password 88 examples/auth/crackcheck/crackcheck.c char *password; password 114 examples/auth/crackcheck/crackcheck.c password = fgets(f, sizeof(f), stdin); password 116 examples/auth/crackcheck/crackcheck.c if (password == NULL) { password 122 examples/auth/crackcheck/crackcheck.c ret = complexity(password); password 132 examples/auth/crackcheck/crackcheck.c reply = FascistCheck(password, dictionary); password 18 examples/libsmbclient/get_auth_data_fn.h char password[256] = { '\0' }; password 29 examples/libsmbclient/get_auth_data_fn.h strncpy(pPassword, password, maxLenPassword - 1); password 79 examples/libsmbclient/get_auth_data_fn.h strncpy(password, pPassword, sizeof(password) - 1); password 15 examples/libsmbclient/testbrowse2.c char *password = ""; password 88 examples/libsmbclient/testbrowse2.c strncpy(passwd, password, passwdlen - 1); passwd[passwdlen - 1] = 0; password 600 examples/libsmbclient/tree.c char *password, int pwmaxlen) password 604 examples/libsmbclient/tree.c strncpy(password, "test", pwmaxlen); password 241 lib/zlib/contrib/minizip/miniunz.c int do_extract_currentfile(uf,popt_extract_without_path,popt_overwrite,password) password 245 lib/zlib/contrib/minizip/miniunz.c const char* password; password 299 lib/zlib/contrib/minizip/miniunz.c err = unzOpenCurrentFilePassword(uf,password); password 405 lib/zlib/contrib/minizip/miniunz.c int do_extract(uf,opt_extract_without_path,opt_overwrite,password) password 409 lib/zlib/contrib/minizip/miniunz.c const char* password; password 424 lib/zlib/contrib/minizip/miniunz.c password) != UNZ_OK) password 441 lib/zlib/contrib/minizip/miniunz.c int do_extract_onefile(uf,filename,opt_extract_without_path,opt_overwrite,password) password 446 lib/zlib/contrib/minizip/miniunz.c const char* password; password 457 lib/zlib/contrib/minizip/miniunz.c password) == UNZ_OK) password 470 lib/zlib/contrib/minizip/miniunz.c const char *password=NULL; password 516 lib/zlib/contrib/minizip/miniunz.c password=argv[i+1]; password 577 lib/zlib/contrib/minizip/miniunz.c return do_extract(uf,opt_do_extract_withoutpath,opt_overwrite,password); password 580 lib/zlib/contrib/minizip/miniunz.c opt_do_extract_withoutpath,opt_overwrite,password); password 199 lib/zlib/contrib/minizip/minizip.c const char* password=NULL; password 228 lib/zlib/contrib/minizip/minizip.c password=argv[i+1]; password 348 lib/zlib/contrib/minizip/minizip.c if ((password != NULL) && (err==ZIP_OK)) password 357 lib/zlib/contrib/minizip/minizip.c password,crcFile); password 1047 lib/zlib/contrib/minizip/unzip.c extern int ZEXPORT unzOpenCurrentFile3 (file, method, level, raw, password) password 1052 lib/zlib/contrib/minizip/unzip.c const char* password; password 1063 lib/zlib/contrib/minizip/unzip.c if (password != NULL) password 1167 lib/zlib/contrib/minizip/unzip.c if (password != NULL) password 1171 lib/zlib/contrib/minizip/unzip.c init_keys(password,s->keys,s->pcrc_32_tab); password 1198 lib/zlib/contrib/minizip/unzip.c extern int ZEXPORT unzOpenCurrentFilePassword (file, password) password 1200 lib/zlib/contrib/minizip/unzip.c const char* password; password 1202 lib/zlib/contrib/minizip/unzip.c return unzOpenCurrentFile3(file, NULL, NULL, 0, password); password 259 lib/zlib/contrib/minizip/unzip.h const char* password)); password 283 lib/zlib/contrib/minizip/unzip.h const char* password)); password 695 lib/zlib/contrib/minizip/zip.c password, crcForCrypting) password 710 lib/zlib/contrib/minizip/zip.c const char* password; password 720 lib/zlib/contrib/minizip/zip.c if (password != NULL) password 765 lib/zlib/contrib/minizip/zip.c if (password != NULL) password 878 lib/zlib/contrib/minizip/zip.c if ((err==Z_OK) && (password != NULL)) password 886 lib/zlib/contrib/minizip/zip.c sizeHead=crypthead(password,bufHead,RAND_HEAD_LEN,zi->ci.keys,zi->ci.pcrc_32_tab,crcForCrypting); password 193 lib/zlib/contrib/minizip/zip.h const char* password, password 403 libcli/ldap/ldap_message.c asn1_write(data, r->creds.password, password 404 libcli/ldap/ldap_message.c strlen(r->creds.password)); password 1154 libcli/ldap/ldap_message.c r->creds.password = ""; password 1168 libcli/ldap/ldap_message.c r->creds.password = pw; password 67 libcli/ldap/ldap_message.h const char *password; password 1568 librpc/gen_ndr/cli_netlogon.c struct samr_Password *password /* [out] [ref] */, password 1605 librpc/gen_ndr/cli_netlogon.c *password = *r.out.password; password 2101 librpc/gen_ndr/cli_netlogon.c struct samr_Password *password /* [out] [ref] */, password 2138 librpc/gen_ndr/cli_netlogon.c *password = *r.out.password; password 259 librpc/gen_ndr/cli_netlogon.h struct samr_Password *password /* [out] [ref] */, password 334 librpc/gen_ndr/cli_netlogon.h struct samr_Password *password /* [out] [ref] */, password 2345 librpc/gen_ndr/cli_samr.c struct samr_CryptPassword *password /* [in] [unique] */, password 2354 librpc/gen_ndr/cli_samr.c r.in.password = password; password 306 librpc/gen_ndr/cli_samr.h struct samr_CryptPassword *password /* [in] [unique] */, password 519 librpc/gen_ndr/cli_svcctl.c const char *password /* [in] [unique,charset(UTF16)] */, password 535 librpc/gen_ndr/cli_svcctl.c r.in.password = password; password 586 librpc/gen_ndr/cli_svcctl.c uint8_t *password /* [in] [unique,size_is(password_size)] */, password 608 librpc/gen_ndr/cli_svcctl.c r.in.password = password; password 1167 librpc/gen_ndr/cli_svcctl.c const char *password /* [in] [unique,charset(UTF16)] */, password 1183 librpc/gen_ndr/cli_svcctl.c r.in.password = password; password 1233 librpc/gen_ndr/cli_svcctl.c const char *password /* [in] [unique,charset(UTF16)] */, password 1251 librpc/gen_ndr/cli_svcctl.c r.in.password = password; password 71 librpc/gen_ndr/cli_svcctl.h const char *password /* [in] [unique,charset(UTF16)] */, password 89 librpc/gen_ndr/cli_svcctl.h uint8_t *password /* [in] [unique,size_is(password_size)] */, password 179 librpc/gen_ndr/cli_svcctl.h const char *password /* [in] [unique,charset(UTF16)] */, password 196 librpc/gen_ndr/cli_svcctl.h const char *password /* [in] [unique,charset(UTF16)] */, password 811 librpc/gen_ndr/cli_wkssvc.c const char *password /* [in] [unique,charset(UTF16)] */, password 823 librpc/gen_ndr/cli_wkssvc.c r.in.password = password; password 862 librpc/gen_ndr/cli_wkssvc.c const char *password /* [in] [unique,charset(UTF16)] */, password 872 librpc/gen_ndr/cli_wkssvc.c r.in.password = password; password 912 librpc/gen_ndr/cli_wkssvc.c const char *password /* [in] [unique,charset(UTF16)] */, password 923 librpc/gen_ndr/cli_wkssvc.c r.in.password = password; password 117 librpc/gen_ndr/cli_wkssvc.h const char *password /* [in] [unique,charset(UTF16)] */, password 124 librpc/gen_ndr/cli_wkssvc.h const char *password /* [in] [unique,charset(UTF16)] */, password 132 librpc/gen_ndr/cli_wkssvc.h const char *password /* [in] [unique,charset(UTF16)] */, password 274 librpc/gen_ndr/drsblobs.h struct samr_Password password; password 279 librpc/gen_ndr/drsblobs.h uint8_t *password; password 511 librpc/gen_ndr/lsa.h struct lsa_DATA_BUF *password;/* [unique] */ password 597 librpc/gen_ndr/lsa.h struct lsa_TrustDomainInfoPassword password;/* [case(LSA_TRUSTED_DOMAIN_INFO_PASSWORD)] */ password 2344 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_push_samr_Password(ndr, NDR_SCALARS, &r->password)); password 2356 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_pull_samr_Password(ndr, NDR_SCALARS, &r->password)); password 2368 librpc/gen_ndr/ndr_drsblobs.c ndr_print_samr_Password(ndr, "password", &r->password); password 2377 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->password, r->size)); password 2389 librpc/gen_ndr/ndr_drsblobs.c NDR_PULL_ALLOC_N(ndr, r->password, r->size); password 2390 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->password, r->size)); password 2402 librpc/gen_ndr/ndr_drsblobs.c ndr_print_array_uint8(ndr, "password", r->password, r->size); password 2973 librpc/gen_ndr/ndr_lsa.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->password)); password 2977 librpc/gen_ndr/ndr_lsa.c if (r->password) { password 2978 librpc/gen_ndr/ndr_lsa.c NDR_CHECK(ndr_push_lsa_DATA_BUF(ndr, NDR_SCALARS|NDR_BUFFERS, r->password)); password 2997 librpc/gen_ndr/ndr_lsa.c NDR_PULL_ALLOC(ndr, r->password); password 2999 librpc/gen_ndr/ndr_lsa.c r->password = NULL; password 3009 librpc/gen_ndr/ndr_lsa.c if (r->password) { password 3011 librpc/gen_ndr/ndr_lsa.c NDR_PULL_SET_MEM_CTX(ndr, r->password, 0); password 3012 librpc/gen_ndr/ndr_lsa.c NDR_CHECK(ndr_pull_lsa_DATA_BUF(ndr, NDR_SCALARS|NDR_BUFFERS, r->password)); password 3029 librpc/gen_ndr/ndr_lsa.c ndr_print_ptr(ndr, "password", r->password); password 3031 librpc/gen_ndr/ndr_lsa.c if (r->password) { password 3032 librpc/gen_ndr/ndr_lsa.c ndr_print_lsa_DATA_BUF(ndr, "password", r->password); password 3630 librpc/gen_ndr/ndr_lsa.c NDR_CHECK(ndr_push_lsa_TrustDomainInfoPassword(ndr, NDR_SCALARS, &r->password)); password 3688 librpc/gen_ndr/ndr_lsa.c NDR_CHECK(ndr_push_lsa_TrustDomainInfoPassword(ndr, NDR_BUFFERS, &r->password)); password 3757 librpc/gen_ndr/ndr_lsa.c NDR_CHECK(ndr_pull_lsa_TrustDomainInfoPassword(ndr, NDR_SCALARS, &r->password)); password 3814 librpc/gen_ndr/ndr_lsa.c NDR_CHECK(ndr_pull_lsa_TrustDomainInfoPassword(ndr, NDR_BUFFERS, &r->password)); password 3878 librpc/gen_ndr/ndr_lsa.c ndr_print_lsa_TrustDomainInfoPassword(ndr, "password", &r->password); password 663 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->password)); password 671 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->password)); password 679 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->password)); password 687 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->password)); password 698 librpc/gen_ndr/ndr_netlogon.c if (r->password) { password 699 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password)); password 710 librpc/gen_ndr/ndr_netlogon.c if (r->password) { password 711 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password)); password 722 librpc/gen_ndr/ndr_netlogon.c if (r->password) { password 723 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password)); password 734 librpc/gen_ndr/ndr_netlogon.c if (r->password) { password 735 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password)); password 764 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->password); password 766 librpc/gen_ndr/ndr_netlogon.c r->password = NULL; password 784 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->password); password 786 librpc/gen_ndr/ndr_netlogon.c r->password = NULL; password 804 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->password); password 806 librpc/gen_ndr/ndr_netlogon.c r->password = NULL; password 824 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->password); password 826 librpc/gen_ndr/ndr_netlogon.c r->password = NULL; password 837 librpc/gen_ndr/ndr_netlogon.c if (r->password) { password 839 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->password, 0); password 840 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password)); password 855 librpc/gen_ndr/ndr_netlogon.c if (r->password) { password 857 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->password, 0); password 858 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password)); password 873 librpc/gen_ndr/ndr_netlogon.c if (r->password) { password 875 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->password, 0); password 876 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password)); password 891 librpc/gen_ndr/ndr_netlogon.c if (r->password) { password 893 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->password, 0); password 894 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password)); password 913 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "password", r->password); password 915 librpc/gen_ndr/ndr_netlogon.c if (r->password) { password 916 librpc/gen_ndr/ndr_netlogon.c ndr_print_netr_PasswordInfo(ndr, "password", r->password); password 931 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "password", r->password); password 933 librpc/gen_ndr/ndr_netlogon.c if (r->password) { password 934 librpc/gen_ndr/ndr_netlogon.c ndr_print_netr_PasswordInfo(ndr, "password", r->password); password 949 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "password", r->password); password 951 librpc/gen_ndr/ndr_netlogon.c if (r->password) { password 952 librpc/gen_ndr/ndr_netlogon.c ndr_print_netr_PasswordInfo(ndr, "password", r->password); password 967 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "password", r->password); password 969 librpc/gen_ndr/ndr_netlogon.c if (r->password) { password 970 librpc/gen_ndr/ndr_netlogon.c ndr_print_netr_PasswordInfo(ndr, "password", r->password); password 13714 librpc/gen_ndr/ndr_netlogon.c if (r->out.password == NULL) { password 13717 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_samr_Password(ndr, NDR_SCALARS, r->out.password)); password 13775 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->out.password); password 13776 librpc/gen_ndr/ndr_netlogon.c ZERO_STRUCTP(r->out.password); password 13787 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->out.password); password 13790 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->out.password, LIBNDR_FLAG_REF_ALLOC); password 13791 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_samr_Password(ndr, NDR_SCALARS, r->out.password)); password 13830 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "password", r->out.password); password 13832 librpc/gen_ndr/ndr_netlogon.c ndr_print_samr_Password(ndr, "password", r->out.password); password 15208 librpc/gen_ndr/ndr_netlogon.c if (r->out.password == NULL) { password 15211 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_samr_Password(ndr, NDR_SCALARS, r->out.password)); password 15274 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->out.password); password 15275 librpc/gen_ndr/ndr_netlogon.c ZERO_STRUCTP(r->out.password); password 15288 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->out.password); password 15291 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->out.password, LIBNDR_FLAG_REF_ALLOC); password 15292 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_samr_Password(ndr, NDR_SCALARS, r->out.password)); password 15338 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "password", r->out.password); password 15340 librpc/gen_ndr/ndr_netlogon.c ndr_print_samr_Password(ndr, "password", r->out.password); password 3007 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_samr_CryptPassword(ndr, NDR_SCALARS, &r->password)); password 3020 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_pull_samr_CryptPassword(ndr, NDR_SCALARS, &r->password)); password 3033 librpc/gen_ndr/ndr_samr.c ndr_print_samr_CryptPassword(ndr, "password", &r->password); password 3041 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_samr_CryptPassword(ndr, NDR_SCALARS, &r->password)); password 3053 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_pull_samr_CryptPassword(ndr, NDR_SCALARS, &r->password)); password 3065 librpc/gen_ndr/ndr_samr.c ndr_print_samr_CryptPassword(ndr, "password", &r->password); password 3120 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_samr_CryptPasswordEx(ndr, NDR_SCALARS, &r->password)); password 3133 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_pull_samr_CryptPasswordEx(ndr, NDR_SCALARS, &r->password)); password 3146 librpc/gen_ndr/ndr_samr.c ndr_print_samr_CryptPasswordEx(ndr, "password", &r->password); password 3154 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_samr_CryptPasswordEx(ndr, NDR_SCALARS, &r->password)); password 3166 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_pull_samr_CryptPasswordEx(ndr, NDR_SCALARS, &r->password)); password 3178 librpc/gen_ndr/ndr_samr.c ndr_print_samr_CryptPasswordEx(ndr, "password", &r->password); password 5078 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_lsa_StringLarge(ndr, NDR_SCALARS, &r->password)); password 5086 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_lsa_StringLarge(ndr, NDR_BUFFERS, &r->password)); password 5098 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_pull_lsa_StringLarge(ndr, NDR_SCALARS, &r->password)); password 5106 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_pull_lsa_StringLarge(ndr, NDR_BUFFERS, &r->password)); password 5118 librpc/gen_ndr/ndr_samr.c ndr_print_lsa_StringLarge(ndr, "password", &r->password); password 5131 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_lsa_StringLarge(ndr, NDR_SCALARS, &r->password)); password 5138 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_lsa_StringLarge(ndr, NDR_BUFFERS, &r->password)); password 5150 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_pull_lsa_StringLarge(ndr, NDR_SCALARS, &r->password)); password 5157 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_pull_lsa_StringLarge(ndr, NDR_BUFFERS, &r->password)); password 5169 librpc/gen_ndr/ndr_samr.c ndr_print_lsa_StringLarge(ndr, "password", &r->password); password 10631 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password)); password 10632 librpc/gen_ndr/ndr_samr.c if (r->in.password) { password 10633 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_samr_CryptPassword(ndr, NDR_SCALARS, r->in.password)); password 10677 librpc/gen_ndr/ndr_samr.c NDR_PULL_ALLOC(ndr, r->in.password); password 10679 librpc/gen_ndr/ndr_samr.c r->in.password = NULL; password 10681 librpc/gen_ndr/ndr_samr.c if (r->in.password) { password 10683 librpc/gen_ndr/ndr_samr.c NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0); password 10684 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_pull_samr_CryptPassword(ndr, NDR_SCALARS, r->in.password)); password 10726 librpc/gen_ndr/ndr_samr.c ndr_print_ptr(ndr, "password", r->in.password); password 10728 librpc/gen_ndr/ndr_samr.c if (r->in.password) { password 10729 librpc/gen_ndr/ndr_samr.c ndr_print_samr_CryptPassword(ndr, "password", r->in.password); password 4078 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->password)); password 4099 librpc/gen_ndr/ndr_srvsvc.c if (r->password) { password 4100 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16))); password 4102 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16))); password 4103 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->password, ndr_charset_length(r->password, CH_UTF16), sizeof(uint16_t), CH_UTF16)); password 4145 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->password); password 4147 librpc/gen_ndr/ndr_srvsvc.c r->password = NULL; password 4187 librpc/gen_ndr/ndr_srvsvc.c if (r->password) { password 4189 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->password, 0); password 4190 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->password)); password 4191 