316 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.password, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t), CH_UTF16));
password         2394 librpc/gen_ndr/ndr_svcctl.c 		ndr_print_ptr(ndr, "password", r->in.password);
password         2396 librpc/gen_ndr/ndr_svcctl.c 		if (r->in.password) {
password         2397 librpc/gen_ndr/ndr_svcctl.c 			ndr_print_string(ndr, "password", r->in.password);
password         2471 librpc/gen_ndr/ndr_svcctl.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password));
password         2472 librpc/gen_ndr/ndr_svcctl.c 		if (r->in.password) {
password         2474 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->in.password, r->in.password_size));
password         2619 librpc/gen_ndr/ndr_svcctl.c 			NDR_PULL_ALLOC(ndr, r->in.password);
password         2621 librpc/gen_ndr/ndr_svcctl.c 			r->in.password = NULL;
password         2623 librpc/gen_ndr/ndr_svcctl.c 		if (r->in.password) {
password         2625 librpc/gen_ndr/ndr_svcctl.c 			NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0);
password         2626 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password));
password         2627 librpc/gen_ndr/ndr_svcctl.c 			NDR_PULL_ALLOC_N(ndr, r->in.password, ndr_get_array_size(ndr, &r->in.password));
password         2628 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->in.password, ndr_get_array_size(ndr, &r->in.password)));
password         2637 librpc/gen_ndr/ndr_svcctl.c 		if (r->in.password) {
password         2638 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_check_array_size(ndr, (void*)&r->in.password, r->in.password_size));
password         2717 librpc/gen_ndr/ndr_svcctl.c 		ndr_print_ptr(ndr, "password", r->in.password);
password         2719 librpc/gen_ndr/ndr_svcctl.c 		if (r->in.password) {
password         2720 librpc/gen_ndr/ndr_svcctl.c 			ndr_print_array_uint8(ndr, "password", r->in.password, r->in.password_size);
password         4071 librpc/gen_ndr/ndr_svcctl.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password));
password         4072 librpc/gen_ndr/ndr_svcctl.c 		if (r->in.password) {
password         4073 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password         4075 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password         4076 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.password, ndr_charset_length(r->in.password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password         4199 librpc/gen_ndr/ndr_svcctl.c 			NDR_PULL_ALLOC(ndr, r->in.password);
password         4201 librpc/gen_ndr/ndr_svcctl.c 			r->in.password = NULL;
password         4203 librpc/gen_ndr/ndr_svcctl.c 		if (r->in.password) {
password         4205 librpc/gen_ndr/ndr_svcctl.c 			NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0);
password         4206 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password));
password         4207 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->in.password));
password         4208 librpc/gen_ndr/ndr_svcctl.c 			if (ndr_get_array_length(ndr, &r->in.password) > ndr_get_array_size(ndr, &r->in.password)) {
password         4209 librpc/gen_ndr/ndr_svcctl.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.password), ndr_get_array_length(ndr, &r->in.password));
password         4211 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t)));
password         4212 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.password, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t), CH_UTF16));
password         4290 librpc/gen_ndr/ndr_svcctl.c 		ndr_print_ptr(ndr, "password", r->in.password);
password         4292 librpc/gen_ndr/ndr_svcctl.c 		if (r->in.password) {
password         4293 librpc/gen_ndr/ndr_svcctl.c 			ndr_print_string(ndr, "password", r->in.password);
password         4370 librpc/gen_ndr/ndr_svcctl.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password));
password         4371 librpc/gen_ndr/ndr_svcctl.c 		if (r->in.password) {
password         4372 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password         4374 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password         4375 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.password, ndr_charset_length(r->in.password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password         4531 librpc/gen_ndr/ndr_svcctl.c 			NDR_PULL_ALLOC(ndr, r->in.password);
password         4533 librpc/gen_ndr/ndr_svcctl.c 			r->in.password = NULL;
password         4535 librpc/gen_ndr/ndr_svcctl.c 		if (r->in.password) {
password         4537 librpc/gen_ndr/ndr_svcctl.c 			NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0);
password         4538 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password));
password         4539 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->in.password));
password         4540 librpc/gen_ndr/ndr_svcctl.c 			if (ndr_get_array_length(ndr, &r->in.password) > ndr_get_array_size(ndr, &r->in.password)) {
password         4541 librpc/gen_ndr/ndr_svcctl.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.password), ndr_get_array_length(ndr, &r->in.password));
password         4543 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t)));
password         4544 librpc/gen_ndr/ndr_svcctl.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.password, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t), CH_UTF16));
password         4620 librpc/gen_ndr/ndr_svcctl.c 		ndr_print_ptr(ndr, "password", r->in.password);
password         4622 librpc/gen_ndr/ndr_svcctl.c 		if (r->in.password) {
password         4623 librpc/gen_ndr/ndr_svcctl.c 			ndr_print_string(ndr, "password", r->in.password);
password         4152 librpc/gen_ndr/ndr_wkssvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->password));
password         4173 librpc/gen_ndr/ndr_wkssvc.c 		if (r->password) {
password         4174 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16)));
password         4176 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16)));
password         4177 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->password, ndr_charset_length(r->password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password         4223 librpc/gen_ndr/ndr_wkssvc.c 			NDR_PULL_ALLOC(ndr, r->password);
password         4225 librpc/gen_ndr/ndr_wkssvc.c 			r->password = NULL;
password         4269 librpc/gen_ndr/ndr_wkssvc.c 		if (r->password) {
password         4271 librpc/gen_ndr/ndr_wkssvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
password         4272 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->password));
password         4273 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->password));
password         4274 librpc/gen_ndr/ndr_wkssvc.c 			if (ndr_get_array_length(ndr, &r->password) > ndr_get_array_size(ndr, &r->password)) {
password         4275 librpc/gen_ndr/ndr_wkssvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->password), ndr_get_array_length(ndr, &r->password));
password         4277 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t)));
password         4278 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->password, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t), CH_UTF16));
password         4325 librpc/gen_ndr/ndr_wkssvc.c 	ndr_print_ptr(ndr, "password", r->password);
password         4327 librpc/gen_ndr/ndr_wkssvc.c 	if (r->password) {
password         4328 librpc/gen_ndr/ndr_wkssvc.c 		ndr_print_string(ndr, "password", r->password);
password         4356 librpc/gen_ndr/ndr_wkssvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->password));
password         4375 librpc/gen_ndr/ndr_wkssvc.c 		if (r->password) {
password         4376 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16)));
password         4378 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16)));
password         4379 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->password, ndr_charset_length(r->password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password         4409 librpc/gen_ndr/ndr_wkssvc.c 			NDR_PULL_ALLOC(ndr, r->password);
password         4411 librpc/gen_ndr/ndr_wkssvc.c 			r->password = NULL;
password         4443 librpc/gen_ndr/ndr_wkssvc.c 		if (r->password) {
password         4445 librpc/gen_ndr/ndr_wkssvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
password         4446 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->password));
password         4447 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->password));
password         4448 librpc/gen_ndr/ndr_wkssvc.c 			if (ndr_get_array_length(ndr, &r->password) > ndr_get_array_size(ndr, &r->password)) {
password         4449 librpc/gen_ndr/ndr_wkssvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->password), ndr_get_array_length(ndr, &r->password));
password         4451 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t)));
password         4452 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->password, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t), CH_UTF16));
password         4475 librpc/gen_ndr/ndr_wkssvc.c 	ndr_print_ptr(ndr, "password", r->password);
password         4477 librpc/gen_ndr/ndr_wkssvc.c 	if (r->password) {
password         4478 librpc/gen_ndr/ndr_wkssvc.c 		ndr_print_string(ndr, "password", r->password);
password         7734 librpc/gen_ndr/ndr_wkssvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password));
password         7735 librpc/gen_ndr/ndr_wkssvc.c 		if (r->in.password) {
password         7736 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password         7738 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password         7739 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.password, ndr_charset_length(r->in.password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password         7823 librpc/gen_ndr/ndr_wkssvc.c 			NDR_PULL_ALLOC(ndr, r->in.password);
password         7825 librpc/gen_ndr/ndr_wkssvc.c 			r->in.password = NULL;
password         7827 librpc/gen_ndr/ndr_wkssvc.c 		if (r->in.password) {
password         7829 librpc/gen_ndr/ndr_wkssvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0);
password         7830 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password));
password         7831 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->in.password));
password         7832 librpc/gen_ndr/ndr_wkssvc.c 			if (ndr_get_array_length(ndr, &r->in.password) > ndr_get_array_size(ndr, &r->in.password)) {
password         7833 librpc/gen_ndr/ndr_wkssvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.password), ndr_get_array_length(ndr, &r->in.password));
password         7835 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t)));
password         7836 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.password, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t), CH_UTF16));
password         7879 librpc/gen_ndr/ndr_wkssvc.c 		ndr_print_ptr(ndr, "password", r->in.password);
password         7881 librpc/gen_ndr/ndr_wkssvc.c 		if (r->in.password) {
password         7882 librpc/gen_ndr/ndr_wkssvc.c 			ndr_print_string(ndr, "password", r->in.password);
password         7914 librpc/gen_ndr/ndr_wkssvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password));
password         7915 librpc/gen_ndr/ndr_wkssvc.c 		if (r->in.password) {
password         7916 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password         7918 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password         7919 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.password, ndr_charset_length(r->in.password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password         7976 librpc/gen_ndr/ndr_wkssvc.c 			NDR_PULL_ALLOC(ndr, r->in.password);
password         7978 librpc/gen_ndr/ndr_wkssvc.c 			r->in.password = NULL;
password         7980 librpc/gen_ndr/ndr_wkssvc.c 		if (r->in.password) {
password         7982 librpc/gen_ndr/ndr_wkssvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0);
password         7983 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password));
password         7984 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->in.password));
password         7985 librpc/gen_ndr/ndr_wkssvc.c 			if (ndr_get_array_length(ndr, &r->in.password) > ndr_get_array_size(ndr, &r->in.password)) {
password         7986 librpc/gen_ndr/ndr_wkssvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.password), ndr_get_array_length(ndr, &r->in.password));
password         7988 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t)));
password         7989 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.password, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t), CH_UTF16));
password         8022 librpc/gen_ndr/ndr_wkssvc.c 		ndr_print_ptr(ndr, "password", r->in.password);
password         8024 librpc/gen_ndr/ndr_wkssvc.c 		if (r->in.password) {
password         8025 librpc/gen_ndr/ndr_wkssvc.c 			ndr_print_string(ndr, "password", r->in.password);
password         8064 librpc/gen_ndr/ndr_wkssvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password));
password         8065 librpc/gen_ndr/ndr_wkssvc.c 		if (r->in.password) {
password         8066 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password         8068 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password         8069 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.password, ndr_charset_length(r->in.password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password         8146 librpc/gen_ndr/ndr_wkssvc.c 			NDR_PULL_ALLOC(ndr, r->in.password);
password         8148 librpc/gen_ndr/ndr_wkssvc.c 			r->in.password = NULL;
password         8150 librpc/gen_ndr/ndr_wkssvc.c 		if (r->in.password) {
password         8152 librpc/gen_ndr/ndr_wkssvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0);
password         8153 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password));
password         8154 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->in.password));
password         8155 librpc/gen_ndr/ndr_wkssvc.c 			if (ndr_get_array_length(ndr, &r->in.password) > ndr_get_array_size(ndr, &r->in.password)) {
password         8156 librpc/gen_ndr/ndr_wkssvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.password), ndr_get_array_length(ndr, &r->in.password));
password         8158 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t)));
password         8159 librpc/gen_ndr/ndr_wkssvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.password, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t), CH_UTF16));
password         8198 librpc/gen_ndr/ndr_wkssvc.c 		ndr_print_ptr(ndr, "password", r->in.password);
password         8200 librpc/gen_ndr/ndr_wkssvc.c 		if (r->in.password) {
password         8201 librpc/gen_ndr/ndr_wkssvc.c 			ndr_print_string(ndr, "password", r->in.password);
password          119 librpc/gen_ndr/netlogon.h 	struct netr_PasswordInfo *password;/* [unique,case(NetlogonInteractiveInformation)] */
password         1528 librpc/gen_ndr/netlogon.h 		struct samr_Password *password;/* [ref] */
password         1687 librpc/gen_ndr/netlogon.h 		struct samr_Password *password;/* [ref] */
password          567 librpc/gen_ndr/samr.h 	struct samr_CryptPassword password;
password          571 librpc/gen_ndr/samr.h 	struct samr_CryptPassword password;
password          581 librpc/gen_ndr/samr.h 	struct samr_CryptPasswordEx password;
password          585 librpc/gen_ndr/samr.h 	struct samr_CryptPasswordEx password;
password          796 librpc/gen_ndr/samr.h 	struct lsa_StringLarge password;
password          805 librpc/gen_ndr/samr.h 	struct lsa_StringLarge password;
password         1619 librpc/gen_ndr/samr.h 		struct samr_CryptPassword *password;/* [unique] */
password         2571 librpc/gen_ndr/srv_netlogon.c 	r->out.password = talloc_zero(r, struct samr_Password);
password         2572 librpc/gen_ndr/srv_netlogon.c 	if (r->out.password == NULL) {
password         3443 librpc/gen_ndr/srv_netlogon.c 	r->out.password = talloc_zero(r, struct samr_Password);
password         3444 librpc/gen_ndr/srv_netlogon.c 	if (r->out.password == NULL) {
password         4322 librpc/gen_ndr/srv_netlogon.c 			r->out.password = talloc_zero(mem_ctx, struct samr_Password);
password         4323 librpc/gen_ndr/srv_netlogon.c 			if (r->out.password == NULL) {
password         4447 librpc/gen_ndr/srv_netlogon.c 			r->out.password = talloc_zero(mem_ctx, struct samr_Password);
password         4448 librpc/gen_ndr/srv_netlogon.c 			if (r->out.password == NULL) {
password          300 librpc/gen_ndr/srvsvc.h 	const char *password;/* [unique,charset(UTF16)] */
password          328 librpc/gen_ndr/srvsvc.h 	const char *password;/* [unique,charset(UTF16)] */
password          444 librpc/gen_ndr/svcctl.h 		const char *password;/* [unique,charset(UTF16)] */
password          470 librpc/gen_ndr/svcctl.h 		uint8_t *password;/* [unique,size_is(password_size)] */
password          652 librpc/gen_ndr/svcctl.h 		const char *password;/* [unique,charset(UTF16)] */
password          677 librpc/gen_ndr/svcctl.h 		const char *password;/* [unique,charset(UTF16)] */
password          315 librpc/gen_ndr/wkssvc.h 	const char *password;/* [unique,charset(UTF16)] */
password          327 librpc/gen_ndr/wkssvc.h 	const char *password;/* [unique,charset(UTF16)] */
password          747 librpc/gen_ndr/wkssvc.h 		const char *password;/* [unique,charset(UTF16)] */
password          762 librpc/gen_ndr/wkssvc.h 		const char *password;/* [unique,charset(UTF16)] */
password          778 librpc/gen_ndr/wkssvc.h 		const char *password;/* [unique,charset(UTF16)] */
password           29 nsswitch/libwbclient/wbc_pam.c 			   const char *password)
password           38 nsswitch/libwbclient/wbc_pam.c 	params.password.plaintext	= password;
password          337 nsswitch/libwbclient/wbc_pam.c 		if (!params->password.plaintext) {
password          365 nsswitch/libwbclient/wbc_pam.c 			params->password.plaintext,
password          380 nsswitch/libwbclient/wbc_pam.c 		if (params->password.response.lm_length &&
password          381 nsswitch/libwbclient/wbc_pam.c 		    !params->password.response.lm_data) {
password          385 nsswitch/libwbclient/wbc_pam.c 		if (params->password.response.lm_length == 0 &&
password          386 nsswitch/libwbclient/wbc_pam.c 		    params->password.response.lm_data) {
password          391 nsswitch/libwbclient/wbc_pam.c 		if (params->password.response.nt_length &&
