pass              364 nsswitch/libwbclient/wbc_pam.c 		strncpy(request.data.auth.pass,
pass              366 nsswitch/libwbclient/wbc_pam.c 			sizeof(request.data.auth.pass)-1);
pass              948 nsswitch/libwbclient/wbc_pam.c 	strncpy(request.data.auth.pass,
pass              950 nsswitch/libwbclient/wbc_pam.c 		sizeof(request.data.auth.pass)-1);
pass             1662 nsswitch/pam_winbind.c 				const char *pass,
pass             1767 nsswitch/pam_winbind.c 	logon.password			= pass;
pass             2100 nsswitch/pam_winbind.c 				  const char **pass)
pass             2113 nsswitch/pam_winbind.c 	*pass = token = NULL;
pass             2139 nsswitch/pam_winbind.c 			*pass = item;
pass             2246 nsswitch/pam_winbind.c 	*pass = item;
pass             1196 nsswitch/wbinfo.c 		fstrcpy(request.data.auth.pass, p + 1);
pass             1201 nsswitch/wbinfo.c 		fstrcpy(request.data.auth.pass, password);
pass             1297 nsswitch/wbinfo.c 	char *pass;
pass             1304 nsswitch/wbinfo.c 		pass = SMB_STRDUP(p + 1);
pass             1306 nsswitch/wbinfo.c 		pass = wbinfo_prompt_pass(NULL, username);
pass             1332 nsswitch/wbinfo.c 		if (!SMBNTLMv2encrypt(name_user, name_domain, pass, &server_chal,
pass             1337 nsswitch/wbinfo.c 			SAFE_FREE(pass);
pass             1347 nsswitch/wbinfo.c 			ok = SMBencrypt(pass, params.password.response.challenge,
pass             1354 nsswitch/wbinfo.c 		SMBNTencrypt(pass, params.password.response.challenge,
pass             1382 nsswitch/wbinfo.c 	SAFE_FREE(pass);
pass             1406 nsswitch/wbinfo.c 		fstrcpy(request.data.auth.pass, p + 1);
pass             1410 nsswitch/wbinfo.c 		fstrcpy(request.data.auth.pass, getpass("Password: "));
pass              737 nsswitch/wbinfo4.c 		fstrcpy(request.data.auth.pass, p + 1);
pass              798 nsswitch/wbinfo4.c                 fstrcpy(request.data.auth.pass, p + 1);
pass              828 nsswitch/wbinfo4.c         fstring pass;
pass              840 nsswitch/wbinfo4.c                 fstrcpy(pass, p + 1);
pass              873 nsswitch/wbinfo4.c 		if (!SMBNTLMv2encrypt(mem_ctx, name_user, name_domain, pass, &server_chal,
pass              898 nsswitch/wbinfo4.c 		    && SMBencrypt(pass, request.data.auth_crap.chal,
pass              904 nsswitch/wbinfo4.c 		SMBNTencrypt(pass, request.data.auth_crap.chal,
pass              860 nsswitch/winbind_nss_aix.c static int wb_aix_authenticate(char *user, char *pass,
pass              868 nsswitch/winbind_nss_aix.c 	logit("authenticate '%s' response='%s'\n", user, pass);
pass              885 nsswitch/winbind_nss_aix.c 	STRCPY_RET(request.data.auth.pass, pass);
pass              250 nsswitch/winbind_struct_protocol.h 			fstring pass;
pass              426 source3/auth/auth_server.c 		struct passwd *pass;
pass              428 source3/auth/auth_server.c 		if ( (pass = smb_getpwnam( NULL, user_info->internal_username, 
pass              433 source3/auth/auth_server.c 			nt_status = smb_pam_accountcheck(pass->pw_name);
pass              438 source3/auth/auth_server.c 				nt_status = make_server_info_pw(server_info, pass->pw_name, pass);
pass              440 source3/auth/auth_server.c 			TALLOC_FREE(pass);
pass               92 source3/auth/auth_unix.c 	struct passwd *pass = NULL;
pass               95 source3/auth/auth_unix.c 	pass = Get_Pwnam_alloc(talloc_tos(), user_info->internal_username);
pass              100 source3/auth/auth_unix.c 	nt_status = pass_check(pass,
pass              101 source3/auth/auth_unix.c 				pass ? pass->pw_name : user_info->internal_username, 
pass              111 source3/auth/auth_unix.c 		if (pass) {
pass              114 source3/auth/auth_unix.c 			nt_status = smb_pam_accountcheck(pass->pw_name);
pass              118 source3/auth/auth_unix.c 				make_server_info_pw(server_info, pass->pw_name, pass);
pass              126 source3/auth/auth_unix.c 	TALLOC_FREE(pass);
pass              929 source3/auth/auth_util.c 		struct passwd *pass;
pass              948 source3/auth/auth_util.c 		pass = getpwuid_alloc(tmp_ctx, *uid);
pass              949 source3/auth/auth_util.c 		if (pass == NULL) {
pass              955 source3/auth/auth_util.c 		if (!getgroups_unix_user(tmp_ctx, username, pass->pw_gid,
pass              983 source3/auth/auth_util.c 		*found_username = talloc_strdup(mem_ctx, pass->pw_name);
pass              650 source3/auth/pass_check.c NTSTATUS pass_check(const struct passwd *pass, const char *user, const char *password, 
pass              685 source3/auth/pass_check.c 	if (!pass) {
pass              694 source3/auth/pass_check.c 	if (set_this_crypted(pass->pw_passwd) == NULL) {
pass              697 source3/auth/pass_check.c 	if (set_this_salt(pass->pw_passwd) == NULL) {
pass              710 source3/auth/pass_check.c 		spass = getspnam(pass->pw_name);
pass              727 source3/auth/pass_check.c 		if (ia_openinfo(pass->pw_name, &uinfo) != -1)
