/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/auth/ |
H A D | auth_domain.c | 138 const auth_usersupplied_info *user_info, 185 NULL, user_info->smb_name.str, user_info->domain.str, 186 user_info->wksta_name.str, chal, user_info->lm_resp, 187 user_info->nt_resp, &info3); 197 "Error was %s.\n", user_info->smb_name.str, 198 user_info->domain.str, cli->srv_name_slash, 206 nt_status = make_server_info_info3(mem_ctx, user_info->internal_username.str, 207 user_info 137 domain_client_validate(TALLOC_CTX *mem_ctx, const auth_usersupplied_info *user_info, const char *domain, uchar chal[8], auth_serversupplied_info **server_info, const char *dc_name, struct in_addr dc_ip, const char *setup_creds_as, uint16 sec_chan, unsigned char trust_passwd[16], time_t last_change_time) argument 241 check_ntdomain_security(const struct auth_context *auth_context, void *my_private_data, TALLOC_CTX *mem_ctx, const auth_usersupplied_info *user_info, auth_serversupplied_info **server_info) argument 329 check_trustdomain_security(const struct auth_context *auth_context, void *my_private_data, TALLOC_CTX *mem_ctx, const auth_usersupplied_info *user_info, auth_serversupplied_info **server_info) argument [all...] |
H A D | auth_winbind.c | 59 const auth_usersupplied_info *user_info, 68 if (!user_info) { 74 user_info->internal_username.str)); 78 if (strequal(user_info->domain.str, get_global_sam_name())) { 80 user_info->domain.str)); 92 user_info->smb_name.str); 94 user_info->domain.str); 96 user_info->wksta_name.str); 100 request.data.auth_crap.lm_resp_len = MIN(user_info->lm_resp.length, 102 request.data.auth_crap.nt_resp_len = MIN(user_info 56 check_winbind_security(const struct auth_context *auth_context, void *my_private_data, TALLOC_CTX *mem_ctx, const auth_usersupplied_info *user_info, auth_serversupplied_info **server_info) argument [all...] |
H A D | auth_compat.c | 39 auth_usersupplied_info *user_info = NULL; local 48 if (!make_user_info_for_reply(&user_info, 55 user_info, server_info); 58 free_user_info(&user_info); 74 auth_usersupplied_info *user_info = NULL; local 75 make_user_info_for_reply_enc(&user_info, smb_name, 80 user_info, &server_info); 81 free_user_info(&user_info);
|
H A D | auth_unix.c | 87 const auth_usersupplied_info *user_info, 94 pass = Get_Pwnam(user_info->internal_username.str); 100 pass ? pass->pw_name : user_info->internal_username.str, 101 (char *)user_info->plaintext_password.data, 102 user_info->plaintext_password.length-1, 84 check_unix_security(const struct auth_context *auth_context, void *my_private_data, TALLOC_CTX *mem_ctx, const auth_usersupplied_info *user_info, auth_serversupplied_info **server_info) argument
|
H A D | auth_sam.c | 37 const auth_usersupplied_info *user_info, 60 &user_info->lm_resp, &user_info->nt_resp, 61 &user_info->lm_interactive_pwd, &user_info->nt_interactive_pwd, 63 user_info->smb_name.str, 64 user_info->client_domain.str, 113 const auth_usersupplied_info *user_info) 176 const char *machine_name = talloc_asprintf(mem_ctx, "%s$", user_info->wksta_name.str); 183 tok, user_info 34 sam_password_ok(const struct auth_context *auth_context, TALLOC_CTX *mem_ctx, SAM_ACCOUNT *sampass, const auth_usersupplied_info *user_info, DATA_BLOB *user_sess_key, DATA_BLOB *lm_sess_key) argument 111 sam_account_ok(TALLOC_CTX *mem_ctx, SAM_ACCOUNT *sampass, const auth_usersupplied_info *user_info) argument 226 check_sam_security(const struct auth_context *auth_context, void *my_private_data, TALLOC_CTX *mem_ctx, const auth_usersupplied_info *user_info, auth_serversupplied_info **server_info) argument 353 check_samstrict_security(const struct auth_context *auth_context, void *my_private_data, TALLOC_CTX *mem_ctx, const auth_usersupplied_info *user_info, auth_serversupplied_info **server_info) argument [all...] |
