password 88 examples/auth/crackcheck/crackcheck.c char *password;
password 114 examples/auth/crackcheck/crackcheck.c password = fgets(f, sizeof(f), stdin);
password 116 examples/auth/crackcheck/crackcheck.c if (password == NULL) {
password 122 examples/auth/crackcheck/crackcheck.c ret = complexity(password);
password 132 examples/auth/crackcheck/crackcheck.c reply = FascistCheck(password, dictionary);
password 18 examples/libsmbclient/get_auth_data_fn.h char password[256] = { '\0' };
password 29 examples/libsmbclient/get_auth_data_fn.h strncpy(pPassword, password, maxLenPassword - 1);
password 79 examples/libsmbclient/get_auth_data_fn.h strncpy(password, pPassword, sizeof(password) - 1);
password 15 examples/libsmbclient/testbrowse2.c char *password = "";
password 88 examples/libsmbclient/testbrowse2.c strncpy(passwd, password, passwdlen - 1); passwd[passwdlen - 1] = 0;
password 600 examples/libsmbclient/tree.c char *password, int pwmaxlen)
password 604 examples/libsmbclient/tree.c strncpy(password, "test", pwmaxlen);
password 241 lib/zlib/contrib/minizip/miniunz.c int do_extract_currentfile(uf,popt_extract_without_path,popt_overwrite,password)
password 245 lib/zlib/contrib/minizip/miniunz.c const char* password;
password 299 lib/zlib/contrib/minizip/miniunz.c err = unzOpenCurrentFilePassword(uf,password);
password 405 lib/zlib/contrib/minizip/miniunz.c int do_extract(uf,opt_extract_without_path,opt_overwrite,password)
password 409 lib/zlib/contrib/minizip/miniunz.c const char* password;
password 424 lib/zlib/contrib/minizip/miniunz.c password) != UNZ_OK)
password 441 lib/zlib/contrib/minizip/miniunz.c int do_extract_onefile(uf,filename,opt_extract_without_path,opt_overwrite,password)
password 446 lib/zlib/contrib/minizip/miniunz.c const char* password;
password 457 lib/zlib/contrib/minizip/miniunz.c password) == UNZ_OK)
password 470 lib/zlib/contrib/minizip/miniunz.c const char *password=NULL;
password 516 lib/zlib/contrib/minizip/miniunz.c password=argv[i+1];
password 577 lib/zlib/contrib/minizip/miniunz.c return do_extract(uf,opt_do_extract_withoutpath,opt_overwrite,password);
password 580 lib/zlib/contrib/minizip/miniunz.c opt_do_extract_withoutpath,opt_overwrite,password);
password 199 lib/zlib/contrib/minizip/minizip.c const char* password=NULL;
password 228 lib/zlib/contrib/minizip/minizip.c password=argv[i+1];
password 348 lib/zlib/contrib/minizip/minizip.c if ((password != NULL) && (err==ZIP_OK))
password 357 lib/zlib/contrib/minizip/minizip.c password,crcFile);
password 1047 lib/zlib/contrib/minizip/unzip.c extern int ZEXPORT unzOpenCurrentFile3 (file, method, level, raw, password)
password 1052 lib/zlib/contrib/minizip/unzip.c const char* password;
password 1063 lib/zlib/contrib/minizip/unzip.c if (password != NULL)
password 1167 lib/zlib/contrib/minizip/unzip.c if (password != NULL)
password 1171 lib/zlib/contrib/minizip/unzip.c init_keys(password,s->keys,s->pcrc_32_tab);
password 1198 lib/zlib/contrib/minizip/unzip.c extern int ZEXPORT unzOpenCurrentFilePassword (file, password)
password 1200 lib/zlib/contrib/minizip/unzip.c const char* password;
password 1202 lib/zlib/contrib/minizip/unzip.c return unzOpenCurrentFile3(file, NULL, NULL, 0, password);
password 259 lib/zlib/contrib/minizip/unzip.h const char* password));
password 283 lib/zlib/contrib/minizip/unzip.h const char* password));
password 695 lib/zlib/contrib/minizip/zip.c password, crcForCrypting)
password 710 lib/zlib/contrib/minizip/zip.c const char* password;