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->password)); password 4192 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->password) > ndr_get_array_size(ndr, &r->password)) { password 4193 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->password), ndr_get_array_length(ndr, &r->password)); password 4195 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t))); password 4196 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->password, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t), CH_UTF16)); password 4229 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "password", r->password); password 4231 librpc/gen_ndr/ndr_srvsvc.c if (r->password) { password 4232 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "password", r->password); password 4520 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->password)); password 4542 librpc/gen_ndr/ndr_srvsvc.c if (r->password) { password 4543 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16))); password 4545 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16))); password 4546 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->password, ndr_charset_length(r->password, CH_UTF16), sizeof(uint16_t), CH_UTF16)); password 4589 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->password); password 4591 librpc/gen_ndr/ndr_srvsvc.c r->password = NULL; password 4632 librpc/gen_ndr/ndr_srvsvc.c if (r->password) { password 4634 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->password, 0); password 4635 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->password)); password 4636 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->password)); password 4637 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->password) > ndr_get_array_size(ndr, &r->password)) { password 4638 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->password), ndr_get_array_length(ndr, &r->password)); password 4640 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t))); password 4641 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->password, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t), CH_UTF16)); password 4675 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "password", r->password); password 4677 librpc/gen_ndr/ndr_srvsvc.c if (r->password) { password 4678 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "password", r->password); password 2175 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password)); password 2176 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) { password 2177 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16))); password 2179 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16))); password 2180 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.password, ndr_charset_length(r->in.password, CH_UTF16), sizeof(uint16_t), CH_UTF16)); password 2303 librpc/gen_ndr/ndr_svcctl.c NDR_PULL_ALLOC(ndr, r->in.password); password 2305 librpc/gen_ndr/ndr_svcctl.c r->in.password = NULL; password 2307 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) { password 2309 librpc/gen_ndr/ndr_svcctl.c NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0); password 2310 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password)); password 2311 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.password)); password 2312 librpc/gen_ndr/ndr_svcctl.c if (ndr_get_array_length(ndr, &r->in.password) > ndr_get_array_size(ndr, &r->in.password)) { password 2313 librpc/gen_ndr/ndr_svcctl.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.password), ndr_get_array_length(ndr, &r->in.password)); password 2315 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t))); password 2316 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.password, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t), CH_UTF16)); password 2394 librpc/gen_ndr/ndr_svcctl.c ndr_print_ptr(ndr, "password", r->in.password); password 2396 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) { password 2397 librpc/gen_ndr/ndr_svcctl.c ndr_print_string(ndr, "password", r->in.password); password 2471 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password)); password 2472 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) { password 2474 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->in.password, r->in.password_size)); password 2619 librpc/gen_ndr/ndr_svcctl.c NDR_PULL_ALLOC(ndr, r->in.password); password 2621 librpc/gen_ndr/ndr_svcctl.c r->in.password = NULL; password 2623 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) { password 2625 librpc/gen_ndr/ndr_svcctl.c NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0); password 2626 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password)); password 2627 librpc/gen_ndr/ndr_svcctl.c NDR_PULL_ALLOC_N(ndr, r->in.password, ndr_get_array_size(ndr, &r->in.password)); password 2628 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->in.password, ndr_get_array_size(ndr, &r->in.password))); password 2637 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) { password 2638 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_check_array_size(ndr, (void*)&r->in.password, r->in.password_size)); password 2717 librpc/gen_ndr/ndr_svcctl.c ndr_print_ptr(ndr, "password", r->in.password); password 2719 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) { password 2720 librpc/gen_ndr/ndr_svcctl.c ndr_print_array_uint8(ndr, "password", r->in.password, r->in.password_size); password 4071 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password)); password 4072 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) { password 4073 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16))); password 4075 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16))); password 4076 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.password, ndr_charset_length(r->in.password, CH_UTF16), sizeof(uint16_t), CH_UTF16)); password 4199 librpc/gen_ndr/ndr_svcctl.c NDR_PULL_ALLOC(ndr, r->in.password); password 4201 librpc/gen_ndr/ndr_svcctl.c r->in.password = NULL; password 4203 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) { password 4205 librpc/gen_ndr/ndr_svcctl.c NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0); password 4206 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password)); password 4207 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.password)); password 4208 librpc/gen_ndr/ndr_svcctl.c if (ndr_get_array_length(ndr, &r->in.password) > ndr_get_array_size(ndr, &r->in.password)) { password 4209 librpc/gen_ndr/ndr_svcctl.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.password), ndr_get_array_length(ndr, &r->in.password)); password 4211 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t))); password 4212 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.password, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t), CH_UTF16)); password 4290 librpc/gen_ndr/ndr_svcctl.c ndr_print_ptr(ndr, "password", r->in.password); password 4292 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) { password 4293 librpc/gen_ndr/ndr_svcctl.c ndr_print_string(ndr, "password", r->in.password); password 4370 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password)); password 4371 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) { password 4372 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16))); password 4374 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16))); password 4375 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.password, ndr_charset_length(r->in.password, CH_UTF16), sizeof(uint16_t), CH_UTF16)); password 4531 librpc/gen_ndr/ndr_svcctl.c NDR_PULL_ALLOC(ndr, r->in.password); password 4533 librpc/gen_ndr/ndr_svcctl.c r->in.password = NULL; password 4535 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) { password 4537 librpc/gen_ndr/ndr_svcctl.c NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0); password 4538 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password)); password 4539 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.password)); password 4540 librpc/gen_ndr/ndr_svcctl.c if (ndr_get_array_length(ndr, &r->in.password) > ndr_get_array_size(ndr, &r->in.password)) { password 4541 librpc/gen_ndr/ndr_svcctl.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.password), ndr_get_array_length(ndr, &r->in.password)); password 4543 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t))); password 4544 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.password, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t), CH_UTF16)); password 4620 librpc/gen_ndr/ndr_svcctl.c ndr_print_ptr(ndr, "password", r->in.password); password 4622 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) { password 4623 librpc/gen_ndr/ndr_svcctl.c ndr_print_string(ndr, "password", r->in.password); password 4152 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->password)); password 4173 librpc/gen_ndr/ndr_wkssvc.c if (r->password) { password 4174 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16))); password 4176 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16))); password 4177 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->password, ndr_charset_length(r->password, CH_UTF16), sizeof(uint16_t), CH_UTF16)); password 4223 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_ALLOC(ndr, r->password); password 4225 librpc/gen_ndr/ndr_wkssvc.c r->password = NULL; password 4269 librpc/gen_ndr/ndr_wkssvc.c if (r->password) { password 4271 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_SET_MEM_CTX(ndr, r->password, 0); password 4272 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->password)); password 4273 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->password)); password 4274 librpc/gen_ndr/ndr_wkssvc.c if (ndr_get_array_length(ndr, &r->password) > ndr_get_array_size(ndr, &r->password)) { password 4275 librpc/gen_ndr/ndr_wkssvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->password), ndr_get_array_length(ndr, &r->password)); password 4277 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t))); password 4278 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->password, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t), CH_UTF16)); password 4325 librpc/gen_ndr/ndr_wkssvc.c ndr_print_ptr(ndr, "password", r->password); password 4327 librpc/gen_ndr/ndr_wkssvc.c if (r->password) { password 4328 librpc/gen_ndr/ndr_wkssvc.c ndr_print_string(ndr, "password", r->password); password 4356 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->password)); password 4375 librpc/gen_ndr/ndr_wkssvc.c if (r->password) { password 4376 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16))); password 4378 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16))); password 4379 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->password, ndr_charset_length(r->password, CH_UTF16), sizeof(uint16_t), CH_UTF16)); password 4409 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_ALLOC(ndr, r->password); password 4411 librpc/gen_ndr/ndr_wkssvc.c r->password = NULL; password 4443 librpc/gen_ndr/ndr_wkssvc.c if (r->password) { password 4445 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_SET_MEM_CTX(ndr, r->password, 0); password 4446 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->password)); password 4447 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->password)); password 4448 librpc/gen_ndr/ndr_wkssvc.c if (ndr_get_array_length(ndr, &r->password) > ndr_get_array_size(ndr, &r->password)) { password 4449 librpc/gen_ndr/ndr_wkssvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->password), ndr_get_array_length(ndr, &r->password)); password 4451 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t))); password 4452 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->password, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t), CH_UTF16)); password 4475 librpc/gen_ndr/ndr_wkssvc.c ndr_print_ptr(ndr, "password", r->password); password 4477 librpc/gen_ndr/ndr_wkssvc.c if (r->password) { password 4478 librpc/gen_ndr/ndr_wkssvc.c ndr_print_string(ndr, "password", r->password); password 7734 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password)); password 7735 librpc/gen_ndr/ndr_wkssvc.c if (r->in.password) { password 7736 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16))); password 7738 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16))); password 7739 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.password, ndr_charset_length(r->in.password, CH_UTF16), sizeof(uint16_t), CH_UTF16)); password 7823 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_ALLOC(ndr, r->in.password); password 7825 librpc/gen_ndr/ndr_wkssvc.c r->in.password = NULL; password 7827 librpc/gen_ndr/ndr_wkssvc.c if (r->in.password) { password 7829 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0); password 7830 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password)); password 7831 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.password)); password 7832 librpc/gen_ndr/ndr_wkssvc.c if (ndr_get_array_length(ndr, &r->in.password) > ndr_get_array_size(ndr, &r->in.password)) { password 7833 librpc/gen_ndr/ndr_wkssvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.password), ndr_get_array_length(ndr, &r->in.password)); password 7835 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t))); password 7836 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.password, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t), CH_UTF16)); password 7879 librpc/gen_ndr/ndr_wkssvc.c ndr_print_ptr(ndr, "password", r->in.password); password 7881 librpc/gen_ndr/ndr_wkssvc.c if (r->in.password) { password 7882 librpc/gen_ndr/ndr_wkssvc.c ndr_print_string(ndr, "password", r->in.password); password 7914 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password)); password 7915 librpc/gen_ndr/ndr_wkssvc.c if (r->in.password) { password 7916 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16))); password 7918 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16))); password 7919 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.password, ndr_charset_length(r->in.password, CH_UTF16), sizeof(uint16_t), CH_UTF16)); password 7976 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_ALLOC(ndr, r->in.password); password 7978 librpc/gen_ndr/ndr_wkssvc.c r->in.password = NULL; password 7980 librpc/gen_ndr/ndr_wkssvc.c if (r->in.password) { password 7982 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0); password 7983 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password)); password 7984 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.password)); password 7985 librpc/gen_ndr/ndr_wkssvc.c if (ndr_get_array_length(ndr, &r->in.password) > ndr_get_array_size(ndr, &r->in.password)) { password 7986 librpc/gen_ndr/ndr_wkssvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.password), ndr_get_array_length(ndr, &r->in.password)); password 7988 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t))); password 7989 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.password, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t), CH_UTF16)); password 8022 librpc/gen_ndr/ndr_wkssvc.c ndr_print_ptr(ndr, "password", r->in.password); password 8024 librpc/gen_ndr/ndr_wkssvc.c if (r->in.password) { password 8025 librpc/gen_ndr/ndr_wkssvc.c ndr_print_string(ndr, "password", r->in.password); password 8064 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password)); password 8065 librpc/gen_ndr/ndr_wkssvc.c if (r->in.password) { password 8066 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16))); password 8068 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16))); password 8069 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.password, ndr_charset_length(r->in.password, CH_UTF16), sizeof(uint16_t), CH_UTF16)); password 8146 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_ALLOC(ndr, r->in.password); password 8148 librpc/gen_ndr/ndr_wkssvc.c r->in.password = NULL; password 8150 librpc/gen_ndr/ndr_wkssvc.c if (r->in.password) { password 8152 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0); password 8153 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password)); password 8154 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.password)); password 8155 librpc/gen_ndr/ndr_wkssvc.c if (ndr_get_array_length(ndr, &r->in.password) > ndr_get_array_size(ndr, &r->in.password)) { password 8156 librpc/gen_ndr/ndr_wkssvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.password), ndr_get_array_length(ndr, &r->in.password)); password 8158 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t))); password 8159 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.password, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t), CH_UTF16)); password 8198 librpc/gen_ndr/ndr_wkssvc.c ndr_print_ptr(ndr, "password", r->in.password); password 8200 librpc/gen_ndr/ndr_wkssvc.c if (r->in.password) { password 8201 librpc/gen_ndr/ndr_wkssvc.c ndr_print_string(ndr, "password", r->in.password); password 119 librpc/gen_ndr/netlogon.h struct netr_PasswordInfo *password;/* [unique,case(NetlogonInteractiveInformation)] */ password 1528 librpc/gen_ndr/netlogon.h struct samr_Password *password;/* [ref] */ password 1687 librpc/gen_ndr/netlogon.h struct samr_Password *password;/* [ref] */ password 567 librpc/gen_ndr/samr.h struct samr_CryptPassword password; password 571 librpc/gen_ndr/samr.h struct samr_CryptPassword password; password 581 librpc/gen_ndr/samr.h struct samr_CryptPasswordEx password; password 585 librpc/gen_ndr/samr.h struct samr_CryptPasswordEx password; password 796 librpc/gen_ndr/samr.h struct lsa_StringLarge password; password 805 librpc/gen_ndr/samr.h struct lsa_StringLarge password; password 1619 librpc/gen_ndr/samr.h struct samr_CryptPassword *password;/* [unique] */ password 2571 librpc/gen_ndr/srv_netlogon.c r->out.password = talloc_zero(r, struct samr_Password); password 2572 librpc/gen_ndr/srv_netlogon.c if (r->out.password == NULL) { password 3443 librpc/gen_ndr/srv_netlogon.c r->out.password = talloc_zero(r, struct samr_Password); password 3444 librpc/gen_ndr/srv_netlogon.c if (r->out.password == NULL) { password 4322 librpc/gen_ndr/srv_netlogon.c r->out.password = talloc_zero(mem_ctx, struct samr_Password); password 4323 librpc/gen_ndr/srv_netlogon.c if (r->out.password == NULL) { password 4447 librpc/gen_ndr/srv_netlogon.c r->out.password = talloc_zero(mem_ctx, struct samr_Password); password 4448 librpc/gen_ndr/srv_netlogon.c if (r->out.password == NULL) { password 300 librpc/gen_ndr/srvsvc.h const char *password;/* [unique,charset(UTF16)] */ password 328 librpc/gen_ndr/srvsvc.h const char *password;/* [unique,charset(UTF16)] */ password 444 librpc/gen_ndr/svcctl.h const char *password;/* [unique,charset(UTF16)] */ password 470 librpc/gen_ndr/svcctl.h uint8_t *password;/* [unique,size_is(password_size)] */ password 652 librpc/gen_ndr/svcctl.h const char *password;/* [unique,charset(UTF16)] */ password 677 librpc/gen_ndr/svcctl.h const char *password;/* [unique,charset(UTF16)] */ password 315 librpc/gen_ndr/wkssvc.h const char *password;/* [unique,charset(UTF16)] */ password 327 librpc/gen_ndr/wkssvc.h const char *password;/* [unique,charset(UTF16)] */ password 747 librpc/gen_ndr/wkssvc.h const char *password;/* [unique,charset(UTF16)] */ password 762 librpc/gen_ndr/wkssvc.h const char *password;/* [unique,charset(UTF16)] */ password 778 librpc/gen_ndr/wkssvc.h const char *password;/* [unique,charset(UTF16)] */ password 29 nsswitch/libwbclient/wbc_pam.c const char *password) password 38 nsswitch/libwbclient/wbc_pam.c params.password.plaintext = password; password 337 nsswitch/libwbclient/wbc_pam.c if (!params->password.plaintext) { password 365 nsswitch/libwbclient/wbc_pam.c params->password.plaintext, password 380 nsswitch/libwbclient/wbc_pam.c if (params->password.response.lm_length && password 381 nsswitch/libwbclient/wbc_pam.c !params->password.response.lm_data) { password 385 nsswitch/libwbclient/wbc_pam.c if (params->password.response.lm_length == 0 && password 386 nsswitch/libwbclient/wbc_pam.c params->password.response.lm_data) { password 391 nsswitch/libwbclient/wbc_pam.c if (params->password.response.nt_length && password 392 nsswitch/libwbclient/wbc_pam.c !params->password.response.nt_data) { password 396 nsswitch/libwbclient/wbc_pam.c if (params->password.response.nt_length == 0&& password 397 nsswitch/libwbclient/wbc_pam.c params->password.response.nt_data) { password 420 nsswitch/libwbclient/wbc_pam.c params->password.response.challenge, password 424 nsswitch/libwbclient/wbc_pam.c MIN(params->password.response.lm_length, password 426 nsswitch/libwbclient/wbc_pam.c if (params->password.response.lm_data) { password 428 nsswitch/libwbclient/wbc_pam.c params->password.response.lm_data, password 431 nsswitch/libwbclient/wbc_pam.c request.data.auth_crap.nt_resp_len = params->password.response.nt_length; password 432 nsswitch/libwbclient/wbc_pam.c if (params->password.response.nt_length > sizeof(request.data.auth_crap.nt_resp)) { password 434 nsswitch/libwbclient/wbc_pam.c request.extra_len = params->password.response.nt_length; password 441 nsswitch/libwbclient/wbc_pam.c params->password.response.nt_data, password 443 nsswitch/libwbclient/wbc_pam.c } else if (params->password.response.nt_data) { password 445 nsswitch/libwbclient/wbc_pam.c params->password.response.nt_data, password 939 nsswitch/libwbclient/wbc_pam.c if (!params->password) { password 949 nsswitch/libwbclient/wbc_pam.c params->password, password 223 nsswitch/libwbclient/wbclient.h } password; password 251 nsswitch/libwbclient/wbclient.h const char *password; password 1045 nsswitch/libwbclient/wbclient.h const char *password); password 1767 nsswitch/pam_winbind.c logon.password = pass; password 2598 nsswitch/pam_winbind.c const char *password; password 2665 nsswitch/pam_winbind.c &password); password 2679 nsswitch/pam_winbind.c real_username, password); password 2690 nsswitch/pam_winbind.c retval = winbind_auth_request(ctx, real_username, password, password 1184 nsswitch/wbinfo.c char *password; password 1200 nsswitch/wbinfo.c password = wbinfo_prompt_pass(NULL, username); password 1201 nsswitch/wbinfo.c fstrcpy(request.data.auth.pass, password); password 1202 nsswitch/wbinfo.c SAFE_FREE(password); password 1249 nsswitch/wbinfo.c char *password = NULL; password 1259 nsswitch/wbinfo.c password = SMB_STRDUP(p); password 1261 nsswitch/wbinfo.c password = wbinfo_prompt_pass(NULL, username); password 1266 nsswitch/wbinfo.c wbc_status = wbcAuthenticateUser(name, password); password 1280 nsswitch/wbinfo.c SAFE_FREE(password); password 1321 nsswitch/wbinfo.c generate_random_buffer(params.password.response.challenge, 8); password 1327 nsswitch/wbinfo.c server_chal = data_blob(params.password.response.challenge, 8); password 1347 nsswitch/wbinfo.c ok = SMBencrypt(pass, params.password.response.challenge, password 1354 nsswitch/wbinfo.c SMBNTencrypt(pass, params.password.response.challenge, password 1358 nsswitch/wbinfo.c params.password.response.nt_length = nt.length; password 1359 nsswitch/wbinfo.c params.password.response.nt_data = nt.data; password 1360 nsswitch/wbinfo.c params.password.response.lm_length = lm.length; password 1361 nsswitch/wbinfo.c params.password.response.lm_data = lm.data; password 1509 nsswitch/wbinfo.c const char *password; password 1521 nsswitch/wbinfo.c password = p+1; password 1525 nsswitch/wbinfo.c password = thepass; password 1527 nsswitch/wbinfo.c password = ""; password 1556 nsswitch/wbinfo.c if (password[0]) { password 1558 nsswitch/wbinfo.c if (!secrets_store(SECRETS_AUTH_PASSWORD, password, password 1559 nsswitch/wbinfo.c strlen(password) + 1)) { password 1572 nsswitch/wbinfo.c char *user, *domain, *password; password 1576 nsswitch/wbinfo.c secrets_fetch_ipc_userpass(&user, &domain, &password); password 1578 nsswitch/wbinfo.c if ((!user || !*user) && (!domain || !*domain ) && (!password || !*password)){ password 1582 nsswitch/wbinfo.c SAFE_FREE(password); password 1590 nsswitch/wbinfo.c user, password ? "%" : "", password ? password : ""); password 1594 nsswitch/wbinfo.c SAFE_FREE(password); password 30 source3/auth/auth_unix.c static bool update_smbpassword_file(const char *user, const char *password) password 58 source3/auth/auth_unix.c if (!pdb_set_plaintext_passwd (sampass, password)) { password 77 source3/auth/auth_wbc.c params.password.plaintext = (char *)user_info->plaintext_password.data; password 83 source3/auth/auth_wbc.c memcpy(params.password.response.challenge, password 85 source3/auth/auth_wbc.c sizeof(params.password.response.challenge)); password 87 source3/auth/auth_wbc.c params.password.response.nt_length = user_info->nt_resp.length; password 88 source3/auth/auth_wbc.c params.password.response.nt_data = user_info->nt_resp.data; password 89 source3/auth/auth_wbc.c params.password.response.lm_length = user_info->lm_resp.length; password 90 source3/auth/auth_wbc.c params.password.response.lm_data = user_info->lm_resp.data; password 69 source3/auth/auth_winbind.c memcpy(params.password.response.challenge, password 71 source3/auth/auth_winbind.c sizeof(params.password.response.challenge)); password 73 source3/auth/auth_winbind.c params.password.response.nt_length = user_info->nt_resp.length; password 74 source3/auth/auth_winbind.c params.password.response.nt_data = user_info->nt_resp.data; password 75 source3/auth/auth_winbind.c params.password.response.lm_length = user_info->lm_resp.length; password 76 source3/auth/auth_winbind.c params.password.response.lm_data = user_info->lm_resp.data; password 804 source3/auth/pampass.c NTSTATUS smb_pam_passcheck(const char * user, const char * password) password 816 source3/auth/pampass.c if ((pconv = smb_setup_pam_conv(smb_pam_conv, user, password, NULL)) == NULL) password 94 source3/auth/pass_check.c static bool afs_auth(char *user, char *password) password 105 source3/auth/pass_check.c password, 0, /* lifetime, default */ password 143 source3/auth/pass_check.c static bool dfs_auth(char *user, char *password) password 167 source3/auth/pass_check.c if (strcmp((char *)crypt(password, get_this_salt()), get_this_crypted())) password 324 source3/auth/pass_check.c passwd_rec.key.tagged_union.plain = (idl_char *) password; password 435 source3/auth/pass_check.c static int linux_bigcrypt(char *password, char *salt1, char *crypted) password 444 source3/auth/pass_check.c for (i = strlen(password); i > 0; i -= LINUX_PASSWORD_SEG_CHARS) { password 445 source3/auth/pass_check.c char *p = crypt(password, salt) + 2; password 448 source3/auth/pass_check.c password += LINUX_PASSWORD_SEG_CHARS; password 460 source3/auth/pass_check.c static char *osf1_bigcrypt(char *password, char *salt1) password 464 source3/auth/pass_check.c char *p2 = password; password 467 source3/auth/pass_check.c int parts = strlen(password) / AUTH_CLEARTEXT_SEG_CHARS; password 468 source3/auth/pass_check.c if (strlen(password) % AUTH_CLEARTEXT_SEG_CHARS) password 543 source3/auth/pass_check.c static NTSTATUS password_check(const char *password) password 546 source3/auth/pass_check.c return smb_pam_passcheck(get_this_user(), password); password 552 source3/auth/pass_check.c if (afs_auth(get_this_user(), password)) password 557 source3/auth/pass_check.c if (dfs_auth(get_this_user(), password)) password 563 source3/auth/pass_check.c ret = (strcmp(osf1_bigcrypt(password, get_this_salt()), password 568 source3/auth/pass_check.c ret = (strcmp((char *)crypt(password, get_this_salt()), get_this_crypted()) == 0); password 579 source3/auth/pass_check.c ret = (strcmp((char *)crypt16(password, get_this_salt()), get_this_crypted()) == 0); password 589 source3/auth/pass_check.c ret = (linux_bigcrypt(password, get_this_salt(), get_this_crypted())); password 606 source3/auth/pass_check.c if (strcmp(bigcrypt(password, get_this_salt()), get_this_crypted()) == 0) password 609 source3/auth/pass_check.c ret = (strcmp((char *)crypt(password, get_this_salt()), get_this_crypted()) == 0); password 618 source3/auth/pass_check.c ret = (strcmp(bigcrypt(password, get_this_salt()), get_this_crypted()) == 0); password 630 source3/auth/pass_check.c ret = (strcmp((char *)crypt(password, get_this_salt()), get_this_crypted()) == 0); password 650 source3/auth/pass_check.c NTSTATUS pass_check(const struct passwd *pass, const char *user, const char *password, password 659 source3/auth/pass_check.c DEBUG(100, ("checking user=[%s] pass=[%s]\n", user, password)); password 662 source3/auth/pass_check.c if (!password) password 665 source3/auth/pass_check.c if (((!*password) || (!pwlen)) && !lp_null_passwords()) password 810 source3/auth/pass_check.c if (!*password) { password 821 source3/auth/pass_check.c nt_status = password_check(password); password 824 source3/auth/pass_check.c fn(user, password); password 839 source3/auth/pass_check.c if (strhasupper(password) && strhaslower(password)) { password 844 source3/auth/pass_check.c pass2 = talloc_strdup(talloc_tos(), password); password 2253 source3/client/client.c char *password = NULL; password 2265 source3/client/client.c if (!next_token_talloc(ctx, &cmd_ptr,&password,NULL)) { password 2272 source3/client/client.c password, password 187 source3/client/mount.cifs.c struct passwd *password = getpwuid(getuid()); password 189 source3/client/mount.cifs.c if (password) { password 190 source3/client/mount.cifs.c username = password->pw_name; password 84 source3/client/smbspool.c *password; /* Password */ password 188 source3/client/smbspool.c password = uri_unescape_alloc(tmp2); password 190 source3/client/smbspool.c password = null_str; password 198 source3/client/smbspool.c if ((password = getenv("AUTH_PASSWORD")) == NULL) { password 199 source3/client/smbspool.c password = null_str; password 262 source3/client/smbspool.c username, password, argv[2], &need_auth); password 392 source3/client/smbspool.c const char *password, password 414 source3/client/smbspool.c if (!password) { password 420 source3/client/smbspool.c password, strlen(password) + 1, password 421 source3/client/smbspool.c password, strlen(password) + 1, password 435 source3/client/smbspool.c nt_status = cli_tcon_andx(cli, share, "?????", password, password 436 source3/client/smbspool.c strlen(password) + 1); password 454 source3/client/smbspool.c password, password 477 source3/client/smbspool.c const char *password, /* I - Password */ password 500 source3/client/smbspool.c password, workgroup, share, 0, need_auth); password 596 source3/client/tree.c char *password, int pwmaxlen) password 600 source3/client/tree.c strncpy(password, "test", pwmaxlen); password 64 source3/include/ads.h char *password; password 194 source3/include/client.h char *password; /* Can be null to force use of zero NTLMSSP session key. */ password 938 source3/include/includes.h int create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype, bool no_salt); password 1025 source3/include/includes.h krb5_data password, password 2682 source3/include/libsmbclient.h const char *password, password 2697 source3/include/libsmbclient.h const char *password); password 50 source3/include/popt_common.h char *password; password 162 source3/include/proto.h NTSTATUS smb_pam_passcheck(const char * user, const char * password); password 171 source3/include/proto.h NTSTATUS pass_check(const struct passwd *pass, const char *user, const char *password, password 1087 source3/include/proto.h const char *password); password 1764 source3/include/proto.h const char *password, password 1783 source3/include/proto.h const char *password, password 1823 source3/include/proto.h const char *password); password 2335 source3/include/proto.h const char *password, int flags, password 2358 source3/include/proto.h const char *password, password 2425 source3/include/proto.h NTSTATUS cli_set_password(struct cli_state *cli, const char *password); password 2426 source3/include/proto.h NTSTATUS cli_init_creds(struct cli_state *cli, const char *username, const char *domain, const char *password); password 2590 source3/include/proto.h const char *password, password 3109 source3/include/proto.h NTSTATUS ntlmssp_set_password(NTLMSSP_STATE *ntlmssp_state, const char *password) ; password 3258 source3/include/proto.h bool SMBNTLMv2encrypt(const char *user, const char *domain, const char *password, password 3263 source3/include/proto.h bool encode_pw_buffer(uint8 buffer[516], const char *password, int string_flags); password 4526 source3/include/proto.h bool pdb_set_plaintext_pw_only(struct samu *sampass, const char *password, enum pdb_value_state flag); password 4707 source3/include/proto.h void secrets_fetch_ipc_userpass(char **username, char **domain, char **password); password 5222 source3/include/proto.h const char *password, password 5284 source3/include/proto.h const char *password, password 5294 source3/include/proto.h const char *password, password 5319 source3/include/proto.h const char *password, password 5327 source3/include/proto.h const char *password, password 5346 source3/include/proto.h const char *password, password 5359 source3/include/proto.h const char *password, password 6730 source3/include/proto.h bool authorise_login(int snum, fstring user, DATA_BLOB password, password 6990 source3/include/proto.h connection_struct *make_connection(const char *service_in, DATA_BLOB password, password 502 source3/include/rap.h char password[RAP_SPASSWD_LEN]; password 798 source3/lib/ldb/ldb_ildap/ldb_ildap.c const char *password = cli_credentials_get_password(creds); password 799 source3/lib/ldb/ldb_ildap/ldb_ildap.c status = ldap_bind_simple(ildb->ldap, bind_dn, password); password 46 source3/lib/netapi/cm.c if (ctx->password) { password 47 source3/lib/netapi/cm.c set_cmdline_auth_info_password(auth_info, ctx->password); password 53 source3/lib/netapi/cm.c ctx->password && ctx->password[0] && password 66 source3/lib/netapi/cm.c cli_set_password(cli_ipc, ctx->password); password 76 source3/lib/netapi/examples/join/getjoinableous.c ctx->password, password 41 source3/lib/netapi/examples/join/netdomjoin.c const char *password = NULL; password 55 source3/lib/netapi/examples/join/netdomjoin.c { "passwordd", 0, POPT_ARG_STRING, &password, 'U', "Domain admin password", "PASSWORD" }, password 89 source3/lib/netapi/examples/join/netdomjoin.c password, password 74 source3/lib/netapi/examples/join/rename_machine.c ctx->password, password 69 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c char *password; password 139 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c SAFE_FREE(state->password); password 155 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c SAFE_FREE(state->password); password 171 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c SAFE_FREE(s->password); password 390 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c SAFE_FREE(state->password); password 391 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c state->password = strdup(entry_text); password 411 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c SAFE_FREE(state->password); password 412 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c state->password = strdup(entry_text); password 424 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c SAFE_FREE(state->password); password 484 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c if (!state->account || !state->password) { password 491 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c if (!state->account || !state->password) { password 499 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c state->password, password 714 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c if (!state->account || !state->password) { password 721 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c if (!state->account || !state->password) { password 729 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c state->password, password 793 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c if (!state->account || !state->password) { password 800 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c if (!state->account || !state->password) { password 813 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c debug("with %s ", state->password); password 822 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c state->password, password 1069 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c if (!state->account || !state->password) { password 1076 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c if (!state->account || !state->password) { password 1084 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c state->password, password 36 source3/lib/netapi/examples/user/user_add.c const char *password = NULL; password 76 source3/lib/netapi/examples/user/user_add.c password = poptGetArg(pc); password 81 source3/lib/netapi/examples/user/user_add.c info1.usri1_password = password; password 77 source3/lib/netapi/joindomain.c if (r->in.password) { password 78 source3/lib/netapi/joindomain.c j->in.admin_password = talloc_strdup(mem_ctx, r->in.password); password 114 source3/lib/netapi/joindomain.c if (r->in.password) { password 116 source3/lib/netapi/joindomain.c r->in.password, password 199 source3/lib/netapi/joindomain.c if (r->in.password) { password 200 source3/lib/netapi/joindomain.c u->in.admin_password = talloc_strdup(mem_ctx, r->in.password); password 240 source3/lib/netapi/joindomain.c if (r->in.password) { password 242 source3/lib/netapi/joindomain.c r->in.password, password 370 source3/lib/netapi/joindomain.c SAFE_FREE(ads->auth.password); password 371 source3/lib/netapi/joindomain.c if (r->in.password) { password 372 source3/lib/netapi/joindomain.c ads->auth.password = SMB_STRDUP(r->in.password); password 373 source3/lib/netapi/joindomain.c } else if (ctx->password) { password 374 