pass              728 source3/auth/pass_check.c 			ia_get_logpwd(uinfo, &(pass->pw_passwd));
pass              734 source3/auth/pass_check.c 		struct pr_passwd *pr_pw = getprpwnam(pass->pw_name);
pass              778 source3/auth/pass_check.c 		AUTHORIZATION *ap = getauthuid(pass->pw_uid);
pass             3793 source3/client/client.c 		char *pass = getpass("Password: ");
pass             3794 source3/client/client.c 		if (pass) {
pass             3795 source3/client/client.c 			l_password = talloc_strdup(ctx,pass);
pass              768 source3/client/mount.cifs.c 	char *pass;
pass              776 source3/client/mount.cifs.c 		(pass = *ppasswrd);
pass              778 source3/client/mount.cifs.c 	len = strlen(pass);
pass              781 source3/client/mount.cifs.c 		if(pass[i] == ',')
pass              798 source3/client/mount.cifs.c 		new_pass_buf[j] = pass[i];
pass              799 source3/client/mount.cifs.c 		if(pass[i] == ',') {
pass              801 source3/client/mount.cifs.c 			new_pass_buf[j] = pass[i];
pass              171 source3/include/proto.h NTSTATUS pass_check(const struct passwd *pass, const char *user, const char *password, 
pass             1691 source3/include/proto.h 			     const char *pass,
pass             1702 source3/include/proto.h 					const char *pass,
pass             2290 source3/include/proto.h 			      const char *pass, const char *user_domain,
pass             2295 source3/include/proto.h 			   const char *pass, int passlen,
pass             2307 source3/include/proto.h 				     const char *pass, int passlen);
pass             2310 source3/include/proto.h 		       const char *dev, const char *pass, int passlen);
pass             2341 source3/include/proto.h 		      const char *service, const char *pass, const char *dev,
pass             2585 source3/include/proto.h 				const char *pass,
pass             4696 source3/include/proto.h bool secrets_store_machine_password(const char *pass, const char *domain, uint32 sec_channel);
pass             6174 source3/include/proto.h bool chgpasswd(const char *name, const struct passwd *pass,
pass             6176 source3/include/proto.h bool chgpasswd(const char *name, const struct passwd *pass, 
pass               70 source3/include/secrets.h 	fstring pass;		/* trust relationship's password */
pass              347 source3/lib/popt_common.c 	char pass[128];
pass              371 source3/lib/popt_common.c 	for(p = pass, *p = '\0'; /* ensure that pass is null-terminated */
pass              372 source3/lib/popt_common.c 		p && p - pass < sizeof(pass);) {
pass              380 source3/lib/popt_common.c 			if (p - pass) {
pass              400 source3/lib/popt_common.c 	set_cmdline_auth_info_password(auth_info, pass);
pass              586 source3/lib/substitute.c 			struct passwd *pass;
pass              591 source3/lib/substitute.c 			pass = Get_Pwnam_alloc(tmp_ctx, r);
pass              592 source3/lib/substitute.c 			if (pass != NULL) {
pass              595 source3/lib/substitute.c 					gidtoname(pass->pw_gid));
pass              597 source3/lib/substitute.c 			TALLOC_FREE(pass);
pass               37 source3/lib/username.c 	struct passwd *pass;
pass               42 source3/lib/username.c 	pass = Get_Pwnam_alloc(mem_ctx, user);
pass               44 source3/lib/username.c 	if (!pass)
pass               49 source3/lib/username.c 	result = talloc_move(mem_ctx, &pass->pw_dir);
pass               51 source3/lib/username.c 	TALLOC_FREE(pass);
pass              438 source3/lib/util.c 	char *pass = NULL;
pass              454 source3/lib/util.c 	pass = secrets_fetch_machine_password(lp_workgroup(), NULL, NULL);
pass              455 source3/lib/util.c 	if (!pass) {
pass              464 source3/lib/util.c 	set_cmdline_auth_info_password(auth_info, pass);
pass              467 source3/lib/util.c 	SAFE_FREE(pass);
pass              479 source3/lib/util.c 	char *pass;
pass              491 source3/lib/util.c 	pass = getpass(label);
pass              492 source3/lib/util.c 	if (pass) {
pass              493 source3/lib/util.c 		set_cmdline_auth_info_password(auth_info, pass);
pass             1382 source3/lib/util.c 	struct passwd *pass = NULL;
pass             1384 source3/lib/util.c 	pass = getpwuid_alloc(ctx,uid);
pass             1385 source3/lib/util.c 	if (pass) {
pass             1386 source3/lib/util.c 		name = talloc_strdup(ctx,pass->pw_name);
pass             1387 source3/lib/util.c 		TALLOC_FREE(pass);
pass             1421 source3/lib/util.c 	struct passwd *pass;
pass             1425 source3/lib/util.c 	pass = getpwnam_alloc(talloc_autofree_context(), name);
pass             1426 source3/lib/util.c 	if (pass) {
pass             1427 source3/lib/util.c 		u = pass->pw_uid;
pass             1428 source3/lib/util.c 		TALLOC_FREE(pass);
pass              343 source3/libads/authdata.c 			     const char *pass,
pass              367 source3/libads/authdata.c 	if (!name || !pass) {
pass              388 source3/libads/authdata.c 					  pass,
