/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/smbd/ |
H A D | service.c | 269 DATA_BLOB password, 338 if (!authorise_login(snum,user,password,&guest)) { 339 DEBUG( 2, ( "Invalid username/password for [%s]\n", 692 connection_struct *make_connection_with_chdir(const char *service_in, DATA_BLOB password, argument 697 conn = make_connection(service_in, password, dev, vuid, status); 722 connection_struct *make_connection(const char *service_in, DATA_BLOB password, argument 780 password, 823 password, 268 make_connection_snum(int snum, user_struct *vuser, DATA_BLOB password, const char *pdev, NTSTATUS *status) argument
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/fs/ecryptfs/ |
H A D | keystore.c | 762 memcpy((*new_auth_tok)->token.password.salt, 768 (*new_auth_tok)->token.password.hash_iterations = 784 (*new_auth_tok)->token.password.hash_algo = 0x01; 938 password_s_ptr = &auth_tok->token.password; 1120 ecryptfs_to_hex(new_auth_tok->token.password.signature, 1122 new_auth_tok->token.password.signature[ 1181 && !strncmp(candidate_auth_tok->token.password.signature, 1212 memcpy(&(candidate_auth_tok->token.password), 1213 &(chosen_auth_tok->token.password), 1467 ecryptfs_from_hex(key_rec->sig, auth_tok->token.password [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/passdb/ |
H A D | pdb_nds.c | 47 const char *password, 65 if (password != NULL) 67 utf8PwdSize = strlen(password)+1; 68 utf8PwdPtr = password; 84 if (password != NULL && password2 != NULL) 86 /* BER encode the NMAS Version, the objectDN, and the password */ 89 else if (password != NULL) 91 /* BER encode the NMAS Version, the objectDN, and the password */ 422 case 1: /* cleartext password */ 660 Get the user's password fro 44 berEncodePasswordData( struct berval **requestBV, const char *objectDN, const char *password, const char *password2) argument [all...] |
H A D | secrets.c | 24 such as the local SID and machine trust password */ 209 * Form a key for fetching the machine trust account password 213 * @return stored password's key 227 * Form a key for fetching a trusted domain password 231 * @return stored password's key 244 Lock the trust password entry. 274 Routine to get the trust account password for a domain. 275 The user of this function must have locked the trust password file using 290 DEBUG(4,("Using cleartext machine password\n")); 317 Routine to get account password t 811 secrets_fetch_ipc_userpass(char **username, char **domain, char **password) argument [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/sam/ |
H A D | idmap_rid.c | 149 const char *password = NULL; local 195 password = secrets_fetch(SECRETS_AUTH_PASSWORD, NULL); 203 if (!password) 204 password = smb_xstrdup(""); 213 password = ""; 223 password,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/utils/ |
H A D | smbget.c | 43 const char *username = NULL, *password = NULL, *workgroup = NULL; variable 94 if(!nonprompt && !password) { 100 } else if(password) strncpy(pw, password, pwlen-1); 521 {"password", 'p', POPT_ARG_STRING, &password, 'p', "Password to use" }, 557 username = ""; password = "";
|
H A D | net_ads.c | 47 "\nnet ads password <username@realm> <password> -Uadmin_username@realm%%admin_pass"\ 48 "\n\tchange a user's password using an admin account"\ 49 "\n\t(note: use realm in UPPERCASE, prompts if password is obmitted)\n"\ 51 "\n\tchange the trust account password of this machine in the AD tree\n"\ 160 asprintf(&prompt,"%s's password: ", opt_user_name); 167 ads->auth.password = smb_xstrdup(opt_password); 201 ads_startup() stores the password in opt_password if it needs to so 317 /* if no password is to be set, we're done */ 324 /* try setting the password */ 703 char *password; local [all...] |
H A D | smbtree.c | 226 pstrcpy(cmdline_auth_info.password, pass);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp/pppd/ |
H A D | upap.c | 40 { "hide-password", o_bool, &hide_password,
42 { "show-password", o_bool, &hide_password,
43 "Show password string in debug log messages", OPT_PRIOSUB | 0 },
126 upap_authwithpeer(unit, user, password)
128 char *user, *password;
132 /* Save the username and password we're given */
135 u->us_passwd = password;
136 u->us_passwdlen = strlen(password);
399 * Check the username and password given.