H A D | auth_builtin.c | 38 const auth_usersupplied_info *user_info, 44 if (!(user_info->internal_username.str 45 && *user_info->internal_username.str)) { 81 const auth_usersupplied_info *user_info, 87 fstrcpy(user, user_info->smb_name.str); 134 const auth_usersupplied_info *user_info, 35 check_guest_security(const struct auth_context *auth_context, void *my_private_data, TALLOC_CTX *mem_ctx, const auth_usersupplied_info *user_info, auth_serversupplied_info **server_info) argument 78 check_name_to_ntstatus_security(const struct auth_context *auth_context, void *my_private_data, TALLOC_CTX *mem_ctx, const auth_usersupplied_info *user_info, auth_serversupplied_info **server_info) argument 131 check_fixed_challenge_security(const struct auth_context *auth_context, void *my_private_data, TALLOC_CTX *mem_ctx, const auth_usersupplied_info *user_info, auth_serversupplied_info **server_info) argument
|
H A D | auth_server.c | 221 const auth_usersupplied_info *user_info, 238 if(is_myname(user_info->domain.str)) { 257 if (user_info->encrypted) { 271 if((user_info->nt_resp.length == sizeof(badpass)) && 272 !memcmp(badpass, user_info->nt_resp.data, sizeof(badpass))) { 299 (char *)badpass, sizeof(badpass), user_info->domain.str)) { 343 if (!user_info->encrypted) { 345 if (!cli_session_setup(cli, user_info->smb_name.str, 346 (char *)user_info->plaintext_password.data, 347 user_info 218 check_smbserver_security(const struct auth_context *auth_context, void *my_private_data, TALLOC_CTX *mem_ctx, const auth_usersupplied_info *user_info, auth_serversupplied_info **server_info) argument [all...] |
H A D | auth.c | 180 * Check a user's password, as given in the user_info struct and return various 190 * @param user_info Contains the user supplied components, including the passwords. 206 const struct auth_usersupplied_info *user_info, 216 if (!user_info || !auth_context || !server_info) 220 user_info->client_domain.str, user_info->smb_name.str, user_info->wksta_name.str)); 223 user_info->domain.str, user_info->internal_username.str, user_info 205 check_ntlm_password(const struct auth_context *auth_context, const struct auth_usersupplied_info *user_info, struct auth_serversupplied_info **server_info) argument [all...] |
H A D | auth_util.c | 120 static NTSTATUS make_user_info(auth_usersupplied_info **user_info, argument 132 DEBUG(5,("attempting to make a user_info for %s (%s)\n", internal_username, smb_name)); 134 *user_info = SMB_MALLOC_P(auth_usersupplied_info); 135 if (!user_info) { 136 DEBUG(0,("malloc failed for user_info (size %lu)\n", (unsigned long)sizeof(*user_info))); 140 ZERO_STRUCTP(*user_info); 142 DEBUG(5,("making strings for %s's user_info struct\n", internal_username)); 144 (*user_info)->smb_name.str = SMB_STRDUP(smb_name); 145 if ((*user_info) 209 make_user_info_map(auth_usersupplied_info **user_info, const char *smb_name, const char *client_domain, const char *wksta_name, DATA_BLOB *lm_pwd, DATA_BLOB *nt_pwd, DATA_BLOB *lm_interactive_pwd, DATA_BLOB *nt_interactive_pwd, DATA_BLOB *plaintext, BOOL encrypted) argument 255 make_user_info_netlogon_network(auth_usersupplied_info **user_info, const char *smb_name, const char *client_domain, const