pass              482 source3/libads/authdata.c 					       const char *pass,
pass              498 source3/libads/authdata.c 				     pass,
pass              532 source3/libads/authdata.c 					const char *pass,
pass              547 source3/libads/authdata.c 						pass,
pass              649 source3/libnet/libnet_join.c 					   const char *pass,
pass              659 source3/libnet/libnet_join.c 	if (use_kerberos && pass) {
pass              669 source3/libnet/libnet_join.c 				   pass,
pass               59 source3/libsmb/cliconnect.c 					  const char *pass, size_t passlen,
pass               86 source3/libsmb/cliconnect.c 		if (!SMBencrypt(pass, cli->secblob.data,(uchar *)lm_response.data)) {
pass               92 source3/libsmb/cliconnect.c 		lm_response = data_blob(pass, passlen);
pass               95 source3/libsmb/cliconnect.c 		passlen = clistr_push(cli, pword, pass, sizeof(pword), STR_TERMINATE);
pass               96 source3/libsmb/cliconnect.c 		lm_response = data_blob(pass, passlen);
pass              294 source3/libsmb/cliconnect.c 					    const char *user, const char *pass,
pass              321 source3/libsmb/cliconnect.c 		p += clistr_push(cli, p, pass, -1, STR_TERMINATE); /* password */
pass              332 source3/libsmb/cliconnect.c 		p += clistr_push(cli, p, pass, -1, STR_UNICODE|STR_TERMINATE); /* unicode password */
pass              382 source3/libsmb/cliconnect.c 				      const char *pass, size_t passlen,
pass              408 source3/libsmb/cliconnect.c 			if (!SMBNTLMv2encrypt(user, workgroup, pass, &server_chal, 
pass              420 source3/libsmb/cliconnect.c 			E_md4hash(pass, nt_hash);
pass              426 source3/libsmb/cliconnect.c 			SMBNTencrypt(pass,cli->secblob.data,nt_response.data);
pass              431 source3/libsmb/cliconnect.c 				if (!SMBencrypt(pass,cli->secblob.data, lm_response.data)) {
pass              444 source3/libsmb/cliconnect.c 			E_deshash(pass, session_key.data);
pass              456 source3/libsmb/cliconnect.c 		lm_response = data_blob(pass, passlen);
pass              800 source3/libsmb/cliconnect.c 					  const char *pass, const char *domain)
pass              823 source3/libsmb/cliconnect.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_password(ntlmssp_state, pass))) {
pass              928 source3/libsmb/cliconnect.c 			      const char *pass, const char *user_domain,
pass              988 source3/libsmb/cliconnect.c 		if (pass && *pass) {
pass              992 source3/libsmb/cliconnect.c 			ret = kerberos_kinit_password(user, pass, 0 /* no time correction for now */, NULL);
pass             1080 source3/libsmb/cliconnect.c 	return ADS_ERROR_NT(cli_session_setup_ntlmssp(cli, account, pass, user_domain));
pass             1091 source3/libsmb/cliconnect.c 			   const char *pass, int passlen,
pass             1127 source3/libsmb/cliconnect.c 		if (!lp_client_lanman_auth() && passlen != 24 && (*pass)) {
pass             1134 source3/libsmb/cliconnect.c 		    !lp_client_plaintext_auth() && (*pass)) {
pass             1140 source3/libsmb/cliconnect.c 		return cli_session_setup_lanman2(cli, user, pass, passlen,
pass             1161 source3/libsmb/cliconnect.c 		if (!lp_client_plaintext_auth() && (*pass)) {
pass             1166 source3/libsmb/cliconnect.c 		return cli_session_setup_plaintext(cli, user, pass, workgroup);
pass             1172 source3/libsmb/cliconnect.c 		ADS_STATUS status = cli_session_setup_spnego(cli, user, pass,
pass             1182 source3/libsmb/cliconnect.c 		status = cli_session_setup_nt1(cli, user, pass, passlen,
pass             1231 source3/libsmb/cliconnect.c 				     const char *pass, int passlen)
pass             1244 source3/libsmb/cliconnect.c 		pass = "";
pass             1245 source3/libsmb/cliconnect.c 	} else if (pass == NULL) {
pass             1252 source3/libsmb/cliconnect.c 	    *pass && passlen != 24) {
pass             1265 source3/libsmb/cliconnect.c 		SMBencrypt(pass, cli->secblob.data, (uchar *)pword);
pass             1270 source3/libsmb/cliconnect.c 			if (!lp_client_plaintext_auth() && (*pass)) {
pass             1281 source3/libsmb/cliconnect.c 			passlen = clistr_push(cli, pword, pass, sizeof(pword),
pass             1289 source3/libsmb/cliconnect.c 				memcpy(pword, pass, passlen);
pass             1399 source3/libsmb/cliconnect.c 		       const char *dev, const char *pass, int passlen)
pass             1420 source3/libsmb/cliconnect.c 	req = cli_tcon_andx_send(frame, ev, cli, share, dev, pass, passlen);
pass             2237 source3/libsmb/cliconnect.c 		      const char *service, const char *pass, const char *dev,
pass             2242 source3/libsmb/cliconnect.c 	if (!lp_client_plaintext_auth() && (*pass)) {
pass             2257 source3/libsmb/cliconnect.c 	*p++ = 4; p += clistr_push(cli, p, pass, -1, STR_TERMINATE | STR_NOALIGN);
pass              537 source3/libsmb/clifsinfo.c 				const char *pass,