password          392 nsswitch/libwbclient/wbc_pam.c 		    !params->password.response.nt_data) {
password          396 nsswitch/libwbclient/wbc_pam.c 		if (params->password.response.nt_length == 0&&
password          397 nsswitch/libwbclient/wbc_pam.c 		    params->password.response.nt_data) {
password          420 nsswitch/libwbclient/wbc_pam.c 		       params->password.response.challenge,
password          424 nsswitch/libwbclient/wbc_pam.c 				MIN(params->password.response.lm_length,
password          426 nsswitch/libwbclient/wbc_pam.c 		if (params->password.response.lm_data) {
password          428 nsswitch/libwbclient/wbc_pam.c 			       params->password.response.lm_data,
password          431 nsswitch/libwbclient/wbc_pam.c 		request.data.auth_crap.nt_resp_len = params->password.response.nt_length;
password          432 nsswitch/libwbclient/wbc_pam.c 		if (params->password.response.nt_length > sizeof(request.data.auth_crap.nt_resp)) {
password          434 nsswitch/libwbclient/wbc_pam.c 			request.extra_len = params->password.response.nt_length;
password          441 nsswitch/libwbclient/wbc_pam.c 			       params->password.response.nt_data,
password          443 nsswitch/libwbclient/wbc_pam.c 		} else if (params->password.response.nt_data) {
password          445 nsswitch/libwbclient/wbc_pam.c 			       params->password.response.nt_data,
password          939 nsswitch/libwbclient/wbc_pam.c 	if (!params->password) {
password          949 nsswitch/libwbclient/wbc_pam.c 		params->password,
password          223 nsswitch/libwbclient/wbclient.h 	} password;
password          251 nsswitch/libwbclient/wbclient.h 	const char *password;
password         1045 nsswitch/libwbclient/wbclient.h 			   const char *password);
password         1767 nsswitch/pam_winbind.c 	logon.password			= pass;
password         2598 nsswitch/pam_winbind.c 	const char *password;
password         2665 nsswitch/pam_winbind.c 					&password);
password         2679 nsswitch/pam_winbind.c 		       real_username, password);
password         2690 nsswitch/pam_winbind.c 	retval = winbind_auth_request(ctx, real_username, password,
password         1184 nsswitch/wbinfo.c 	char *password;
password         1200 nsswitch/wbinfo.c 		password = wbinfo_prompt_pass(NULL, username);
password         1201 nsswitch/wbinfo.c 		fstrcpy(request.data.auth.pass, password);
password         1202 nsswitch/wbinfo.c 		SAFE_FREE(password);
password         1249 nsswitch/wbinfo.c 	char *password = NULL;
password         1259 nsswitch/wbinfo.c 		password = SMB_STRDUP(p);
password         1261 nsswitch/wbinfo.c 		password = wbinfo_prompt_pass(NULL, username);
password         1266 nsswitch/wbinfo.c 	wbc_status = wbcAuthenticateUser(name, password);
password         1280 nsswitch/wbinfo.c 	SAFE_FREE(password);
password         1321 nsswitch/wbinfo.c 	generate_random_buffer(params.password.response.challenge, 8);
password         1327 nsswitch/wbinfo.c 		server_chal = data_blob(params.password.response.challenge, 8);
password         1347 nsswitch/wbinfo.c 			ok = SMBencrypt(pass, params.password.response.challenge,
password         1354 nsswitch/wbinfo.c 		SMBNTencrypt(pass, params.password.response.challenge,
password         1358 nsswitch/wbinfo.c 	params.password.response.nt_length	= nt.length;
password         1359 nsswitch/wbinfo.c 	params.password.response.nt_data	= nt.data;
password         1360 nsswitch/wbinfo.c 	params.password.response.lm_length	= lm.length;
password         1361 nsswitch/wbinfo.c 	params.password.response.lm_data	= lm.data;
password         1509 nsswitch/wbinfo.c 	const char *password;
password         1521 nsswitch/wbinfo.c 		password = p+1;
password         1525 nsswitch/wbinfo.c 			password = thepass;
password         1527 nsswitch/wbinfo.c 			password = "";
password         1556 nsswitch/wbinfo.c 	if (password[0]) {
password         1558 nsswitch/wbinfo.c 		if (!secrets_store(SECRETS_AUTH_PASSWORD, password,
password         1559 nsswitch/wbinfo.c 				   strlen(password) + 1)) {
password         1572 nsswitch/wbinfo.c 	char *user, *domain, *password;
password         1576 nsswitch/wbinfo.c 	secrets_fetch_ipc_userpass(&user, &domain, &password);
password         1578 nsswitch/wbinfo.c 	if ((!user || !*user) && (!domain || !*domain ) && (!password || !*password)){
password         1582 nsswitch/wbinfo.c 		SAFE_FREE(password);
password         1590 nsswitch/wbinfo.c 		 user, password ? "%" : "", password ? password : "");
password         1594 nsswitch/wbinfo.c 	SAFE_FREE(password);
password           30 source3/auth/auth_unix.c static bool update_smbpassword_file(const char *user, const char *password)
password           58 source3/auth/auth_unix.c 	if (!pdb_set_plaintext_passwd (sampass, password)) {
password           77 source3/auth/auth_wbc.c 		params.password.plaintext = (char *)user_info->plaintext_password.data;
password           83 source3/auth/auth_wbc.c 		memcpy(params.password.response.challenge,
password           85 source3/auth/auth_wbc.c 		    sizeof(params.password.response.challenge));
password           87 source3/auth/auth_wbc.c 		params.password.response.nt_length = user_info->nt_resp.length;
password           88 source3/auth/auth_wbc.c 		params.password.response.nt_data = user_info->nt_resp.data;
password           89 source3/auth/auth_wbc.c 		params.password.response.lm_length = user_info->lm_resp.length;
password           90 source3/auth/auth_wbc.c 		params.password.response.lm_data = user_info->lm_resp.data;
password           69 source3/auth/auth_winbind.c 	memcpy(params.password.response.challenge,
password           71 source3/auth/auth_winbind.c 	       sizeof(params.password.response.challenge));
password           73 source3/auth/auth_winbind.c 	params.password.response.nt_length	= user_info->nt_resp.length;
password           74 source3/auth/auth_winbind.c 	params.password.response.nt_data	= user_info->nt_resp.data;
password           75 source3/auth/auth_winbind.c 	params.password.response.lm_length	= user_info->lm_resp.length;
password           76 source3/auth/auth_winbind.c 	params.password.response.lm_data	= user_info->lm_resp.data;
password          804 source3/auth/pampass.c NTSTATUS smb_pam_passcheck(const char * user, const char * password)
password          816 source3/auth/pampass.c 	if ((pconv = smb_setup_pam_conv(smb_pam_conv, user, password, NULL)) == NULL)
password           94 source3/auth/pass_check.c static bool afs_auth(char *user, char *password)
password          105 source3/auth/pass_check.c 	     password, 0,	/* lifetime, default */
password          143 source3/auth/pass_check.c static bool dfs_auth(char *user, char *password)
password          167 source3/auth/pass_check.c 	if (strcmp((char *)crypt(password, get_this_salt()), get_this_crypted()))
password          324 source3/auth/pass_check.c 	passwd_rec.key.tagged_union.plain = (idl_char *) password;
password          435 source3/auth/pass_check.c static int linux_bigcrypt(char *password, char *salt1, char *crypted)
password          444 source3/auth/pass_check.c 	for (i = strlen(password); i > 0; i -= LINUX_PASSWORD_SEG_CHARS) {
password          445 source3/auth/pass_check.c 		char *p = crypt(password, salt) + 2;
password          448 source3/auth/pass_check.c 		password += LINUX_PASSWORD_SEG_CHARS;
password          460 source3/auth/pass_check.c static char *osf1_bigcrypt(char *password, char *salt1)
password          464 source3/auth/pass_check.c 	char *p2 = password;
password          467 source3/auth/pass_check.c 	int parts = strlen(password) / AUTH_CLEARTEXT_SEG_CHARS;
password          468 source3/auth/pass_check.c 	if (strlen(password) % AUTH_CLEARTEXT_SEG_CHARS)
password          543 source3/auth/pass_check.c static NTSTATUS password_check(const char *password)
password          546 source3/auth/pass_check.c 	return smb_pam_passcheck(get_this_user(), password);
password          552 source3/auth/pass_check.c 	if (afs_auth(get_this_user(), password))
password          557 source3/auth/pass_check.c 	if (dfs_auth(get_this_user(), password))
password          563 source3/auth/pass_check.c 	ret = (strcmp(osf1_bigcrypt(password, get_this_salt()),
password          568 source3/auth/pass_check.c 		ret = (strcmp((char *)crypt(password, get_this_salt()), get_this_crypted()) == 0);
password          579 source3/auth/pass_check.c 	ret = (strcmp((char *)crypt16(password, get_this_salt()), get_this_crypted()) == 0);
password          589 source3/auth/pass_check.c 	ret = (linux_bigcrypt(password, get_this_salt(), get_this_crypted()));
password          606 source3/auth/pass_check.c 	if (strcmp(bigcrypt(password, get_this_salt()), get_this_crypted()) == 0)
password          609 source3/auth/pass_check.c 		ret = (strcmp((char *)crypt(password, get_this_salt()), get_this_crypted()) == 0);
password          618 source3/auth/pass_check.c 	ret = (strcmp(bigcrypt(password, get_this_salt()), get_this_crypted()) == 0);
password          630 source3/auth/pass_check.c 	ret = (strcmp((char *)crypt(password, get_this_salt()), get_this_crypted()) == 0);
password          650 source3/auth/pass_check.c NTSTATUS pass_check(const struct passwd *pass, const char *user, const char *password, 
password          659 source3/auth/pass_check.c 	DEBUG(100, ("checking user=[%s] pass=[%s]\n", user, password));
password          662 source3/auth/pass_check.c 	if (!password)
password          665 source3/auth/pass_check.c 	if (((!*password) || (!pwlen)) && !lp_null_passwords())
password          810 source3/auth/pass_check.c 		if (!*password) {
password          821 source3/auth/pass_check.c 	nt_status = password_check(password);
password          824 source3/auth/pass_check.c                         fn(user, password);
password          839 source3/auth/pass_check.c 	if (strhasupper(password) && strhaslower(password)) {
password          844 source3/auth/pass_check.c 	pass2 = talloc_strdup(talloc_tos(), password);
password         2253 source3/client/client.c 		char *password = NULL;
password         2265 source3/client/client.c 		if (!next_token_talloc(ctx, &cmd_ptr,&password,NULL)) {
password         2272 source3/client/client.c 							password,
password          187 source3/client/mount.cifs.c 	struct passwd *password = getpwuid(getuid());
password          189 source3/client/mount.cifs.c 	if (password) {
password          190 source3/client/mount.cifs.c 		username = password->pw_name;
password           84 source3/client/smbspool.c 	               *password;	/* Password */
password          188 source3/client/smbspool.c 			password = uri_unescape_alloc(tmp2);
password          190 source3/client/smbspool.c 			password = null_str;
password          198 source3/client/smbspool.c 		if ((password = getenv("AUTH_PASSWORD")) == NULL) {
password          199 source3/client/smbspool.c 			password = null_str;
password          262 source3/client/smbspool.c 			username, password, argv[2], &need_auth);
password          392 source3/client/smbspool.c 			const char *password,
password          414 source3/client/smbspool.c 	if (!password) {
password          420 source3/client/smbspool.c 				      password, strlen(password) + 1,
password          421 source3/client/smbspool.c 				      password, strlen(password) + 1,
password          435 source3/client/smbspool.c 	nt_status = cli_tcon_andx(cli, share, "?????", password,
password          436 source3/client/smbspool.c 				  strlen(password) + 1);
password          454 source3/client/smbspool.c 					     password,
password          477 source3/client/smbspool.c 	    const char *password,	/* I - Password */
password          500 source3/client/smbspool.c 				    password, workgroup, share, 0, need_auth);
password          596 source3/client/tree.c 	char *password, int pwmaxlen)
password          600 source3/client/tree.c    strncpy(password, "test", pwmaxlen);
password           64 source3/include/ads.h 		char *password;
password          194 source3/include/client.h 	char *password; /* Can be null to force use of zero NTLMSSP session key. */
password          938 source3/include/includes.h int create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype, bool no_salt);
password         1025 source3/include/includes.h 			      krb5_data password,
password         2682 source3/include/libsmbclient.h                      const char *password,
password         2697 source3/include/libsmbclient.h 			    	   const char *password);
password           50 source3/include/popt_common.h 	char *password;
password          162 source3/include/proto.h NTSTATUS smb_pam_passcheck(const char * user, const char * password);
password          171 source3/include/proto.h NTSTATUS pass_check(const struct passwd *pass, const char *user, const char *password, 
password         1087 source3/include/proto.h 				    const char *password);
password         1764 source3/include/proto.h 				const char *password,
password         1783 source3/include/proto.h 			    const char *password,
password         1823 source3/include/proto.h 				    const char *password);
password         2335 source3/include/proto.h 			     const char *password, int flags,
password         2358 source3/include/proto.h 			const char *password,
password         2425 source3/include/proto.h NTSTATUS cli_set_password(struct cli_state *cli, const char *password);
password         2426 source3/include/proto.h NTSTATUS cli_init_creds(struct cli_state *cli, const char *username, const char *domain, const char *password);
password         2590 source3/include/proto.h 			const char *password,
password         3109 source3/include/proto.h NTSTATUS ntlmssp_set_password(NTLMSSP_STATE *ntlmssp_state, const char *password) ;
password         3258 source3/include/proto.h bool SMBNTLMv2encrypt(const char *user, const char *domain, const char *password, 
password         3263 source3/include/proto.h bool encode_pw_buffer(uint8 buffer[516], const char *password, int string_flags);
password         4526 source3/include/proto.h bool pdb_set_plaintext_pw_only(struct samu *sampass, const char *password, enum pdb_value_state flag);
password         4707 source3/include/proto.h void secrets_fetch_ipc_userpass(char **username, char **domain, char **password);
password         5222 source3/include/proto.h 				   const char *password,
password         5284 source3/include/proto.h 				  const char *password,
password         5294 source3/include/proto.h 				   const char *password,
password         5319 source3/include/proto.h 				   const char *password,
password         5327 source3/include/proto.h 					  const char *password,
password         5346 source3/include/proto.h 						 const char *password,
password         5359 source3/include/proto.h 				const char *password,
password         6730 source3/include/proto.h bool authorise_login(int snum, fstring user, DATA_BLOB password,
password         6990 source3/include/proto.h connection_struct *make_connection(const char *service_in, DATA_BLOB password, 
password          502 source3/include/rap.h     char   password[RAP_SPASSWD_LEN];
password          798 source3/lib/ldb/ldb_ildap/ldb_ildap.c 			const char *password = cli_credentials_get_password(creds);
password          799 source3/lib/ldb/ldb_ildap/ldb_ildap.c 			status = ldap_bind_simple(ildb->ldap, bind_dn, password);
password           46 source3/lib/netapi/cm.c 	if (ctx->password) {
password           47 source3/lib/netapi/cm.c 		set_cmdline_auth_info_password(auth_info, ctx->password);
password           53 source3/lib/netapi/cm.c 	    ctx->password && ctx->password[0] &&
password           66 source3/lib/netapi/cm.c 		cli_set_password(cli_ipc, ctx->password);
password           76 source3/lib/netapi/examples/join/getjoinableous.c 				   ctx->password,
password           41 source3/lib/netapi/examples/join/netdomjoin.c 	const char *password = NULL;
password           55 source3/lib/netapi/examples/join/netdomjoin.c 		{ "passwordd", 0, POPT_ARG_STRING, &password, 'U', "Domain admin password", "PASSWORD" },
password           89 source3/lib/netapi/examples/join/netdomjoin.c 			       password,
password           74 source3/lib/netapi/examples/join/rename_machine.c 					  ctx->password,
password           69 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 	char *password;
password          139 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 	SAFE_FREE(state->password);
password          155 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 	SAFE_FREE(state->password);
password          171 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 	SAFE_FREE(s->password);
password          390 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 	SAFE_FREE(state->password);
password          391 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 	state->password = strdup(entry_text);
password          411 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 	SAFE_FREE(state->password);
password          412 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 	state->password = strdup(entry_text);
password          424 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 	SAFE_FREE(state->password);
password          484 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 			if (!state->account || !state->password) {
password          491 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 			if (!state->account || !state->password) {
password          499 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 							  state->password,
password          714 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 			if (!state->account || !state->password) {
password          721 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 			if (!state->account || !state->password) {
password          729 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 					 state->password,
password          793 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 		if (!state->account || !state->password) {
password          800 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 		if (!state->account || !state->password) {
password          813 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 		debug("with %s ", state->password);
password          822 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 			       state->password,
password         1069 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 	if (!state->account || !state->password) {
password         1076 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 	if (!state->account || !state->password) {