source3/lib/netapi/joindomain.c ads->auth.password = SMB_STRDUP(ctx->password); password 416 source3/lib/netapi/joindomain.c if (r->in.password) { password 418 source3/lib/netapi/joindomain.c r->in.password, password 458 source3/lib/netapi/joindomain.c if (r->in.password) { password 460 source3/lib/netapi/joindomain.c r->in.password, password 35 source3/lib/netapi/libnetapi.c const char * password /* [in] [unique] */, password 53 source3/lib/netapi/libnetapi.c r.in.password = password; password 83 source3/lib/netapi/libnetapi.c const char * password /* [in] [unique] */, password 99 source3/lib/netapi/libnetapi.c r.in.password = password; password 174 source3/lib/netapi/libnetapi.c const char * password /* [in] [unique] */, password 192 source3/lib/netapi/libnetapi.c r.in.password = password; password 224 source3/lib/netapi/libnetapi.c const char * password /* [in] */, password 241 source3/lib/netapi/libnetapi.c r.in.password = password; password 7 source3/lib/netapi/libnetapi.h const char * password /* [in] [unique] */, password 15 source3/lib/netapi/libnetapi.h const char * password /* [in] [unique] */, password 31 source3/lib/netapi/libnetapi.h const char * password /* [in] [unique] */, password 41 source3/lib/netapi/libnetapi.h const char * password /* [in] */, password 224 source3/lib/netapi/netapi.c const char *password) password 226 source3/lib/netapi/netapi.c TALLOC_FREE(ctx->password); password 227 source3/lib/netapi/netapi.c ctx->password = talloc_strdup(ctx, password); password 228 source3/lib/netapi/netapi.c if (!ctx->password) { password 1270 source3/lib/netapi/netapi.h char *password; password 1309 source3/lib/netapi/netapi.h const char *password); password 1398 source3/lib/netapi/netapi.h const char * password /* [in] */, password 1417 source3/lib/netapi/netapi.h const char * password /* [in] */, password 1461 source3/lib/netapi/netapi.h const char * password /* [in] */, password 1485 source3/lib/netapi/netapi.h const char * password /* [in] */, password 48 source3/lib/netapi/netapi_private.h NET_API_STATUS libnetapi_get_password(struct libnetapi_ctx *ctx, char **password); password 85 source3/lib/netapi/share.c i2.shi2_passwd = talloc_strdup(mem_ctx, s2->password); password 153 source3/lib/netapi/share.c s2->password = i2->shi2_passwd; password 313 source3/lib/netapi/user.c &user_info.info25.password); password 326 source3/lib/netapi/user.c &user_info.info23.password); password 313 source3/lib/util.c if (!auth_info->password) { password 316 source3/lib/util.c return auth_info->password; password 320 source3/lib/util.c const char *password) password 322 source3/lib/util.c TALLOC_FREE(auth_info->password); password 323 source3/lib/util.c if (password == NULL) { password 324 source3/lib/util.c password = ""; password 326 source3/lib/util.c auth_info->password = talloc_strdup(auth_info, password); password 327 source3/lib/util.c if (!auth_info->password) { password 426 source3/lib/util.c result->password = talloc_strdup( password 428 source3/lib/util.c if ((result->username == NULL) || (result->password == NULL)) { password 171 source3/libads/ads_struct.c SAFE_FREE((*ads)->auth.password); password 156 source3/libads/kerberos.c const char *password, password 222 source3/libads/kerberos.c if ((code = krb5_get_init_creds_password(ctx, &my_creds, me, CONST_DISCARD(char *,password), password 223 source3/libads/kerberos.c kerb_prompter, CONST_DISCARD(char *,password), password 321 source3/libads/kerberos.c if (!ads->auth.password) { password 326 source3/libads/kerberos.c ret = kerberos_kinit_password_ext(s, ads->auth.password, ads->auth.time_offset, password 644 source3/libads/kerberos.c const char *password, password 649 source3/libads/kerberos.c password, password 40 source3/libads/kerberos_keytab.c krb5_data password, password 166 source3/libads/kerberos_keytab.c if (create_kerberos_key_from_string(context, princ, &password, keyp, enctypes[i], no_salt)) { password 213 source3/libads/kerberos_keytab.c krb5_data password) password 220 source3/libads/kerberos_keytab.c password, password 234 source3/libads/kerberos_keytab.c krb5_data password; password 272 source3/libads/kerberos_keytab.c ZERO_STRUCT(password); password 273 source3/libads/kerberos_keytab.c password.data = password_s; password 274 source3/libads/kerberos_keytab.c password.length = strlen(password_s); password 350 source3/libads/kerberos_keytab.c ret = smb_krb5_kt_add_entry( context, keytab, kvno, princ_s, enctypes, password ); password 359 source3/libads/kerberos_keytab.c ret = smb_krb5_kt_add_entry( context, keytab, kvno, short_princ_s, enctypes, password ); password 310 source3/libads/kerberos_verify.c krb5_data password; password 340 source3/libads/kerberos_verify.c password.data = password_s; password 341 source3/libads/kerberos_verify.c password.length = strlen(password_s); password 357 source3/libads/kerberos_verify.c if (create_kerberos_key_from_string(context, host_princ, &password, key, enctypes[i], false)) { password 60 source3/libads/krb5_setpw.c static DATA_BLOB encode_krb5_setpw(const char *principal, const char *password) password 100 source3/libads/krb5_setpw.c asn1_write_OctetString(req, password, strlen(password)); password 729 source3/libads/krb5_setpw.c char *chpw_princ = NULL, *password; password 759 source3/libads/krb5_setpw.c password = SMB_STRDUP(oldpw); password 760 source3/libads/krb5_setpw.c ret = krb5_get_init_creds_password(context, &creds, princ, password, password 764 source3/libads/krb5_setpw.c SAFE_FREE(password); password 818 source3/libads/krb5_setpw.c const char *password) password 833 source3/libads/krb5_setpw.c password, ads->auth.time_offset); password 707 source3/libads/ldap.c status = ADS_ERROR(ldap_simple_bind_s(ads->ldap.ld, ads->auth.user_name, ads->auth.password)); password 57 source3/libads/ndr.c ndr_print_string(ndr, "password", r->auth.password); password 146 source3/libads/sasl.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_password(ntlmssp_state, ads->auth.password))) { password 26 source3/libads/util.c char *password; password 31 source3/libads/util.c if ((password = secrets_fetch_machine_password(lp_workgroup(), NULL, &sec_channel_type)) == NULL) { password 38 source3/libads/util.c ret = kerberos_set_password(ads->auth.kdc_server, host_principal, password, host_principal, new_password, ads->auth.time_offset); password 51 source3/libads/util.c SAFE_FREE(password); password 666 source3/libgpo/gpo_util.c ads->auth.password, password 55 source3/libnet/libnet_dssync_keytab.c ndr_err = ndr_pull_struct_blob(&entry->password, old_utdv, password 389 source3/libnet/libnet_dssync_keytab.c entry->password.data, password 390 source3/libnet/libnet_dssync_keytab.c entry->password.length); password 98 source3/libnet/libnet_join.c const char *password, password 116 source3/libnet/libnet_join.c if (password) { password 117 source3/libnet/libnet_join.c SAFE_FREE(my_ads->auth.password); password 118 source3/libnet/libnet_join.c my_ads->auth.password = SMB_STRDUP(password); password 933 source3/libnet/libnet_join.c user_info.info26.password = crypt_pwd_ex; password 949 source3/libnet/libnet_join.c user_info.info24.password = crypt_pwd; password 210 source3/libnet/libnet_keytab.c krb5_data password) password 238 source3/libnet/libnet_keytab.c &password, keyp, enctype, true)) password 289 source3/libnet/libnet_keytab.c krb5_data password; password 291 source3/libnet/libnet_keytab.c ZERO_STRUCT(password); password 292 source3/libnet/libnet_keytab.c password.data = (char *)entry->password.data; password 293 source3/libnet/libnet_keytab.c password.length = entry->password.length; password 300 source3/libnet/libnet_keytab.c password); password 373 source3/libnet/libnet_keytab.c entry->password = data_blob_talloc(entry, KRB5_KEY_DATA(keyp), password 375 source3/libnet/libnet_keytab.c if (!entry->password.data) { password 421 source3/libnet/libnet_keytab.c entry.password = blob; password 424 source3/libnet/libnet_keytab.c NT_STATUS_HAVE_NO_MEMORY(entry.password.data); password 25 source3/libnet/libnet_keytab.h DATA_BLOB password; password 64 source3/libnet/libnet_samsync.h const char *password; password 32 source3/libnet/libnet_samsync_keytab.c const char *password, password 56 source3/libnet/libnet_samsync_keytab.c ads->auth.password = SMB_STRDUP(password); password 130 source3/libnet/libnet_samsync_keytab.c ctx->password, password 143 source3/libnet/libnet_samsync_keytab.c if (entry && (entry->password.length == 8)) { password 144 source3/libnet/libnet_samsync_keytab.c old_sequence_num = BVAL(entry->password.data, 0); password 225 source3/libnet/libnet_samsync_keytab.c if (entry && (entry->password.length == 8)) { password 226 source3/libnet/libnet_samsync_keytab.c old_sequence_num = BVAL(entry->password.data, 0); password 1305 source3/librpc/gen_ndr/libnetapi.h const char * password;/* [unique] */ password 1320 source3/librpc/gen_ndr/libnetapi.h const char * password;/* [unique] */ password 1350 source3/librpc/gen_ndr/libnetapi.h const char * password;/* [unique] */ password 1367 source3/librpc/gen_ndr/libnetapi.h const char * password; password 5883 source3/librpc/gen_ndr/ndr_libnetapi.c ndr_print_ptr(ndr, "password", r->in.password); password 5885 source3/librpc/gen_ndr/ndr_libnetapi.c if (r->in.password) { password 5886 source3/librpc/gen_ndr/ndr_libnetapi.c ndr_print_string(ndr, "password", r->in.password); password 5923 source3/librpc/gen_ndr/ndr_libnetapi.c ndr_print_ptr(ndr, "password", r->in.password); password 5925 source3/librpc/gen_ndr/ndr_libnetapi.c if (r->in.password) { password 5926 source3/librpc/gen_ndr/ndr_libnetapi.c ndr_print_string(ndr, "password", r->in.password); password 6007 source3/librpc/gen_ndr/ndr_libnetapi.c ndr_print_ptr(ndr, "password", r->in.password); password 6009 source3/librpc/gen_ndr/ndr_libnetapi.c if (r->in.password) { password 6010 source3/librpc/gen_ndr/ndr_libnetapi.c ndr_print_string(ndr, "password", r->in.password); password 6055 source3/librpc/gen_ndr/ndr_libnetapi.c ndr_print_string(ndr, "password", r->in.password); password 2103 source3/libsmb/cliconnect.c const char *password, int flags, password 2109 source3/libsmb/cliconnect.c int pw_len = password ? strlen(password)+1 : 0; password 2113 source3/libsmb/cliconnect.c if (password == NULL) { password 2114 source3/libsmb/cliconnect.c password = ""; password 2125 source3/libsmb/cliconnect.c nt_status = cli_session_setup(cli, user, password, pw_len, password, password 2146 source3/libsmb/cliconnect.c nt_status = cli_tcon_andx(cli, service, service_type, password, password 2158 source3/libsmb/cliconnect.c nt_status = cli_init_creds(cli, user, domain, password); password 2294 source3/libsmb/cliconnect.c user_info->password ? user_info->password : "", password 42 source3/libsmb/clidfs.c const char *password, password 51 source3/libsmb/clidfs.c const char *password, password 57 source3/libsmb/clidfs.c password, password 104 source3/libsmb/clidfs.c const char *password; password 197 source3/libsmb/clidfs.c password = get_cmdline_auth_info_password(auth_info); password 200 source3/libsmb/clidfs.c password, strlen(password), password 201 source3/libsmb/clidfs.c password, strlen(password), password 205 source3/libsmb/clidfs.c if (password[0] || !username[0] || password 221 source3/libsmb/clidfs.c status = cli_init_creds(c, username, lp_workgroup(), password); password 251 source3/libsmb/clidfs.c password, password 263 source3/libsmb/clidfs.c password, strlen(password)+1); password 273 source3/libsmb/clidfs.c password, password 994 source3/libsmb/clidfs.c const char *password, password 1033 source3/libsmb/clidfs.c password, password 435 source3/libsmb/clientgen.c NTSTATUS cli_set_password(struct cli_state *cli, const char *password) password 437 source3/libsmb/clientgen.c TALLOC_FREE(cli->password); password 440 source3/libsmb/clientgen.c if (password) { password 441 source3/libsmb/clientgen.c cli->password = talloc_strdup(cli, password); password 442 source3/libsmb/clientgen.c if (cli->password == NULL) { password 447 source3/libsmb/clientgen.c cli->password = NULL; password 457 source3/libsmb/clientgen.c NTSTATUS cli_init_creds(struct cli_state *cli, const char *username, const char *domain, const char *password) password 469 source3/libsmb/clientgen.c return cli_set_password(cli, password); password 786 source3/libsmb/clifsinfo.c const char *password, password 809 source3/libsmb/clifsinfo.c password, password 218 source3/libsmb/clikrb5.c krb5_data *password, password 232 source3/libsmb/clikrb5.c ret = krb5_string_to_key(context, &eblock, key, password, &salt); password 240 source3/libsmb/clikrb5.c krb5_data *password, password 253 source3/libsmb/clikrb5.c ret = krb5_string_to_key_salt(context, enctype, (const char *)password->data, salt, key); password 264 source3/libsmb/clikrb5.c krb5_data *password, password 277 source3/libsmb/clikrb5.c KRB5_KEY_DATA(key) = (KRB5_KEY_DATA_CAST *)SMB_MALLOC(password->length); password 281 source3/libsmb/clikrb5.c memcpy(KRB5_KEY_DATA(key), password->data, password->length); password 282 source3/libsmb/clikrb5.c KRB5_KEY_LENGTH(key) = password->length; password 287 source3/libsmb/clikrb5.c ret = create_kerberos_key_from_string_direct(context, salt_princ ? salt_princ : host_princ, password, key, enctype); password 1377 source3/libsmb/clirap2.c PUTSTRINGF(p, sinfo->password, RAP_SPASSWD_LEN); password 640 source3/libsmb/libsmb_context.c const char *password, password 650 source3/libsmb/libsmb_context.c const char *password) password 669 source3/libsmb/libsmb_context.c if (! password) { password 670 source3/libsmb/libsmb_context.c password = ""; password 693 source3/libsmb/libsmb_context.c set_cmdline_auth_info_password(auth_info, password); password 359 source3/libsmb/libsmb_dir.c char *password = NULL; password 393 source3/libsmb/libsmb_dir.c &password, password 466 source3/libsmb/libsmb_dir.c u_info.password = talloc_strdup(frame,password); password 467 source3/libsmb/libsmb_dir.c if (!u_info.username || !u_info.password) { password 555 source3/libsmb/libsmb_dir.c &workgroup, &user, &password); password 610 source3/libsmb/libsmb_dir.c &workgroup, &user, &password); password 660 source3/libsmb/libsmb_dir.c &user, &password); password 696 source3/libsmb/libsmb_dir.c &user, &password); password 756 source3/libsmb/libsmb_dir.c &workgroup, &user, &password); password 1123 source3/libsmb/libsmb_dir.c char *password = NULL; password 1152 source3/libsmb/libsmb_dir.c &password, password 1169 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password); password 1231 source3/libsmb/libsmb_dir.c char *password = NULL; password 1260 source3/libsmb/libsmb_dir.c &password, password 1277 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password); password 1515 source3/libsmb/libsmb_dir.c char *password = NULL; password 1546 source3/libsmb/libsmb_dir.c &password, password 1563 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password); password 1606 source3/libsmb/libsmb_dir.c char *password = NULL; password 1662 source3/libsmb/libsmb_dir.c &password, password 1679 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password); password 1707 source3/libsmb/libsmb_dir.c char *password = NULL; password 1738 source3/libsmb/libsmb_dir.c &password, password 1755 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password); password 43 source3/libsmb/libsmb_file.c char *password = NULL; password 77 source3/libsmb/libsmb_file.c &password, password 94 source3/libsmb/libsmb_file.c server, share, &workgroup, &user, &password); password 238 source3/libsmb/libsmb_file.c char *server = NULL, *share = NULL, *user = NULL, *password = NULL; password 292 source3/libsmb/libsmb_file.c &password, password 341 source3/libsmb/libsmb_file.c char *server = NULL, *share = NULL, *user = NULL, *password = NULL; password 383 source3/libsmb/libsmb_file.c &password, password 426 source3/libsmb/libsmb_file.c char *server = NULL, *share = NULL, *user = NULL, *password = NULL; password 460 source3/libsmb/libsmb_file.c &password, password 710 source3/libsmb/libsmb_file.c char *server = NULL, *share = NULL, *user = NULL, *password = NULL; password 758 source3/libsmb/libsmb_file.c &password, password 817 source3/libsmb/libsmb_file.c char *password = NULL; password 851 source3/libsmb/libsmb_file.c &password, password 41 source3/libsmb/libsmb_printjob.c char *password = NULL; password 68 source3/libsmb/libsmb_printjob.c &password, password 189 source3/libsmb/libsmb_printjob.c char *password = NULL; password 217 source3/libsmb/libsmb_printjob.c &password, password 234 source3/libsmb/libsmb_printjob.c server, share, &workgroup, &user, &password); password 266 source3/libsmb/libsmb_printjob.c char *password = NULL; password 295 source3/libsmb/libsmb_printjob.c &password, password 312 source3/libsmb/libsmb_printjob.c server, share, &workgroup, &user, &password); password 103 source3/libsmb/libsmb_server.c fstring password; password 108 source3/libsmb/libsmb_server.c strlcpy(password, *pp_password, sizeof(password)); password 118 source3/libsmb/libsmb_server.c password, sizeof(password)); password 125 source3/libsmb/libsmb_server.c password, sizeof(password)); password 134 source3/libsmb/libsmb_server.c *pp_password = talloc_strdup(ctx, password); password 118 source3/libsmb/libsmb_stat.c char *password = NULL; password 152 source3/libsmb/libsmb_stat.c &password, password 169 source3/libsmb/libsmb_stat.c server, share, &workgroup, &user, &password); password 218 source3/libsmb/libsmb_stat.c char *password = NULL; password 252 source3/libsmb/libsmb_stat.c &password, password 1713 source3/libsmb/libsmb_xattr.c char *password = NULL; password 1749 source3/libsmb/libsmb_xattr.c &password, password 1766 source3/libsmb/libsmb_xattr.c server, share, &workgroup, &user, &password); password 1774 source3/libsmb/libsmb_xattr.c &workgroup, &user, &password); password 2009 source3/libsmb/libsmb_xattr.c char *password = NULL; password 2043 source3/libsmb/libsmb_xattr.c &password, password 2060 source3/libsmb/libsmb_xattr.c server, share, &workgroup, &user, &password); password 2068 source3/libsmb/libsmb_xattr.c &workgroup, &user, &password); password 2151 source3/libsmb/libsmb_xattr.c char *password = NULL; password 2179 source3/libsmb/libsmb_xattr.c &password, password 2196 source3/libsmb/libsmb_xattr.c server, share, &workgroup, &user, &password); password 2204 source3/libsmb/libsmb_xattr.c &workgroup, &user, &password); password 180 source3/libsmb/ntlmssp.c NTSTATUS ntlmssp_set_password(NTLMSSP_STATE *ntlmssp_state, const char *password) password 182 source3/libsmb/ntlmssp.c if (!password) { password 189 source3/libsmb/ntlmssp.c E_deshash(password, lm_hash); password 190 source3/libsmb/ntlmssp.c E_md4hash(password, nt_hash); password 474 source3/libsmb/smbencrypt.c bool SMBNTLMv2encrypt(const char *user, const char *domain, const char *password, password 481 source3/libsmb/smbencrypt.c E_md4hash(password, nt_hash); password 494 source3/libsmb/smbencrypt.c bool encode_pw_buffer(uint8 buffer[516], const char *password, int string_flags) password 503 source3/libsmb/smbencrypt.c password, password 896 source3/passdb/pdb_get_set.c bool pdb_set_plaintext_pw_only(struct samu *sampass, const char *password, enum pdb_value_state flag) password 898 source3/passdb/pdb_get_set.c if (password) { password 902 source3/passdb/pdb_get_set.c sampass->plaintext_pw = talloc_strdup(sampass, password); password 46 source3/passdb/pdb_nds.c const char *password, password 64 source3/passdb/pdb_nds.c if (password != NULL) password 66 source3/passdb/pdb_nds.c utf8PwdSize = strlen(password)+1; password 67 source3/passdb/pdb_nds.c utf8PwdPtr = password; password 83 source3/passdb/pdb_nds.c if (password != NULL && password2 != NULL) password 88 source3/passdb/pdb_nds.c else if (password != NULL) password 1107 source3/passdb/secrets.c void secrets_fetch_ipc_userpass(char **username, char **domain, char **password) password 1111 source3/passdb/secrets.c *password = (char *)secrets_fetch(SECRETS_AUTH_PASSWORD, NULL); password 1118 source3/passdb/secrets.c if (!