pass              563 source3/libsmb/clifsinfo.c 	if (!NT_STATUS_IS_OK(status = ntlmssp_set_password(es->s.ntlmssp_state, pass))) {
pass              197 source3/pam_smbpass/pam_smb_auth.c 	const char *pass = NULL;
pass              201 source3/pam_smbpass/pam_smb_auth.c 	retval = _pam_get_item( pamh, PAM_AUTHTOK, &pass );
pass              207 source3/pam_smbpass/pam_smb_auth.c 	} else if (pass == NULL) {
pass              214 source3/pam_smbpass/pam_smb_auth.c 					pass, &err_str, &msg_str));
pass              220 source3/pam_smbpass/pam_smb_auth.c 		pass = NULL;
pass              229 source3/pam_smbpass/pam_smb_auth.c 					pass, &err_str, &msg_str));
pass              240 source3/pam_smbpass/pam_smb_auth.c 	pass = NULL;
pass              505 source3/pam_smbpass/support.c                         const char *prompt2, const char *data_name, char **pass )
pass              519 source3/pam_smbpass/support.c     *pass = token = NULL;
pass              535 source3/pam_smbpass/support.c             *pass = item;
pass              648 source3/pam_smbpass/support.c     *pass = item;
pass              416 source3/passdb/secrets.c 	struct machine_acct_pass *pass;
pass              419 source3/passdb/secrets.c 	if (!(pass = (struct machine_acct_pass *)secrets_fetch(
pass              425 source3/passdb/secrets.c 	if (size != sizeof(*pass)) {
pass              427 source3/passdb/secrets.c 		SAFE_FREE(pass);
pass              432 source3/passdb/secrets.c 		*pass_last_set_time = pass->mod_time;
pass              434 source3/passdb/secrets.c 	memcpy(ret_pwd, pass->hash, 16);
pass              442 source3/passdb/secrets.c 		if (pass->mod_time > 0 && time(NULL) > (pass->mod_time +
pass              448 source3/passdb/secrets.c 	SAFE_FREE(pass);
pass              567 source3/passdb/secrets.c 					TRUSTED_DOM_PASS* pass)
pass              573 source3/passdb/secrets.c 	if (!pass) {
pass              579 source3/passdb/secrets.c 			pass->uni_name_len);
pass              587 source3/passdb/secrets.c 				 pass->uni_name[idx]);
pass              594 source3/passdb/secrets.c 	len += tdb_pack(p, remaining_space, "dPd", pass->pass_len,
pass              595 source3/passdb/secrets.c 	                     pass->pass, pass->mod_time);
pass              602 source3/passdb/secrets.c 	len += tdb_sid_pack(p, remaining_space, &pass->domain_sid);
pass              622 source3/passdb/secrets.c 					  TRUSTED_DOM_PASS* pass)
pass              627 source3/passdb/secrets.c 	if (!pack_buf || !pass) return -1;
pass              630 source3/passdb/secrets.c 	len += tdb_unpack(pack_buf, bufsize - len, "d", &pass->uni_name_len);
pass              634 source3/passdb/secrets.c 				   &pass->uni_name[idx]);
pass              637 source3/passdb/secrets.c 			  &pass->pass_len, &passp, &pass->mod_time);
pass              639 source3/passdb/secrets.c 		fstrcpy(pass->pass, passp);
pass              645 source3/passdb/secrets.c 			      &pass->domain_sid);
pass              657 source3/passdb/secrets.c 	struct trusted_dom_pass pass;
pass              664 source3/passdb/secrets.c 	ZERO_STRUCT(pass);
pass              674 source3/passdb/secrets.c 	pass_len = tdb_trusted_dom_pass_unpack(pass_buf, size, &pass);
pass              684 source3/passdb/secrets.c 		*pwd = SMB_STRDUP(pass.pass);
pass              691 source3/passdb/secrets.c 	if (pass_last_set_time) *pass_last_set_time = pass.mod_time;
pass              694 source3/passdb/secrets.c 	if (sid != NULL) sid_copy(sid, &pass.domain_sid);
pass              720 source3/passdb/secrets.c 	struct trusted_dom_pass pass;
pass              721 source3/passdb/secrets.c 	ZERO_STRUCT(pass);
pass              729 source3/passdb/secrets.c 	strncpy_w(pass.uni_name, uni_dom_name, sizeof(pass.uni_name) - 1);
pass              730 source3/passdb/secrets.c 	pass.uni_name_len = strlen_w(uni_dom_name)+1;
pass              734 source3/passdb/secrets.c 	pass.mod_time = time(NULL);
pass              737 source3/passdb/secrets.c 	pass.pass_len = strlen(pwd);
pass              738 source3/passdb/secrets.c 	fstrcpy(pass.pass, pwd);
pass              741 source3/passdb/secrets.c 	sid_copy(&pass.domain_sid, sid);
pass              744 source3/passdb/secrets.c 	pass_len = tdb_trusted_dom_pass_pack(NULL, 0, &pass);
pass              749 source3/passdb/secrets.c 	pass_len = tdb_trusted_dom_pass_pack(pass_buf, pass_len, &pass);
pass              795 source3/passdb/secrets.c bool secrets_store_machine_password(const char *pass, const char *domain, uint32 sec_channel)
pass              801 source3/passdb/secrets.c 	ret = secrets_store(machine_password_keystr(domain), pass, strlen(pass)+1);
pass              958 source3/passdb/secrets.c 	struct trusted_dom_pass pass;
pass              971 source3/passdb/secrets.c 		rec->value.dptr, rec->value.dsize, &pass);
pass              978 source3/passdb/secrets.c 	if (pass.domain_sid.num_auths != 4) {
pass              981 source3/passdb/secrets.c 			  sid_string_dbg(&pass.domain_sid),
