• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/

Lines Matching defs:password

21 /* this module is for checking a username/password against a system
22 password database. The SMB encrypted password support is elsewhere */
44 static BOOL afs_auth(char *user, char *password)
55 password, 0, /* lifetime, default */
93 static BOOL dfs_auth(char *user, char *password)
112 * We only go for a DCE login context if the given password
113 * matches that stored in the local password file..
117 if (strcmp((char *)crypt(password, this_salt), this_crypted))
274 passwd_rec.key.tagged_union.plain = (idl_char *) password;
383 an enhanced crypt for Linux to handle password longer than 8 characters
385 static int linux_bigcrypt(char *password, char *salt1, char *crypted)
394 for (i = strlen(password); i > 0; i -= LINUX_PASSWORD_SEG_CHARS) {
395 char *p = crypt(password, salt) + 2;
398 password += LINUX_PASSWORD_SEG_CHARS;
410 static char *osf1_bigcrypt(char *password, char *salt1)
414 char *p2 = password;
417 int parts = strlen(password) / AUTH_CLEARTEXT_SEG_CHARS;
418 if (strlen(password) % AUTH_CLEARTEXT_SEG_CHARS)
491 core of password checking routine
493 static NTSTATUS password_check(const char *password)
496 return smb_pam_passcheck(this_user, password);
502 if (afs_auth(this_user, password))
507 if (dfs_auth(this_user, password))
513 ret = (strcmp(osf1_bigcrypt(password, this_salt),
518 ret = (strcmp((char *)crypt(password, this_salt), this_crypted) == 0);
529 ret = (strcmp((char *)crypt16(password, this_salt), this_crypted) == 0);
539 ret = (linux_bigcrypt(password, this_salt, this_crypted));
551 * actually use it for the password hashes (HPUX 10.20) is
556 if (strcmp(bigcrypt(password, this_salt), this_crypted) == 0)
559 ret = (strcmp((char *)crypt(password, this_salt), this_crypted) == 0);
568 ret = (strcmp(bigcrypt(password, this_salt), this_crypted) == 0);
580 ret = (strcmp((char *)crypt(password, this_salt), this_crypted) == 0);
594 CHECK if a username/password is OK
596 match is found and is used to update the encrypted password file
600 NTSTATUS pass_check(const struct passwd *pass, const char *user, const char *password,
609 DEBUG(100, ("checking user=[%s] pass=[%s]\n", user, password));
612 if (!password)
615 if (((!*password) || (!pwlen)) && !lp_null_passwords())
627 DEBUG(4, ("pass_check: Checking (PAM) password for user %s (l=%d)\n", user, pwlen));
631 DEBUG(4, ("pass_check: Checking password for user %s (l=%d)\n", user, pwlen));
640 /* Also the place to keep the 'password' no matter what
650 the password, in most cases this should already be
652 perhaps for IPC password changing requests */
662 /* Need to get password with SVR4.2's ia_ functions
692 DEBUG(5, ("Checking password for user %s in OSF1_ENH_SEC\n",
724 DEBUG(2, ("Disallowing %s with null password\n",
728 if (!*password) {
730 ("Allowing access to %s with null password\n",
739 nt_status = password_check(password);
742 fn(user, password);
746 /* No point continuing if its not the password thats to blame (ie PAM disabled). */
754 /* if the password was given to us with mixed case then we don't
757 if (strhasupper(password) && strhaslower(password)) {
762 pstrcpy(pass2, password);