• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/passdb/

Lines Matching defs:password

24    such as the local SID and machine trust password */
205 * Form a key for fetching the machine trust account password
209 * @return stored password's key
223 * Form a key for fetching a trusted domain password
227 * @return stored password's key
240 Lock the trust password entry.
270 Routine to get the trust account password for a domain.
271 The user of this function must have locked the trust password file using
286 DEBUG(4,("Using cleartext machine password\n"));
312 /* Test if machine password has expired and needs to be changed */
392 * @param pass pointer to trusted domain password to be packed
403 /* packing unicode domain name and password */
426 * @param pass pointer to trusted domain password to be filled with unpacked data
437 /* unpack unicode domain name and plaintext password */
455 Routine to get account password to trusted domain
470 /* fetching trusted domain password structure */
477 /* unpack trusted domain password */
486 /* the trust's password */
504 Routine to set the trust account password for a domain.
518 * Routine to store the password for trusted domain
521 * @param pwd plain text password of trust relationship
553 /* password of the trust */
566 Routine to set the plaintext machine account password for a realm
567 the password is assumed to be a null terminated ascii string
610 Routine to fetch the plaintext machine account password for a realm
611 the password is assumed to be a null terminated ascii string.
659 Wrapper around retrieving the trust account password
675 "account password for trusted domain %s\n",
695 "password for domain %s\n", domain));
700 Routine to delete the machine trust account password file for a domain.
709 Routine to delete the password for trusted domain
734 Find the ldap password.
1008 Caller to free() result in domain, username, password
1010 void secrets_fetch_ipc_userpass(char **username, char **domain, char **password)
1014 *password = (char *)secrets_fetch(SECRETS_AUTH_PASSWORD, NULL);
1021 if (!*password || !**password)
1022 *password = smb_xstrdup("");
1031 *password = smb_xstrdup("");
1273 Find the ldap password.