pass              982 source3/passdb/secrets.c 			  pass.domain_sid.num_auths));
pass              991 source3/passdb/secrets.c 	if (!pull_ucs2_talloc(dom_info, &dom_info->name, pass.uni_name,
pass              998 source3/passdb/secrets.c 	sid_copy(&dom_info->sid, &pass.domain_sid);
pass              302 source3/rpc_server/srv_netlog_nt.c 	const uint8 *pass;
pass              386 source3/rpc_server/srv_netlog_nt.c 	if ((pass = pdb_get_nt_passwd(sampass)) == NULL) {
pass              392 source3/rpc_server/srv_netlog_nt.c 	memcpy(md4pw, pass, 16);
pass             4805 source3/rpc_server/srv_samr_nt.c static bool set_user_info_pw(uint8 *pass, struct samu *pwd)
pass             4817 source3/rpc_server/srv_samr_nt.c 				pass,
pass              125 source3/smbd/chgpasswd.c static int dochild(int master, const char *slavedev, const struct passwd *pass,
pass              134 source3/smbd/chgpasswd.c 	if (pass == NULL)
pass              141 source3/smbd/chgpasswd.c 	gid = pass->pw_gid;
pass              142 source3/smbd/chgpasswd.c 	uid = pass->pw_uid;
pass              373 source3/smbd/chgpasswd.c static bool chat_with_program(char *passwordprogram, const struct passwd *pass,
pass              382 source3/smbd/chgpasswd.c 	if (pass == NULL) {
pass              389 source3/smbd/chgpasswd.c 		DEBUG(3, ("chat_with_program: Cannot Allocate pty for password change: %s\n", pass->pw_name));
pass              401 source3/smbd/chgpasswd.c 		DEBUG(3, ("chat_with_program: Cannot fork() child for password change: %s\n", pass->pw_name));
pass              414 source3/smbd/chgpasswd.c 			DEBUG(3, ("chat_with_program: Child failed to change password: %s\n", pass->pw_name));
pass              471 source3/smbd/chgpasswd.c 		DEBUG(3, ("chat_with_program: Dochild for user %s (uid=%d,gid=%d) (as_root = %s)\n", pass->pw_name,
pass              473 source3/smbd/chgpasswd.c 		chstat = dochild(master, slavedev, pass, passwordprogram, as_root);
pass              488 source3/smbd/chgpasswd.c 		       (chstat ? "" : "un"), pass->pw_name));
pass              492 source3/smbd/chgpasswd.c bool chgpasswd(const char *name, const struct passwd *pass,
pass              551 source3/smbd/chgpasswd.c 		if (pass) {
pass              552 source3/smbd/chgpasswd.c 			ret = smb_pam_passchange(pass->pw_name, oldpass, newpass);
pass              570 source3/smbd/chgpasswd.c 	if (pass == NULL) {
pass              620 source3/smbd/chgpasswd.c 				pass,
pass              627 source3/smbd/chgpasswd.c bool chgpasswd(const char *name, const struct passwd *pass, 
pass             1087 source3/smbd/chgpasswd.c 	struct passwd *pass = NULL;
pass             1149 source3/smbd/chgpasswd.c 	pass = Get_Pwnam_alloc(talloc_tos(), username);
pass             1150 source3/smbd/chgpasswd.c 	if (!pass) {
pass             1167 source3/smbd/chgpasswd.c 			TALLOC_FREE(pass);
pass             1185 source3/smbd/chgpasswd.c 		!chgpasswd(username, pass, old_passwd, new_passwd, as_root)) {
pass             1186 source3/smbd/chgpasswd.c 		TALLOC_FREE(pass);
pass             1190 source3/smbd/chgpasswd.c 	TALLOC_FREE(pass);
pass             1541 source3/smbd/sesssetup.c 			char *pass = NULL;
pass             1549 source3/smbd/sesssetup.c 							&pass,
pass             1557 source3/smbd/sesssetup.c 							&pass,
pass             1562 source3/smbd/sesssetup.c 			if (!pass) {
pass             1568 source3/smbd/sesssetup.c 			plaintext_password = data_blob(pass, strlen(pass)+1);
pass               32 source3/smbd/uid.c 	struct passwd *pass;
pass               34 source3/smbd/uid.c 	pass = getpwnam_alloc(talloc_autofree_context(), lp_guestaccount());
pass               35 source3/smbd/uid.c 	if (!pass) {
pass               42 source3/smbd/uid.c 	initgroups(pass->pw_name, pass->pw_gid);
pass               45 source3/smbd/uid.c 	set_sec_ctx(pass->pw_uid, pass->pw_gid, 0, NULL, NULL);
pass               50 source3/smbd/uid.c 	TALLOC_FREE(pass);
pass              224 source3/torture/locktest.c 		char *pass = getpass("Password: ");
pass              225 source3/torture/locktest.c 		if (pass) {
pass              226 source3/torture/locktest.c 			fstrcpy(password[0], pass);
pass              227 source3/torture/locktest.c 			fstrcpy(password[1], pass);
pass              177 source3/torture/locktest2.c 		char *pass = getpass("Password: ");
pass              178 source3/torture/locktest2.c 		if (pass) {
pass              179 source3/torture/locktest2.c 			fstrcpy(password, pass);
pass              224 source3/torture/masktest.c 		char *pass = getpass("Password: ");
pass              225 source3/torture/masktest.c 		if (pass) {
pass              226 source3/torture/masktest.c 			fstrcpy(password, pass);
pass              541 source3/utils/net_util.c 	const char *pass = NULL;
pass              559 source3/utils/net_util.c 	pass = getpass(prompt);
pass              562 source3/utils/net_util.c 	return pass;
pass               90 source3/utils/netlookup.c 		char *pass = getpass("Password:");
