Searched refs:password (Results 226 - 250 of 314) sorted by relevance

1234567891011>>

/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/smbd/
H A Dservice.c269 DATA_BLOB password,
338 if (!authorise_login(snum,user,password,&guest)) {
339 DEBUG( 2, ( "Invalid username/password for [%s]\n",
692 connection_struct *make_connection_with_chdir(const char *service_in, DATA_BLOB password, argument
697 conn = make_connection(service_in, password, dev, vuid, status);
722 connection_struct *make_connection(const char *service_in, DATA_BLOB password, argument
780 password,
823 password,
268 make_connection_snum(int snum, user_struct *vuser, DATA_BLOB password, const char *pdev, NTSTATUS *status) argument
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/fs/ecryptfs/
H A Dkeystore.c762 memcpy((*new_auth_tok)->token.password.salt,
768 (*new_auth_tok)->token.password.hash_iterations =
784 (*new_auth_tok)->token.password.hash_algo = 0x01;
938 password_s_ptr = &auth_tok->token.password;
1120 ecryptfs_to_hex(new_auth_tok->token.password.signature,
1122 new_auth_tok->token.password.signature[
1181 && !strncmp(candidate_auth_tok->token.password.signature,
1212 memcpy(&(candidate_auth_tok->token.password),
1213 &(chosen_auth_tok->token.password),
1467 ecryptfs_from_hex(key_rec->sig, auth_tok->token.password
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/passdb/
H A Dpdb_nds.c47 const char *password,
65 if (password != NULL)
67 utf8PwdSize = strlen(password)+1;
68 utf8PwdPtr = password;
84 if (password != NULL && password2 != NULL)
86 /* BER encode the NMAS Version, the objectDN, and the password */
89 else if (password != NULL)
91 /* BER encode the NMAS Version, the objectDN, and the password */
422 case 1: /* cleartext password */
660 Get the user's password fro
44 berEncodePasswordData( struct berval **requestBV, const char *objectDN, const char *password, const char *password2) argument
[all...]
H A Dsecrets.c24 such as the local SID and machine trust password */
209 * Form a key for fetching the machine trust account password
213 * @return stored password's key
227 * Form a key for fetching a trusted domain password
231 * @return stored password's key
244 Lock the trust password entry.
274 Routine to get the trust account password for a domain.
275 The user of this function must have locked the trust password file using
290 DEBUG(4,("Using cleartext machine password\n"));
317 Routine to get account password t
811 secrets_fetch_ipc_userpass(char **username, char **domain, char **password) argument
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/sam/
H A Didmap_rid.c149 const char *password = NULL; local
195 password = secrets_fetch(SECRETS_AUTH_PASSWORD, NULL);
203 if (!password)
204 password = smb_xstrdup("");
213 password = "";
223 password,
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/utils/
H A Dsmbget.c43 const char *username = NULL, *password = NULL, *workgroup = NULL; variable
94 if(!nonprompt && !password) {
100 } else if(password) strncpy(pw, password, pwlen-1);
521 {"password", 'p', POPT_ARG_STRING, &password, 'p', "Password to use" },
557 username = ""; password = "";
H A Dnet_ads.c47 "\nnet ads password <username@realm> <password> -Uadmin_username@realm%%admin_pass"\
48 "\n\tchange a user's password using an admin account"\
49 "\n\t(note: use realm in UPPERCASE, prompts if password is obmitted)\n"\
51 "\n\tchange the trust account password of this machine in the AD tree\n"\
160 asprintf(&prompt,"%s's password: ", opt_user_name);
167 ads->auth.password = smb_xstrdup(opt_password);
201 ads_startup() stores the password in opt_password if it needs to so
317 /* if no password is to be set, we're done */
324 /* try setting the password */
703 char *password; local
[all...]
H A Dsmbtree.c226 pstrcpy(cmdline_auth_info.password, pass);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp/pppd/
H A Dupap.c40 { "hide-password", o_bool, &hide_password,
42 { "show-password", o_bool, &hide_password,
43 "Show password string in debug log messages", OPT_PRIOSUB | 0 },
126 upap_authwithpeer(unit, user, password)
128 char *user, *password;
132 /* Save the username and password we're given */
135 u->us_passwd = password;
136 u->us_passwdlen = strlen(password);
399 * Check the username and password given.
612 printer(arg, " password
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/pppd/
H A Dupap.c63 { "hide-password", o_bool, &hide_password,
65 { "show-password", o_bool, &hide_password,
66 "Show password string in debug log messages", OPT_PRIOSUB | 0 },
149 upap_authwithpeer(unit, user, password)
151 char *user, *password;
155 /* Save the username and password we're given */
158 u->us_passwd = password;
159 u->us_passwdlen = strlen(password);
423 * Check the username and password given.
654 printer(arg, " password
[all...]
H A Dsrp-entry.c186 (char *)pwval.pebuf.password.data, pwval.pebuf.password.len),
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libads/
H A Dads_struct.c129 SAFE_FREE((*ads)->auth.password);