password         1084 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c 				   state->password,
password           36 source3/lib/netapi/examples/user/user_add.c 	const char *password = NULL;
password           76 source3/lib/netapi/examples/user/user_add.c 	password = poptGetArg(pc);
password           81 source3/lib/netapi/examples/user/user_add.c 	info1.usri1_password = password;
password           77 source3/lib/netapi/joindomain.c 	if (r->in.password) {
password           78 source3/lib/netapi/joindomain.c 		j->in.admin_password = talloc_strdup(mem_ctx, r->in.password);
password          114 source3/lib/netapi/joindomain.c 	if (r->in.password) {
password          116 source3/lib/netapi/joindomain.c 						   r->in.password,
password          199 source3/lib/netapi/joindomain.c 	if (r->in.password) {
password          200 source3/lib/netapi/joindomain.c 		u->in.admin_password = talloc_strdup(mem_ctx, r->in.password);
password          240 source3/lib/netapi/joindomain.c 	if (r->in.password) {
password          242 source3/lib/netapi/joindomain.c 						   r->in.password,
password          370 source3/lib/netapi/joindomain.c 	SAFE_FREE(ads->auth.password);
password          371 source3/lib/netapi/joindomain.c 	if (r->in.password) {
password          372 source3/lib/netapi/joindomain.c 		ads->auth.password = SMB_STRDUP(r->in.password);
password          373 source3/lib/netapi/joindomain.c 	} else if (ctx->password) {
password          374 source3/lib/netapi/joindomain.c 		ads->auth.password = SMB_STRDUP(ctx->password);
password          416 source3/lib/netapi/joindomain.c 	if (r->in.password) {
password          418 source3/lib/netapi/joindomain.c 						   r->in.password,
password          458 source3/lib/netapi/joindomain.c 	if (r->in.password) {
password          460 source3/lib/netapi/joindomain.c 						   r->in.password,
password           35 source3/lib/netapi/libnetapi.c 			     const char * password /* [in] [unique] */,
password           53 source3/lib/netapi/libnetapi.c 	r.in.password = password;
password           83 source3/lib/netapi/libnetapi.c 			       const char * password /* [in] [unique] */,
password           99 source3/lib/netapi/libnetapi.c 	r.in.password = password;
password          174 source3/lib/netapi/libnetapi.c 				 const char * password /* [in] [unique] */,
password          192 source3/lib/netapi/libnetapi.c 	r.in.password = password;
password          224 source3/lib/netapi/libnetapi.c 					const char * password /* [in] */,
password          241 source3/lib/netapi/libnetapi.c 	r.in.password = password;
password            7 source3/lib/netapi/libnetapi.h 			     const char * password /* [in] [unique] */,
password           15 source3/lib/netapi/libnetapi.h 			       const char * password /* [in] [unique] */,
password           31 source3/lib/netapi/libnetapi.h 				 const char * password /* [in] [unique] */,
password           41 source3/lib/netapi/libnetapi.h 					const char * password /* [in] */,
password          224 source3/lib/netapi/netapi.c 				      const char *password)
password          226 source3/lib/netapi/netapi.c 	TALLOC_FREE(ctx->password);
password          227 source3/lib/netapi/netapi.c 	ctx->password = talloc_strdup(ctx, password);
password          228 source3/lib/netapi/netapi.c 	if (!ctx->password) {
password         1270 source3/lib/netapi/netapi.h 	char *password;
password         1309 source3/lib/netapi/netapi.h 				      const char *password);
password         1398 source3/lib/netapi/netapi.h 			     const char * password /* [in] */,
password         1417 source3/lib/netapi/netapi.h 			       const char * password /* [in] */,
password         1461 source3/lib/netapi/netapi.h 				 const char * password /* [in] */,
password         1485 source3/lib/netapi/netapi.h 					const char * password /* [in] */,
password           48 source3/lib/netapi/netapi_private.h NET_API_STATUS libnetapi_get_password(struct libnetapi_ctx *ctx, char **password);
password           85 source3/lib/netapi/share.c 			i2.shi2_passwd		= talloc_strdup(mem_ctx, s2->password);
password          153 source3/lib/netapi/share.c 			s2->password		= i2->shi2_passwd;
password          313 source3/lib/netapi/user.c 					  &user_info.info25.password);
password          326 source3/lib/netapi/user.c 						&user_info.info23.password);
password          313 source3/lib/util.c 	if (!auth_info->password) {
password          316 source3/lib/util.c 	return auth_info->password;
password          320 source3/lib/util.c 				    const char *password)
password          322 source3/lib/util.c 	TALLOC_FREE(auth_info->password);
password          323 source3/lib/util.c 	if (password == NULL) {
password          324 source3/lib/util.c 		password = "";
password          326 source3/lib/util.c 	auth_info->password = talloc_strdup(auth_info, password);
password          327 source3/lib/util.c 	if (!auth_info->password) {
password          426 source3/lib/util.c 	result->password = talloc_strdup(
password          428 source3/lib/util.c 	if ((result->username == NULL) || (result->password == NULL)) {
password          171 source3/libads/ads_struct.c 		SAFE_FREE((*ads)->auth.password);
password          156 source3/libads/kerberos.c 				const char *password,
password          222 source3/libads/kerberos.c 	if ((code = krb5_get_init_creds_password(ctx, &my_creds, me, CONST_DISCARD(char *,password), 
password          223 source3/libads/kerberos.c 						 kerb_prompter, CONST_DISCARD(char *,password),
password          321 source3/libads/kerberos.c 	if (!ads->auth.password) {
password          326 source3/libads/kerberos.c 	ret = kerberos_kinit_password_ext(s, ads->auth.password, ads->auth.time_offset,
password          644 source3/libads/kerberos.c 			    const char *password,
password          649 source3/libads/kerberos.c 					   password, 
password           40 source3/libads/kerberos_keytab.c 			      krb5_data password,
password          166 source3/libads/kerberos_keytab.c 		if (create_kerberos_key_from_string(context, princ, &password, keyp, enctypes[i], no_salt)) {
password          213 source3/libads/kerberos_keytab.c 				 krb5_data password)
password          220 source3/libads/kerberos_keytab.c 					 password,
password          234 source3/libads/kerberos_keytab.c 	krb5_data password;
password          272 source3/libads/kerberos_keytab.c 	ZERO_STRUCT(password);
password          273 source3/libads/kerberos_keytab.c 	password.data = password_s;
password          274 source3/libads/kerberos_keytab.c 	password.length = strlen(password_s);
password          350 source3/libads/kerberos_keytab.c 	ret = smb_krb5_kt_add_entry( context, keytab, kvno, princ_s, enctypes, password );
password          359 source3/libads/kerberos_keytab.c 		ret = smb_krb5_kt_add_entry( context, keytab, kvno, short_princ_s, enctypes, password );
password          310 source3/libads/kerberos_verify.c 	krb5_data password;
password          340 source3/libads/kerberos_verify.c 	password.data = password_s;
password          341 source3/libads/kerberos_verify.c 	password.length = strlen(password_s);
password          357 source3/libads/kerberos_verify.c 		if (create_kerberos_key_from_string(context, host_princ, &password, key, enctypes[i], false)) {
password           60 source3/libads/krb5_setpw.c static DATA_BLOB encode_krb5_setpw(const char *principal, const char *password)
password          100 source3/libads/krb5_setpw.c 	asn1_write_OctetString(req, password, strlen(password));
password          729 source3/libads/krb5_setpw.c     char *chpw_princ = NULL, *password;
password          759 source3/libads/krb5_setpw.c     password = SMB_STRDUP(oldpw);
password          760 source3/libads/krb5_setpw.c     ret = krb5_get_init_creds_password(context, &creds, princ, password,
password          764 source3/libads/krb5_setpw.c     SAFE_FREE(password);
password          818 source3/libads/krb5_setpw.c 				    const char *password)
password          833 source3/libads/krb5_setpw.c 				       password, ads->auth.time_offset);
password          707 source3/libads/ldap.c 		status = ADS_ERROR(ldap_simple_bind_s(ads->ldap.ld, ads->auth.user_name, ads->auth.password));
password           57 source3/libads/ndr.c 	ndr_print_string(ndr, "password", r->auth.password);
password          146 source3/libads/sasl.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_password(ntlmssp_state, ads->auth.password))) {
password           26 source3/libads/util.c 	char *password;
password           31 source3/libads/util.c 	if ((password = secrets_fetch_machine_password(lp_workgroup(), NULL, &sec_channel_type)) == NULL) {
password           38 source3/libads/util.c 	ret = kerberos_set_password(ads->auth.kdc_server, host_principal, password, host_principal, new_password, ads->auth.time_offset);
password           51 source3/libads/util.c 	SAFE_FREE(password);
password          666 source3/libgpo/gpo_util.c 					ads->auth.password,
password           55 source3/libnet/libnet_dssync_keytab.c 		ndr_err = ndr_pull_struct_blob(&entry->password, old_utdv,
password          389 source3/libnet/libnet_dssync_keytab.c 						     entry->password.data,
password          390 source3/libnet/libnet_dssync_keytab.c 						     entry->password.length);
password           98 source3/libnet/libnet_join.c 				     const char *password,
password          116 source3/libnet/libnet_join.c 	if (password) {
password          117 source3/libnet/libnet_join.c 		SAFE_FREE(my_ads->auth.password);
password          118 source3/libnet/libnet_join.c 		my_ads->auth.password = SMB_STRDUP(password);
password          933 source3/libnet/libnet_join.c 	user_info.info26.password = crypt_pwd_ex;
password          949 source3/libnet/libnet_join.c 		user_info.info24.password = crypt_pwd;
password          210 source3/libnet/libnet_keytab.c 					       krb5_data password)
password          238 source3/libnet/libnet_keytab.c 					    &password, keyp, enctype, true))
password          289 source3/libnet/libnet_keytab.c 		krb5_data password;
password          291 source3/libnet/libnet_keytab.c 		ZERO_STRUCT(password);
password          292 source3/libnet/libnet_keytab.c 		password.data = (char *)entry->password.data;
password          293 source3/libnet/libnet_keytab.c 		password.length = entry->password.length;
password          300 source3/libnet/libnet_keytab.c 					      password);
password          373 source3/libnet/libnet_keytab.c 		entry->password = data_blob_talloc(entry, KRB5_KEY_DATA(keyp),
password          375 source3/libnet/libnet_keytab.c 		if (!entry->password.data) {
password          421 source3/libnet/libnet_keytab.c 	entry.password = blob;
password          424 source3/libnet/libnet_keytab.c 	NT_STATUS_HAVE_NO_MEMORY(entry.password.data);
password           25 source3/libnet/libnet_keytab.h 	DATA_BLOB password;
password           64 source3/libnet/libnet_samsync.h 	const char *password;
password           32 source3/libnet/libnet_samsync_keytab.c 				  const char *password,
password           56 source3/libnet/libnet_samsync_keytab.c 	ads->auth.password = SMB_STRDUP(password);
password          130 source3/libnet/libnet_samsync_keytab.c 				   ctx->password,
password          143 source3/libnet/libnet_samsync_keytab.c 	if (entry && (entry->password.length == 8)) {
password          144 source3/libnet/libnet_samsync_keytab.c 		old_sequence_num = BVAL(entry->password.data, 0);
password          225 source3/libnet/libnet_samsync_keytab.c 	if (entry && (entry->password.length == 8)) {
password          226 source3/libnet/libnet_samsync_keytab.c 		old_sequence_num = BVAL(entry->password.data, 0);
password         1305 source3/librpc/gen_ndr/libnetapi.h 		const char * password;/* [unique] */
password         1320 source3/librpc/gen_ndr/libnetapi.h 		const char * password;/* [unique] */
password         1350 source3/librpc/gen_ndr/libnetapi.h 		const char * password;/* [unique] */
password         1367 source3/librpc/gen_ndr/libnetapi.h 		const char * password;
password         5883 source3/librpc/gen_ndr/ndr_libnetapi.c 		ndr_print_ptr(ndr, "password", r->in.password);
password         5885 source3/librpc/gen_ndr/ndr_libnetapi.c 		if (r->in.password) {
password         5886 source3/librpc/gen_ndr/ndr_libnetapi.c 			ndr_print_string(ndr, "password", r->in.password);
password         5923 source3/librpc/gen_ndr/ndr_libnetapi.c 		ndr_print_ptr(ndr, "password", r->in.password);
password         5925 source3/librpc/gen_ndr/ndr_libnetapi.c 		if (r->in.password) {
password         5926 source3/librpc/gen_ndr/ndr_libnetapi.c 			ndr_print_string(ndr, "password", r->in.password);
password         6007 source3/librpc/gen_ndr/ndr_libnetapi.c 		ndr_print_ptr(ndr, "password", r->in.password);
password         6009 source3/librpc/gen_ndr/ndr_libnetapi.c 		if (r->in.password) {
password         6010 source3/librpc/gen_ndr/ndr_libnetapi.c 			ndr_print_string(ndr, "password", r->in.password);
password         6055 source3/librpc/gen_ndr/ndr_libnetapi.c 		ndr_print_string(ndr, "password", r->in.password);
password         2103 source3/libsmb/cliconnect.c 			     const char *password, int flags,
password         2109 source3/libsmb/cliconnect.c 	int pw_len = password ? strlen(password)+1 : 0;
password         2113 source3/libsmb/cliconnect.c 	if (password == NULL) {
password         2114 source3/libsmb/cliconnect.c 		password = "";
password         2125 source3/libsmb/cliconnect.c 	nt_status = cli_session_setup(cli, user, password, pw_len, password,
password         2146 source3/libsmb/cliconnect.c 		nt_status = cli_tcon_andx(cli, service, service_type, password,
password         2158 source3/libsmb/cliconnect.c 	nt_status = cli_init_creds(cli, user, domain, password);
password         2294 source3/libsmb/cliconnect.c 					user_info->password ? user_info->password : "",
password           42 source3/libsmb/clidfs.c 				const char *password,
password           51 source3/libsmb/clidfs.c 			const char *password,
password           57 source3/libsmb/clidfs.c 					password,
password          104 source3/libsmb/clidfs.c 	const char *password;
password          197 source3/libsmb/clidfs.c 	password = get_cmdline_auth_info_password(auth_info);
password          200 source3/libsmb/clidfs.c 					       password, strlen(password),
password          201 source3/libsmb/clidfs.c 					       password, strlen(password),
password          205 source3/libsmb/clidfs.c 		if (password[0] || !username[0] ||
password          221 source3/libsmb/clidfs.c 		status = cli_init_creds(c, username, lp_workgroup(), password);
password          251 source3/libsmb/clidfs.c 				password,
password          263 source3/libsmb/clidfs.c 			       password, strlen(password)+1);
password          273 source3/libsmb/clidfs.c 					password,
password          994 source3/libsmb/clidfs.c 				const char *password,
password         1033 source3/libsmb/clidfs.c 					password,
password          435 source3/libsmb/clientgen.c NTSTATUS cli_set_password(struct cli_state *cli, const char *password)
password          437 source3/libsmb/clientgen.c 	TALLOC_FREE(cli->password);
password          440 source3/libsmb/clientgen.c 	if (password) {
password          441 source3/libsmb/clientgen.c 		cli->password = talloc_strdup(cli, password);
password          442 source3/libsmb/clientgen.c 		if (cli->password == NULL) {
password          447 source3/libsmb/clientgen.c 		cli->password = NULL;
password          457 source3/libsmb/clientgen.c NTSTATUS cli_init_creds(struct cli_state *cli, const char *username, const char *domain, const char *password)
password          469 source3/libsmb/clientgen.c 	return cli_set_password(cli, password);
password          786 source3/libsmb/clifsinfo.c 			const char *password,
password          809 source3/libsmb/clifsinfo.c 					password,
password          218 source3/libsmb/clikrb5.c 						  krb5_data *password,
password          232 source3/libsmb/clikrb5.c 	ret = krb5_string_to_key(context, &eblock, key, password, &salt);
password          240 source3/libsmb/clikrb5.c 						  krb5_data *password,
password          253 source3/libsmb/clikrb5.c 	ret = krb5_string_to_key_salt(context, enctype, (const char *)password->data, salt, key);
password          264 source3/libsmb/clikrb5.c 					krb5_data *password,
password          277 source3/libsmb/clikrb5.c 		KRB5_KEY_DATA(key) = (KRB5_KEY_DATA_CAST *)SMB_MALLOC(password->length);
password          281 source3/libsmb/clikrb5.c 		memcpy(KRB5_KEY_DATA(key), password->data, password->length);
password          282 source3/libsmb/clikrb5.c 		KRB5_KEY_LENGTH(key) = password->length;
password          287 source3/libsmb/clikrb5.c 	ret = create_kerberos_key_from_string_direct(context, salt_princ ? salt_princ : host_princ, password, key, enctype);
password         1377 source3/libsmb/clirap2.c 	PUTSTRINGF(p, sinfo->password, RAP_SPASSWD_LEN);
password          640 source3/libsmb/libsmb_context.c 			const char *password,
password          650 source3/libsmb/libsmb_context.c 					const char *password)
password          669 source3/libsmb/libsmb_context.c 	if (! password) {
password          670 source3/libsmb/libsmb_context.c 		password = "";
password          693 source3/libsmb/libsmb_context.c         set_cmdline_auth_info_password(auth_info, password);
password          359 source3/libsmb/libsmb_dir.c         char *password = NULL;
password          393 source3/libsmb/libsmb_dir.c                             &password,
password          466 source3/libsmb/libsmb_dir.c 		u_info.password = talloc_strdup(frame,password);
password          467 source3/libsmb/libsmb_dir.c 		if (!u_info.username || !u_info.password) {
password          555 source3/libsmb/libsmb_dir.c                                           &workgroup, &user, &password);
password          610 source3/libsmb/libsmb_dir.c                                           &workgroup, &user, &password);
password          660 source3/libsmb/libsmb_dir.c                                                   &user, &password);
password          696 source3/libsmb/libsmb_dir.c                                                           &user, &password);
password          756 source3/libsmb/libsmb_dir.c                                           &workgroup, &user, &password);
password         1123 source3/libsmb/libsmb_dir.c         char *password = NULL;
password         1152 source3/libsmb/libsmb_dir.c                             &password,