pass               91 source3/utils/netlookup.c 		if (pass) {
pass               92 source3/utils/netlookup.c 			opt_password = SMB_STRDUP(pass);
pass              283 source3/utils/ntlm_auth.c static bool check_plaintext_auth(const char *user, const char *pass,
pass              300 source3/utils/ntlm_auth.c 	fstrcpy(request.data.auth.pass, pass);
pass             1035 source3/utils/ntlm_auth.c 	char *user, *pass;	
pass             1038 source3/utils/ntlm_auth.c 	pass=(char *)memchr(buf,' ',length);
pass             1039 source3/utils/ntlm_auth.c 	if (!pass) {
pass             1044 source3/utils/ntlm_auth.c 	*pass='\0';
pass             1045 source3/utils/ntlm_auth.c 	pass++;
pass             1049 source3/utils/ntlm_auth.c 		rfc1738_unescape(pass);
pass             1052 source3/utils/ntlm_auth.c 	if (check_plaintext_auth(user, pass, False)) {
pass               49 source3/utils/ntlm_auth_diagnostics.c 	bool pass = True;
pass              121 source3/utils/ntlm_auth_diagnostics.c 		pass = False;
pass              132 source3/utils/ntlm_auth_diagnostics.c 			pass = False;
pass              142 source3/utils/ntlm_auth_diagnostics.c 			pass = False;
pass              145 source3/utils/ntlm_auth_diagnostics.c         return pass;
pass              173 source3/utils/ntlm_auth_diagnostics.c 	bool pass = True;
pass              220 source3/utils/ntlm_auth_diagnostics.c 		pass = False;
pass              228 source3/utils/ntlm_auth_diagnostics.c 		pass = False;
pass              230 source3/utils/ntlm_auth_diagnostics.c         return pass;
pass              239 source3/utils/ntlm_auth_diagnostics.c 	bool pass = True;
pass              291 source3/utils/ntlm_auth_diagnostics.c 		pass = False;
pass              300 source3/utils/ntlm_auth_diagnostics.c 		pass = False;
pass              304 source3/utils/ntlm_auth_diagnostics.c         return pass;
pass              313 source3/utils/ntlm_auth_diagnostics.c 	bool pass = True;
pass              383 source3/utils/ntlm_auth_diagnostics.c 		pass = False;
pass              385 source3/utils/ntlm_auth_diagnostics.c         return pass;
pass              596 source3/utils/ntlm_auth_diagnostics.c 	bool pass = True;
pass              601 source3/utils/ntlm_auth_diagnostics.c 			pass = False;
pass              605 source3/utils/ntlm_auth_diagnostics.c         return pass;
pass              102 source3/utils/smbget.c 		char *prompt, *pass;
pass              106 source3/utils/smbget.c 		pass = getpass(prompt);
pass              108 source3/utils/smbget.c 		strncpy(pw, pass, pwlen-1);
pass              341 source3/web/cgi.c 	struct passwd *pass = NULL;
pass              370 source3/web/cgi.c 	pass = getpwnam_alloc(talloc_autofree_context(), user);
pass              376 source3/web/cgi.c 	if NT_STATUS_IS_OK(pass_check(pass, user, user_pass, 
pass              379 source3/web/cgi.c 		if (pass) {
pass              384 source3/web/cgi.c 			if ( initgroups(pass->pw_name, pass->pw_gid) != 0 )
pass              387 source3/web/cgi.c 			become_user_permanently(pass->pw_uid, pass->pw_gid);
pass              391 source3/web/cgi.c 			TALLOC_FREE(pass);
pass              401 source3/web/cgi.c 	TALLOC_FREE(pass);
pass              381 source3/winbindd/winbindd.h 	char *pass;
pass              127 source3/winbindd/winbindd_cred_cache.c 		if (cred_ptr && cred_ptr->pass) {
pass              132 source3/winbindd/winbindd_cred_cache.c 							  cred_ptr->pass,
pass              313 source3/winbindd/winbindd_cred_cache.c 	if (!cred_ptr || !cred_ptr->pass) {
pass              330 source3/winbindd/winbindd_cred_cache.c 					  cred_ptr->pass,
pass              765 source3/winbindd/winbindd_cred_cache.c 				   const char *pass)
pass              775 source3/winbindd/winbindd_cred_cache.c 	if (pass) {
pass              776 source3/winbindd/winbindd_cred_cache.c 		memcredp->len += strlen(pass)+1;
pass              812 source3/winbindd/winbindd_cred_cache.c 	E_md4hash(pass, memcredp->nt_hash);
pass              813 source3/winbindd/winbindd_cred_cache.c 	E_deshash(pass, memcredp->lm_hash);
pass              815 source3/winbindd/winbindd_cred_cache.c 	if (pass) {
pass              816 source3/winbindd/winbindd_cred_cache.c 		memcredp->pass = (char *)memcredp->lm_hash + LM_HASH_LEN;
pass              817 source3/winbindd/winbindd_cred_cache.c 		memcpy(memcredp->pass, pass,
pass              843 source3/winbindd/winbindd_cred_cache.c 	memcredp->pass = NULL;
pass              854 source3/winbindd/winbindd_cred_cache.c 						       const char *pass)
pass              860 source3/winbindd/winbindd_cred_cache.c 	return store_memory_creds(memcredp, pass);
pass              869 source3/winbindd/winbindd_cred_cache.c 						   const char *pass)
pass              899 source3/winbindd/winbindd_cred_cache.c 		return winbindd_replace_memory_creds_internal(memcredp, pass);
pass              912 source3/winbindd/winbindd_cred_cache.c 	status = store_memory_creds(memcredp, pass);