*password || !**password) password 1119 source3/passdb/secrets.c *password = smb_xstrdup(""); password 1128 source3/passdb/secrets.c *password = smb_xstrdup(""); password 3340 source3/printing/nt_printing.c SAFE_FREE(ads->auth.password); password 3341 source3/printing/nt_printing.c ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), password 3382 source3/printing/nt_printing.c SAFE_FREE(ads->auth.password); password 3383 source3/printing/nt_printing.c ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), password 142 source3/rpc_client/cli_netlogon.c const char *password, password 193 source3/rpc_client/cli_netlogon.c nt_lm_owf_gen(password, nt_owf_user_pwd, lm_owf_user_pwd); password 230 source3/rpc_client/cli_netlogon.c logon->password = password_info; password 252 source3/rpc_client/cli_netlogon.c SMBencrypt(password, chal, local_lm_response); password 253 source3/rpc_client/cli_netlogon.c SMBNTencrypt(password, chal, local_nt_response); password 3010 source3/rpc_client/cli_pipe.c E_md4hash(cli->password ? cli->password : "", nt_hash); password 3049 source3/rpc_client/cli_pipe.c const char *password, password 3087 source3/rpc_client/cli_pipe.c status = ntlmssp_set_password(result->a_u.ntlmssp_state, password); password 3164 source3/rpc_client/cli_pipe.c const char *password, password 3170 source3/rpc_client/cli_pipe.c if ((username != NULL) && (password != NULL)) { password 3171 source3/rpc_client/cli_pipe.c int ret = kerberos_kinit_password(username, password, 0, NULL); password 3742 source3/rpc_client/cli_pipe.c const char *password, password 3756 source3/rpc_client/cli_pipe.c password, &auth); password 3795 source3/rpc_client/cli_pipe.c const char *password, password 3805 source3/rpc_client/cli_pipe.c password, password 3820 source3/rpc_client/cli_pipe.c const char *password, password 3830 source3/rpc_client/cli_pipe.c password, password 3985 source3/rpc_client/cli_pipe.c const char *password, password 3995 source3/rpc_client/cli_pipe.c domain, username, password, &netlogon_pipe); password 4023 source3/rpc_client/cli_pipe.c const char *password, password 4032 source3/rpc_client/cli_pipe.c cli, domain, username, password, &neg_flags, &netlogon_pipe); password 4104 source3/rpc_client/cli_pipe.c const char *password, password 4118 source3/rpc_client/cli_pipe.c username, password, &auth); password 939 source3/rpc_server/srv_netlog_nt.c logon->password->identity_info.account_name.string); password 941 source3/rpc_server/srv_netlog_nt.c logon->password->identity_info.domain_name.string); password 943 source3/rpc_server/srv_netlog_nt.c logon->password->identity_info.workstation.string); password 1018 source3/rpc_server/srv_netlog_nt.c logon->password->identity_info.parameter_control, password 1020 source3/rpc_server/srv_netlog_nt.c logon->password->lmpassword.hash, password 1021 source3/rpc_server/srv_netlog_nt.c logon->password->ntpassword.hash, password 2084 source3/rpc_server/srv_samr_nt.c if (!r->in.hash || !r->in.password) { password 2089 source3/rpc_server/srv_samr_nt.c r->in.password->data, password 4742 source3/rpc_server/srv_samr_nt.c id23->password.data, password 4877 source3/rpc_server/srv_samr_nt.c if (!set_user_info_pw(id24->password.data, pwd)) { password 4917 source3/rpc_server/srv_samr_nt.c if (!set_user_info_pw(id25->password.data, pwd)) { password 4962 source3/rpc_server/srv_samr_nt.c if (!set_user_info_pw(id26->password.data, pwd)) { password 5240 source3/rpc_server/srv_samr_nt.c SamOEMhashBlob(info->info23.password.data, 516, password 5243 source3/rpc_server/srv_samr_nt.c dump_data(100, info->info23.password.data, 516); password 5253 source3/rpc_server/srv_samr_nt.c SamOEMhashBlob(info->info24.password.data, password 5257 source3/rpc_server/srv_samr_nt.c dump_data(100, info->info24.password.data, 516); password 5268 source3/rpc_server/srv_samr_nt.c info->info25.password.data, password 5271 source3/rpc_server/srv_samr_nt.c dump_data(100, info->info25.password.data, 532); password 5282 source3/rpc_server/srv_samr_nt.c info->info26.password.data, password 5285 source3/rpc_server/srv_samr_nt.c dump_data(100, info->info26.password.data, 516); password 315 source3/rpc_server/srv_srvsvc_nt.c r->password = ""; password 407 source3/rpc_server/srv_srvsvc_nt.c r->password = ""; password 954 source3/rpcclient/cmd_lsarpc.c DATA_BLOB data = data_blob(NULL, p->password->length); password 957 source3/rpcclient/cmd_lsarpc.c memcpy(data.data, p->password->data, p->password->length); password 980 source3/rpcclient/cmd_lsarpc.c display_trust_dom_info_4(&info->password, nt_hash); password 692 source3/rpcclient/cmd_netlogon.c const char *username, *password; password 706 source3/rpcclient/cmd_netlogon.c password = argv[2]; password 722 source3/rpcclient/cmd_netlogon.c result = rpccli_netlogon_sam_logon(cli, mem_ctx, logon_param, lp_workgroup(), username, password, workstation, logon_type); password 2712 source3/rpcclient/cmd_samr.c info.info23.password = pwd_buf; password 2716 source3/rpcclient/cmd_samr.c info.info24.password = pwd_buf; password 2730 source3/rpcclient/cmd_samr.c info.info25.password = pwd_buf_ex; password 2734 source3/rpcclient/cmd_samr.c info.info26.password = pwd_buf_ex; password 226 source3/rpcclient/cmd_srvsvc.c printf("\tpassword:\t%s\n", r->password); password 234 source3/rpcclient/cmd_srvsvc.c printf("\tpassword:\t%s\n", r->password); password 916 source3/rpcclient/rpcclient.c memset(cmdline_auth_info.password,'X',sizeof(cmdline_auth_info.password)); password 2622 source3/smbd/lanman.c DATA_BLOB password = data_blob(pass1, strlen(pass1)+1); password 2624 source3/smbd/lanman.c if (NT_STATUS_IS_OK(check_plaintext_password(user,password,&server_info))) { password 2634 source3/smbd/lanman.c data_blob_clear_free(&password); password 577 source3/smbd/password.c static char *validate_group(char *group, DATA_BLOB password,int snum) password 586 source3/smbd/password.c password_ok(user,password)) { password 647 source3/smbd/password.c password_ok(member,password)) { password 675 source3/smbd/password.c bool authorise_login(int snum, fstring user, DATA_BLOB password, password 682 source3/smbd/password.c "user=%s pass=%s\n", user,password.data)); password 723 source3/smbd/password.c if (password_ok(user2,password)) { password 759 source3/smbd/password.c auser = validate_group(auser+1,password,snum); password 771 source3/smbd/password.c password_ok(user2,password)) { password 514 source3/smbd/reply.c char *password = NULL; password 533 source3/smbd/reply.c pwlen = srvstr_pull_req_talloc(ctx, req, &password, p, STR_TERMINATE); password 538 source3/smbd/reply.c if (service_buf == NULL || password == NULL || dev == NULL) { password 550 source3/smbd/reply.c password_blob = data_blob(password, pwlen+1); password 584 source3/smbd/reply.c DATA_BLOB password; password 621 source3/smbd/reply.c password = data_blob_talloc(talloc_tos(), req->buf, passlen); password 632 source3/smbd/reply.c password = data_blob_talloc(talloc_tos(), req->buf, passlen+1); password 634 source3/smbd/reply.c password.data[passlen]=0; password 641 source3/smbd/reply.c data_blob_clear_free(&password); password 654 source3/smbd/reply.c data_blob_clear_free(&password); password 669 source3/smbd/reply.c data_blob_clear_free(&password); password 677 source3/smbd/reply.c conn = make_connection(service, password, client_devicetype, password 681 source3/smbd/reply.c data_blob_clear_free(&password); password 565 source3/smbd/service.c DATA_BLOB password, password 621 source3/smbd/service.c if (!authorise_login(snum,user,password,&guest)) { password 642 source3/smbd/service.c DATA_BLOB password, password 671 source3/smbd/service.c conn, snum, vuser ? vuser->server_info : NULL, password, password 1088 source3/smbd/service.c connection_struct *make_connection(const char *service_in, DATA_BLOB password, password 1164 source3/smbd/service.c password, password 1213 source3/smbd/service.c password, password 22 source3/torture/locktest.c static fstring password[2]; password 226 source3/torture/locktest.c fstrcpy(password[0], pass); password 227 source3/torture/locktest.c fstrcpy(password[1], pass); password 232 source3/torture/locktest.c fstrcpy(password[1], password[0]); password 237 source3/torture/locktest.c password[snum], password 238 source3/torture/locktest.c strlen(password[snum]), password 239 source3/torture/locktest.c password[snum], password 240 source3/torture/locktest.c strlen(password[snum]), password 260 source3/torture/locktest.c status = cli_tcon_andx(c, share, "?????", password[snum], password 261 source3/torture/locktest.c strlen(password[snum])+1); password 653 source3/torture/locktest.c fstrcpy(password[got_pass], p+1); password 22 source3/torture/locktest2.c static fstring password; password 179 source3/torture/locktest2.c fstrcpy(password, pass); password 186 source3/torture/locktest2.c username, lp_workgroup(), password, 0, password 524 source3/torture/locktest2.c fstrcpy(password, p+1); password 22 source3/torture/masktest.c static fstring password; password 226 source3/torture/masktest.c fstrcpy(password, pass); password 231 source3/torture/masktest.c password, strlen(password), password 232 source3/torture/masktest.c password, strlen(password), password 252 source3/torture/masktest.c status = cli_tcon_andx(c, share, "?????", password, password 253 source3/torture/masktest.c strlen(password)+1); password 522 source3/torture/masktest.c fstrcpy(password, p+1); password 26 source3/torture/torture.c static fstring host, workgroup, share, password, username, myname; password 138 source3/torture/torture.c password, password 281 source3/torture/torture.c password, flags, Undefined, &retry); password 335 source3/torture/torture.c size_t passlen = strlen(password); password 342 source3/torture/torture.c password, passlen, password 343 source3/torture/torture.c password, passlen, password 1137 source3/torture/torture.c password, strlen(password)+1); password 1227 source3/torture/torture.c status = cli_raw_tcon(cli, service, password, "?????", &max_xmit, &cnum); password 1253 source3/torture/torture.c password, strlen(password)+1); password 1307 source3/torture/torture.c password, flags, Undefined, &retry); password 4925 source3/torture/torture.c password, strlen(password), password 4926 source3/torture/torture.c password, strlen(password), password 4943 source3/torture/torture.c password, strlen(password), password 4944 source3/torture/torture.c password, strlen(password), password 4997 source3/torture/torture.c password, strlen(password), password 4998 source3/torture/torture.c password, strlen(password), password 6240 source3/torture/torture.c fstrcpy(password, p+1); password 6266 source3/torture/torture.c fstrcpy(password, p); password 253 source3/utils/net_ads.c SAFE_FREE(ads->auth.password); password 254 source3/utils/net_ads.c ads->auth.password = smb_xstrdup(c->opt_password); password 1322 source3/utils/net_ads.c ads_dns->auth.password = secrets_fetch_machine_password( password 43 source3/utils/net_dom.c const char *password = NULL; password 70 source3/utils/net_dom.c password = get_string_param(argv[i]); password 71 source3/utils/net_dom.c if (!password) { password 89 source3/utils/net_dom.c status = NetUnjoinDomain(server_name, account, password, unjoin_flags); password 132 source3/utils/net_dom.c const char *password = NULL; password 174 source3/utils/net_dom.c password = get_string_param(argv[i]); password 175 source3/utils/net_dom.c if (!password) { password 196 source3/utils/net_dom.c Account, password, join_flags); password 236 source3/utils/net_dom.c const char *password = NULL; password 262 source3/utils/net_dom.c password = get_string_param(argv[i]); password 263 source3/utils/net_dom.c if (!password) { password 288 source3/utils/net_dom.c account, password, rename_options); password 255 source3/utils/net_rap.c memset(sinfo.password, '\0', sizeof(sinfo.password)); password 2808 source3/utils/net_rpc.c char *password=NULL; /* don't allow a share password */ password 2834 source3/utils/net_rpc.c i2.shi2_passwd = password; password 4676 source3/utils/net_rpc.c d_printf("Password: %s\n", info.info2->password); password 5244 source3/utils/net_rpc.c info.info23.password = crypt_pwd; password 5756 source3/utils/net_rpc.c data = data_blob(info->password.password->data, password 5757 source3/utils/net_rpc.c info->password.password->length); password 346 source3/utils/net_rpc_join.c set_info.info24.password = crypt_pwd; password 383 source3/utils/net_rpc_samsync.c ctx->password = c->opt_password; password 446 source3/utils/ntlm_auth_diagnostics.c char *password; password 471 source3/utils/ntlm_auth_diagnostics.c if ((password = strdup_upper(opt_password)) == NULL) { password 477 source3/utils/ntlm_auth_diagnostics.c CH_DOS, password, password 478 source3/utils/ntlm_auth_diagnostics.c strlen(password)+1, password 485 source3/utils/ntlm_auth_diagnostics.c SAFE_FREE(password); password 48 source3/utils/smbget.c static const char *username = NULL, *password = NULL, *workgroup = NULL; password 101 source3/utils/smbget.c if(!nonprompt && !password) { password 109 source3/utils/smbget.c } else if(password) strncpy(pw, password, pwlen-1); password 574 source3/utils/smbget.c {"password", 'p', POPT_ARG_STRING, &password, 'p', "Password to use" }, password 615 source3/utils/smbget.c username = ""; password = ""; password 131 source3/winbindd/idmap_ad.c SAFE_FREE(ads->auth.password); password 132 source3/winbindd/idmap_ad.c ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), NULL, NULL); password 81 source3/winbindd/idmap_adex/idmap_adex.c ads->auth.password = password 276 source3/winbindd/idmap_adex/likewise_cell.c ads->auth.password = password 83 source3/winbindd/winbindd_ads.c SAFE_FREE(ads->auth.password); password 90 source3/winbindd/winbindd_ads.c if ( !pdb_get_trusteddom_pw( domain->name, &ads->auth.password, &sid, &last_set_time ) ) { password 100 source3/winbindd/winbindd_ads.c ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), NULL, NULL); password 552 source3/winbindd/winbindd_cm.c static void cm_get_ipc_userpass(char **username, char **domain, char **password) password 556 source3/winbindd/winbindd_cm.c *password = (char *)secrets_fetch(SECRETS_AUTH_PASSWORD, NULL); password 563 source3/winbindd/winbindd_cm.c if (!*password || !**password) password 564 source3/winbindd/winbindd_cm.c *password = smb_xstrdup(""); password 573 source3/winbindd/winbindd_cm.c *password = smb_xstrdup(""); password 2033 source3/winbindd/winbindd_cm.c (conn->cli->password == NULL || conn->cli->password[0] == '\0')) password 2044 source3/winbindd/winbindd_cm.c machine_password = SMB_STRDUP(conn->cli->password); password 2252 source3/winbindd/winbindd_cm.c (conn->cli->password == NULL || conn->cli->password[0] == '\0')) { password 2263 source3/winbindd/winbindd_cm.c conn->cli->domain, conn->cli->user_name, conn->cli->password, password 82 source4/auth/auth.h } password; password 271 source4/auth/auth.h const char *password, password 288 source4/auth/credentials/credentials.c cred->password = cred->password_cb(cred); password 294 source4/auth/credentials/credentials.c return cred->password; password 305 source4/auth/credentials/credentials.c cred->password = talloc_strdup(cred, val); password 366 source4/auth/credentials/credentials.c const char *password = cli_credentials_get_password(cred); password 368 source4/auth/credentials/credentials.c if (password) { password 374 source4/auth/credentials/credentials.c E_md4hash(password, nt_hash->hash); password 643 source4/auth/credentials/credentials.c memset(p,0,strlen(cred->password)); password 74 source4/auth/credentials/credentials.h const char *password; password 203 source4/auth/credentials/credentials_files.c const char *password; password 252 source4/auth/credentials/credentials_files.c password = ldb_msg_find_attr_as_string(msgs[0], "secret", NULL); password 281 source4/auth/credentials/credentials_files.c if (!password) { password 294 source4/auth/credentials/credentials_files.c cli_credentials_set_password(cred, password, CRED_SPECIFIED); password 173 source4/auth/credentials/credentials_ntlm.c const char *password; password 174 source4/auth/credentials/credentials_ntlm.c password = cli_credentials_get_password(cred); password 175 source4/auth/credentials/credentials_ntlm.c if (!password) { password 179 source4/auth/credentials/credentials_ntlm.c if (!SMBencrypt(password,challenge.data, password 191 source4/auth/credentials/credentials_ntlm.c E_deshash(password, lm_hash); password 202 source4/auth/credentials/credentials_ntlm.c const char *password; password 208 source4/auth/credentials/credentials_ntlm.c password = cli_credentials_get_password(cred); password 209 source4/auth/credentials/credentials_ntlm.c if (password) { password 210 source4/auth/credentials/credentials_ntlm.c E_deshash(password, lm_hash); password 93 source4/auth/gensec/cyrus_sasl.c const char *password = cli_credentials_get_password(gensec_get_credentials(gensec_security)); password 96 source4/auth/gensec/cyrus_sasl.c if (!password) { password 100 source4/auth/gensec/cyrus_sasl.c secret = talloc_size(gensec_security, sizeof(sasl_secret_t)+strlen(password)); password 104 source4/auth/gensec/cyrus_sasl.c secret->len = strlen(password); password 105 source4/auth/gensec/cyrus_sasl.c safe_strcpy((char*)secret->data, password, secret->len+1); password 33 source4/auth/kerberos/clikrb5.c krb5_data *password, password 47 source4/auth/kerberos/clikrb5.c ret = krb5_string_to_key(context, &eblock, key, password, &salt); password 54 source4/auth/kerberos/clikrb5.c krb5_data *password, password 66 source4/auth/kerberos/clikrb5.c ret = krb5_string_to_key_salt(context, enctype, password->data, password 82 