password         1169 source3/libsmb/libsmb_dir.c                           server, share, &workgroup, &user, &password);
password         1231 source3/libsmb/libsmb_dir.c         char *password = NULL;
password         1260 source3/libsmb/libsmb_dir.c                             &password,
password         1277 source3/libsmb/libsmb_dir.c                           server, share, &workgroup, &user, &password);
password         1515 source3/libsmb/libsmb_dir.c         char *password = NULL;
password         1546 source3/libsmb/libsmb_dir.c                             &password,
password         1563 source3/libsmb/libsmb_dir.c                           server, share, &workgroup, &user, &password);
password         1606 source3/libsmb/libsmb_dir.c 	char *password = NULL;
password         1662 source3/libsmb/libsmb_dir.c                             &password,
password         1679 source3/libsmb/libsmb_dir.c                           server, share, &workgroup, &user, &password);
password         1707 source3/libsmb/libsmb_dir.c         char *password = NULL;
password         1738 source3/libsmb/libsmb_dir.c                             &password,
password         1755 source3/libsmb/libsmb_dir.c                           server, share, &workgroup, &user, &password);
password           43 source3/libsmb/libsmb_file.c         char *password = NULL;
password           77 source3/libsmb/libsmb_file.c                             &password,
password           94 source3/libsmb/libsmb_file.c                           server, share, &workgroup, &user, &password);
password          238 source3/libsmb/libsmb_file.c 	char *server = NULL, *share = NULL, *user = NULL, *password = NULL;
password          292 source3/libsmb/libsmb_file.c                             &password,
password          341 source3/libsmb/libsmb_file.c 	char *server = NULL, *share = NULL, *user = NULL, *password = NULL;
password          383 source3/libsmb/libsmb_file.c                             &password,
password          426 source3/libsmb/libsmb_file.c 	char *server = NULL, *share = NULL, *user = NULL, *password = NULL;
password          460 source3/libsmb/libsmb_file.c                             &password,
password          710 source3/libsmb/libsmb_file.c 	char *server = NULL, *share = NULL, *user = NULL, *password = NULL;
password          758 source3/libsmb/libsmb_file.c                                     &password,
password          817 source3/libsmb/libsmb_file.c 	char *password = NULL;
password          851 source3/libsmb/libsmb_file.c                             &password,
password           41 source3/libsmb/libsmb_printjob.c 	char *password = NULL;
password           68 source3/libsmb/libsmb_printjob.c                             &password,
password          189 source3/libsmb/libsmb_printjob.c 	char *password = NULL;
password          217 source3/libsmb/libsmb_printjob.c                             &password,
password          234 source3/libsmb/libsmb_printjob.c                           server, share, &workgroup, &user, &password);
password          266 source3/libsmb/libsmb_printjob.c 	char *password = NULL;
password          295 source3/libsmb/libsmb_printjob.c                             &password,
password          312 source3/libsmb/libsmb_printjob.c                           server, share, &workgroup, &user, &password);
password          103 source3/libsmb/libsmb_server.c 	fstring password;
password          108 source3/libsmb/libsmb_server.c 	strlcpy(password, *pp_password, sizeof(password));
password          118 source3/libsmb/libsmb_server.c                                      password, sizeof(password));
password          125 source3/libsmb/libsmb_server.c                                               password, sizeof(password));
password          134 source3/libsmb/libsmb_server.c 	*pp_password = talloc_strdup(ctx, password);
password          118 source3/libsmb/libsmb_stat.c 	char *password = NULL;
password          152 source3/libsmb/libsmb_stat.c                             &password,
password          169 source3/libsmb/libsmb_stat.c                           server, share, &workgroup, &user, &password);
password          218 source3/libsmb/libsmb_stat.c 	char *password = NULL;
password          252 source3/libsmb/libsmb_stat.c                             &password,
password         1713 source3/libsmb/libsmb_xattr.c 	char *password = NULL;
password         1749 source3/libsmb/libsmb_xattr.c                             &password,
password         1766 source3/libsmb/libsmb_xattr.c                           server, share, &workgroup, &user, &password);
password         1774 source3/libsmb/libsmb_xattr.c                                            &workgroup, &user, &password);
password         2009 source3/libsmb/libsmb_xattr.c 	char *password = NULL;
password         2043 source3/libsmb/libsmb_xattr.c                             &password,
password         2060 source3/libsmb/libsmb_xattr.c                           server, share, &workgroup, &user, &password);
password         2068 source3/libsmb/libsmb_xattr.c                                            &workgroup, &user, &password);
password         2151 source3/libsmb/libsmb_xattr.c 	char *password = NULL;
password         2179 source3/libsmb/libsmb_xattr.c                             &password,
password         2196 source3/libsmb/libsmb_xattr.c                           server, share, &workgroup, &user, &password);
password         2204 source3/libsmb/libsmb_xattr.c                                            &workgroup, &user, &password);
password          180 source3/libsmb/ntlmssp.c NTSTATUS ntlmssp_set_password(NTLMSSP_STATE *ntlmssp_state, const char *password) 
password          182 source3/libsmb/ntlmssp.c 	if (!password) {
password          189 source3/libsmb/ntlmssp.c 		E_deshash(password, lm_hash);
password          190 source3/libsmb/ntlmssp.c 		E_md4hash(password, nt_hash);
password          474 source3/libsmb/smbencrypt.c bool SMBNTLMv2encrypt(const char *user, const char *domain, const char *password, 
password          481 source3/libsmb/smbencrypt.c 	E_md4hash(password, nt_hash);
password          494 source3/libsmb/smbencrypt.c bool encode_pw_buffer(uint8 buffer[516], const char *password, int string_flags)
password          503 source3/libsmb/smbencrypt.c 				 password, 
password          896 source3/passdb/pdb_get_set.c bool pdb_set_plaintext_pw_only(struct samu *sampass, const char *password, enum pdb_value_state flag)
password          898 source3/passdb/pdb_get_set.c 	if (password) { 
password          902 source3/passdb/pdb_get_set.c 		sampass->plaintext_pw = talloc_strdup(sampass, password);
password           46 source3/passdb/pdb_nds.c 	const char    *password,
password           64 source3/passdb/pdb_nds.c 	if (password != NULL)
password           66 source3/passdb/pdb_nds.c 		utf8PwdSize = strlen(password)+1;
password           67 source3/passdb/pdb_nds.c 		utf8PwdPtr = password;
password           83 source3/passdb/pdb_nds.c 	if (password != NULL && password2 != NULL)
password           88 source3/passdb/pdb_nds.c 	else if (password != NULL)
password         1107 source3/passdb/secrets.c void secrets_fetch_ipc_userpass(char **username, char **domain, char **password)
password         1111 source3/passdb/secrets.c 	*password = (char *)secrets_fetch(SECRETS_AUTH_PASSWORD, NULL);
password         1118 source3/passdb/secrets.c 		if (!*password || !**password)
password         1119 source3/passdb/secrets.c 			*password = smb_xstrdup("");
password         1128 source3/passdb/secrets.c 		*password = smb_xstrdup("");
password         3340 source3/printing/nt_printing.c 	SAFE_FREE(ads->auth.password);
password         3341 source3/printing/nt_printing.c 	ads->auth.password = secrets_fetch_machine_password(lp_workgroup(),
password         3382 source3/printing/nt_printing.c 	SAFE_FREE(ads->auth.password);
password         3383 source3/printing/nt_printing.c 	ads->auth.password = secrets_fetch_machine_password(lp_workgroup(),
password          142 source3/rpc_client/cli_netlogon.c 				   const char *password,
password          193 source3/rpc_client/cli_netlogon.c 		nt_lm_owf_gen(password, nt_owf_user_pwd, lm_owf_user_pwd);
password          230 source3/rpc_client/cli_netlogon.c 		logon->password = password_info;
password          252 source3/rpc_client/cli_netlogon.c 		SMBencrypt(password, chal, local_lm_response);
password          253 source3/rpc_client/cli_netlogon.c 		SMBNTencrypt(password, chal, local_nt_response);
password         3010 source3/rpc_client/cli_pipe.c 	E_md4hash(cli->password ? cli->password : "", nt_hash);
password         3049 source3/rpc_client/cli_pipe.c 				  const char *password,
password         3087 source3/rpc_client/cli_pipe.c 	status = ntlmssp_set_password(result->a_u.ntlmssp_state, password);
password         3164 source3/rpc_client/cli_pipe.c 				   const char *password,
password         3170 source3/rpc_client/cli_pipe.c 	if ((username != NULL) && (password != NULL)) {
password         3171 source3/rpc_client/cli_pipe.c 		int ret = kerberos_kinit_password(username, password, 0, NULL);
password         3742 source3/rpc_client/cli_pipe.c 						   const char *password,
password         3756 source3/rpc_client/cli_pipe.c 		password, &auth);
password         3795 source3/rpc_client/cli_pipe.c 				   const char *password,
password         3805 source3/rpc_client/cli_pipe.c 						password,
password         3820 source3/rpc_client/cli_pipe.c 					  const char *password,
password         3830 source3/rpc_client/cli_pipe.c 						password,
password         3985 source3/rpc_client/cli_pipe.c 						      const char *password,
password         3995 source3/rpc_client/cli_pipe.c 		domain, username, password, &netlogon_pipe);
password         4023 source3/rpc_client/cli_pipe.c 						 const char *password,
password         4032 source3/rpc_client/cli_pipe.c 		cli, domain, username, password, &neg_flags, &netlogon_pipe);
password         4104 source3/rpc_client/cli_pipe.c 				const char *password,
password         4118 source3/rpc_client/cli_pipe.c 					   username, password, &auth);
password          939 source3/rpc_server/srv_netlog_nt.c 			logon->password->identity_info.account_name.string);
password          941 source3/rpc_server/srv_netlog_nt.c 			logon->password->identity_info.domain_name.string);
password          943 source3/rpc_server/srv_netlog_nt.c 			logon->password->identity_info.workstation.string);
password         1018 source3/rpc_server/srv_netlog_nt.c 							 logon->password->identity_info.parameter_control,
password         1020 source3/rpc_server/srv_netlog_nt.c 							 logon->password->lmpassword.hash,
password         1021 source3/rpc_server/srv_netlog_nt.c 							 logon->password->ntpassword.hash,
password         2084 source3/rpc_server/srv_samr_nt.c 	if (!r->in.hash || !r->in.password) {
password         2089 source3/rpc_server/srv_samr_nt.c 				 r->in.password->data,
password         4742 source3/rpc_server/srv_samr_nt.c 				      id23->password.data,
password         4877 source3/rpc_server/srv_samr_nt.c 	if (!set_user_info_pw(id24->password.data, pwd)) {
password         4917 source3/rpc_server/srv_samr_nt.c 		if (!set_user_info_pw(id25->password.data, pwd)) {
password         4962 source3/rpc_server/srv_samr_nt.c 	if (!set_user_info_pw(id26->password.data, pwd)) {
password         5240 source3/rpc_server/srv_samr_nt.c 			SamOEMhashBlob(info->info23.password.data, 516,
password         5243 source3/rpc_server/srv_samr_nt.c 			dump_data(100, info->info23.password.data, 516);
password         5253 source3/rpc_server/srv_samr_nt.c 			SamOEMhashBlob(info->info24.password.data,
password         5257 source3/rpc_server/srv_samr_nt.c 			dump_data(100, info->info24.password.data, 516);
password         5268 source3/rpc_server/srv_samr_nt.c 				info->info25.password.data,
password         5271 source3/rpc_server/srv_samr_nt.c 			dump_data(100, info->info25.password.data, 532);
password         5282 source3/rpc_server/srv_samr_nt.c 				info->info26.password.data,
password         5285 source3/rpc_server/srv_samr_nt.c 			dump_data(100, info->info26.password.data, 516);
password          315 source3/rpc_server/srv_srvsvc_nt.c 	r->password		= "";
password          407 source3/rpc_server/srv_srvsvc_nt.c 	r->password		= "";
password          954 source3/rpcclient/cmd_lsarpc.c 	DATA_BLOB data 	   = data_blob(NULL, p->password->length);
password          957 source3/rpcclient/cmd_lsarpc.c 	memcpy(data.data, p->password->data, p->password->length);
password          980 source3/rpcclient/cmd_lsarpc.c 			display_trust_dom_info_4(&info->password, nt_hash);
password          692 source3/rpcclient/cmd_netlogon.c 	const char *username, *password;
password          706 source3/rpcclient/cmd_netlogon.c 	password = argv[2];
password          722 source3/rpcclient/cmd_netlogon.c 	result = rpccli_netlogon_sam_logon(cli, mem_ctx, logon_param, lp_workgroup(), username, password, workstation, logon_type);
password         2712 source3/rpcclient/cmd_samr.c 		info.info23.password = pwd_buf;
password         2716 source3/rpcclient/cmd_samr.c 		info.info24.password		= pwd_buf;
password         2730 source3/rpcclient/cmd_samr.c 		info.info25.password = pwd_buf_ex;
password         2734 source3/rpcclient/cmd_samr.c 		info.info26.password		= pwd_buf_ex;
password          226 source3/rpcclient/cmd_srvsvc.c 	printf("\tpassword:\t%s\n", r->password);
password          234 source3/rpcclient/cmd_srvsvc.c 	printf("\tpassword:\t%s\n", r->password);
password          916 source3/rpcclient/rpcclient.c 	memset(cmdline_auth_info.password,'X',sizeof(cmdline_auth_info.password));
password         2622 source3/smbd/lanman.c 		DATA_BLOB password = data_blob(pass1, strlen(pass1)+1);
password         2624 source3/smbd/lanman.c 		if (NT_STATUS_IS_OK(check_plaintext_password(user,password,&server_info))) {
password         2634 source3/smbd/lanman.c 		data_blob_clear_free(&password);
password          577 source3/smbd/password.c static char *validate_group(char *group, DATA_BLOB password,int snum)
password          586 source3/smbd/password.c 				    password_ok(user,password)) {
password          647 source3/smbd/password.c 				    password_ok(member,password)) {
password          675 source3/smbd/password.c bool authorise_login(int snum, fstring user, DATA_BLOB password,
password          682 source3/smbd/password.c 		   "user=%s pass=%s\n", user,password.data));
password          723 source3/smbd/password.c 			if (password_ok(user2,password)) {
password          759 source3/smbd/password.c 				auser = validate_group(auser+1,password,snum);
password          771 source3/smbd/password.c 				    password_ok(user2,password)) {
password          514 source3/smbd/reply.c 	char *password = NULL;
password          533 source3/smbd/reply.c 	pwlen = srvstr_pull_req_talloc(ctx, req, &password, p, STR_TERMINATE);
password          538 source3/smbd/reply.c 	if (service_buf == NULL || password == NULL || dev == NULL) {
password          550 source3/smbd/reply.c 	password_blob = data_blob(password, pwlen+1);
password          584 source3/smbd/reply.c 	DATA_BLOB password;
password          621 source3/smbd/reply.c 		password = data_blob_talloc(talloc_tos(), req->buf, passlen);
password          632 source3/smbd/reply.c 		password = data_blob_talloc(talloc_tos(), req->buf, passlen+1);
password          634 source3/smbd/reply.c 		password.data[passlen]=0;
password          641 source3/smbd/reply.c 		data_blob_clear_free(&password);
password          654 source3/smbd/reply.c 			data_blob_clear_free(&password);
password          669 source3/smbd/reply.c 		data_blob_clear_free(&password);
password          677 source3/smbd/reply.c 	conn = make_connection(service, password, client_devicetype,
password          681 source3/smbd/reply.c 	data_blob_clear_free(&password);
password          565 source3/smbd/service.c 					      DATA_BLOB password,
password          621 source3/smbd/service.c                 if (!authorise_login(snum,user,password,&guest)) {
password          642 source3/smbd/service.c 					       DATA_BLOB password, 
password          671 source3/smbd/service.c 		conn, snum, vuser ? vuser->server_info : NULL, password,
password         1088 source3/smbd/service.c connection_struct *make_connection(const char *service_in, DATA_BLOB password, 
password         1164 source3/smbd/service.c 							    password,
password         1213 source3/smbd/service.c 				    password,
password           22 source3/torture/locktest.c static fstring password[2];
password          226 source3/torture/locktest.c 			fstrcpy(password[0], pass);
password          227 source3/torture/locktest.c 			fstrcpy(password[1], pass);
password          232 source3/torture/locktest.c 		fstrcpy(password[1], password[0]);
password          237 source3/torture/locktest.c 					       password[snum],
password          238 source3/torture/locktest.c 					       strlen(password[snum]),
password          239 source3/torture/locktest.c 					       password[snum],
password          240 source3/torture/locktest.c 					       strlen(password[snum]),
password          260 source3/torture/locktest.c 	status = cli_tcon_andx(c, share, "?????", password[snum],
password          261 source3/torture/locktest.c 			       strlen(password[snum])+1);
password          653 source3/torture/locktest.c 				fstrcpy(password[got_pass], p+1);
password           22 source3/torture/locktest2.c static fstring password;
password          179 source3/torture/locktest2.c 			fstrcpy(password, pass);
password          186 source3/torture/locktest2.c 					username, lp_workgroup(), password, 0,
password          524 source3/torture/locktest2.c 				fstrcpy(password, p+1);
password           22 source3/torture/masktest.c static fstring password;
password          226 source3/torture/masktest.c 			fstrcpy(password, pass);
password          231 source3/torture/masktest.c 					       password, strlen(password),
password          232 source3/torture/masktest.c 					       password, strlen(password),
password          252 source3/torture/masktest.c 	status = cli_tcon_andx(c, share, "?????", password,
password          253 source3/torture/masktest.c 			       strlen(password)+1);
password          522 source3/torture/masktest.c 				fstrcpy(password, p+1);
password           26 source3/torture/torture.c static fstring host, workgroup, share, password, username, myname;