pass              938 source3/winbindd/winbindd_cred_cache.c 				   const char *pass)
pass              943 source3/winbindd/winbindd_cred_cache.c 	status = winbindd_add_memory_creds_internal(username, uid, pass);
pass             1012 source3/winbindd/winbindd_cred_cache.c 				       const char *pass)
pass             1026 source3/winbindd/winbindd_cred_cache.c 	return winbindd_replace_memory_creds_internal(memcredp, pass);
pass               58 source3/winbindd/winbindd_creds.c 			      const char *pass, 
pass               95 source3/winbindd/winbindd_creds.c 	if (pass) {
pass              118 source3/winbindd/winbindd_creds.c 		E_md4hash(pass, nt_pass);
pass              140 source3/winbindd/winbindd_creds.c 				        const char *pass,
pass              143 source3/winbindd/winbindd_creds.c 	return winbindd_store_creds(domain, mem_ctx, user, pass, info3, NULL);
pass              149 source3/winbindd/winbindd_creds.c 				      const char *pass)
pass              151 source3/winbindd/winbindd_creds.c 	return winbindd_store_creds(domain, mem_ctx, NULL, pass, NULL, sid);
pass              157 source3/winbindd/winbindd_creds.c 				       const char *pass)
pass              159 source3/winbindd/winbindd_creds.c 	return winbindd_store_creds(domain, mem_ctx, user, pass, NULL, NULL);
pass              636 source3/winbindd/winbindd_pam.c 						state->request.data.auth.pass,
pass              823 source3/winbindd/winbindd_pam.c 	state->request.data.auth.pass
pass              824 source3/winbindd/winbindd_pam.c 		[sizeof(state->request.data.auth.pass)-1]='\0';
pass              931 source3/winbindd/winbindd_pam.c 	E_md4hash(state->request.data.auth.pass, new_nt_pass);
pass             1073 source3/winbindd/winbindd_pam.c 							state->request.data.auth.pass,
pass             1247 source3/winbindd/winbindd_pam.c 				      state->request.data.auth.pass,
pass             1268 source3/winbindd/winbindd_pam.c 		    && SMBencrypt(state->request.data.auth.pass,
pass             1277 source3/winbindd/winbindd_pam.c 		SMBNTencrypt(state->request.data.auth.pass,
pass             1474 source3/winbindd/winbindd_pam.c 	state->request.data.auth.pass[sizeof(state->request.data.auth.pass)-1]='\0';
pass             1667 source3/winbindd/winbindd_pam.c 							state->request.data.auth.pass);
pass             1678 source3/winbindd/winbindd_pam.c 						      state->request.data.auth.pass,
pass              259 source3/winbindd/winbindd_proto.h 				   const char *pass);
pass              262 source3/winbindd/winbindd_proto.h 				       const char *pass);
pass              275 source3/winbindd/winbindd_proto.h 			      const char *pass, 
pass              281 source3/winbindd/winbindd_proto.h 				        const char *pass,
pass              286 source3/winbindd/winbindd_proto.h 				      const char *pass);
pass              290 source3/winbindd/winbindd_proto.h 				       const char *pass);
pass               49 source4/auth/credentials/credentials_files.c 	char pass[128];
pass               51 source4/auth/credentials/credentials_files.c 	for(p = pass, *p = '\0'; /* ensure that pass is null-terminated */
pass               52 source4/auth/credentials/credentials_files.c 		p && p - pass < sizeof(pass);) {
pass               61 source4/auth/credentials/credentials_files.c 			if (p - pass) {
pass               77 source4/auth/credentials/credentials_files.c 	cli_credentials_set_password(credentials, pass, obtained);
pass              195 source4/client/smbmount.c 		char *pass = getpass("Password: ");
pass              196 source4/client/smbmount.c 		if (pass) {
pass              197 source4/client/smbmount.c 			pstrcpy(password, pass);
pass              559 source4/client/smbmount.c 	char pass[128];
pass              577 source4/client/smbmount.c 	for(p = pass, *p = '\0'; /* ensure that pass is null-terminated */
pass              578 source4/client/smbmount.c 	    p && p - pass < sizeof(pass);) {
pass              586 source4/client/smbmount.c 			if (p - pass) {
pass              602 source4/client/smbmount.c 	pstrcpy(password, pass);
pass             1552 source4/dsdb/common/util.c static bool samdb_password_complexity_ok(const char *pass)
pass             1554 source4/dsdb/common/util.c 	return check_password_quality(pass);
pass              154 source4/libcli/auth/credentials.c void creds_des_encrypt(struct creds_CredentialState *creds, struct samr_Password *pass)
pass              157 source4/libcli/auth/credentials.c 	des_crypt112_16(tmp.hash, pass->hash, creds->session_key, 1);
pass              158 source4/libcli/auth/credentials.c 	*pass = tmp;
pass              164 source4/libcli/auth/credentials.c void creds_des_decrypt(struct creds_CredentialState *creds, struct samr_Password *pass)
pass              167 source4/libcli/auth/credentials.c 	des_crypt112_16(tmp.hash, pass->hash, creds->session_key, 0);
pass              168 source4/libcli/auth/credentials.c 	*pass = tmp;