char *wksta_name, const uchar *lm_network_pwd, int lm_pwd_len, const uchar *nt_network_pwd, int nt_pwd_len) argument 287 make_user_info_netlogon_interactive(auth_usersupplied_info **user_info, const char *smb_name, const char *client_domain, const char *wksta_name, const uchar chal[8], const uchar lm_interactive_pwd[16], const uchar nt_interactive_pwd[16], const uchar *dc_sess_key) argument 387 make_user_info_for_reply(auth_usersupplied_info **user_info, const char *smb_name, const char *client_domain, const uint8 chal[8], DATA_BLOB plaintext_password) argument 441 make_user_info_for_reply_enc(auth_usersupplied_info **user_info, const char *smb_name, const char *client_domain, DATA_BLOB lm_resp, DATA_BLOB nt_resp) argument 459 make_user_info_guest(auth_usersupplied_info **user_info) argument 1378 free_user_info(auth_usersupplied_info **user_info) argument [all...] |
H A D | auth_ntlmssp.c | 81 auth_usersupplied_info *user_info = NULL; local 95 nt_status = make_user_info_map(&user_info, 109 user_info, &auth_ntlmssp_state->server_info); 111 free_user_info(&user_info);
|
H A D | auth_rhosts.c | 162 const auth_usersupplied_info *user_info, 168 auth_get_sam_account(user_info->internal_username.str, 205 const auth_usersupplied_info *user_info, 214 auth_get_sam_account(user_info->internal_username.str, 159 check_hostsequiv_security(const struct auth_context *auth_context, void *my_private_data, TALLOC_CTX *mem_ctx, const auth_usersupplied_info *user_info, auth_serversupplied_info **server_info) argument 202 check_rhosts_security(const struct auth_context *auth_context, void *my_private_data, TALLOC_CTX *mem_ctx, const auth_usersupplied_info *user_info, auth_serversupplied_info **server_info) argument
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/examples/auth/ |
H A D | auth_skel.c | 30 const auth_usersupplied_info *user_info, 33 if (!user_info || !auth_context) { 27 check_skel_security(const struct auth_context *auth_context, void *my_private_data, TALLOC_CTX *mem_ctx, const auth_usersupplied_info *user_info, auth_serversupplied_info **server_info) argument
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/utils/ |
H A D | smbtree.c | 71 static BOOL get_workgroups(struct user_auth_info *user_info) argument 88 if (!(cli = get_ipc_connect(inet_ntoa(server_ip), &server_ip, user_info))) 92 if (!(cli = get_ipc_connect_master_ip_bcast(master_workgroup, user_info))) { 107 static BOOL get_servers(char *workgroup, struct user_auth_info *user_info) argument 120 if (!(cli = get_ipc_connect(inet_ntoa(server_ip), &server_ip, user_info))) 130 static BOOL get_shares(char *server_name, struct user_auth_info *user_info) argument 134 if (!(cli = get_ipc_connect(server_name, NULL, user_info))) 143 static BOOL print_tree(struct user_auth_info *user_info) argument 149 if (!get_workgroups(user_info)) 162 !get_servers(wg->name, user_info)) [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/nsswitch/ |
H A D | getent.exp | 50 set user_info [split $user ":"] 51 set username [lindex $user_info 0]
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/nsswitch/ |
H A D | winbindd_user.c | 113 WINBIND_USERINFO user_info; local 180 &user_info); 190 if (!winbindd_fill_pwent(name_domain, user_info.acct_name, 191 user_info.user_sid, user_info.group_sid, 192 user_info.full_name, 213 WINBIND_USERINFO user_info; local 269 &user_info); 280 if (!NT_STATUS_IS_OK(idmap_sid_to_gid(user_info.group_sid, &gid, 0))) { 288 if (!winbindd_fill_pwent(domain->name, user_info [all...] |