H A Dsasl.c41 if (!ads->auth.password) {
42 /* No password, don't segfault below... */
84 /* encrypt the password with the challenge */
86 SMBencrypt(ads->auth.password, challenge,lmhash);
87 SMBNTencrypt(ads->auth.password, challenge,nthash);
H A Dkerberos_keytab.c44 krb5_data password; local
86 /* retrieve the password */
94 DEBUG(1,("ads_keytab_add_entry: failed to fetch machine password\n"));
98 password.data = password_s;
99 password.length = strlen(password_s);
162 * work. Otherwise, when the password for the machine changes, all
260 if (create_kerberos_key_from_string(context, princ, &password, keyp, enctypes[i])) {
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libsmb/
H A Dsmbencrypt.c29 This implements the X/Open SMB password encryption
30 It takes a password ('unix' string), a 8 byte "crypt key"
31 and puts 24 bytes of encrypted password into p24
33 Returns False if password must have been truncated to create LM hash
56 * Creates the MD4 Hash of the users password in NT UNICODE.
57 * @param passwd password in 'unix' charset.
58 * @param p16 return password hashed with md4, caller allocated 16 byte buffer
96 * Creates the DES forward-only Hash of the users password in DOS ASCII charset
97 * @param passwd password in 'unix' charset.
98 * @param p16 return password hashe
445 SMBNTLMv2encrypt(const char *user, const char *domain, const char *password, const DATA_BLOB *server_chal, const DATA_BLOB *names_blob, DATA_BLOB *lm_response, DATA_BLOB *nt_response, DATA_BLOB *user_session_key) argument
488 encode_pw_buffer(char buffer[516], const char *password, int string_flags) argument
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/misc/
H A Dcheck_multiple_LDAP_entries.pl14 print "usage: $0 -h host -b base -D admindn -w password [-l]\n";
25 my $bindpw = $opts{w} || die "please set password with -w";
59 $res = $ldap->bind( $binddn, password => $bindpw);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/tridge/
H A Dsmb.conf12 password level = 2
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/fs/cifs/
H A Dconnect.c61 char *password; member in struct:smb_vol
843 vol->password = NULL;
847 since that would mean the password really
851 vol->password = NULL;
856 /* removed password length check, NTLM passwords
859 /* if comma in password, the string will be
860 prematurely null terminated. Commas in password are
866 /* NB: password legally can have multiple commas and
867 the only illegal character in a password is null */
898 vol->password
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/netatalk-2.2.0/etc/uams/
H A Duams_pam.c68 * echo off means password.
295 /* old password */
300 /* let's do a quick check for the same password */
325 /* new password */
350 char password[PASSWDLEN + 1] = "\0"; local
363 * (username) (password)
382 /* Parse input for password in next () */
385 LOG(log_info, logtype_uams,"Bad Login ClearTxtUAM: password not found in string");
389 memcpy(password, p, MIN(PASSWDLEN, (q - p)) );
391 /* Done copying username and password, clea
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/rpc_client/
H A Dcli_netlogon.c147 password ?).\n", cli->desthost ));
223 password ?).\n", cli->desthost ));
531 const char *username, const char *password,
567 nt_lm_owf_gen(password, nt_owf_user_pwd, lm_owf_user_pwd);
585 SMBencrypt(password, chal, local_lm_response);
586 SMBNTencrypt(password, chal, local_nt_response);
804 password ?).\n", cli->desthost ));
529 cli_netlogon_sam_logon(struct cli_state *cli, TALLOC_CTX *mem_ctx, DOM_CRED *ret_creds, const char *username, const char *password, int logon_type) argument
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/rpcclient/
H A Drpcclient.c732 * Get password
739 pstrcpy(cmdline_auth_info.password, pass);
748 cmdline_auth_info.password,
757 memset(cmdline_auth_info.password,'X',sizeof(cmdline_auth_info.password));
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/torture/
H A Dlocktest2.c25 static fstring password; variable
172 fstrcpy(password, pass);
179 username, lp_workgroup(), password, 0,
519 fstrcpy(password, p+1);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/zebra/lib/
H A Dcommand.h36 char *password; member in struct:host
39 /* Enable password */
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/include/
H A Dads.h27 char *password; member in struct:__anon1589::__anon1591
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/nsswitch/
H A Dpam_winbind.c154 /* incorrect password */
155 _pam_log(LOG_WARNING, "user `%s' denied access (incorrect password or invalid membership)", user);
162 /* password expired */
163 _pam_log(LOG_WARNING, "user `%s' password expired", user);
166 /* password expired */
167 _pam_log(LOG_WARNING, "user `%s' new password required", user);
184 _pam_log(LOG_NOTICE, "user '%s' password changed", user);
297 * obtain a password from the user
325 * should we obtain the password from a PAM item ?
333 "pam_get_item returned error to unix-read-password"
453 const char *password; local
[all...]

Completed in 195 milliseconds

1234567891011>>