612 printer(arg, " password [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/pppd/ |
H A D | upap.c | 63 { "hide-password", o_bool, &hide_password, 65 { "show-password", o_bool, &hide_password, 66 "Show password string in debug log messages", OPT_PRIOSUB | 0 }, 149 upap_authwithpeer(unit, user, password) 151 char *user, *password; 155 /* Save the username and password we're given */ 158 u->us_passwd = password; 159 u->us_passwdlen = strlen(password); 423 * Check the username and password given. 654 printer(arg, " password [all...] |
H A D | srp-entry.c | 186 (char *)pwval.pebuf.password.data, pwval.pebuf.password.len),
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libads/ |
H A D | ads_struct.c | 129 SAFE_FREE((*ads)->auth.password);
|
H A D | sasl.c | 41 if (!ads->auth.password) { 42 /* No password, don't segfault below... */ 84 /* encrypt the password with the challenge */ 86 SMBencrypt(ads->auth.password, challenge,lmhash); 87 SMBNTencrypt(ads->auth.password, challenge,nthash);
|
H A D | kerberos_keytab.c | 44 krb5_data password; local 86 /* retrieve the password */ 94 DEBUG(1,("ads_keytab_add_entry: failed to fetch machine password\n")); 98 password.data = password_s; 99 password.length = strlen(password_s); 162 * work. Otherwise, when the password for the machine changes, all 260 if (create_kerberos_key_from_string(context, princ, &password, keyp, enctypes[i])) {
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | smbencrypt.c | 29 This implements the X/Open SMB password encryption 30 It takes a password ('unix' string), a 8 byte "crypt key" 31 and puts 24 bytes of encrypted password into p24 33 Returns False if password must have been truncated to create LM hash 56 * Creates the MD4 Hash of the users password in NT UNICODE. 57 * @param passwd password in 'unix' charset. 58 * @param p16 return password hashed with md4, caller allocated 16 byte buffer 96 * Creates the DES forward-only Hash of the users password in DOS ASCII charset 97 * @param passwd password in 'unix' charset. 98 * @param p16 return password hashe 445 SMBNTLMv2encrypt(const char *user, const char *domain, const char *password, const DATA_BLOB *server_chal, const DATA_BLOB *names_blob, DATA_BLOB *lm_response, DATA_BLOB *nt_response, DATA_BLOB *user_session_key) argument 488 encode_pw_buffer(char buffer[516], const char *password, int string_flags) argument [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/misc/ |
H A D | check_multiple_LDAP_entries.pl | 14 print "usage: $0 -h host -b base -D admindn -w password [-l]\n"; 25 my $bindpw = $opts{w} || die "please set password with -w"; 59 $res = $ldap->bind( $binddn, password => $bindpw);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/tridge/ |
H A D | smb.conf | 12 password level = 2
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/fs/cifs/ |
H A D | connect.c | 61 char *password; member in struct:smb_vol 843 vol->password = NULL; 847 since that would mean the password really 851 vol->password = NULL; 856 /* removed password length check, NTLM passwords 859 /* if comma in password, the string will be 860 prematurely null terminated. Commas in password are 866 /* NB: password legally can have multiple commas and 867 the only illegal character in a password is null */ 898 vol->password [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/netatalk-2.2.0/etc/uams/ |
H A D | uams_pam.c | 68 * echo off means password. 295 /* old password */ 300 /* let's do a quick check for the same password */ 325 /* new password */ 350 char password[PASSWDLEN + 1] = "\0"; local 363 * (username) (password) 382 /* Parse input for password in next () */ 385 LOG(log_info, logtype_uams,"Bad Login ClearTxtUAM: password not found in string"); 389 memcpy(password, p, MIN(PASSWDLEN, (q - p)) ); 391 /* Done copying username and password, clea [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/rpc_client/ |
H A D | cli_netlogon.c | 147 password ?).\n", cli->desthost )); 223 password ?).\n", cli->desthost )); 531 const char *username, const char *password, 567 nt_lm_owf_gen(password, nt_owf_user_pwd, lm_owf_user_pwd); 585 SMBencrypt(password, chal, local_lm_response); 586 SMBNTencrypt(password, chal, local_nt_response); 804 password ?).\n", cli->desthost )); 529 cli_netlogon_sam_logon(struct cli_state *cli, TALLOC_CTX *mem_ctx, DOM_CRED *ret_creds, const char *username, const char *password, int logon_type) argument
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/rpcclient/ |
H A D | rpcclient.c | 732 * Get password 739 pstrcpy(cmdline_auth_info.password, pass); 748 cmdline_auth_info.password, 757 memset(cmdline_auth_info.password,'X',sizeof(cmdline_auth_info.password));
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/torture/ |
H A D | locktest2.c | 25 static fstring password; variable 172 fstrcpy(password, pass); 179 username, lp_workgroup(), password, 0, 519 fstrcpy(password, p+1);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/zebra/lib/ |
H A D | command.h | 36 char *password; member in struct:host 39 /* Enable password */
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/include/ |
H A D | ads.h | 27 char *password; member in struct:__anon1589::__anon1591
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/nsswitch/ |
H A D | pam_winbind.c | 154 /* incorrect password */ 155 _pam_log(LOG_WARNING, "user `%s' denied access (incorrect password or invalid membership)", user); 162 /* password expired */ 163 _pam_log(LOG_WARNING, "user `%s' password expired", user); 166 /* password expired */ 167 _pam_log(LOG_WARNING, "user `%s' new password required", user); 184 _pam_log(LOG_NOTICE, "user '%s' password changed", user); 297 * obtain a password from the user 325 * should we obtain the password from a PAM item ? 333 "pam_get_item returned error to unix-read-password" 453 const char *password; local [all...] |