password          138 source3/torture/torture.c 						password,
password          281 source3/torture/torture.c 				     password, flags, Undefined, &retry);
password          335 source3/torture/torture.c 	size_t passlen = strlen(password);
password          342 source3/torture/torture.c 						password, passlen,
password          343 source3/torture/torture.c 						password, passlen,
password         1137 source3/torture/torture.c 			       password, strlen(password)+1);
password         1227 source3/torture/torture.c 	status = cli_raw_tcon(cli, service, password, "?????", &max_xmit, &cnum);
password         1253 source3/torture/torture.c 			       password, strlen(password)+1);
password         1307 source3/torture/torture.c 				     password, flags, Undefined, &retry);
password         4925 source3/torture/torture.c 						      password, strlen(password),
password         4926 source3/torture/torture.c 						      password, strlen(password),
password         4943 source3/torture/torture.c 						      password, strlen(password),
password         4944 source3/torture/torture.c 						      password, strlen(password),
password         4997 source3/torture/torture.c 			password, strlen(password),
password         4998 source3/torture/torture.c 			password, strlen(password),
password         6240 source3/torture/torture.c 				fstrcpy(password, p+1);
password         6266 source3/torture/torture.c 			fstrcpy(password, p);
password          253 source3/utils/net_ads.c 		SAFE_FREE(ads->auth.password);
password          254 source3/utils/net_ads.c 		ads->auth.password = smb_xstrdup(c->opt_password);
password         1322 source3/utils/net_ads.c 			ads_dns->auth.password = secrets_fetch_machine_password(
password           43 source3/utils/net_dom.c 	const char *password = NULL;
password           70 source3/utils/net_dom.c 			password = get_string_param(argv[i]);
password           71 source3/utils/net_dom.c 			if (!password) {
password           89 source3/utils/net_dom.c 	status = NetUnjoinDomain(server_name, account, password, unjoin_flags);
password          132 source3/utils/net_dom.c 	const char *password = NULL;
password          174 source3/utils/net_dom.c 			password = get_string_param(argv[i]);
password          175 source3/utils/net_dom.c 			if (!password) {
password          196 source3/utils/net_dom.c 			       Account, password, join_flags);
password          236 source3/utils/net_dom.c 	const char *password = NULL;
password          262 source3/utils/net_dom.c 			password = get_string_param(argv[i]);
password          263 source3/utils/net_dom.c 			if (!password) {
password          288 source3/utils/net_dom.c 					  account, password, rename_options);
password          255 source3/utils/net_rap.c 	memset(sinfo.password, '\0', sizeof(sinfo.password));
password         2808 source3/utils/net_rpc.c 	char *password=NULL; /* don't allow a share password */
password         2834 source3/utils/net_rpc.c 	i2.shi2_passwd		= password;
password         4676 source3/utils/net_rpc.c 	d_printf("Password: %s\n", info.info2->password);
password         5244 source3/utils/net_rpc.c 		info.info23.password = crypt_pwd;
password         5756 source3/utils/net_rpc.c 	data = data_blob(info->password.password->data,
password         5757 source3/utils/net_rpc.c 			 info->password.password->length);
password          346 source3/utils/net_rpc_join.c 	set_info.info24.password = crypt_pwd;
password          383 source3/utils/net_rpc_samsync.c 	ctx->password		= c->opt_password;
password          446 source3/utils/ntlm_auth_diagnostics.c 	char *password;
password          471 source3/utils/ntlm_auth_diagnostics.c 	if ((password = strdup_upper(opt_password)) == NULL) {
password          477 source3/utils/ntlm_auth_diagnostics.c 				     CH_DOS, password,
password          478 source3/utils/ntlm_auth_diagnostics.c 				     strlen(password)+1, 
password          485 source3/utils/ntlm_auth_diagnostics.c 	SAFE_FREE(password);
password           48 source3/utils/smbget.c static const char *username = NULL, *password = NULL, *workgroup = NULL;
password          101 source3/utils/smbget.c 	if(!nonprompt && !password) {
password          109 source3/utils/smbget.c 	} else if(password) strncpy(pw, password, pwlen-1);
password          574 source3/utils/smbget.c 		{"password", 'p', POPT_ARG_STRING, &password, 'p', "Password to use" },
password          615 source3/utils/smbget.c 			username = ""; password = "";
password          131 source3/winbindd/idmap_ad.c 	SAFE_FREE(ads->auth.password);
password          132 source3/winbindd/idmap_ad.c 	ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), NULL, NULL);
password           81 source3/winbindd/idmap_adex/idmap_adex.c 	ads->auth.password =
password          276 source3/winbindd/idmap_adex/likewise_cell.c 	ads->auth.password =
password           83 source3/winbindd/winbindd_ads.c 	SAFE_FREE(ads->auth.password);
password           90 source3/winbindd/winbindd_ads.c 		if ( !pdb_get_trusteddom_pw( domain->name, &ads->auth.password, &sid, &last_set_time ) ) {
password          100 source3/winbindd/winbindd_ads.c 		ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), NULL, NULL);
password          552 source3/winbindd/winbindd_cm.c static void cm_get_ipc_userpass(char **username, char **domain, char **password)
password          556 source3/winbindd/winbindd_cm.c 	*password = (char *)secrets_fetch(SECRETS_AUTH_PASSWORD, NULL);
password          563 source3/winbindd/winbindd_cm.c 		if (!*password || !**password)
password          564 source3/winbindd/winbindd_cm.c 			*password = smb_xstrdup("");
password          573 source3/winbindd/winbindd_cm.c 		*password = smb_xstrdup("");
password         2033 source3/winbindd/winbindd_cm.c 	    (conn->cli->password == NULL || conn->cli->password[0] == '\0'))
password         2044 source3/winbindd/winbindd_cm.c 		machine_password = SMB_STRDUP(conn->cli->password);
password         2252 source3/winbindd/winbindd_cm.c 	    (conn->cli->password == NULL || conn->cli->password[0] == '\0')) {
password         2263 source3/winbindd/winbindd_cm.c 		 conn->cli->domain, conn->cli->user_name, conn->cli->password,
password           82 source4/auth/auth.h 	} password;
password          271 source4/auth/auth.h 					   const char *password,
password          288 source4/auth/credentials/credentials.c 		cred->password = cred->password_cb(cred);
password          294 source4/auth/credentials/credentials.c 	return cred->password;
password          305 source4/auth/credentials/credentials.c 		cred->password = talloc_strdup(cred, val);
password          366 source4/auth/credentials/credentials.c 	const char *password = cli_credentials_get_password(cred);
password          368 source4/auth/credentials/credentials.c 	if (password) {
password          374 source4/auth/credentials/credentials.c 		E_md4hash(password, nt_hash->hash);    
password          643 source4/auth/credentials/credentials.c 			memset(p,0,strlen(cred->password));
password           74 source4/auth/credentials/credentials.h 	const char *password;
password          203 source4/auth/credentials/credentials_files.c 	const char *password;
password          252 source4/auth/credentials/credentials_files.c 	password = ldb_msg_find_attr_as_string(msgs[0], "secret", NULL);
password          281 source4/auth/credentials/credentials_files.c 	if (!password) {
password          294 source4/auth/credentials/credentials_files.c 		cli_credentials_set_password(cred, password, CRED_SPECIFIED);
password          173 source4/auth/credentials/credentials_ntlm.c 			const char *password;
password          174 source4/auth/credentials/credentials_ntlm.c 			password = cli_credentials_get_password(cred);
password          175 source4/auth/credentials/credentials_ntlm.c 			if (!password) {
password          179 source4/auth/credentials/credentials_ntlm.c 				if (!SMBencrypt(password,challenge.data,
password          191 source4/auth/credentials/credentials_ntlm.c 					E_deshash(password, lm_hash);
password          202 source4/auth/credentials/credentials_ntlm.c 			const char *password;
password          208 source4/auth/credentials/credentials_ntlm.c 			password = cli_credentials_get_password(cred);
password          209 source4/auth/credentials/credentials_ntlm.c 			if (password) {
password          210 source4/auth/credentials/credentials_ntlm.c 				E_deshash(password, lm_hash);
password           93 source4/auth/gensec/cyrus_sasl.c 	const char *password = cli_credentials_get_password(gensec_get_credentials(gensec_security));
password           96 source4/auth/gensec/cyrus_sasl.c 	if (!password) {
password          100 source4/auth/gensec/cyrus_sasl.c 	secret = talloc_size(gensec_security, sizeof(sasl_secret_t)+strlen(password));
password          104 source4/auth/gensec/cyrus_sasl.c 	secret->len = strlen(password);
password          105 source4/auth/gensec/cyrus_sasl.c 	safe_strcpy((char*)secret->data, password, secret->len+1);
password           33 source4/auth/kerberos/clikrb5.c 					krb5_data *password,
password           47 source4/auth/kerberos/clikrb5.c 	ret = krb5_string_to_key(context, &eblock, key, password, &salt);
password           54 source4/auth/kerberos/clikrb5.c 					krb5_data *password,
password           66 source4/auth/kerberos/clikrb5.c 	ret = krb5_string_to_key_salt(context, enctype, password->data,
password           82 source4/auth/kerberos/kerberos.c 				krb5_principal principal, const char *password, 
password           93 source4/auth/kerberos/kerberos.c 	if ((code = krb5_get_init_creds_password(ctx, &my_creds, principal, password, 
password           78 source4/auth/kerberos/kerberos.h int create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype);
password           79 source4/auth/kerberos/kerberos.h int create_kerberos_key_from_string_direct(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype);
password           92 source4/auth/kerberos/kerberos.h 			       krb5_principal principal, const char *password, 
password          151 source4/auth/kerberos/kerberos_util.c 	const char *password;
password          167 source4/auth/kerberos/kerberos_util.c 	password = cli_credentials_get_password(credentials);
password          171 source4/auth/kerberos/kerberos_util.c 		if (password) {
password          174 source4/auth/kerberos/kerberos_util.c 							 password, NULL, &kdc_time);
password          287 source4/auth/kerberos/kerberos_util.c 	krb5_data password;
password          293 source4/auth/kerberos/kerberos_util.c 	password.data = discard_const_p(char *, password_s);
password          294 source4/auth/kerberos/kerberos_util.c 	password.length = strlen(password_s);
password          309 source4/auth/kerberos/kerberos_util.c 						      salt_princ, &password, &entry.keyblock, enctype);
password          189 source4/auth/ntlm/auth_sam.c 					     user_info->password.hash.lanman,
password          190 source4/auth/ntlm/auth_sam.c 					     user_info->password.hash.nt,
password          202 source4/auth/ntlm/auth_sam.c 					     &user_info->password.response.lanman, 
password          203 source4/auth/ntlm/auth_sam.c 					     &user_info->password.response.nt,
password          132 source4/auth/ntlm/auth_server.c 		cli_credentials_set_password(creds, user_info->password.plaintext, 
password          136 source4/auth/ntlm/auth_server.c 		cli_credentials_set_nt_hash(creds, user_info->password.hash.nt,
password          141 source4/auth/ntlm/auth_server.c 		cli_credentials_set_ntlm_response(creds, &user_info->password.response.lanman, &user_info->password.response.nt, CRED_SPECIFIED);
password           40 source4/auth/ntlm/auth_simple.c 					   const char *password,
password           79 source4/auth/ntlm/auth_simple.c 	user_info->password.plaintext = talloc_strdup(user_info, password);
password          446 source4/auth/ntlm/auth_unix.c 	info->plaintext_password = user_info->password.plaintext;
password          502 source4/auth/ntlm/auth_unix.c static NTSTATUS password_check(const char *username, const char *password,
password          508 source4/auth/ntlm/auth_unix.c 	if (afs_auth(username, password))
password          513 source4/auth/ntlm/auth_unix.c 	if (dfs_auth(username, password))
password          519 source4/auth/ntlm/auth_unix.c 	ret = (strcmp(osf1_bigcrypt(password, salt), crypted) == 0);
password          524 source4/auth/ntlm/auth_unix.c 		ret = (strcmp((char *)crypt(password, salt), crypted) == 0);
password          535 source4/auth/ntlm/auth_unix.c 	ret = (strcmp((char *)crypt16(password, salt), crypted) == 0);
password          545 source4/auth/ntlm/auth_unix.c 	ret = (linux_bigcrypt(password, salt, crypted));
password          562 source4/auth/ntlm/auth_unix.c 	if (strcmp(bigcrypt(password, salt), crypted) == 0)
password          565 source4/auth/ntlm/auth_unix.c 		ret = (strcmp((char *)crypt(password, salt), crypted) == 0);
password          574 source4/auth/ntlm/auth_unix.c 	ret = (strcmp(bigcrypt(password, salt), crypted) == 0);
password          586 source4/auth/ntlm/auth_unix.c 	ret = (strcmp((char *)crypt(password, salt), crypted) == 0);
password          600 source4/auth/ntlm/auth_unix.c 	char *password;
password          611 source4/auth/ntlm/auth_unix.c 	password = talloc_strdup(ctx, user_info->password.plaintext);
password          713 source4/auth/ntlm/auth_unix.c 		if (password == NULL) {
password          721 source4/auth/ntlm/auth_unix.c 	nt_status = password_check(username, password, crypted, salt);
password          738 source4/auth/ntlm/auth_unix.c 	if (strhasupper(password) && strhaslower(password)) {
password          743 source4/auth/ntlm/auth_unix.c 	pwcopy = talloc_strdup(ctx, password);
password          154 source4/auth/ntlm/auth_util.c 							   user_info_in->password.hash.nt->hash, &chall_blob,
password          162 source4/auth/ntlm/auth_util.c 				user_info_temp->password.response.lanman = lmv2_response;
password          163 source4/auth/ntlm/auth_util.c 				user_info_temp->password.response.nt = ntlmv2_response;
password          169 source4/auth/ntlm/auth_util.c 				SMBOWFencrypt(user_info_in->password.hash.nt->hash, challenge, blob.data);
password          171 source4/auth/ntlm/auth_util.c 				user_info_temp->password.response.nt = blob;
password          172 source4/auth/ntlm/auth_util.c 				if (lp_client_lanman_auth(auth_context->lp_ctx) && user_info_in->password.hash.lanman) {
password          174 source4/auth/ntlm/auth_util.c 					SMBOWFencrypt(user_info_in->password.hash.lanman->hash, challenge, blob.data);
password          175 source4/auth/ntlm/auth_util.c 					user_info_temp->password.response.lanman = lm_blob;
password          178 source4/auth/ntlm/auth_util.c 					user_info_temp->password.response.lanman = user_info_temp->password.response.nt;
password          207 source4/auth/ntlm/auth_util.c 			if (E_deshash(user_info_in->password.plaintext, lanman.hash)) {
password          208 source4/auth/ntlm/auth_util.c 				user_info_temp->password.hash.lanman = talloc(user_info_temp,
password          210 source4/auth/ntlm/auth_util.c 				*user_info_temp->password.hash.lanman = lanman;
password          212 source4/auth/ntlm/auth_util.c 				user_info_temp->password.hash.lanman = NULL;
password          215 source4/auth/ntlm/auth_util.c 			E_md4hash(user_info_in->password.plaintext, nt.hash);
password          216 source4/auth/ntlm/auth_util.c 			user_info_temp->password.hash.nt = talloc(user_info_temp,
password          218 source4/auth/ntlm/auth_util.c 			*user_info_temp->password.hash.nt = nt;
password          109 source4/auth/ntlm/auth_winbind.c 	request.data.auth_crap.lm_resp_len = MIN(user_info->password.response.lanman.length,
password          111 source4/auth/ntlm/auth_winbind.c 	request.data.auth_crap.nt_resp_len = MIN(user_info->password.response.nt.length, 
password          114 source4/auth/ntlm/auth_winbind.c 	memcpy(request.data.auth_crap.lm_resp, user_info->password.response.lanman.data,
password          116 source4/auth/ntlm/auth_winbind.c 	memcpy(request.data.auth_crap.nt_resp, user_info->password.response.nt.data,
password          193 source4/auth/ntlm/auth_winbind.c 		password_info->lmpassword = *user_info->password.hash.lanman;
password          194 source4/auth/ntlm/auth_winbind.c 		password_info->ntpassword = *user_info->password.hash.nt;
password          198 source4/auth/ntlm/auth_winbind.c 		s->req.in.logon.password= password_info;
password          216 source4/auth/ntlm/auth_winbind.c 		network_info->nt.length = user_info->password.response.nt.length;
password          217 source4/auth/ntlm/auth_winbind.c 		network_info->nt.data	= user_info->password.response.nt.data;
password          219 source4/auth/ntlm/auth_winbind.c 		network_info->lm.length = user_info->password.response.lanman.length;
password          220 source4/auth/ntlm/auth_winbind.c 		network_info->lm.data	= user_info->password.response.lanman.data;
password          679 source4/auth/ntlmssp/ntlmssp_server.c 	user_info->password.response.lanman = gensec_ntlmssp_state->lm_resp;
password          680 source4/auth/ntlmssp/ntlmssp_server.c 	user_info->password.response.lanman.data = talloc_steal(user_info, gensec_ntlmssp_state->lm_resp.data);
password          681 source4/auth/ntlmssp/ntlmssp_server.c 	user_info->password.response.nt = gensec_ntlmssp_state->nt_resp;
password          682 source4/auth/ntlmssp/ntlmssp_server.c 	user_info->password.response.nt.data = talloc_steal(user_info, gensec_ntlmssp_state->nt_resp.data);
password           47 source4/client/mount.cifs.c 	struct passwd *password = getpwuid(getuid());
password           49 source4/client/mount.cifs.c 	if (password) {
password           50 source4/client/mount.cifs.c 		username = password->pw_name;
password           32 source4/client/smbmount.c static pstring password;
password          197 source4/client/smbmount.c 			pstrcpy(password, pass);
password          215 source4/client/smbmount.c 			       password, strlen(password),
password          216 source4/client/smbmount.c 			       password, strlen(password),
password          220 source4/client/smbmount.c 		if (password[0] || !username[0] ||
password          233 source4/client/smbmount.c 	if (!smbcli_tconX(c, share, "?????", password, strlen(password)+1)) {
password          602 source4/client/smbmount.c 	pstrcpy(password, pass);
password          654 source4/client/smbmount.c 			pstrcpy(password, val);
password          772 source4/client/smbmount.c 					pstrcpy(password,lp+1);