source4/auth/kerberos/kerberos.c krb5_principal principal, const char *password, password 93 source4/auth/kerberos/kerberos.c if ((code = krb5_get_init_creds_password(ctx, &my_creds, principal, password, password 78 source4/auth/kerberos/kerberos.h int create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype); password 79 source4/auth/kerberos/kerberos.h int create_kerberos_key_from_string_direct(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype); password 92 source4/auth/kerberos/kerberos.h krb5_principal principal, const char *password, password 151 source4/auth/kerberos/kerberos_util.c const char *password; password 167 source4/auth/kerberos/kerberos_util.c password = cli_credentials_get_password(credentials); password 171 source4/auth/kerberos/kerberos_util.c if (password) { password 174 source4/auth/kerberos/kerberos_util.c password, NULL, &kdc_time); password 287 source4/auth/kerberos/kerberos_util.c krb5_data password; password 293 source4/auth/kerberos/kerberos_util.c password.data = discard_const_p(char *, password_s); password 294 source4/auth/kerberos/kerberos_util.c password.length = strlen(password_s); password 309 source4/auth/kerberos/kerberos_util.c salt_princ, &password, &entry.keyblock, enctype); password 189 source4/auth/ntlm/auth_sam.c user_info->password.hash.lanman, password 190 source4/auth/ntlm/auth_sam.c user_info->password.hash.nt, password 202 source4/auth/ntlm/auth_sam.c &user_info->password.response.lanman, password 203 source4/auth/ntlm/auth_sam.c &user_info->password.response.nt, password 132 source4/auth/ntlm/auth_server.c cli_credentials_set_password(creds, user_info->password.plaintext, password 136 source4/auth/ntlm/auth_server.c cli_credentials_set_nt_hash(creds, user_info->password.hash.nt, password 141 source4/auth/ntlm/auth_server.c cli_credentials_set_ntlm_response(creds, &user_info->password.response.lanman, &user_info->password.response.nt, CRED_SPECIFIED); password 40 source4/auth/ntlm/auth_simple.c const char *password, password 79 source4/auth/ntlm/auth_simple.c user_info->password.plaintext = talloc_strdup(user_info, password); password 446 source4/auth/ntlm/auth_unix.c info->plaintext_password = user_info->password.plaintext; password 502 source4/auth/ntlm/auth_unix.c static NTSTATUS password_check(const char *username, const char *password, password 508 source4/auth/ntlm/auth_unix.c if (afs_auth(username, password)) password 513 source4/auth/ntlm/auth_unix.c if (dfs_auth(username, password)) password 519 source4/auth/ntlm/auth_unix.c ret = (strcmp(osf1_bigcrypt(password, salt), crypted) == 0); password 524 source4/auth/ntlm/auth_unix.c ret = (strcmp((char *)crypt(password, salt), crypted) == 0); password 535 source4/auth/ntlm/auth_unix.c ret = (strcmp((char *)crypt16(password, salt), crypted) == 0); password 545 source4/auth/ntlm/auth_unix.c ret = (linux_bigcrypt(password, salt, crypted)); password 562 source4/auth/ntlm/auth_unix.c if (strcmp(bigcrypt(password, salt), crypted) == 0) password 565 source4/auth/ntlm/auth_unix.c ret = (strcmp((char *)crypt(password, salt), crypted) == 0); password 574 source4/auth/ntlm/auth_unix.c ret = (strcmp(bigcrypt(password, salt), crypted) == 0); password 586 source4/auth/ntlm/auth_unix.c ret = (strcmp((char *)crypt(password, salt), crypted) == 0); password 600 source4/auth/ntlm/auth_unix.c char *password; password 611 source4/auth/ntlm/auth_unix.c password = talloc_strdup(ctx, user_info->password.plaintext); password 713 source4/auth/ntlm/auth_unix.c if (password == NULL) { password 721 source4/auth/ntlm/auth_unix.c nt_status = password_check(username, password, crypted, salt); password 738 source4/auth/ntlm/auth_unix.c if (strhasupper(password) && strhaslower(password)) { password 743 source4/auth/ntlm/auth_unix.c pwcopy = talloc_strdup(ctx, password); password 154 source4/auth/ntlm/auth_util.c user_info_in->password.hash.nt->hash, &chall_blob, password 162 source4/auth/ntlm/auth_util.c user_info_temp->password.response.lanman = lmv2_response; password 163 source4/auth/ntlm/auth_util.c user_info_temp->password.response.nt = ntlmv2_response; password 169 source4/auth/ntlm/auth_util.c SMBOWFencrypt(user_info_in->password.hash.nt->hash, challenge, blob.data); password 171 source4/auth/ntlm/auth_util.c user_info_temp->password.response.nt = blob; password 172 source4/auth/ntlm/auth_util.c if (lp_client_lanman_auth(auth_context->lp_ctx) && user_info_in->password.hash.lanman) { password 174 source4/auth/ntlm/auth_util.c SMBOWFencrypt(user_info_in->password.hash.lanman->hash, challenge, blob.data); password 175 source4/auth/ntlm/auth_util.c user_info_temp->password.response.lanman = lm_blob; password 178 source4/auth/ntlm/auth_util.c user_info_temp->password.response.lanman = user_info_temp->password.response.nt; password 207 source4/auth/ntlm/auth_util.c if (E_deshash(user_info_in->password.plaintext, lanman.hash)) { password 208 source4/auth/ntlm/auth_util.c user_info_temp->password.hash.lanman = talloc(user_info_temp, password 210 source4/auth/ntlm/auth_util.c *user_info_temp->password.hash.lanman = lanman; password 212 source4/auth/ntlm/auth_util.c user_info_temp->password.hash.lanman = NULL; password 215 source4/auth/ntlm/auth_util.c E_md4hash(user_info_in->password.plaintext, nt.hash); password 216 source4/auth/ntlm/auth_util.c user_info_temp->password.hash.nt = talloc(user_info_temp, password 218 source4/auth/ntlm/auth_util.c *user_info_temp->password.hash.nt = nt; password 109 source4/auth/ntlm/auth_winbind.c request.data.auth_crap.lm_resp_len = MIN(user_info->password.response.lanman.length, password 111 source4/auth/ntlm/auth_winbind.c request.data.auth_crap.nt_resp_len = MIN(user_info->password.response.nt.length, password 114 source4/auth/ntlm/auth_winbind.c memcpy(request.data.auth_crap.lm_resp, user_info->password.response.lanman.data, password 116 source4/auth/ntlm/auth_winbind.c memcpy(request.data.auth_crap.nt_resp, user_info->password.response.nt.data, password 193 source4/auth/ntlm/auth_winbind.c password_info->lmpassword = *user_info->password.hash.lanman; password 194 source4/auth/ntlm/auth_winbind.c password_info->ntpassword = *user_info->password.hash.nt; password 198 source4/auth/ntlm/auth_winbind.c s->req.in.logon.password= password_info; password 216 source4/auth/ntlm/auth_winbind.c network_info->nt.length = user_info->password.response.nt.length; password 217 source4/auth/ntlm/auth_winbind.c network_info->nt.data = user_info->password.response.nt.data; password 219 source4/auth/ntlm/auth_winbind.c network_info->lm.length = user_info->password.response.lanman.length; password 220 source4/auth/ntlm/auth_winbind.c network_info->lm.data = user_info->password.response.lanman.data; password 679 source4/auth/ntlmssp/ntlmssp_server.c user_info->password.response.lanman = gensec_ntlmssp_state->lm_resp; password 680 source4/auth/ntlmssp/ntlmssp_server.c user_info->password.response.lanman.data = talloc_steal(user_info, gensec_ntlmssp_state->lm_resp.data); password 681 source4/auth/ntlmssp/ntlmssp_server.c user_info->password.response.nt = gensec_ntlmssp_state->nt_resp; password 682 source4/auth/ntlmssp/ntlmssp_server.c user_info->password.response.nt.data = talloc_steal(user_info, gensec_ntlmssp_state->nt_resp.data); password 47 source4/client/mount.cifs.c struct passwd *password = getpwuid(getuid()); password 49 source4/client/mount.cifs.c if (password) { password 50 source4/client/mount.cifs.c username = password->pw_name; password 32 source4/client/smbmount.c static pstring password; password 197 source4/client/smbmount.c pstrcpy(password, pass); password 215 source4/client/smbmount.c password, strlen(password), password 216 source4/client/smbmount.c password, strlen(password), password 220 source4/client/smbmount.c if (password[0] || !username[0] || password 233 source4/client/smbmount.c if (!smbcli_tconX(c, share, "?????", password, strlen(password)+1)) { password 602 source4/client/smbmount.c pstrcpy(password, pass); password 654 source4/client/smbmount.c pstrcpy(password, val); password 772 source4/client/smbmount.c pstrcpy(password,lp+1); password 774 source4/client/smbmount.c memset(strchr_m(opteq+1,'%')+1,'X',strlen(password)); password 782 source4/client/smbmount.c pstrcpy(password,opteq+1); password 784 source4/client/smbmount.c memset(opteq+1,'X',strlen(password)); password 824 source4/client/smbmount.c *password = '\0'; password 891 source4/client/smbmount.c pstrcpy(password,p+1); password 893 source4/client/smbmount.c memset(strchr_m(getenv("USER"),'%')+1,'X',strlen(password)); password 899 source4/client/smbmount.c pstrcpy(password, getenv("PASSWD")); password 595 source4/client/tree.c char *password, int pwmaxlen) password 599 source4/client/tree.c strncpy(password, "test", pwmaxlen); password 70 source4/dsdb/samdb/ldb_modules/proxy.c const char *olddn, *newdn, *url, *username, *password, *oldstr, *newstr; password 93 source4/dsdb/samdb/ldb_modules/proxy.c password = ldb_msg_find_attr_as_string(res->msgs[0], "password", NULL); password 97 source4/dsdb/samdb/ldb_modules/proxy.c if (url == NULL || olddn == NULL || newdn == NULL || username == NULL || password == NULL) { password 140 source4/dsdb/samdb/ldb_modules/proxy.c cli_credentials_set_password(creds, password, CRED_SPECIFIED); password 167 source4/heimdal/kdc/digest.c char **password) password 185 source4/heimdal/kdc/digest.c ret = hdb_entry_get_password(context, db, &user->entry, password); password 186 source4/heimdal/kdc/digest.c if (ret || password == NULL) { password 222 source4/heimdal/kdc/digest.c char *client_name = NULL, *password = NULL; password 635 source4/heimdal/kdc/digest.c &password); password 641 source4/heimdal/kdc/digest.c MD5_Update(&ctx, password, strlen(password)); password 687 source4/heimdal/kdc/digest.c &password); password 698 source4/heimdal/kdc/digest.c MD5_Update(&ctx, password, strlen(password)); password 1445 source4/heimdal/kdc/digest.c if (password) { password 1446 source4/heimdal/kdc/digest.c memset(password, 0, strlen(password)); password 1447 source4/heimdal/kdc/digest.c free (password); password 69 source4/heimdal/lib/hcrypto/pkcs5.c PKCS5_PBKDF2_HMAC_SHA1(const void * password, size_t password_len, password 112 source4/heimdal/lib/hcrypto/pkcs5.c HMAC(md, password, password_len, data, datalen, password 117 source4/heimdal/lib/hcrypto/pkcs5.c HMAC(md, password, password_len, tmpcksum, checksumsize, password 280 source4/heimdal/lib/hdb/ext.c if (db->hdb_master_key_set && ext->data.u.password.mkvno) { password 283 source4/heimdal/lib/hdb/ext.c key = _hdb_find_master_key(ext->data.u.password.mkvno, password 289 source4/heimdal/lib/hdb/ext.c *ext->data.u.password.mkvno); password 294 source4/heimdal/lib/hdb/ext.c ext->data.u.password.password.data, password 295 source4/heimdal/lib/hdb/ext.c ext->data.u.password.password.length, password 298 source4/heimdal/lib/hdb/ext.c ret = der_copy_octet_string(&ext->data.u.password.password, &pw); password 354 source4/heimdal/lib/hdb/ext.c &ext.data.u.password.password); password 358 source4/heimdal/lib/hdb/ext.c ext.data.u.password.mkvno = password 359 source4/heimdal/lib/hdb/ext.c malloc(sizeof(*ext.data.u.password.mkvno)); password 360 source4/heimdal/lib/hdb/ext.c if (ext.data.u.password.mkvno == NULL) { password 365 source4/heimdal/lib/hdb/ext.c *ext.data.u.password.mkvno = _hdb_mkey_version(key); password 368 source4/heimdal/lib/hdb/ext.c ext.data.u.password.mkvno = NULL; password 370 source4/heimdal/lib/hdb/ext.c ret = krb5_data_copy(&ext.data.u.password.password, password 368 source4/heimdal/lib/hdb/keys.c const char *password, password 388 source4/heimdal/lib/hdb/keys.c password, password 2268 source4/heimdal/lib/hx509/crypto.c const char *password, password 2281 source4/heimdal/lib/hx509/crypto.c passwordlen = password ? strlen(password) : 0; password 2299 source4/heimdal/lib/hx509/crypto.c if (!PKCS12_key_gen (password, passwordlen, salt, saltlen, password 2305 source4/heimdal/lib/hx509/crypto.c if (!PKCS12_key_gen (password, passwordlen, salt, saltlen, password 2433 source4/heimdal/lib/hx509/crypto.c const char *password; password 2436 source4/heimdal/lib/hx509/crypto.c password = pw->val[i]; password 2438 source4/heimdal/lib/hx509/crypto.c password = ""; password 2440 source4/heimdal/lib/hx509/crypto.c password = NULL; password 2442 source4/heimdal/lib/hx509/crypto.c ret = (*s2k)(context, password, ai->parameters, &crypto, password 73 source4/heimdal/lib/hx509/ks_file.c const void *password, password 92 source4/heimdal/lib/hx509/ks_file.c password, passwordlen, password 227 source4/heimdal/lib/hx509/ks_file.c const void *password; password 231 source4/heimdal/lib/hx509/ks_file.c password = pw->val[i]; password 232 source4/heimdal/lib/hx509/ks_file.c passwordlen = strlen(password); password 235 source4/heimdal/lib/hx509/ks_file.c cipher, ivdata, password, passwordlen, password 245 source4/heimdal/lib/hx509/ks_file.c char password[128]; password 251 source4/heimdal/lib/hx509/ks_file.c prompt.reply.data = password; password 252 source4/heimdal/lib/hx509/ks_file.c prompt.reply.length = sizeof(password); password 257 source4/heimdal/lib/hx509/ks_file.c cipher, ivdata, password, strlen(password), password 260 source4/heimdal/lib/hx509/ks_file.c memset(password, 0, sizeof(password)); password 44 source4/heimdal/lib/hx509/lock.c struct _hx509_password password; password 88 source4/heimdal/lib/hx509/lock.c hx509_lock_add_password(hx509_lock lock, const char *password) password 93 source4/heimdal/lib/hx509/lock.c s = strdup(password); password 97 source4/heimdal/lib/hx509/lock.c d = realloc(lock->password.val, password 98 source4/heimdal/lib/hx509/lock.c (lock->password.len + 1) * sizeof(lock->password.val[0])); password 103 source4/heimdal/lib/hx509/lock.c lock->password.val = d; password 104 source4/heimdal/lib/hx509/lock.c lock->password.val[lock->password.len] = s; password 105 source4/heimdal/lib/hx509/lock.c lock->password.len++; password 113 source4/heimdal/lib/hx509/lock.c return &lock->password; password 126 source4/heimdal/lib/hx509/lock.c for (i = 0; i < lock->password.len; i++) password 127 source4/heimdal/lib/hx509/lock.c free(lock->password.val[i]); password 128 source4/heimdal/lib/hx509/lock.c free(lock->password.val); password 129 source4/heimdal/lib/hx509/lock.c lock->password.val = NULL; password 130 source4/heimdal/lib/hx509/lock.c lock->password.len = 0; password 218 source4/heimdal/lib/krb5/crypto.c char password[8+1]; /* crypt is limited to 8 chars anyway */ password 225 source4/heimdal/lib/krb5/crypto.c password[i] = c ? c : 'X'; password 227 source4/heimdal/lib/krb5/crypto.c password[8] = '\0'; password 229 source4/heimdal/lib/krb5/crypto.c memcpy(key, crypt(password, "p1") + 2, sizeof(DES_cblock)); password 250 source4/heimdal/lib/krb5/crypto.c char password[512]; password 253 source4/heimdal/lib/krb5/crypto.c memcpy(password, pw.data, min(pw.length, sizeof(password))); password 254 source4/heimdal/lib/krb5/crypto.c if(pw.length < sizeof(password)) { password 255 source4/heimdal/lib/krb5/crypto.c int len = min(cell.length, sizeof(password) - pw.length); password 258 source4/heimdal/lib/krb5/crypto.c memcpy(password + pw.length, cell.data, len); password 260 source4/heimdal/lib/krb5/crypto.c password[i] = tolower((unsigned char)password[i]); password 262 source4/heimdal/lib/krb5/crypto.c passlen = min(sizeof(password), pw.length + cell.length); password 267 source4/heimdal/lib/krb5/crypto.c DES_cbc_cksum ((void*)password, &ivec, passlen, &schedule, &ivec); password 272 source4/heimdal/lib/krb5/crypto.c DES_cbc_cksum ((void*)password, key, passlen, &schedule, &ivec); password 276 source4/heimdal/lib/krb5/crypto.c memset(password, 0, sizeof(password)); password 284 source4/heimdal/lib/krb5/crypto.c krb5_data password, password 290 source4/heimdal/lib/krb5/crypto.c if(password.length > 8) password 291 source4/heimdal/lib/krb5/crypto.c krb5_DES_AFS3_Transarc_string_to_key(password, salt.saltvalue, &tmp); password 293 source4/heimdal/lib/krb5/crypto.c krb5_DES_AFS3_CMU_string_to_key(password, salt.saltvalue, &tmp); password 337 source4/heimdal/lib/krb5/crypto.c krb5_data password, password 351 source4/heimdal/lib/krb5/crypto.c return DES_AFS3_string_to_key(context, enctype, password, password 356 source4/heimdal/lib/krb5/crypto.c len = password.length + salt.saltvalue.length; password 362 source4/heimdal/lib/krb5/crypto.c memcpy(s, password.data, password.length); password 363 source4/heimdal/lib/krb5/crypto.c memcpy(s + password.length, salt.saltvalue.data, salt.saltvalue.length); password 428 source4/heimdal/lib/krb5/crypto.c krb5_data password, password 439 source4/heimdal/lib/krb5/crypto.c len = password.length + salt.saltvalue.length; password 445 source4/heimdal/lib/krb5/crypto.c memcpy(str, password.data, password.length); password 446 source4/heimdal/lib/krb5/crypto.c memcpy(str + password.length, salt.saltvalue.data, salt.saltvalue.length); password 493 source4/heimdal/lib/krb5/crypto.c krb5_data password, password 499 source4/heimdal/lib/krb5/crypto.c size_t len = password.length + salt.saltvalue.length; password 507 source4/heimdal/lib/krb5/crypto.c memcpy(s, password.data, password.length); password 508 source4/heimdal/lib/krb5/crypto.c memcpy(s + password.length, salt.saltvalue.data, salt.saltvalue.length); password 569 source4/heimdal/lib/krb5/crypto.c krb5_data password, password 588 source4/heimdal/lib/krb5/crypto.c ret = wind_utf8ucs2_length(password.data, &len); password 603 source4/heimdal/lib/krb5/crypto.c ret = wind_utf8ucs2(password.data, s, &len); password 644 source4/heimdal/lib/krb5/crypto.c krb5_data password, password 680 source4/heimdal/lib/krb5/crypto.c ret = PKCS5_PBKDF2_HMAC_SHA1(password.data, password.length, password 991 source4/heimdal/lib/krb5/crypto.c krb5_data password, password 1001 source4/heimdal/lib/krb5/crypto.c ret = krb5_string_to_key_data_salt(context, enctype, password, salt, key); password 1009 source4/heimdal/lib/krb5/crypto.c const char *password, password 1014 source4/heimdal/lib/krb5/crypto.c pw.data = rk_UNCONST(password); password 1015 source4/heimdal/lib/krb5/crypto.c pw.length = strlen(password); password 1022 source4/heimdal/lib/krb5/crypto.c krb5_data password, password 1028 source4/heimdal/lib/krb5/crypto.c return krb5_string_to_key_data_salt_opaque(context, enctype, password, password 1041 source4/heimdal/lib/krb5/crypto.c krb5_data password, password 1056 source4/heimdal/lib/krb5/crypto.c return (*st->string_to_key)(context, enctype, password, password 1073 source4/heimdal/lib/krb5/crypto.c const char *password, password 1078 source4/heimdal/lib/krb5/crypto.c pw.data = rk_UNCONST(password); password 1079 source4/heimdal/lib/krb5/crypto.c pw.length = strlen(password); password 1086 source4/heimdal/lib/krb5/crypto.c const char *password, password 1092 source4/heimdal/lib/krb5/crypto.c pw.data = rk_UNCONST(password); password 