H A D | winbindd_rpc.c | 365 WINBIND_USERINFO *user_info) 390 user_info->user_sid = rid_to_talloced_sid( domain, mem_ctx, user_rid ); 391 user_info->group_sid = rid_to_talloced_sid( domain, mem_ctx, user->group_rid ); 393 user_info->acct_name = unistr2_tdup(mem_ctx, &user->uni_user_name); 394 user_info->full_name = unistr2_tdup(mem_ctx, &user->uni_full_name); 442 user_info->user_sid = rid_to_talloced_sid(domain, mem_ctx, user_rid); 443 user_info->group_sid = rid_to_talloced_sid(domain, mem_ctx, ctr->info.id21->group_rid); 444 user_info->acct_name = unistr2_tdup(mem_ctx, 446 user_info->full_name = unistr2_tdup(mem_ctx, 362 query_user(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx, const DOM_SID *user_sid, WINBIND_USERINFO *user_info) argument
|
H A D | winbindd.h | 176 WINBIND_USERINFO *user_info);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/ |
H A D | auth.h | 98 const struct auth_usersupplied_info *user_info, 112 const struct auth_usersupplied_info *user_info,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/hfsplus/ |
H A D | ioctl.c | 109 memcpy(&file->user_info.fdType, value, 4); 114 memcpy(&file->user_info.fdCreator, value, 4); 153 memcpy(value, &file->user_info.fdType, 4); 159 memcpy(value, &file->user_info.fdCreator, 4);
|
H A D | catalog.c | 104 folder->user_info.frFlags = cpu_to_be16(0x5000); 122 file->user_info.fdType = cpu_to_be32(HFSP_SYMLINK_TYPE); 123 file->user_info.fdCreator = cpu_to_be32(HFSP_SYMLINK_CREATOR); 125 file->user_info.fdType = cpu_to_be32(HFSPLUS_SB(inode->i_sb).type); 126 file->user_info.fdCreator = cpu_to_be32(HFSPLUS_SB(inode->i_sb).creator); 131 file->user_info.fdType = cpu_to_be32(HFSP_HARDLINK_TYPE); 132 file->user_info.fdCreator = cpu_to_be32(HFSP_HFSPLUS_CREATOR); 133 file->user_info.fdFlags = cpu_to_be16(0x100);
|
H A D | hfsplus_raw.h | 246 struct DInfo user_info; member in struct:hfsplus_cat_folder 280 struct FInfo user_info; member in struct:hfsplus_cat_file
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/hfsplus_journal/ |
H A D | ioctl.c | 120 memcpy(&file->user_info.fdType, value, 4); 125 memcpy(&file->user_info.fdCreator, value, 4); 175 memcpy(value, &file->user_info.fdType, 4); 181 memcpy(value, &file->user_info.fdCreator, 4);
|
H A D | catalog.c | 104 folder->user_info.frFlags = cpu_to_be16(0x5000); 122 file->user_info.fdType = cpu_to_be32(HFSP_SYMLINK_TYPE); 123 file->user_info.fdCreator = cpu_to_be32(HFSP_SYMLINK_CREATOR); 125 file->user_info.fdType = cpu_to_be32(HFSPLUS_SB(inode->i_sb).type); 126 file->user_info.fdCreator = cpu_to_be32(HFSPLUS_SB(inode->i_sb).creator); 131 file->user_info.fdType = cpu_to_be32(HFSP_HARDLINK_TYPE); 132 file->user_info.fdCreator = cpu_to_be32(HFSP_HFSPLUS_CREATOR); 133 file->user_info.fdFlags = cpu_to_be16(0x100);
|
H A D | hfsplus_raw.h | 247 struct DInfo user_info; member in struct:hfsplus_cat_folder 281 struct FInfo user_info; member in struct:hfsplus_cat_file
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbd/ |
H A D | sesssetup.c | 113 auth_usersupplied_info *user_info = NULL; local 126 if (!make_user_info_guest(&user_info)) { 131 nt_status = auth_context->check_ntlm_password(auth_context, user_info, server_info); 133 free_user_info(&user_info); 687 auth_usersupplied_info *user_info = NULL; local 917 nt_status = make_user_info_for_reply_enc(&user_info, user, domain, 921 user_info, 930 if (!make_user_info_for_reply(&user_info, 938 user_info, 946 free_user_info(&user_info); [all...] |