password          774 source4/client/smbmount.c 					memset(strchr_m(opteq+1,'%')+1,'X',strlen(password));
password          782 source4/client/smbmount.c 				pstrcpy(password,opteq+1);
password          784 source4/client/smbmount.c 				memset(opteq+1,'X',strlen(password));
password          824 source4/client/smbmount.c 				*password = '\0';
password          891 source4/client/smbmount.c 			pstrcpy(password,p+1);
password          893 source4/client/smbmount.c 			memset(strchr_m(getenv("USER"),'%')+1,'X',strlen(password));
password          899 source4/client/smbmount.c 		pstrcpy(password, getenv("PASSWD"));
password          595 source4/client/tree.c 	char *password, int pwmaxlen)
password          599 source4/client/tree.c    strncpy(password, "test", pwmaxlen);
password           70 source4/dsdb/samdb/ldb_modules/proxy.c 	const char *olddn, *newdn, *url, *username, *password, *oldstr, *newstr;
password           93 source4/dsdb/samdb/ldb_modules/proxy.c 	password = ldb_msg_find_attr_as_string(res->msgs[0], "password", NULL);
password           97 source4/dsdb/samdb/ldb_modules/proxy.c 	if (url == NULL || olddn == NULL || newdn == NULL || username == NULL || password == NULL) {
password          140 source4/dsdb/samdb/ldb_modules/proxy.c 	cli_credentials_set_password(creds, password, CRED_SPECIFIED);
password          167 source4/heimdal/kdc/digest.c 		   char **password)
password          185 source4/heimdal/kdc/digest.c     ret = hdb_entry_get_password(context, db, &user->entry, password);
password          186 source4/heimdal/kdc/digest.c     if (ret || password == NULL) {
password          222 source4/heimdal/kdc/digest.c     char *client_name = NULL, *password = NULL;
password          635 source4/heimdal/kdc/digest.c 				     &password);
password          641 source4/heimdal/kdc/digest.c 	    MD5_Update(&ctx, password, strlen(password));
password          687 source4/heimdal/kdc/digest.c 				     &password);
password          698 source4/heimdal/kdc/digest.c 	    MD5_Update(&ctx, password, strlen(password));
password         1445 source4/heimdal/kdc/digest.c     if (password) {
password         1446 source4/heimdal/kdc/digest.c 	memset(password, 0, strlen(password));
password         1447 source4/heimdal/kdc/digest.c 	free (password);
password           69 source4/heimdal/lib/hcrypto/pkcs5.c PKCS5_PBKDF2_HMAC_SHA1(const void * password, size_t password_len,
password          112 source4/heimdal/lib/hcrypto/pkcs5.c 	HMAC(md, password, password_len, data, datalen,
password          117 source4/heimdal/lib/hcrypto/pkcs5.c 	    HMAC(md, password, password_len, tmpcksum, checksumsize,
password          280 source4/heimdal/lib/hdb/ext.c 	if (db->hdb_master_key_set && ext->data.u.password.mkvno) {
password          283 source4/heimdal/lib/hdb/ext.c 	    key = _hdb_find_master_key(ext->data.u.password.mkvno,
password          289 source4/heimdal/lib/hdb/ext.c 				       *ext->data.u.password.mkvno);
password          294 source4/heimdal/lib/hdb/ext.c 				    ext->data.u.password.password.data,
password          295 source4/heimdal/lib/hdb/ext.c 				    ext->data.u.password.password.length,
password          298 source4/heimdal/lib/hdb/ext.c 	    ret = der_copy_octet_string(&ext->data.u.password.password, &pw);
password          354 source4/heimdal/lib/hdb/ext.c 				&ext.data.u.password.password);
password          358 source4/heimdal/lib/hdb/ext.c 	ext.data.u.password.mkvno =
password          359 source4/heimdal/lib/hdb/ext.c 	    malloc(sizeof(*ext.data.u.password.mkvno));
password          360 source4/heimdal/lib/hdb/ext.c 	if (ext.data.u.password.mkvno == NULL) {
password          365 source4/heimdal/lib/hdb/ext.c 	*ext.data.u.password.mkvno = _hdb_mkey_version(key);
password          368 source4/heimdal/lib/hdb/ext.c 	ext.data.u.password.mkvno = NULL;
password          370 source4/heimdal/lib/hdb/ext.c 	ret = krb5_data_copy(&ext.data.u.password.password,
password          368 source4/heimdal/lib/hdb/keys.c 			      const char *password,
password          388 source4/heimdal/lib/hdb/keys.c 				       password,
password         2268 source4/heimdal/lib/hx509/crypto.c 	       const char *password,
password         2281 source4/heimdal/lib/hx509/crypto.c     passwordlen = password ? strlen(password) : 0;
password         2299 source4/heimdal/lib/hx509/crypto.c     if (!PKCS12_key_gen (password, passwordlen, salt, saltlen,
password         2305 source4/heimdal/lib/hx509/crypto.c     if (!PKCS12_key_gen (password, passwordlen, salt, saltlen,
password         2433 source4/heimdal/lib/hx509/crypto.c 	const char *password;
password         2436 source4/heimdal/lib/hx509/crypto.c 	    password = pw->val[i];
password         2438 source4/heimdal/lib/hx509/crypto.c 	    password = "";
password         2440 source4/heimdal/lib/hx509/crypto.c 	    password = NULL;
password         2442 source4/heimdal/lib/hx509/crypto.c 	ret = (*s2k)(context, password, ai->parameters, &crypto,
password           73 source4/heimdal/lib/hx509/ks_file.c 	    const void *password,
password           92 source4/heimdal/lib/hx509/ks_file.c 			 password, passwordlen,
password          227 source4/heimdal/lib/hx509/ks_file.c 	    const void *password;
password          231 source4/heimdal/lib/hx509/ks_file.c 		password = pw->val[i];
password          232 source4/heimdal/lib/hx509/ks_file.c 		passwordlen = strlen(password);
password          235 source4/heimdal/lib/hx509/ks_file.c 				  cipher, ivdata, password, passwordlen,
password          245 source4/heimdal/lib/hx509/ks_file.c 	    char password[128];
password          251 source4/heimdal/lib/hx509/ks_file.c 	    prompt.reply.data = password;
password          252 source4/heimdal/lib/hx509/ks_file.c 	    prompt.reply.length = sizeof(password);
password          257 source4/heimdal/lib/hx509/ks_file.c 				  cipher, ivdata, password, strlen(password),
password          260 source4/heimdal/lib/hx509/ks_file.c 	    memset(password, 0, sizeof(password));
password           44 source4/heimdal/lib/hx509/lock.c     struct _hx509_password password;
password           88 source4/heimdal/lib/hx509/lock.c hx509_lock_add_password(hx509_lock lock, const char *password)
password           93 source4/heimdal/lib/hx509/lock.c     s = strdup(password);
password           97 source4/heimdal/lib/hx509/lock.c     d = realloc(lock->password.val,
password           98 source4/heimdal/lib/hx509/lock.c 		(lock->password.len + 1) * sizeof(lock->password.val[0]));
password          103 source4/heimdal/lib/hx509/lock.c     lock->password.val = d;
password          104 source4/heimdal/lib/hx509/lock.c     lock->password.val[lock->password.len] = s;
password          105 source4/heimdal/lib/hx509/lock.c     lock->password.len++;
password          113 source4/heimdal/lib/hx509/lock.c     return &lock->password;
password          126 source4/heimdal/lib/hx509/lock.c     for (i = 0; i < lock->password.len; i++)
password          127 source4/heimdal/lib/hx509/lock.c 	free(lock->password.val[i]);
password          128 source4/heimdal/lib/hx509/lock.c     free(lock->password.val);
password          129 source4/heimdal/lib/hx509/lock.c     lock->password.val = NULL;
password          130 source4/heimdal/lib/hx509/lock.c     lock->password.len = 0;
password          218 source4/heimdal/lib/krb5/crypto.c     char  password[8+1];	/* crypt is limited to 8 chars anyway */
password          225 source4/heimdal/lib/krb5/crypto.c 	password[i] = c ? c : 'X';
password          227 source4/heimdal/lib/krb5/crypto.c     password[8] = '\0';
password          229 source4/heimdal/lib/krb5/crypto.c     memcpy(key, crypt(password, "p1") + 2, sizeof(DES_cblock));
password          250 source4/heimdal/lib/krb5/crypto.c     char password[512];
password          253 source4/heimdal/lib/krb5/crypto.c     memcpy(password, pw.data, min(pw.length, sizeof(password)));
password          254 source4/heimdal/lib/krb5/crypto.c     if(pw.length < sizeof(password)) {
password          255 source4/heimdal/lib/krb5/crypto.c 	int len = min(cell.length, sizeof(password) - pw.length);
password          258 source4/heimdal/lib/krb5/crypto.c 	memcpy(password + pw.length, cell.data, len);
password          260 source4/heimdal/lib/krb5/crypto.c 	    password[i] = tolower((unsigned char)password[i]);
password          262 source4/heimdal/lib/krb5/crypto.c     passlen = min(sizeof(password), pw.length + cell.length);
password          267 source4/heimdal/lib/krb5/crypto.c     DES_cbc_cksum ((void*)password, &ivec, passlen, &schedule, &ivec);
password          272 source4/heimdal/lib/krb5/crypto.c     DES_cbc_cksum ((void*)password, key, passlen, &schedule, &ivec);
password          276 source4/heimdal/lib/krb5/crypto.c     memset(password, 0, sizeof(password));
password          284 source4/heimdal/lib/krb5/crypto.c 		       krb5_data password,
password          290 source4/heimdal/lib/krb5/crypto.c     if(password.length > 8)
password          291 source4/heimdal/lib/krb5/crypto.c 	krb5_DES_AFS3_Transarc_string_to_key(password, salt.saltvalue, &tmp);
password          293 source4/heimdal/lib/krb5/crypto.c 	krb5_DES_AFS3_CMU_string_to_key(password, salt.saltvalue, &tmp);
password          337 source4/heimdal/lib/krb5/crypto.c 		       krb5_data password,
password          351 source4/heimdal/lib/krb5/crypto.c 	    return DES_AFS3_string_to_key(context, enctype, password,
password          356 source4/heimdal/lib/krb5/crypto.c     len = password.length + salt.saltvalue.length;
password          362 source4/heimdal/lib/krb5/crypto.c     memcpy(s, password.data, password.length);
password          363 source4/heimdal/lib/krb5/crypto.c     memcpy(s + password.length, salt.saltvalue.data, salt.saltvalue.length);
password          428 source4/heimdal/lib/krb5/crypto.c 		   krb5_data password,
password          439 source4/heimdal/lib/krb5/crypto.c     len = password.length + salt.saltvalue.length;
password          445 source4/heimdal/lib/krb5/crypto.c     memcpy(str, password.data, password.length);
password          446 source4/heimdal/lib/krb5/crypto.c     memcpy(str + password.length, salt.saltvalue.data, salt.saltvalue.length);
password          493 source4/heimdal/lib/krb5/crypto.c 			   krb5_data password,
password          499 source4/heimdal/lib/krb5/crypto.c     size_t len = password.length + salt.saltvalue.length;
password          507 source4/heimdal/lib/krb5/crypto.c     memcpy(s, password.data, password.length);
password          508 source4/heimdal/lib/krb5/crypto.c     memcpy(s + password.length, salt.saltvalue.data, salt.saltvalue.length);
password          569 source4/heimdal/lib/krb5/crypto.c 		      krb5_data password,
password          588 source4/heimdal/lib/krb5/crypto.c     ret = wind_utf8ucs2_length(password.data, &len);
password          603 source4/heimdal/lib/krb5/crypto.c     ret = wind_utf8ucs2(password.data, s, &len);
password          644 source4/heimdal/lib/krb5/crypto.c 		  krb5_data password,
password          680 source4/heimdal/lib/krb5/crypto.c     ret = PKCS5_PBKDF2_HMAC_SHA1(password.data, password.length,
password          991 source4/heimdal/lib/krb5/crypto.c 			 krb5_data password,
password         1001 source4/heimdal/lib/krb5/crypto.c     ret = krb5_string_to_key_data_salt(context, enctype, password, salt, key);
password         1009 source4/heimdal/lib/krb5/crypto.c 		    const char *password,
password         1014 source4/heimdal/lib/krb5/crypto.c     pw.data = rk_UNCONST(password);
password         1015 source4/heimdal/lib/krb5/crypto.c     pw.length = strlen(password);
password         1022 source4/heimdal/lib/krb5/crypto.c 			      krb5_data password,
password         1028 source4/heimdal/lib/krb5/crypto.c     return krb5_string_to_key_data_salt_opaque(context, enctype, password,
password         1041 source4/heimdal/lib/krb5/crypto.c 				     krb5_data password,
password         1056 source4/heimdal/lib/krb5/crypto.c 	    return (*st->string_to_key)(context, enctype, password,
password         1073 source4/heimdal/lib/krb5/crypto.c 			 const char *password,
password         1078 source4/heimdal/lib/krb5/crypto.c     pw.data = rk_UNCONST(password);
password         1079 source4/heimdal/lib/krb5/crypto.c     pw.length = strlen(password);
password         1086 source4/heimdal/lib/krb5/crypto.c 				const char *password,
password         1092 source4/heimdal/lib/krb5/crypto.c     pw.data = rk_UNCONST(password);
password         1093 source4/heimdal/lib/krb5/crypto.c     pw.length = strlen(password);
password          344 source4/heimdal/lib/krb5/init_creds.c 					const char *password,
password          351 source4/heimdal/lib/krb5/init_creds.c     opt->opt_private->password = password;
password           52 source4/heimdal/lib/krb5/init_creds_pw.c     const char *password;
password           68 source4/heimdal/lib/krb5/init_creds_pw.c     krb5_data password;
password           71 source4/heimdal/lib/krb5/init_creds_pw.c     password.data = rk_UNCONST(keyseed);
password           72 source4/heimdal/lib/krb5/init_creds_pw.c     password.length = strlen(keyseed);
password           81 source4/heimdal/lib/krb5/init_creds_pw.c     ret = krb5_string_to_key_data_salt_opaque(context, type, password,
password          281 source4/heimdal/lib/krb5/init_creds_pw.c 	ctx->password = options->opt_private->password;
password          369 source4/heimdal/lib/krb5/init_creds_pw.c 		 const char *password,
password          404 source4/heimdal/lib/krb5/init_creds_pw.c 					password,
password          976 source4/heimdal/lib/krb5/init_creds_pw.c     if (ctx->key_proc == NULL || ctx->password == NULL)
password          981 source4/heimdal/lib/krb5/init_creds_pw.c 			  ctx->key_proc, ctx->password,
password          989 source4/heimdal/lib/krb5/init_creds_pw.c 			  ctx->key_proc, ctx->password,
password          997 source4/heimdal/lib/krb5/init_creds_pw.c 			  ctx->key_proc, ctx->password,
password         1015 source4/heimdal/lib/krb5/init_creds_pw.c     ret = (*ctx->key_proc)(context, etype, ctx->password,
password         1196 source4/heimdal/lib/krb5/init_creds_pw.c     } else if (ctx->password)
password         1436 source4/heimdal/lib/krb5/init_creds_pw.c 	    if (prompter == NULL || ctx.password == NULL)
password         1447 source4/heimdal/lib/krb5/init_creds_pw.c 				   ctx.password,
password         1455 source4/heimdal/lib/krb5/init_creds_pw.c 	    ctx.password = buf;
password         1485 source4/heimdal/lib/krb5/init_creds_pw.c 			     const char *password,
password         1509 source4/heimdal/lib/krb5/init_creds_pw.c     if (password == NULL &&
password         1510 source4/heimdal/lib/krb5/init_creds_pw.c 	options->opt_private->password == NULL &&
password         1536 source4/heimdal/lib/krb5/init_creds_pw.c 	password = password_data.data;
password         1539 source4/heimdal/lib/krb5/init_creds_pw.c     if (options->opt_private->password == NULL) {
password         1541 source4/heimdal/lib/krb5/init_creds_pw.c 						      password, NULL);
password          211 source4/heimdal/lib/krb5/krb5_locl.h     const char *password;
password         1505 source4/heimdal/lib/krb5/pkinit.c 		 char *password)
password         1540 source4/heimdal/lib/krb5/pkinit.c     if (password && password[0])
password         1541 source4/heimdal/lib/krb5/pkinit.c 	hx509_lock_add_password(lock, password);
password         2040 source4/heimdal/lib/krb5/pkinit.c 				   char *password)
password         2095 source4/heimdal/lib/krb5/pkinit.c 			   password);
password          909 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_nt_key(const char *password, struct ntlm_buf *key)
password          920 source4/heimdal/lib/ntlm/ntlm.c     ret = ascii2ucs2le(password, 0, &buf);
password          775 source4/kdc/hdb-samba4.c 			password_utf16 = data_blob_const(password_blob.current->array[i].AuthInfo.clear.password,
password          786 source4/kdc/hdb-samba4.c 			password_hash = password_blob.current->array[i].AuthInfo.nt4owf.password;
password          177 source4/kdc/kpasswdd.c 				     const DATA_BLOB *password,
password          201 source4/kdc/kpasswdd.c 					password, NULL, NULL, 
password          234 source4/kdc/kpasswdd.c 		DATA_BLOB password;
password          239 source4/kdc/kpasswdd.c 					       (void **)&password.data, &pw_len, false)) {
password          242 source4/kdc/kpasswdd.c 		password.length = pw_len;
password          245 source4/kdc/kpasswdd.c 						&password, reply);
password          258 source4/kdc/kpasswdd.c 		DATA_BLOB password;
password          285 source4/kdc/kpasswdd.c 					       (void **)&password.data, &pw_len, false)) {
password          290 source4/kdc/kpasswdd.c 		password.length = pw_len;
password          320 source4/kdc/kpasswdd.c 							&password, reply);
password          385 source4/kdc/kpasswdd.c 						    msg, &password, NULL, NULL, 
password           54 source4/ldap_server/ldap_bind.c 						  req->creds.password,
password          810 source4/lib/ldb/ldb_ildap/ldb_ildap.c 			const char *password = cli_credentials_get_password(creds);
password          811 source4/lib/ldb/ldb_ildap/ldb_ildap.c 			status = ldap_bind_simple(ildb->ldap, bind_dn, password);
password         2575 source4/lib/wmi/wmi_wrap.c WERROR WBEM_ConnectServer(struct com_context *ctx, const char *server, const char *nspace, const char *user, const char *password, 
password          448 source4/libcli/auth/smbencrypt.c 		      const char *password, 
password          455 source4/libcli/auth/smbencrypt.c 	E_md4hash(password, nt_hash);
password          466 source4/libcli/auth/smbencrypt.c bool encode_pw_buffer(uint8_t buffer[516], const char *password, int string_flags)
password          475 source4/libcli/auth/smbencrypt.c 				 password, 
password          548 source4/libcli/auth/smbencrypt.c bool set_pw_in_buffer(uint8_t buffer[516], DATA_BLOB *password)
password          550 source4/libcli/auth/smbencrypt.c 	if (password->length > 512) {
password          554 source4/libcli/auth/smbencrypt.c 	memcpy(&buffer[512 - password->length], password->data, password->length);
password          556 source4/libcli/auth/smbencrypt.c 	generate_random_buffer(buffer, 512 - password->length);
password          562 source4/libcli/auth/smbencrypt.c 	SIVAL(buffer, 512, password->length);
password          101 source4/libcli/cliconnect.c 		      const char *devtype, const char *password)
password          119 source4/libcli/cliconnect.c 		tcon.tconx.in.password = data_blob(NULL, 0);