1093 source4/heimdal/lib/krb5/crypto.c pw.length = strlen(password); password 344 source4/heimdal/lib/krb5/init_creds.c const char *password, password 351 source4/heimdal/lib/krb5/init_creds.c opt->opt_private->password = password; password 52 source4/heimdal/lib/krb5/init_creds_pw.c const char *password; password 68 source4/heimdal/lib/krb5/init_creds_pw.c krb5_data password; password 71 source4/heimdal/lib/krb5/init_creds_pw.c password.data = rk_UNCONST(keyseed); password 72 source4/heimdal/lib/krb5/init_creds_pw.c password.length = strlen(keyseed); password 81 source4/heimdal/lib/krb5/init_creds_pw.c ret = krb5_string_to_key_data_salt_opaque(context, type, password, password 281 source4/heimdal/lib/krb5/init_creds_pw.c ctx->password = options->opt_private->password; password 369 source4/heimdal/lib/krb5/init_creds_pw.c const char *password, password 404 source4/heimdal/lib/krb5/init_creds_pw.c password, password 976 source4/heimdal/lib/krb5/init_creds_pw.c if (ctx->key_proc == NULL || ctx->password == NULL) password 981 source4/heimdal/lib/krb5/init_creds_pw.c ctx->key_proc, ctx->password, password 989 source4/heimdal/lib/krb5/init_creds_pw.c ctx->key_proc, ctx->password, password 997 source4/heimdal/lib/krb5/init_creds_pw.c ctx->key_proc, ctx->password, password 1015 source4/heimdal/lib/krb5/init_creds_pw.c ret = (*ctx->key_proc)(context, etype, ctx->password, password 1196 source4/heimdal/lib/krb5/init_creds_pw.c } else if (ctx->password) password 1436 source4/heimdal/lib/krb5/init_creds_pw.c if (prompter == NULL || ctx.password == NULL) password 1447 source4/heimdal/lib/krb5/init_creds_pw.c ctx.password, password 1455 source4/heimdal/lib/krb5/init_creds_pw.c ctx.password = buf; password 1485 source4/heimdal/lib/krb5/init_creds_pw.c const char *password, password 1509 source4/heimdal/lib/krb5/init_creds_pw.c if (password == NULL && password 1510 source4/heimdal/lib/krb5/init_creds_pw.c options->opt_private->password == NULL && password 1536 source4/heimdal/lib/krb5/init_creds_pw.c password = password_data.data; password 1539 source4/heimdal/lib/krb5/init_creds_pw.c if (options->opt_private->password == NULL) { password 1541 source4/heimdal/lib/krb5/init_creds_pw.c password, NULL); password 211 source4/heimdal/lib/krb5/krb5_locl.h const char *password; password 1505 source4/heimdal/lib/krb5/pkinit.c char *password) password 1540 source4/heimdal/lib/krb5/pkinit.c if (password && password[0]) password 1541 source4/heimdal/lib/krb5/pkinit.c hx509_lock_add_password(lock, password); password 2040 source4/heimdal/lib/krb5/pkinit.c char *password) password 2095 source4/heimdal/lib/krb5/pkinit.c password); password 909 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_nt_key(const char *password, struct ntlm_buf *key) password 920 source4/heimdal/lib/ntlm/ntlm.c ret = ascii2ucs2le(password, 0, &buf); password 775 source4/kdc/hdb-samba4.c password_utf16 = data_blob_const(password_blob.current->array[i].AuthInfo.clear.password, password 786 source4/kdc/hdb-samba4.c password_hash = password_blob.current->array[i].AuthInfo.nt4owf.password; password 177 source4/kdc/kpasswdd.c const DATA_BLOB *password, password 201 source4/kdc/kpasswdd.c password, NULL, NULL, password 234 source4/kdc/kpasswdd.c DATA_BLOB password; password 239 source4/kdc/kpasswdd.c (void **)&password.data, &pw_len, false)) { password 242 source4/kdc/kpasswdd.c password.length = pw_len; password 245 source4/kdc/kpasswdd.c &password, reply); password 258 source4/kdc/kpasswdd.c DATA_BLOB password; password 285 source4/kdc/kpasswdd.c (void **)&password.data, &pw_len, false)) { password 290 source4/kdc/kpasswdd.c password.length = pw_len; password 320 source4/kdc/kpasswdd.c &password, reply); password 385 source4/kdc/kpasswdd.c msg, &password, NULL, NULL, password 54 source4/ldap_server/ldap_bind.c req->creds.password, password 810 source4/lib/ldb/ldb_ildap/ldb_ildap.c const char *password = cli_credentials_get_password(creds); password 811 source4/lib/ldb/ldb_ildap/ldb_ildap.c status = ldap_bind_simple(ildb->ldap, bind_dn, password); password 2575 source4/lib/wmi/wmi_wrap.c WERROR WBEM_ConnectServer(struct com_context *ctx, const char *server, const char *nspace, const char *user, const char *password, password 448 source4/libcli/auth/smbencrypt.c const char *password, password 455 source4/libcli/auth/smbencrypt.c E_md4hash(password, nt_hash); password 466 source4/libcli/auth/smbencrypt.c bool encode_pw_buffer(uint8_t buffer[516], const char *password, int string_flags) password 475 source4/libcli/auth/smbencrypt.c password, password 548 source4/libcli/auth/smbencrypt.c bool set_pw_in_buffer(uint8_t buffer[516], DATA_BLOB *password) password 550 source4/libcli/auth/smbencrypt.c if (password->length > 512) { password 554 source4/libcli/auth/smbencrypt.c memcpy(&buffer[512 - password->length], password->data, password->length); password 556 source4/libcli/auth/smbencrypt.c generate_random_buffer(buffer, 512 - password->length); password 562 source4/libcli/auth/smbencrypt.c SIVAL(buffer, 512, password->length); password 101 source4/libcli/cliconnect.c const char *devtype, const char *password) password 119 source4/libcli/cliconnect.c tcon.tconx.in.password = data_blob(NULL, 0); password 121 source4/libcli/cliconnect.c tcon.tconx.in.password = data_blob_talloc(mem_ctx, NULL, 24); password 125 source4/libcli/cliconnect.c SMBencrypt(password, cli->transport->negotiate.secblob.data, tcon.tconx.in.password.data); password 127 source4/libcli/cliconnect.c tcon.tconx.in.password = data_blob_talloc(mem_ctx, password, strlen(password)+1); password 82 source4/libcli/ldap/ldap_bind.c res->r.BindRequest.creds.password = talloc_strdup(res, pw); password 93 source4/libcli/ldap/ldap_bind.c const char *userdn, const char *password) password 114 source4/libcli/ldap/ldap_bind.c if (password) { password 115 source4/libcli/ldap/ldap_bind.c pw = password; password 108 source4/libcli/ldap/ldap_client.h const char *userdn, const char *password); password 97 source4/libcli/raw/clisession.c SSVAL(req->out.vwv,VWV(7),parms->old.in.password.length); password 99 source4/libcli/raw/clisession.c smbcli_req_append_blob(req, &parms->old.in.password); password 68 source4/libcli/raw/clitree.c smbcli_req_append_ascii4(req, parms->tcon.in.password,STR_ASCII); password 77 source4/libcli/raw/clitree.c SSVAL(req->out.vwv, VWV(3), parms->tconx.in.password.length); password 78 source4/libcli/raw/clitree.c smbcli_req_append_blob(req, &parms->tconx.in.password); password 241 source4/libcli/raw/interfaces.h const char *password; password 256 source4/libcli/raw/interfaces.h DATA_BLOB password; password 314 source4/libcli/raw/interfaces.h DATA_BLOB password; password 112 source4/libcli/smb_composite/connect.c state->io_tcon->tconx.in.password = data_blob(NULL, 0); password 198 source4/libcli/smb_composite/connect.c state->io_tcon->tconx.in.password = data_blob(NULL, 0); password 301 source4/libcli/smb_composite/sesssetup.c const char *password = cli_credentials_get_password(io->in.credentials); password 302 source4/libcli/smb_composite/sesssetup.c state->setup.nt1.in.password1 = data_blob_talloc(state, password, strlen(password)); password 336 source4/libcli/smb_composite/sesssetup.c const char *password = cli_credentials_get_password(io->in.credentials); password 364 source4/libcli/smb_composite/sesssetup.c &state->setup.old.in.password, password 372 source4/libcli/smb_composite/sesssetup.c state->setup.old.in.password = data_blob_talloc(state, password, strlen(password)); password 72 source4/libcli/util/clilsa.c tcon.tconx.in.password = data_blob(NULL, 0); password 178 source4/libnet/libnet_passwd.c oe2.in.password = &lm_pass; password 309 source4/libnet/libnet_passwd.c encode_pw_buffer(u_info.info26.password.data, r->samr_handle.in.newpassword, STR_UNICODE); password 327 source4/libnet/libnet_passwd.c arcfour_crypt_blob(u_info.info26.password.data, 516, &confounded_session_key); password 328 source4/libnet/libnet_passwd.c memcpy(&u_info.info26.password.data[516], confounder, 16); password 364 source4/libnet/libnet_passwd.c encode_pw_buffer(u_info.info25.password.data, r->samr_handle.in.newpassword, STR_UNICODE); password 381 source4/libnet/libnet_passwd.c arcfour_crypt_blob(u_info.info25.password.data, 516, &confounded_session_key); password 382 source4/libnet/libnet_passwd.c memcpy(&u_info.info25.password.data[516], confounder, 16); password 412 source4/libnet/libnet_passwd.c encode_pw_buffer(u_info.info24.password.data, r->samr_handle.in.newpassword, STR_UNICODE); password 423 source4/libnet/libnet_passwd.c arcfour_crypt_blob(u_info.info24.password.data, 516, &session_key); password 455 source4/libnet/libnet_passwd.c encode_pw_buffer(u_info.info23.password.data, r->samr_handle.in.newpassword, STR_UNICODE); password 466 source4/libnet/libnet_passwd.c arcfour_crypt_blob(u_info.info23.password.data, 516, &session_key); password 973 source4/rpc_server/lsa/dcesrv_lsa.c &auth_struct.incoming.current[i]->AuthInfo.nt4owf.password); password 975 source4/rpc_server/lsa/dcesrv_lsa.c DATA_BLOB new_password = data_blob_const(auth_struct.incoming.current[i]->AuthInfo.clear.password, password 513 source4/rpc_server/netlogon/dcerpc_netlogon.c r->in.logon->password->lmpassword.hash, password 514 source4/rpc_server/netlogon/dcerpc_netlogon.c sizeof(r->in.logon->password->lmpassword.hash)); password 516 source4/rpc_server/netlogon/dcerpc_netlogon.c r->in.logon->password->ntpassword.hash, password 517 source4/rpc_server/netlogon/dcerpc_netlogon.c sizeof(r->in.logon->password->ntpassword.hash)); password 519 source4/rpc_server/netlogon/dcerpc_netlogon.c creds_des_decrypt(creds, &r->in.logon->password->lmpassword); password 520 source4/rpc_server/netlogon/dcerpc_netlogon.c creds_des_decrypt(creds, &r->in.logon->password->ntpassword); password 530 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->logon_parameters = r->in.logon->password->identity_info.parameter_control; password 531 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->client.account_name = r->in.logon->password->identity_info.account_name.string; password 532 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->client.domain_name = r->in.logon->password->identity_info.domain_name.string; password 533 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->workstation_name = r->in.logon->password->identity_info.workstation.string; password 538 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->password.hash.lanman = talloc(user_info, struct samr_Password); password 539 source4/rpc_server/netlogon/dcerpc_netlogon.c NT_STATUS_HAVE_NO_MEMORY(user_info->password.hash.lanman); password 540 source4/rpc_server/netlogon/dcerpc_netlogon.c *user_info->password.hash.lanman = r->in.logon->password->lmpassword; password 542 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->password.hash.nt = talloc(user_info, struct samr_Password); password 543 source4/rpc_server/netlogon/dcerpc_netlogon.c NT_STATUS_HAVE_NO_MEMORY(user_info->password.hash.nt); password 544 source4/rpc_server/netlogon/dcerpc_netlogon.c *user_info->password.hash.nt = r->in.logon->password->ntpassword; password 566 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->password.response.lanman = data_blob_talloc(mem_ctx, r->in.logon->network->lm.data, r->in.logon->network->lm.length); password 567 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->password.response.nt = data_blob_talloc(mem_ctx, r->in.logon->network->nt.data, r->in.logon->network->nt.length); password 3522 source4/rpc_server/samr/dcesrv_samr.c &r->in.info->info23.password); password 3529 source4/rpc_server/samr/dcesrv_samr.c &r->in.info->info23.password); password 3541 source4/rpc_server/samr/dcesrv_samr.c &r->in.info->info24.password); password 3578 source4/rpc_server/samr/dcesrv_samr.c &r->in.info->info25.password); password 3585 source4/rpc_server/samr/dcesrv_samr.c &r->in.info->info25.password); password 3597 source4/rpc_server/samr/dcesrv_samr.c &r->in.info->info26.password); password 189 source4/rpc_server/samr/samr_password.c struct samr_CryptPassword *pwbuf = r->in.password; password 493 source4/rpc_server/srvsvc/dcesrv_srvsvc.c if (r->in.info->info2->password && r->in.info->info2->password[0]) { password 496 source4/rpc_server/srvsvc/dcesrv_srvsvc.c info[i].value = talloc_strdup(info, r->in.info->info2->password); password 591 source4/rpc_server/srvsvc/dcesrv_srvsvc.c if (r->in.info->info502->password && r->in.info->info502->password[0]) { password 594 source4/rpc_server/srvsvc/dcesrv_srvsvc.c info[i].value = talloc_strdup(info, r->in.info->info502->password); password 662 source4/rpc_server/srvsvc/dcesrv_srvsvc.c info->info2->password = talloc_strdup(mem_ctx, share_string_option(scfg, SHARE_PASSWORD, NULL)); password 689 source4/rpc_server/srvsvc/dcesrv_srvsvc.c info->info502->password = talloc_strdup(mem_ctx, share_string_option(scfg, SHARE_PASSWORD, NULL)); password 1100 source4/rpc_server/srvsvc/dcesrv_srvsvc.c const char *password, password 1141 source4/rpc_server/srvsvc/dcesrv_srvsvc.c if (password && password[0]) { password 1144 source4/rpc_server/srvsvc/dcesrv_srvsvc.c info[i].value = talloc_strdup(info, password); password 1278 source4/rpc_server/srvsvc/dcesrv_srvsvc.c r->in.info->info2->password, password 1312 source4/rpc_server/srvsvc/dcesrv_srvsvc.c r->in.info->info502->password, password 62 source4/smb_server/smb/reply.c p += req_pull_ascii4(&req->in.bufinfo, &con.tcon.in.password, p, STR_TERMINATE); password 65 source4/smb_server/smb/reply.c if (!con.tcon.in.service || !con.tcon.in.password || !con.tcon.in.dev) { password 109 source4/smb_server/smb/reply.c if (!req_pull_blob(&req->in.bufinfo, p, passlen, &con.tconx.in.password)) { password 1886 source4/smb_server/smb/reply.c if (!req_pull_blob(&req->in.bufinfo, p, passlen, &io->old.in.password)) { password 34 source4/smb_server/smb/service.c DATA_BLOB password, password 122 source4/smb_server/smb/service.c const char *service, DATA_BLOB password, password 173 source4/smb_server/smb/service.c return make_connection_scfg(req, scfg, type, password, dev); password 184 source4/smb_server/smb/service.c DATA_BLOB password; password 185 source4/smb_server/smb/service.c password = data_blob_string_const(con->tcon.in.password); password 187 source4/smb_server/smb/service.c status = make_connection(req, con->tcon.in.service, password, con->tcon.in.dev); password 201 source4/smb_server/smb/service.c status = make_connection(req, con->tconx.in.path, con->tconx.in.password, password 143 source4/smb_server/smb/sesssetup.c user_info->password.response.lanman = sess->old.in.password; password 144 source4/smb_server/smb/sesssetup.c user_info->password.response.lanman.data = talloc_steal(user_info, sess->old.in.password.data); password 145 source4/smb_server/smb/sesssetup.c user_info->password.response.nt = data_blob(NULL, 0); password 269 source4/smb_server/smb/sesssetup.c user_info->password.response.lanman = sess->nt1.in.password1; password 270 source4/smb_server/smb/sesssetup.c user_info->password.response.lanman.data = talloc_steal(user_info, sess->nt1.in.password1.data); password 271 source4/smb_server/smb/sesssetup.c user_info->password.response.nt = sess->nt1.in.password2; password 272 source4/smb_server/smb/sesssetup.c user_info->password.response.nt.data = talloc_steal(user_info, sess->nt1.in.password2.data); password 84 source4/torture/basic/base.c const char *password = torture_setting_string(tctx, "password", NULL); password 87 source4/torture/basic/base.c password)); password 410 source4/torture/basic/base.c const char *password = torture_setting_string(tctx, "password", NULL); password 432 source4/torture/basic/base.c if (NT_STATUS_IS_ERR(smbcli_tconX(cli, share, "?????", password))) { password 32 source4/torture/ldap/basic.c static bool test_bind_simple(struct ldap_connection *conn, const char *userdn, const char *password) password 37 source4/torture/ldap/basic.c status = torture_ldap_bind(conn, userdn, password); password 61 source4/torture/ldap/basic.c static bool test_multibind(struct ldap_connection *conn, const char *userdn, const char *password) password 73 source4/torture/ldap/basic.c ret = test_bind_simple(conn, userdn, password); password 28 source4/torture/ldap/common.c NTSTATUS torture_ldap_bind(struct ldap_connection *conn, const char *userdn, const char *password) password 32 source4/torture/ldap/common.c status = ldap_bind_simple(conn, userdn, password); password 81 source4/torture/ldap/common.c const char *url, const char *userdn, const char *password) password 88 source4/torture/ldap/common.c status = ldap_bind_simple(*conn, userdn, password); password 83 source4/torture/libnet/libnet_share.c info->password); password 109 source4/torture/libnet/libnet_share.c info->password); password 181 source4/torture/libnet/libnet_share.c i.password = NULL; password 24 source4/torture/locktest2.c static fstring password; password 168 source4/torture/locktest2.c password = talloc_strdup(mem_ctx, pass); password 176 source4/torture/locktest2.c username, lp_workgroup(), password, ev, password 531 source4/torture/locktest2.c password = talloc_strdup(mem_ctx, p+1); password 296 source4/torture/raw/context.c tcon.tconx.in.password = data_blob(NULL, 0); password 418 source4/torture/raw/context.c tcon.tconx.in.password = data_blob(NULL, 0); password 773 source4/torture/raw/context.c tcon.tconx.in.password = data_blob(NULL, 0); password 645 source4/torture/raw/lock.c tcon.tconx.in.password = data_blob(NULL, 0); password 1453 source4/torture/raw/notify.c tcon.tconx.in.password = data_blob(NULL, 0); password 70 source4/torture/rpc/dfs.c i.password = NULL; password 272 source4/torture/rpc/netlogon.c const char *password; password 289 source4/torture/rpc/netlogon.c password = generate_random_str(tctx, 8); password 290 source4/torture/rpc/netlogon.c E_md4hash(password, new_password.hash); password 296 source4/torture/rpc/netlogon.c password); password 314 source4/torture/rpc/netlogon.c "Changing machine account password to '%s' (same as previous run)\n", password); password 325 source4/torture/rpc/netlogon.c cli_credentials_set_password(machine_credentials, password, CRED_SPECIFIED); password 340 source4/torture/rpc/netlogon.c DATA_BLOB password = data_blob_talloc(mem_ctx, NULL, len * 2 /* number of unicode chars */); password 341 source4/torture/rpc/netlogon.c generate_random_buffer(password.data, password.length); password 344 source4/torture/rpc/netlogon.c if (((uint16_t *)password.data)[i] == 0) { password 345 source4/torture/rpc/netlogon.c ((uint16_t *)password.data)[i] = 1; password 349 source4/torture/rpc/netlogon.c return password; password 361 source4/torture/rpc/netlogon.c const char *password; password 381 source4/torture/rpc/netlogon.c password = generate_random_str(tctx, 8); password 382 source4/torture/rpc/netlogon.c encode_pw_buffer(password_buf.data, password, STR_UNICODE); password 