pass              143 source4/ntvfs/cifs/vfs_cifs.c 	const char *host, *user, *pass, *domain, *remote_share;
pass              157 source4/ntvfs/cifs/vfs_cifs.c 	pass = share_string_option(scfg, CIFS_PASSWORD, NULL);
pass              178 source4/ntvfs/cifs/vfs_cifs.c 	if (user && pass) {
pass              189 source4/ntvfs/cifs/vfs_cifs.c 		cli_credentials_set_password(credentials, pass, CRED_SPECIFIED);
pass              161 source4/ntvfs/smb2/vfs_smb2.c 	const char *host, *user, *pass, *domain, *remote_share;
pass              175 source4/ntvfs/smb2/vfs_smb2.c 	pass = share_string_option(scfg, SMB2_PASSWORD, NULL);
pass              196 source4/ntvfs/smb2/vfs_smb2.c 	if (user && pass) {
pass              207 source4/ntvfs/smb2/vfs_smb2.c 		cli_credentials_set_password(credentials, pass, CRED_SPECIFIED);
pass               44 source4/rpc_server/remote/dcesrv_remote.c 	const char *user, *pass, *domain;
pass               64 source4/rpc_server/remote/dcesrv_remote.c 	pass = lp_parm_string(dce_call->conn->dce_ctx->lp_ctx, NULL, "dcerpc_remote", "password");
pass               73 source4/rpc_server/remote/dcesrv_remote.c 	if (user && pass) {
pass               84 source4/rpc_server/remote/dcesrv_remote.c 		cli_credentials_set_password(credentials, pass, CRED_SPECIFIED);
pass              166 source4/torture/locktest2.c 		char *pass = getpass("Password: ");
pass              167 source4/torture/locktest2.c 		if (pass) {
pass              168 source4/torture/locktest2.c 			password = talloc_strdup(mem_ctx, pass);
pass              272 source4/torture/rpc/samlogon.c 	bool pass = true;
pass              345 source4/torture/rpc/samlogon.c 		pass = false;
pass              361 source4/torture/rpc/samlogon.c 			pass = false;
pass              373 source4/torture/rpc/samlogon.c 			pass = false;
pass              376 source4/torture/rpc/samlogon.c         return pass;
pass              405 source4/torture/rpc/samlogon.c 	bool pass = true;
pass              462 source4/torture/rpc/samlogon.c 			pass = false;
pass              473 source4/torture/rpc/samlogon.c 			pass = false;
pass              488 source4/torture/rpc/samlogon.c 			pass = false;
pass              491 source4/torture/rpc/samlogon.c         return pass;
pass              500 source4/torture/rpc/samlogon.c 	bool pass = true;
pass              562 source4/torture/rpc/samlogon.c 		pass = false;
pass              571 source4/torture/rpc/samlogon.c 		pass = false;
pass              575 source4/torture/rpc/samlogon.c         return pass;
pass              592 source4/torture/rpc/samlogon.c 	bool pass = true;
pass              674 source4/torture/rpc/samlogon.c 			pass = false;
pass              683 source4/torture/rpc/samlogon.c 			pass = false;
pass              696 source4/torture/rpc/samlogon.c 				pass = false;
pass              704 source4/torture/rpc/samlogon.c 				pass = false;
pass              716 source4/torture/rpc/samlogon.c 				pass = false;
pass              723 source4/torture/rpc/samlogon.c 				pass = false;
pass              728 source4/torture/rpc/samlogon.c         return pass;
pass              740 source4/torture/rpc/samlogon.c 	bool pass = true;
pass              841 source4/torture/rpc/samlogon.c 			pass = false;
pass              850 source4/torture/rpc/samlogon.c 			pass = false;
pass              861 source4/torture/rpc/samlogon.c 			pass = false;
pass              871 source4/torture/rpc/samlogon.c 				pass = false;
pass              882 source4/torture/rpc/samlogon.c 				pass = false;
pass              894 source4/torture/rpc/samlogon.c 			pass = false;
pass              903 source4/torture/rpc/samlogon.c 			pass = false;
pass              907 source4/torture/rpc/samlogon.c         return pass;
pass             1045 source4/torture/rpc/samlogon.c 	bool pass = true;
pass             1121 source4/torture/rpc/samlogon.c 			pass = false;
pass             1132 source4/torture/rpc/samlogon.c 			pass = false;
pass             1141 source4/torture/rpc/samlogon.c 		pass = false;
pass             1143 source4/torture/rpc/samlogon.c         return pass;
pass              176 source4/utils/ntlm_auth.c static bool check_plaintext_auth(const char *user, const char *pass, 
pass              179 source4/utils/ntlm_auth.c         return (strcmp(pass, opt_password) == 0);
pass              254 source4/utils/ntlm_auth.c 	char *user, *pass;	
pass              257 source4/utils/ntlm_auth.c 	pass = memchr(buf, ' ', length);
pass              258 source4/utils/ntlm_auth.c 	if (!pass) {
pass              263 source4/utils/ntlm_auth.c 	*pass='\0';
pass              264 source4/utils/ntlm_auth.c 	pass++;
pass              268 source4/utils/ntlm_auth.c 		rfc1738_unescape(pass);
pass              271 source4/utils/ntlm_auth.c 	if (check_plaintext_auth(user, pass, false)) {
pass              592 source4/winbind/wb_samba3_cmd.c 	cli_credentials_set_password(credentials, s3call->request.data.auth.pass, CRED_SPECIFIED);