password          121 source4/libcli/cliconnect.c 		tcon.tconx.in.password = data_blob_talloc(mem_ctx, NULL, 24);
password          125 source4/libcli/cliconnect.c 		SMBencrypt(password, cli->transport->negotiate.secblob.data, tcon.tconx.in.password.data);
password          127 source4/libcli/cliconnect.c 		tcon.tconx.in.password = data_blob_talloc(mem_ctx, password, strlen(password)+1);
password           82 source4/libcli/ldap/ldap_bind.c 	res->r.BindRequest.creds.password = talloc_strdup(res, pw);
password           93 source4/libcli/ldap/ldap_bind.c 			  const char *userdn, const char *password)
password          114 source4/libcli/ldap/ldap_bind.c 	if (password) {
password          115 source4/libcli/ldap/ldap_bind.c 		pw = password;
password          108 source4/libcli/ldap/ldap_client.h 			  const char *userdn, const char *password);
password           97 source4/libcli/raw/clisession.c 		SSVAL(req->out.vwv,VWV(7),parms->old.in.password.length);
password           99 source4/libcli/raw/clisession.c 		smbcli_req_append_blob(req, &parms->old.in.password);
password           68 source4/libcli/raw/clitree.c 		smbcli_req_append_ascii4(req, parms->tcon.in.password,STR_ASCII);
password           77 source4/libcli/raw/clitree.c 		SSVAL(req->out.vwv, VWV(3), parms->tconx.in.password.length);
password           78 source4/libcli/raw/clitree.c 		smbcli_req_append_blob(req, &parms->tconx.in.password);
password          241 source4/libcli/raw/interfaces.h 			const char *password;
password          256 source4/libcli/raw/interfaces.h 			DATA_BLOB password;
password          314 source4/libcli/raw/interfaces.h 			DATA_BLOB password;
password          112 source4/libcli/smb_composite/connect.c 	state->io_tcon->tconx.in.password = data_blob(NULL, 0);	
password          198 source4/libcli/smb_composite/connect.c 	state->io_tcon->tconx.in.password = data_blob(NULL, 0);	
password          301 source4/libcli/smb_composite/sesssetup.c 		const char *password = cli_credentials_get_password(io->in.credentials);
password          302 source4/libcli/smb_composite/sesssetup.c 		state->setup.nt1.in.password1 = data_blob_talloc(state, password, strlen(password));
password          336 source4/libcli/smb_composite/sesssetup.c 	const char *password = cli_credentials_get_password(io->in.credentials);
password          364 source4/libcli/smb_composite/sesssetup.c 							      &state->setup.old.in.password,
password          372 source4/libcli/smb_composite/sesssetup.c 		state->setup.old.in.password = data_blob_talloc(state, password, strlen(password));
password           72 source4/libcli/util/clilsa.c 	tcon.tconx.in.password = data_blob(NULL, 0);
password          178 source4/libnet/libnet_passwd.c 	oe2.in.password = &lm_pass;
password          309 source4/libnet/libnet_passwd.c 	encode_pw_buffer(u_info.info26.password.data, r->samr_handle.in.newpassword, STR_UNICODE);
password          327 source4/libnet/libnet_passwd.c 	arcfour_crypt_blob(u_info.info26.password.data, 516, &confounded_session_key);
password          328 source4/libnet/libnet_passwd.c 	memcpy(&u_info.info26.password.data[516], confounder, 16);
password          364 source4/libnet/libnet_passwd.c 	encode_pw_buffer(u_info.info25.password.data, r->samr_handle.in.newpassword, STR_UNICODE);
password          381 source4/libnet/libnet_passwd.c 	arcfour_crypt_blob(u_info.info25.password.data, 516, &confounded_session_key);
password          382 source4/libnet/libnet_passwd.c 	memcpy(&u_info.info25.password.data[516], confounder, 16);
password          412 source4/libnet/libnet_passwd.c 	encode_pw_buffer(u_info.info24.password.data, r->samr_handle.in.newpassword, STR_UNICODE);
password          423 source4/libnet/libnet_passwd.c 	arcfour_crypt_blob(u_info.info24.password.data, 516, &session_key);
password          455 source4/libnet/libnet_passwd.c 	encode_pw_buffer(u_info.info23.password.data, r->samr_handle.in.newpassword, STR_UNICODE);
password          466 source4/libnet/libnet_passwd.c 	arcfour_crypt_blob(u_info.info23.password.data, 516, &session_key);
password          973 source4/rpc_server/lsa/dcesrv_lsa.c 							   &auth_struct.incoming.current[i]->AuthInfo.nt4owf.password);
password          975 source4/rpc_server/lsa/dcesrv_lsa.c 					DATA_BLOB new_password = data_blob_const(auth_struct.incoming.current[i]->AuthInfo.clear.password,
password          513 source4/rpc_server/netlogon/dcerpc_netlogon.c 					    r->in.logon->password->lmpassword.hash,
password          514 source4/rpc_server/netlogon/dcerpc_netlogon.c 					    sizeof(r->in.logon->password->lmpassword.hash));
password          516 source4/rpc_server/netlogon/dcerpc_netlogon.c 					    r->in.logon->password->ntpassword.hash,
password          517 source4/rpc_server/netlogon/dcerpc_netlogon.c 					    sizeof(r->in.logon->password->ntpassword.hash));
password          519 source4/rpc_server/netlogon/dcerpc_netlogon.c 			creds_des_decrypt(creds, &r->in.logon->password->lmpassword);
password          520 source4/rpc_server/netlogon/dcerpc_netlogon.c 			creds_des_decrypt(creds, &r->in.logon->password->ntpassword);
password          530 source4/rpc_server/netlogon/dcerpc_netlogon.c 		user_info->logon_parameters = r->in.logon->password->identity_info.parameter_control;
password          531 source4/rpc_server/netlogon/dcerpc_netlogon.c 		user_info->client.account_name = r->in.logon->password->identity_info.account_name.string;
password          532 source4/rpc_server/netlogon/dcerpc_netlogon.c 		user_info->client.domain_name = r->in.logon->password->identity_info.domain_name.string;
password          533 source4/rpc_server/netlogon/dcerpc_netlogon.c 		user_info->workstation_name = r->in.logon->password->identity_info.workstation.string;
password          538 source4/rpc_server/netlogon/dcerpc_netlogon.c 		user_info->password.hash.lanman = talloc(user_info, struct samr_Password);
password          539 source4/rpc_server/netlogon/dcerpc_netlogon.c 		NT_STATUS_HAVE_NO_MEMORY(user_info->password.hash.lanman);
password          540 source4/rpc_server/netlogon/dcerpc_netlogon.c 		*user_info->password.hash.lanman = r->in.logon->password->lmpassword;
password          542 source4/rpc_server/netlogon/dcerpc_netlogon.c 		user_info->password.hash.nt = talloc(user_info, struct samr_Password);
password          543 source4/rpc_server/netlogon/dcerpc_netlogon.c 		NT_STATUS_HAVE_NO_MEMORY(user_info->password.hash.nt);
password          544 source4/rpc_server/netlogon/dcerpc_netlogon.c 		*user_info->password.hash.nt = r->in.logon->password->ntpassword;
password          566 source4/rpc_server/netlogon/dcerpc_netlogon.c 		user_info->password.response.lanman = data_blob_talloc(mem_ctx, r->in.logon->network->lm.data, r->in.logon->network->lm.length);
password          567 source4/rpc_server/netlogon/dcerpc_netlogon.c 		user_info->password.response.nt = data_blob_talloc(mem_ctx, r->in.logon->network->nt.data, r->in.logon->network->nt.length);
password         3522 source4/rpc_server/samr/dcesrv_samr.c 						   &r->in.info->info23.password);
password         3529 source4/rpc_server/samr/dcesrv_samr.c 						   &r->in.info->info23.password);
password         3541 source4/rpc_server/samr/dcesrv_samr.c 					   &r->in.info->info24.password);
password         3578 source4/rpc_server/samr/dcesrv_samr.c 						      &r->in.info->info25.password);
password         3585 source4/rpc_server/samr/dcesrv_samr.c 						      &r->in.info->info25.password);
password         3597 source4/rpc_server/samr/dcesrv_samr.c 					      &r->in.info->info26.password);
password          189 source4/rpc_server/samr/samr_password.c 	struct samr_CryptPassword *pwbuf = r->in.password;
password          493 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 		if (r->in.info->info2->password && r->in.info->info2->password[0]) {
password          496 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 			info[i].value = talloc_strdup(info, r->in.info->info2->password);
password          591 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 		if (r->in.info->info502->password && r->in.info->info502->password[0]) {
password          594 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 			info[i].value = talloc_strdup(info, r->in.info->info502->password);
password          662 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 		info->info2->password		= talloc_strdup(mem_ctx, share_string_option(scfg, SHARE_PASSWORD, NULL));
password          689 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 		info->info502->password		= talloc_strdup(mem_ctx, share_string_option(scfg, SHARE_PASSWORD, NULL));
password         1100 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 					const char *password,
password         1141 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 		if (password && password[0]) {
password         1144 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 			info[i].value = talloc_strdup(info, password);
password         1278 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 					r->in.info->info2->password,
password         1312 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 					r->in.info->info502->password,
password           62 source4/smb_server/smb/reply.c 	p += req_pull_ascii4(&req->in.bufinfo, &con.tcon.in.password, p, STR_TERMINATE);
password           65 source4/smb_server/smb/reply.c 	if (!con.tcon.in.service || !con.tcon.in.password || !con.tcon.in.dev) {
password          109 source4/smb_server/smb/reply.c 	if (!req_pull_blob(&req->in.bufinfo, p, passlen, &con.tconx.in.password)) {
password         1886 source4/smb_server/smb/reply.c 	if (!req_pull_blob(&req->in.bufinfo, p, passlen, &io->old.in.password)) {
password           34 source4/smb_server/smb/service.c 				     DATA_BLOB password, 
password          122 source4/smb_server/smb/service.c 				const char *service, DATA_BLOB password, 
password          173 source4/smb_server/smb/service.c 	return make_connection_scfg(req, scfg, type, password, dev);
password          184 source4/smb_server/smb/service.c 		DATA_BLOB password;
password          185 source4/smb_server/smb/service.c 		password = data_blob_string_const(con->tcon.in.password);
password          187 source4/smb_server/smb/service.c 		status = make_connection(req, con->tcon.in.service, password, con->tcon.in.dev);
password          201 source4/smb_server/smb/service.c 	status = make_connection(req, con->tconx.in.path, con->tconx.in.password, 
password          143 source4/smb_server/smb/sesssetup.c 	user_info->password.response.lanman = sess->old.in.password;
password          144 source4/smb_server/smb/sesssetup.c 	user_info->password.response.lanman.data = talloc_steal(user_info, sess->old.in.password.data);
password          145 source4/smb_server/smb/sesssetup.c 	user_info->password.response.nt = data_blob(NULL, 0);
password          269 source4/smb_server/smb/sesssetup.c 	user_info->password.response.lanman = sess->nt1.in.password1;
password          270 source4/smb_server/smb/sesssetup.c 	user_info->password.response.lanman.data = talloc_steal(user_info, sess->nt1.in.password1.data);
password          271 source4/smb_server/smb/sesssetup.c 	user_info->password.response.nt = sess->nt1.in.password2;
password          272 source4/smb_server/smb/sesssetup.c 	user_info->password.response.nt.data = talloc_steal(user_info, sess->nt1.in.password2.data);
password           84 source4/torture/basic/base.c 	const char *password = torture_setting_string(tctx, "password", NULL);
password           87 source4/torture/basic/base.c 						password));
password          410 source4/torture/basic/base.c 	const char *password = torture_setting_string(tctx, "password", NULL);
password          432 source4/torture/basic/base.c 	if (NT_STATUS_IS_ERR(smbcli_tconX(cli, share, "?????", password))) {
password           32 source4/torture/ldap/basic.c static bool test_bind_simple(struct ldap_connection *conn, const char *userdn, const char *password)
password           37 source4/torture/ldap/basic.c 	status = torture_ldap_bind(conn, userdn, password);
password           61 source4/torture/ldap/basic.c static bool test_multibind(struct ldap_connection *conn, const char *userdn, const char *password)
password           73 source4/torture/ldap/basic.c 	ret = test_bind_simple(conn, userdn, password);
password           28 source4/torture/ldap/common.c NTSTATUS torture_ldap_bind(struct ldap_connection *conn, const char *userdn, const char *password)
password           32 source4/torture/ldap/common.c 	status = ldap_bind_simple(conn, userdn, password);
password           81 source4/torture/ldap/common.c 				const char *url, const char *userdn, const char *password)
password           88 source4/torture/ldap/common.c 	status = ldap_bind_simple(*conn, userdn, password);
password           83 source4/torture/libnet/libnet_share.c 				 info->password);
password          109 source4/torture/libnet/libnet_share.c 				 info->password);
password          181 source4/torture/libnet/libnet_share.c 	i.password     = NULL;
password           24 source4/torture/locktest2.c static fstring password;
password          168 source4/torture/locktest2.c 			password = talloc_strdup(mem_ctx, pass);
password          176 source4/torture/locktest2.c 			   username, lp_workgroup(), password, ev,
password          531 source4/torture/locktest2.c 				password = talloc_strdup(mem_ctx, p+1);
password          296 source4/torture/raw/context.c 	tcon.tconx.in.password = data_blob(NULL, 0);
password          418 source4/torture/raw/context.c 	tcon.tconx.in.password = data_blob(NULL, 0);
password          773 source4/torture/raw/context.c 	tcon.tconx.in.password = data_blob(NULL, 0);
password          645 source4/torture/raw/lock.c 	tcon.tconx.in.password = data_blob(NULL, 0);
password         1453 source4/torture/raw/notify.c 	tcon.tconx.in.password = data_blob(NULL, 0);
password           70 source4/torture/rpc/dfs.c 	i.password		= NULL;
password          272 source4/torture/rpc/netlogon.c 	const char *password;
password          289 source4/torture/rpc/netlogon.c 	password = generate_random_str(tctx, 8);
password          290 source4/torture/rpc/netlogon.c 	E_md4hash(password, new_password.hash);
password          296 source4/torture/rpc/netlogon.c 			password);
password          314 source4/torture/rpc/netlogon.c 		"Changing machine account password to '%s' (same as previous run)\n", password);
password          325 source4/torture/rpc/netlogon.c 	cli_credentials_set_password(machine_credentials, password, CRED_SPECIFIED);
password          340 source4/torture/rpc/netlogon.c 	DATA_BLOB password = data_blob_talloc(mem_ctx, NULL, len * 2 /* number of unicode chars */);
password          341 source4/torture/rpc/netlogon.c 	generate_random_buffer(password.data, password.length);
password          344 source4/torture/rpc/netlogon.c 		if (((uint16_t *)password.data)[i] == 0) {
password          345 source4/torture/rpc/netlogon.c 			((uint16_t *)password.data)[i] = 1;
password          349 source4/torture/rpc/netlogon.c 	return password;
password          361 source4/torture/rpc/netlogon.c 	const char *password;
password          381 source4/torture/rpc/netlogon.c 	password = generate_random_str(tctx, 8);
password          382 source4/torture/rpc/netlogon.c 	encode_pw_buffer(password_buf.data, password, STR_UNICODE);
password          389 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Changing machine account password to '%s'\n", password);
password          400 source4/torture/rpc/netlogon.c 	cli_credentials_set_password(machine_credentials, password, CRED_SPECIFIED);
password          411 source4/torture/rpc/netlogon.c 		password = "";
password          412 source4/torture/rpc/netlogon.c 		encode_pw_buffer(password_buf.data, password, STR_UNICODE);
password          421 source4/torture/rpc/netlogon.c 			"Changing machine account password to '%s'\n", password);
password          432 source4/torture/rpc/netlogon.c 		cli_credentials_set_password(machine_credentials, password, CRED_SPECIFIED);
password          439 source4/torture/rpc/netlogon.c 	password = generate_random_str(tctx, 8);
password          440 source4/torture/rpc/netlogon.c 	encode_pw_buffer(password_buf.data, password, STR_UNICODE);
password          447 source4/torture/rpc/netlogon.c 	torture_comment(tctx, "Changing machine account password to '%s'\n", password);
password          465 source4/torture/rpc/netlogon.c 		"Changing machine account password to '%s' (same as previous run)\n", password);
password          476 source4/torture/rpc/netlogon.c 	cli_credentials_set_password(machine_credentials, password, CRED_SPECIFIED);
password          525 source4/torture/rpc/netlogon.c 	struct samr_Password password;
password          539 source4/torture/rpc/netlogon.c 	r.out.password = &password;
password          556 source4/torture/rpc/netlogon.c 	struct samr_Password password, password2;
password          570 source4/torture/rpc/netlogon.c 	r.out.password = &password;
password          537 source4/torture/rpc/samba3rpc.c 			const char *username, const char *password,
password          572 source4/torture/rpc/samba3rpc.c 		encode_pw_buffer(u_info.info23.password.data, password,
password          580 source4/torture/rpc/samba3rpc.c 		arcfour_crypt_blob(u_info.info23.password.data, 516,
password          776 source4/torture/rpc/samba3rpc.c 		encode_pw_buffer(u_info.info25.password.data,
password          792 source4/torture/rpc/samba3rpc.c 		arcfour_crypt_blob(u_info.info25.password.data, 516,
password          794 source4/torture/rpc/samba3rpc.c 		memcpy(&u_info.info25.password.data[516], confounder, 16);
password          812 source4/torture/rpc/samba3rpc.c 		encode_pw_buffer(u_info.info24.password.data,
password          823 source4/torture/rpc/samba3rpc.c 		arcfour_crypt_blob(u_info.info24.password.data, 516,
password         1150 source4/torture/rpc/samba3rpc.c 		logon.password = &pinfo;
password         1173 source4/torture/rpc/samba3rpc.c 		char *password = generate_random_str(wks_creds, 8);
password         1188 source4/torture/rpc/samba3rpc.c 		E_md4hash(password, new_password.hash);
password         1205 source4/torture/rpc/samba3rpc.c 		cli_credentials_set_password(wks_creds, password,
password         1702 source4/torture/rpc/samba3rpc.c 	tcon.tconx.in.password = data_blob(NULL, 0);
password           57 source4/torture/rpc/samlogon.c 	const char *password;
password          287 source4/torture/rpc/samlogon.c 	lm_good = SMBencrypt(samlogon_state->password, samlogon_state->chall.data, lm_response.data);