389 source4/torture/rpc/netlogon.c torture_comment(tctx, "Changing machine account password to '%s'\n", password); password 400 source4/torture/rpc/netlogon.c cli_credentials_set_password(machine_credentials, password, CRED_SPECIFIED); password 411 source4/torture/rpc/netlogon.c password = ""; password 412 source4/torture/rpc/netlogon.c encode_pw_buffer(password_buf.data, password, STR_UNICODE); password 421 source4/torture/rpc/netlogon.c "Changing machine account password to '%s'\n", password); password 432 source4/torture/rpc/netlogon.c cli_credentials_set_password(machine_credentials, password, CRED_SPECIFIED); password 439 source4/torture/rpc/netlogon.c password = generate_random_str(tctx, 8); password 440 source4/torture/rpc/netlogon.c encode_pw_buffer(password_buf.data, password, STR_UNICODE); password 447 source4/torture/rpc/netlogon.c torture_comment(tctx, "Changing machine account password to '%s'\n", password); password 465 source4/torture/rpc/netlogon.c "Changing machine account password to '%s' (same as previous run)\n", password); password 476 source4/torture/rpc/netlogon.c cli_credentials_set_password(machine_credentials, password, CRED_SPECIFIED); password 525 source4/torture/rpc/netlogon.c struct samr_Password password; password 539 source4/torture/rpc/netlogon.c r.out.password = &password; password 556 source4/torture/rpc/netlogon.c struct samr_Password password, password2; password 570 source4/torture/rpc/netlogon.c r.out.password = &password; password 537 source4/torture/rpc/samba3rpc.c const char *username, const char *password, password 572 source4/torture/rpc/samba3rpc.c encode_pw_buffer(u_info.info23.password.data, password, password 580 source4/torture/rpc/samba3rpc.c arcfour_crypt_blob(u_info.info23.password.data, 516, password 776 source4/torture/rpc/samba3rpc.c encode_pw_buffer(u_info.info25.password.data, password 792 source4/torture/rpc/samba3rpc.c arcfour_crypt_blob(u_info.info25.password.data, 516, password 794 source4/torture/rpc/samba3rpc.c memcpy(&u_info.info25.password.data[516], confounder, 16); password 812 source4/torture/rpc/samba3rpc.c encode_pw_buffer(u_info.info24.password.data, password 823 source4/torture/rpc/samba3rpc.c arcfour_crypt_blob(u_info.info24.password.data, 516, password 1150 source4/torture/rpc/samba3rpc.c logon.password = &pinfo; password 1173 source4/torture/rpc/samba3rpc.c char *password = generate_random_str(wks_creds, 8); password 1188 source4/torture/rpc/samba3rpc.c E_md4hash(password, new_password.hash); password 1205 source4/torture/rpc/samba3rpc.c cli_credentials_set_password(wks_creds, password, password 1702 source4/torture/rpc/samba3rpc.c tcon.tconx.in.password = data_blob(NULL, 0); password 57 source4/torture/rpc/samlogon.c const char *password; password 287 source4/torture/rpc/samlogon.c lm_good = SMBencrypt(samlogon_state->password, samlogon_state->chall.data, lm_response.data); password 291 source4/torture/rpc/samlogon.c E_deshash(samlogon_state->password, lm_hash); password 294 source4/torture/rpc/samlogon.c SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, nt_response.data); password 296 source4/torture/rpc/samlogon.c E_md4hash(samlogon_state->password, nt_hash); password 418 source4/torture/rpc/samlogon.c SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, password 420 source4/torture/rpc/samlogon.c E_md4hash(samlogon_state->password, nt_hash); password 424 source4/torture/rpc/samlogon.c lm_good = E_deshash(samlogon_state->password, lm_hash); password 514 source4/torture/rpc/samlogon.c SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, password 516 source4/torture/rpc/samlogon.c E_md4hash(samlogon_state->password, nt_hash); password 520 source4/torture/rpc/samlogon.c lm_good = E_deshash(samlogon_state->password, lm_hash); password 610 source4/torture/rpc/samlogon.c samlogon_state->password, &samlogon_state->chall, password 621 source4/torture/rpc/samlogon.c samlogon_state->password, &samlogon_state->chall, password 757 source4/torture/rpc/samlogon.c SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, password 759 source4/torture/rpc/samlogon.c E_md4hash(samlogon_state->password, nt_hash); password 763 source4/torture/rpc/samlogon.c lm_good = E_deshash(samlogon_state->password, lm_hash); password 776 source4/torture/rpc/samlogon.c samlogon_state->password, &samlogon_state->chall, password 788 source4/torture/rpc/samlogon.c samlogon_state->password, &samlogon_state->chall, password 1072 source4/torture/rpc/samlogon.c E_md4hash(samlogon_state->password, (uint8_t *)nt_hash); password 1073 source4/torture/rpc/samlogon.c lm_good = E_deshash(samlogon_state->password, (uint8_t *)lm_hash); password 1077 source4/torture/rpc/samlogon.c SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, nt_response.data); password 1151 source4/torture/rpc/samlogon.c char *password; password 1160 source4/torture/rpc/samlogon.c bool lm_good = E_deshash(samlogon_state->password, lm_hash); password 1165 source4/torture/rpc/samlogon.c &unicodepw, samlogon_state->password, NULL)) { password 1170 source4/torture/rpc/samlogon.c nt_response = data_blob_talloc(samlogon_state->mem_ctx, unicodepw, strlen_m(samlogon_state->password)*2); password 1172 source4/torture/rpc/samlogon.c password = strupper_talloc(samlogon_state->mem_ctx, samlogon_state->password); password 1177 source4/torture/rpc/samlogon.c password, strlen(password)+1, password 1347 source4/torture/rpc/samlogon.c samlogon_state.password = plain_pass; password 1459 source4/torture/rpc/samlogon.c logon.password = &pinfo; password 1660 source4/torture/rpc/samlogon.c const char *password; password 1671 source4/torture/rpc/samlogon.c .password = cli_credentials_get_password(cmdline_credentials), password 1680 source4/torture/rpc/samlogon.c .password = cli_credentials_get_password(cmdline_credentials), password 1693 source4/torture/rpc/samlogon.c .password = cli_credentials_get_password(cmdline_credentials), password 1706 source4/torture/rpc/samlogon.c .password = cli_credentials_get_password(cmdline_credentials), password 1715 source4/torture/rpc/samlogon.c .password = cli_credentials_get_password(machine_credentials), password 1724 source4/torture/rpc/samlogon.c .password = cli_credentials_get_password(machine_credentials), password 1733 source4/torture/rpc/samlogon.c .password = cli_credentials_get_password(machine_credentials), password 1746 source4/torture/rpc/samlogon.c .password = cli_credentials_get_password(machine_credentials), password 1759 source4/torture/rpc/samlogon.c .password = cli_credentials_get_password(machine_credentials), password 1768 source4/torture/rpc/samlogon.c .password = user_password, password 1780 source4/torture/rpc/samlogon.c .password = user_password, password 1792 source4/torture/rpc/samlogon.c .password = user_password, password 1802 source4/torture/rpc/samlogon.c .password = old_user_password, password 1812 source4/torture/rpc/samlogon.c .password = user_password_wrong_wks, password 1827 source4/torture/rpc/samlogon.c usercreds[ci].password, password 1838 source4/torture/rpc/samlogon.c usercreds[ci].password, password 1860 source4/torture/rpc/samlogon.c usercreds[0].password, password 1871 source4/torture/rpc/samlogon.c usercreds[0].password, password 72 source4/torture/rpc/samr.c struct policy_handle *domain_handle, char **password); password 587 source4/torture/rpc/samr.c DATA_BLOB password = data_blob_talloc(mem_ctx, NULL, len * 2 /* number of unicode chars */); password 588 source4/torture/rpc/samr.c generate_random_buffer(password.data, password.length); password 591 source4/torture/rpc/samr.c if (((uint16_t *)password.data)[i] == 0) { password 592 source4/torture/rpc/samr.c ((uint16_t *)password.data)[i] = 1; password 596 source4/torture/rpc/samr.c return password; password 610 source4/torture/rpc/samr.c struct policy_handle *handle, char **password) password 634 source4/torture/rpc/samr.c encode_pw_buffer(u.info24.password.data, newpass, STR_UNICODE); password 644 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info24.password.data, 516, &session_key); password 654 source4/torture/rpc/samr.c *password = newpass; password 663 source4/torture/rpc/samr.c char **password) password 691 source4/torture/rpc/samr.c encode_pw_buffer(u.info23.password.data, newpass, STR_UNICODE); password 700 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info23.password.data, 516, &session_key); password 710 source4/torture/rpc/samr.c *password = newpass; password 713 source4/torture/rpc/samr.c encode_pw_buffer(u.info23.password.data, newpass, STR_UNICODE); password 724 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info23.password.data, 516, &session_key); password 741 source4/torture/rpc/samr.c char **password) password 772 source4/torture/rpc/samr.c encode_pw_buffer(u.info26.password.data, newpass, STR_UNICODE); password 789 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info26.password.data, 516, &confounded_session_key); password 790 source4/torture/rpc/samr.c memcpy(&u.info26.password.data[516], confounder, 16); password 800 source4/torture/rpc/samr.c *password = newpass; password 806 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info26.password.data, 516, &confounded_session_key); password 807 source4/torture/rpc/samr.c memcpy(&u.info26.password.data[516], confounder, 16); password 817 source4/torture/rpc/samr.c *password = newpass; password 825 source4/torture/rpc/samr.c char **password) password 856 source4/torture/rpc/samr.c encode_pw_buffer(u.info25.password.data, newpass, STR_UNICODE); password 872 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info25.password.data, 516, &confounded_session_key); password 873 source4/torture/rpc/samr.c memcpy(&u.info25.password.data[516], confounder, 16); password 883 source4/torture/rpc/samr.c *password = newpass; password 889 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info25.password.data, 516, &confounded_session_key); password 890 source4/torture/rpc/samr.c memcpy(&u.info25.password.data[516], confounder, 16); password 905 source4/torture/rpc/samr.c struct policy_handle *handle, char **password) password 969 source4/torture/rpc/samr.c *password = newpass; password 977 source4/torture/rpc/samr.c char **password) password 1057 source4/torture/rpc/samr.c *password = newpass; password 1095 source4/torture/rpc/samr.c char **password, uint8_t password_expired, password 1182 source4/torture/rpc/samr.c encode_pw_buffer(u.info23.password.data, newpass, STR_UNICODE); password 1188 source4/torture/rpc/samr.c encode_pw_buffer(u.info24.password.data, newpass, STR_UNICODE); password 1196 source4/torture/rpc/samr.c encode_pw_buffer(u.info25.password.data, newpass, STR_UNICODE); password 1202 source4/torture/rpc/samr.c encode_pw_buffer(u.info26.password.data, newpass, STR_UNICODE); password 1258 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info23.password.data, 516, &session_key); password 1261 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info24.password.data, 516, &session_key); password 1264 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info25.password.data, 516, &confounded_session_key); password 1265 source4/torture/rpc/samr.c memcpy(&u.info25.password.data[516], confounder, 16); password 1268 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info26.password.data, 516, &confounded_session_key); password 1269 source4/torture/rpc/samr.c memcpy(&u.info26.password.data[516], confounder, 16); password 1307 source4/torture/rpc/samr.c *password = newpass; password 1594 source4/torture/rpc/samr.c struct policy_handle *handle, char **password) password 1626 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL, password 1629 source4/torture/rpc/samr.c oldpass = *password; password 1755 source4/torture/rpc/samr.c *password = newpass; password 1793 source4/torture/rpc/samr.c *password = newpass; password 1836 source4/torture/rpc/samr.c *password = newpass; password 1872 source4/torture/rpc/samr.c struct policy_handle *handle, char **password) password 1896 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL, password 1899 source4/torture/rpc/samr.c oldpass = *password; password 1920 source4/torture/rpc/samr.c r.in.password = &lm_pass; password 1945 source4/torture/rpc/samr.c r.in.password = &lm_pass; password 1962 source4/torture/rpc/samr.c r.in.password = &lm_pass; password 1989 source4/torture/rpc/samr.c r.in.password = &lm_pass; password 2003 source4/torture/rpc/samr.c r.in.password = NULL; password 2023 source4/torture/rpc/samr.c r.in.password = &lm_pass; password 2033 source4/torture/rpc/samr.c *password = newpass; password 2042 source4/torture/rpc/samr.c char **password, password 2066 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL, password 2068 source4/torture/rpc/samr.c oldpass = *password; password 2112 source4/torture/rpc/samr.c *password = newpass; password 2122 source4/torture/rpc/samr.c char **password, password 2154 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL, password 2157 source4/torture/rpc/samr.c oldpass = *password; password 2331 source4/torture/rpc/samr.c password, NULL, 0, false); password 2345 source4/torture/rpc/samr.c *password = talloc_strdup(tctx, newpass); password 2354 source4/torture/rpc/samr.c char **password) password 2379 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL, password 2382 source4/torture/rpc/samr.c oldpass = *password; password 2394 source4/torture/rpc/samr.c set_pw_in_buffer(u.info25.password.data, &new_random_pass); password 2410 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info25.password.data, 516, &confounded_session_key); password 2411 source4/torture/rpc/samr.c memcpy(&u.info25.password.data[516], confounder, 16); password 2497 source4/torture/rpc/samr.c *password = talloc_strdup(tctx, newpass); password 2785 source4/torture/rpc/samr.c char *password, password 2800 source4/torture/rpc/samr.c password, CRED_SPECIFIED); password 2804 source4/torture/rpc/samr.c acct_name, TEST_ACCOUNT_NAME_PWD, password); password 2825 source4/torture/rpc/samr.c char **password, password 2852 source4/torture/rpc/samr.c password, password 2872 source4/torture/rpc/samr.c *password, password 2885 source4/torture/rpc/samr.c char **password, password 2973 source4/torture/rpc/samr.c password, password 3046 source4/torture/rpc/samr.c password, password 3126 source4/torture/rpc/samr.c password, password 3179 source4/torture/rpc/samr.c password, password 3586 source4/torture/rpc/samr.c char *password = NULL; password 3633 source4/torture/rpc/samr.c if (!test_SetUserPass(p, tctx, user_handle, &password)) { password 3648 source4/torture/rpc/samr.c if (!test_SetUserPassEx(p, tctx, user_handle, true, &password)) { password 3652 source4/torture/rpc/samr.c if (!test_ChangePasswordUser2(p, tctx, base_acct_name, &password, simple_pass, false)) { password 3657 source4/torture/rpc/samr.c if (!test_SetUserPassEx(p, tctx, user_handle, true, &password)) { password 3662 source4/torture/rpc/samr.c if (!test_ChangePasswordUser2(p, tctx, base_acct_name, &password, samr_rand_pass(tctx, 4), false)) { password 3667 source4/torture/rpc/samr.c if (!test_ChangePasswordRandomBytes(p, tctx, base_acct_name, user_handle, &password)) { password 3673 source4/torture/rpc/samr.c if (!test_SetUserPass_23(p, tctx, user_handle, password_fields[i], &password)) { password 3678 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) { password 3684 source4/torture/rpc/samr.c if (!test_SetUserPass_25(p, tctx, user_handle, password_fields[i], &password)) { password 3689 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) { password 3694 source4/torture/rpc/samr.c if (!test_SetUserPassEx(p, tctx, user_handle, false, &password)) { password 3698 source4/torture/rpc/samr.c if (!test_ChangePassword(p, tctx, base_acct_name, domain_handle, &password)) { password 3706 source4/torture/rpc/samr.c if (!test_SetUserPass_18(p, tctx, user_handle, &password)) { password 3710 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) { password 3722 source4/torture/rpc/samr.c if (!test_SetUserPass_21(p, tctx, user_handle, password_fields[i], &password)) { password 3727 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) { password 3767 source4/torture/rpc/samr.c user_handle, &password, password 4065 source4/torture/rpc/samr.c struct policy_handle *domain_handle, char **password) password 4069 source4/torture/rpc/samr.c if (!*password) { password 4073 source4/torture/rpc/samr.c if (!test_ChangePasswordUser(p, tctx, acct_name, domain_handle, password)) { password 4077 source4/torture/rpc/samr.c if (!test_ChangePasswordUser2(p, tctx, acct_name, password, 0, true)) { password 4081 source4/torture/rpc/samr.c if (!test_OemChangePasswordUser2(p, tctx, acct_name, domain_handle, password)) { password 4086 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, *password, 0, true)) { password 4098 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, simple_pass, 0, true)) { password 4147 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, len - 1, password, NULL, 0, true)) { password 4208 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, NULL, password 4216 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, NULL, 0, true)) { password 4220 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, NULL, 0, true)) { password 773 source4/torture/rpc/schannel.c char *password = generate_random_str(s->join_ctx1, 8); password 798 source4/torture/rpc/schannel.c E_md4hash(password, new_password.hash); password 814 source4/torture/rpc/schannel.c cli_credentials_set_password(s->wks_creds1, password, password 576 source4/torture/rpc/srvsvc.c info.info2->password = NULL; password 618 source4/torture/rpc/srvsvc.c info.info2->password = NULL; password 637 source4/torture/rpc/srvsvc.c info.info502->password = NULL; password 249 source4/torture/rpc/testjoin.c encode_pw_buffer(u.info24.password.data, random_pw, STR_UNICODE); password 260 source4/torture/rpc/testjoin.c arcfour_crypt_blob(u.info24.password.data, 516, &session_key); password 349 source4/torture/rpc/wkssvc.c info1.password = NULL; password 831 source4/torture/rpc/wkssvc.c r.in.password = NULL; password 1108 source4/torture/rpc/wkssvc.c r.in.password = NULL; password 1138 source4/torture/rpc/wkssvc.c r.in.password = NULL; password 897 source4/torture/util_smb.c tcon.tconx.in.password = data_blob(NULL, 0); password 284 source4/utils/ntlm_auth.c unsigned int mux_id, void **password) password 301 source4/utils/ntlm_auth.c *password = talloc_strndup(*private1 /* hopefully the right gensec context, useful to use for talloc */, password 304 source4/utils/ntlm_auth.c if (*password == NULL) { password 328 source4/utils/ntlm_auth.c char *password = NULL; password 334 source4/utils/ntlm_auth.c manage_squid_request(cmdline_lp_ctx, NUM_HELPER_MODES /* bogus */, manage_gensec_get_pw_request, (void **)&password); password 335 source4/utils/ntlm_auth.c return password;