Lines Matching defs:crypted
503 const char *crypted, const char *salt)
519 ret = (strcmp(osf1_bigcrypt(password, salt), crypted) == 0);
524 ret = (strcmp((char *)crypt(password, salt), crypted) == 0);
535 ret = (strcmp((char *)crypt16(password, salt), crypted) == 0);
545 ret = (linux_bigcrypt(password, salt, crypted));
562 if (strcmp(bigcrypt(password, salt), crypted) == 0)
565 ret = (strcmp((char *)crypt(password, salt), crypted) == 0);
574 ret = (strcmp(bigcrypt(password, salt), crypted) == 0);
586 ret = (strcmp((char *)crypt(password, salt), crypted) == 0);
603 char *crypted;
618 crypted = pws->pw_passwd;
632 crypted = talloc_strdup(ctx, spass->sp_pwdp);
633 NT_STATUS_HAVE_NO_MEMORY(crypted);
648 crypted = talloc_strdup(ctx, ia_password);
649 NT_STATUS_HAVE_NO_MEMORY(crypted);
658 crypted = talloc_strdup(ctx, pr_pw->ufld.fd_encrypt);
659 NT_STATUS_HAVE_NO_MEMORY(crypted);
669 crypted = talloc_strdup(ctx, pwret->pwa_passwd);
670 NT_STATUS_HAVE_NO_MEMORY(crypted);
683 crypted = talloc_strdup(ctx, mypasswd->ufld.fd_encrypt);
684 NT_STATUS_HAVE_NO_MEMORY(crypted);
695 crypted = talloc_strdup(ctx, ap->a_password);
697 NT_STATUS_HAVE_NO_MEMORY(crypted);
708 if (crypted[0] == '\0') {
721 nt_status = password_check(username, password, crypted, salt);
750 nt_status = password_check(username, pwcopy, crypted, salt);