password          291 source4/torture/rpc/samlogon.c 		E_deshash(samlogon_state->password, lm_hash); 
password          294 source4/torture/rpc/samlogon.c 	SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, nt_response.data);
password          296 source4/torture/rpc/samlogon.c 	E_md4hash(samlogon_state->password, nt_hash);
password          418 source4/torture/rpc/samlogon.c 	SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, 
password          420 source4/torture/rpc/samlogon.c 	E_md4hash(samlogon_state->password, nt_hash);
password          424 source4/torture/rpc/samlogon.c 	lm_good = E_deshash(samlogon_state->password, lm_hash); 
password          514 source4/torture/rpc/samlogon.c 	SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, 
password          516 source4/torture/rpc/samlogon.c 	E_md4hash(samlogon_state->password, nt_hash);
password          520 source4/torture/rpc/samlogon.c 	lm_good = E_deshash(samlogon_state->password, lm_hash); 
password          610 source4/torture/rpc/samlogon.c 				      samlogon_state->password, &samlogon_state->chall,
password          621 source4/torture/rpc/samlogon.c 				      samlogon_state->password, &samlogon_state->chall,
password          757 source4/torture/rpc/samlogon.c 	SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, 
password          759 source4/torture/rpc/samlogon.c 	E_md4hash(samlogon_state->password, nt_hash);
password          763 source4/torture/rpc/samlogon.c 	lm_good = E_deshash(samlogon_state->password, lm_hash); 
password          776 source4/torture/rpc/samlogon.c 				      samlogon_state->password, &samlogon_state->chall,
password          788 source4/torture/rpc/samlogon.c 				      samlogon_state->password, &samlogon_state->chall,
password         1072 source4/torture/rpc/samlogon.c 	E_md4hash(samlogon_state->password, (uint8_t *)nt_hash);
password         1073 source4/torture/rpc/samlogon.c 	lm_good = E_deshash(samlogon_state->password, (uint8_t *)lm_hash);
password         1077 source4/torture/rpc/samlogon.c 	SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, nt_response.data);
password         1151 source4/torture/rpc/samlogon.c 	char *password;
password         1160 source4/torture/rpc/samlogon.c 	bool lm_good = E_deshash(samlogon_state->password, lm_hash); 
password         1165 source4/torture/rpc/samlogon.c 			      &unicodepw, samlogon_state->password, NULL)) {
password         1170 source4/torture/rpc/samlogon.c 	nt_response = data_blob_talloc(samlogon_state->mem_ctx, unicodepw, strlen_m(samlogon_state->password)*2);
password         1172 source4/torture/rpc/samlogon.c 	password = strupper_talloc(samlogon_state->mem_ctx, samlogon_state->password);
password         1177 source4/torture/rpc/samlogon.c 				   password, strlen(password)+1, 
password         1347 source4/torture/rpc/samlogon.c 	samlogon_state.password = plain_pass;
password         1459 source4/torture/rpc/samlogon.c 	logon.password = &pinfo;
password         1660 source4/torture/rpc/samlogon.c 			const char *password;
password         1671 source4/torture/rpc/samlogon.c 				.password      = cli_credentials_get_password(cmdline_credentials),
password         1680 source4/torture/rpc/samlogon.c 				.password      = cli_credentials_get_password(cmdline_credentials),
password         1693 source4/torture/rpc/samlogon.c 				.password      = cli_credentials_get_password(cmdline_credentials),
password         1706 source4/torture/rpc/samlogon.c 				.password      = cli_credentials_get_password(cmdline_credentials),
password         1715 source4/torture/rpc/samlogon.c 				.password     = cli_credentials_get_password(machine_credentials),
password         1724 source4/torture/rpc/samlogon.c 				.password     = cli_credentials_get_password(machine_credentials),
password         1733 source4/torture/rpc/samlogon.c 				.password      = cli_credentials_get_password(machine_credentials),
password         1746 source4/torture/rpc/samlogon.c 				.password      = cli_credentials_get_password(machine_credentials),
password         1759 source4/torture/rpc/samlogon.c 				.password      = cli_credentials_get_password(machine_credentials),
password         1768 source4/torture/rpc/samlogon.c 				.password      = user_password,
password         1780 source4/torture/rpc/samlogon.c 				.password      = user_password,
password         1792 source4/torture/rpc/samlogon.c 				.password      = user_password,
password         1802 source4/torture/rpc/samlogon.c 				.password      = old_user_password,
password         1812 source4/torture/rpc/samlogon.c 				.password      = user_password_wrong_wks,
password         1827 source4/torture/rpc/samlogon.c 						   usercreds[ci].password,
password         1838 source4/torture/rpc/samlogon.c 						   usercreds[ci].password,
password         1860 source4/torture/rpc/samlogon.c 						   usercreds[0].password,
password         1871 source4/torture/rpc/samlogon.c 						   usercreds[0].password,
password           72 source4/torture/rpc/samr.c 				struct policy_handle *domain_handle, char **password);
password          587 source4/torture/rpc/samr.c 	DATA_BLOB password = data_blob_talloc(mem_ctx, NULL, len * 2 /* number of unicode chars */);
password          588 source4/torture/rpc/samr.c 	generate_random_buffer(password.data, password.length);
password          591 source4/torture/rpc/samr.c 		if (((uint16_t *)password.data)[i] == 0) {
password          592 source4/torture/rpc/samr.c 			((uint16_t *)password.data)[i] = 1;
password          596 source4/torture/rpc/samr.c 	return password;
password          610 source4/torture/rpc/samr.c 			     struct policy_handle *handle, char **password)
password          634 source4/torture/rpc/samr.c 	encode_pw_buffer(u.info24.password.data, newpass, STR_UNICODE);
password          644 source4/torture/rpc/samr.c 	arcfour_crypt_blob(u.info24.password.data, 516, &session_key);
password          654 source4/torture/rpc/samr.c 		*password = newpass;
password          663 source4/torture/rpc/samr.c 				char **password)
password          691 source4/torture/rpc/samr.c 	encode_pw_buffer(u.info23.password.data, newpass, STR_UNICODE);
password          700 source4/torture/rpc/samr.c 	arcfour_crypt_blob(u.info23.password.data, 516, &session_key);
password          710 source4/torture/rpc/samr.c 		*password = newpass;
password          713 source4/torture/rpc/samr.c 	encode_pw_buffer(u.info23.password.data, newpass, STR_UNICODE);
password          724 source4/torture/rpc/samr.c 	arcfour_crypt_blob(u.info23.password.data, 516, &session_key);
password          741 source4/torture/rpc/samr.c 			       char **password)
password          772 source4/torture/rpc/samr.c 	encode_pw_buffer(u.info26.password.data, newpass, STR_UNICODE);
password          789 source4/torture/rpc/samr.c 	arcfour_crypt_blob(u.info26.password.data, 516, &confounded_session_key);
password          790 source4/torture/rpc/samr.c 	memcpy(&u.info26.password.data[516], confounder, 16);
password          800 source4/torture/rpc/samr.c 		*password = newpass;
password          806 source4/torture/rpc/samr.c 	arcfour_crypt_blob(u.info26.password.data, 516, &confounded_session_key);
password          807 source4/torture/rpc/samr.c 	memcpy(&u.info26.password.data[516], confounder, 16);
password          817 source4/torture/rpc/samr.c 		*password = newpass;
password          825 source4/torture/rpc/samr.c 				char **password)
password          856 source4/torture/rpc/samr.c 	encode_pw_buffer(u.info25.password.data, newpass, STR_UNICODE);
password          872 source4/torture/rpc/samr.c 	arcfour_crypt_blob(u.info25.password.data, 516, &confounded_session_key);
password          873 source4/torture/rpc/samr.c 	memcpy(&u.info25.password.data[516], confounder, 16);
password          883 source4/torture/rpc/samr.c 		*password = newpass;
password          889 source4/torture/rpc/samr.c 	arcfour_crypt_blob(u.info25.password.data, 516, &confounded_session_key);
password          890 source4/torture/rpc/samr.c 	memcpy(&u.info25.password.data[516], confounder, 16);
password          905 source4/torture/rpc/samr.c 				struct policy_handle *handle, char **password)
password          969 source4/torture/rpc/samr.c 		*password = newpass;
password          977 source4/torture/rpc/samr.c 				char **password)
password         1057 source4/torture/rpc/samr.c 		*password = newpass;
password         1095 source4/torture/rpc/samr.c 				      char **password, uint8_t password_expired,
password         1182 source4/torture/rpc/samr.c 		encode_pw_buffer(u.info23.password.data, newpass, STR_UNICODE);
password         1188 source4/torture/rpc/samr.c 		encode_pw_buffer(u.info24.password.data, newpass, STR_UNICODE);
password         1196 source4/torture/rpc/samr.c 		encode_pw_buffer(u.info25.password.data, newpass, STR_UNICODE);
password         1202 source4/torture/rpc/samr.c 		encode_pw_buffer(u.info26.password.data, newpass, STR_UNICODE);
password         1258 source4/torture/rpc/samr.c 		arcfour_crypt_blob(u.info23.password.data, 516, &session_key);
password         1261 source4/torture/rpc/samr.c 		arcfour_crypt_blob(u.info24.password.data, 516, &session_key);
password         1264 source4/torture/rpc/samr.c 		arcfour_crypt_blob(u.info25.password.data, 516, &confounded_session_key);
password         1265 source4/torture/rpc/samr.c 		memcpy(&u.info25.password.data[516], confounder, 16);
password         1268 source4/torture/rpc/samr.c 		arcfour_crypt_blob(u.info26.password.data, 516, &confounded_session_key);
password         1269 source4/torture/rpc/samr.c 		memcpy(&u.info26.password.data[516], confounder, 16);
password         1307 source4/torture/rpc/samr.c 		*password = newpass;
password         1594 source4/torture/rpc/samr.c 				    struct policy_handle *handle, char **password)
password         1626 source4/torture/rpc/samr.c 	torture_assert(tctx, *password != NULL,
password         1629 source4/torture/rpc/samr.c 	oldpass = *password;
password         1755 source4/torture/rpc/samr.c 		*password = newpass;
password         1793 source4/torture/rpc/samr.c 		*password = newpass;
password         1836 source4/torture/rpc/samr.c 		*password = newpass;
password         1872 source4/torture/rpc/samr.c 					struct policy_handle *handle, char **password)
password         1896 source4/torture/rpc/samr.c 	torture_assert(tctx, *password != NULL,
password         1899 source4/torture/rpc/samr.c 	oldpass = *password;
password         1920 source4/torture/rpc/samr.c 	r.in.password = &lm_pass;
password         1945 source4/torture/rpc/samr.c 	r.in.password = &lm_pass;
password         1962 source4/torture/rpc/samr.c 	r.in.password = &lm_pass;
password         1989 source4/torture/rpc/samr.c 	r.in.password = &lm_pass;
password         2003 source4/torture/rpc/samr.c 	r.in.password = NULL;
password         2023 source4/torture/rpc/samr.c 	r.in.password = &lm_pass;
password         2033 source4/torture/rpc/samr.c 		*password = newpass;
password         2042 source4/torture/rpc/samr.c 				     char **password,
password         2066 source4/torture/rpc/samr.c 	torture_assert(tctx, *password != NULL,
password         2068 source4/torture/rpc/samr.c 	oldpass = *password;
password         2112 source4/torture/rpc/samr.c 		*password = newpass;
password         2122 source4/torture/rpc/samr.c 			      char **password,
password         2154 source4/torture/rpc/samr.c 	torture_assert(tctx, *password != NULL,
password         2157 source4/torture/rpc/samr.c 	oldpass = *password;
password         2331 source4/torture/rpc/samr.c 							password, NULL, 0, false);
password         2345 source4/torture/rpc/samr.c 		*password = talloc_strdup(tctx, newpass);
password         2354 source4/torture/rpc/samr.c 				    char **password)
password         2379 source4/torture/rpc/samr.c 	torture_assert(tctx, *password != NULL,
password         2382 source4/torture/rpc/samr.c 	oldpass = *password;
password         2394 source4/torture/rpc/samr.c 	set_pw_in_buffer(u.info25.password.data, &new_random_pass);
password         2410 source4/torture/rpc/samr.c 	arcfour_crypt_blob(u.info25.password.data, 516, &confounded_session_key);
password         2411 source4/torture/rpc/samr.c 	memcpy(&u.info25.password.data[516], confounder, 16);
password         2497 source4/torture/rpc/samr.c 		*password = talloc_strdup(tctx, newpass);
password         2785 source4/torture/rpc/samr.c 				     char *password,
password         2800 source4/torture/rpc/samr.c 				     password, CRED_SPECIFIED);
password         2804 source4/torture/rpc/samr.c 		acct_name, TEST_ACCOUNT_NAME_PWD, password);
password         2825 source4/torture/rpc/samr.c 				   char **password,
password         2852 source4/torture/rpc/samr.c 				       password,
password         2872 source4/torture/rpc/samr.c 				      *password,
password         2885 source4/torture/rpc/samr.c 					char **password,
password         2973 source4/torture/rpc/samr.c 					    password,
password         3046 source4/torture/rpc/samr.c 					    password,
password         3126 source4/torture/rpc/samr.c 					    password,
password         3179 source4/torture/rpc/samr.c 					    password,
password         3586 source4/torture/rpc/samr.c 	char *password = NULL;
password         3633 source4/torture/rpc/samr.c 		if (!test_SetUserPass(p, tctx, user_handle, &password)) {
password         3648 source4/torture/rpc/samr.c 			if (!test_SetUserPassEx(p, tctx, user_handle, true, &password)) {
password         3652 source4/torture/rpc/samr.c 			if (!test_ChangePasswordUser2(p, tctx, base_acct_name, &password, simple_pass, false)) {
password         3657 source4/torture/rpc/samr.c 			if (!test_SetUserPassEx(p, tctx, user_handle, true, &password)) {
password         3662 source4/torture/rpc/samr.c 			if (!test_ChangePasswordUser2(p, tctx, base_acct_name, &password, samr_rand_pass(tctx, 4), false)) {
password         3667 source4/torture/rpc/samr.c 			if (!test_ChangePasswordRandomBytes(p, tctx, base_acct_name, user_handle, &password)) {
password         3673 source4/torture/rpc/samr.c 			if (!test_SetUserPass_23(p, tctx, user_handle, password_fields[i], &password)) {
password         3678 source4/torture/rpc/samr.c 			if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) {
password         3684 source4/torture/rpc/samr.c 			if (!test_SetUserPass_25(p, tctx, user_handle, password_fields[i], &password)) {
password         3689 source4/torture/rpc/samr.c 			if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) {
password         3694 source4/torture/rpc/samr.c 		if (!test_SetUserPassEx(p, tctx, user_handle, false, &password)) {
password         3698 source4/torture/rpc/samr.c 		if (!test_ChangePassword(p, tctx, base_acct_name, domain_handle, &password)) {
password         3706 source4/torture/rpc/samr.c 			if (!test_SetUserPass_18(p, tctx, user_handle, &password)) {
password         3710 source4/torture/rpc/samr.c 			if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) {
password         3722 source4/torture/rpc/samr.c 				if (!test_SetUserPass_21(p, tctx, user_handle, password_fields[i], &password)) {
password         3727 source4/torture/rpc/samr.c 				if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) {
password         3767 source4/torture/rpc/samr.c 						 user_handle, &password,
password         4065 source4/torture/rpc/samr.c 				struct policy_handle *domain_handle, char **password)
password         4069 source4/torture/rpc/samr.c 	if (!*password) {
password         4073 source4/torture/rpc/samr.c 	if (!test_ChangePasswordUser(p, tctx, acct_name, domain_handle, password)) {
password         4077 source4/torture/rpc/samr.c 	if (!test_ChangePasswordUser2(p, tctx, acct_name, password, 0, true)) {
password         4081 source4/torture/rpc/samr.c 	if (!test_OemChangePasswordUser2(p, tctx, acct_name, domain_handle, password)) {
password         4086 source4/torture/rpc/samr.c 	if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, *password, 0, true)) {
password         4098 source4/torture/rpc/samr.c 		if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, simple_pass, 0, true)) {
password         4147 source4/torture/rpc/samr.c 		if (!test_ChangePasswordUser3(p, tctx, acct_name, len - 1, password, NULL, 0, true)) {
password         4208 source4/torture/rpc/samr.c 		if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, NULL,
password         4216 source4/torture/rpc/samr.c 	if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, NULL, 0, true)) {
password         4220 source4/torture/rpc/samr.c 	if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, NULL, 0, true)) {
password          773 source4/torture/rpc/schannel.c 		char *password = generate_random_str(s->join_ctx1, 8);
password          798 source4/torture/rpc/schannel.c 		E_md4hash(password, new_password.hash);
password          814 source4/torture/rpc/schannel.c 		cli_credentials_set_password(s->wks_creds1, password,
password          576 source4/torture/rpc/srvsvc.c 	info.info2->password = NULL;
password          618 source4/torture/rpc/srvsvc.c 			info.info2->password = NULL;
password          637 source4/torture/rpc/srvsvc.c 			info.info502->password = NULL;
password          249 source4/torture/rpc/testjoin.c 	encode_pw_buffer(u.info24.password.data, random_pw, STR_UNICODE);
password          260 source4/torture/rpc/testjoin.c 	arcfour_crypt_blob(u.info24.password.data, 516, &session_key);
password          349 source4/torture/rpc/wkssvc.c 	info1.password = NULL;
password          831 source4/torture/rpc/wkssvc.c 	r.in.password = NULL;
password         1108 source4/torture/rpc/wkssvc.c 	r.in.password = NULL;
password         1138 source4/torture/rpc/wkssvc.c 	r.in.password = NULL;
password          897 source4/torture/util_smb.c 	tcon.tconx.in.password = data_blob(NULL, 0);
password          284 source4/utils/ntlm_auth.c 					 unsigned int mux_id, void **password)  
password          301 source4/utils/ntlm_auth.c 		*password = talloc_strndup(*private1 /* hopefully the right gensec context, useful to use for talloc */,
password          304 source4/utils/ntlm_auth.c 		if (*password == NULL) {
password          328 source4/utils/ntlm_auth.c 	char *password = NULL;
password          334 source4/utils/ntlm_auth.c 	manage_squid_request(cmdline_lp_ctx, NUM_HELPER_MODES /* bogus */, manage_gensec_get_pw_request, (void **)&password);
password          335 source4/utils/ntlm_auth.c 	return password;