password 720 lib/zlib/contrib/minizip/zip.c if (password != NULL)
password 765 lib/zlib/contrib/minizip/zip.c if (password != NULL)
password 878 lib/zlib/contrib/minizip/zip.c if ((err==Z_OK) && (password != NULL))
password 886 lib/zlib/contrib/minizip/zip.c sizeHead=crypthead(password,bufHead,RAND_HEAD_LEN,zi->ci.keys,zi->ci.pcrc_32_tab,crcForCrypting);
password 193 lib/zlib/contrib/minizip/zip.h const char* password,
password 403 libcli/ldap/ldap_message.c asn1_write(data, r->creds.password,
password 404 libcli/ldap/ldap_message.c strlen(r->creds.password));
password 1154 libcli/ldap/ldap_message.c r->creds.password = "";
password 1168 libcli/ldap/ldap_message.c r->creds.password = pw;
password 67 libcli/ldap/ldap_message.h const char *password;
password 1568 librpc/gen_ndr/cli_netlogon.c struct samr_Password *password /* [out] [ref] */,
password 1605 librpc/gen_ndr/cli_netlogon.c *password = *r.out.password;
password 2101 librpc/gen_ndr/cli_netlogon.c struct samr_Password *password /* [out] [ref] */,
password 2138 librpc/gen_ndr/cli_netlogon.c *password = *r.out.password;
password 259 librpc/gen_ndr/cli_netlogon.h struct samr_Password *password /* [out] [ref] */,
password 334 librpc/gen_ndr/cli_netlogon.h struct samr_Password *password /* [out] [ref] */,
password 2345 librpc/gen_ndr/cli_samr.c struct samr_CryptPassword *password /* [in] [unique] */,
password 2354 librpc/gen_ndr/cli_samr.c r.in.password = password;
password 306 librpc/gen_ndr/cli_samr.h struct samr_CryptPassword *password /* [in] [unique] */,
password 519 librpc/gen_ndr/cli_svcctl.c const char *password /* [in] [unique,charset(UTF16)] */,
password 535 librpc/gen_ndr/cli_svcctl.c r.in.password = password;
password 586 librpc/gen_ndr/cli_svcctl.c uint8_t *password /* [in] [unique,size_is(password_size)] */,
password 608 librpc/gen_ndr/cli_svcctl.c r.in.password = password;
password 1167 librpc/gen_ndr/cli_svcctl.c const char *password /* [in] [unique,charset(UTF16)] */,
password 1183 librpc/gen_ndr/cli_svcctl.c r.in.password = password;
password 1233 librpc/gen_ndr/cli_svcctl.c const char *password /* [in] [unique,charset(UTF16)] */,
password 1251 librpc/gen_ndr/cli_svcctl.c r.in.password = password;
password 71 librpc/gen_ndr/cli_svcctl.h const char *password /* [in] [unique,charset(UTF16)] */,
password 89 librpc/gen_ndr/cli_svcctl.h uint8_t *password /* [in] [unique,size_is(password_size)] */,
password 179 librpc/gen_ndr/cli_svcctl.h const char *password /* [in] [unique,charset(UTF16)] */,
password 196 librpc/gen_ndr/cli_svcctl.h const char *password /* [in] [unique,charset(UTF16)] */,
password 811 librpc/gen_ndr/cli_wkssvc.c const char *password /* [in] [unique,charset(UTF16)] */,
password 823 librpc/gen_ndr/cli_wkssvc.c r.in.password = password;
password 862 librpc/gen_ndr/cli_wkssvc.c const char *password /* [in] [unique,charset(UTF16)] */,
password 872 librpc/gen_ndr/cli_wkssvc.c r.in.password = password;
password 912 librpc/gen_ndr/cli_wkssvc.c const char *password /* [in] [unique,charset(UTF16)] */,
password 923 librpc/gen_ndr/cli_wkssvc.c r.in.password = password;
password 117 librpc/gen_ndr/cli_wkssvc.h const char *password /* [in] [unique,charset(UTF16)] */,
password 124 librpc/gen_ndr/cli_wkssvc.h const char *password /* [in] [unique,charset(UTF16)] */,
password 132 librpc/gen_ndr/cli_wkssvc.h const char *password /* [in] [unique,charset(UTF16)] */,
password 274 librpc/gen_ndr/drsblobs.h struct samr_Password password;
password 279 librpc/gen_ndr/drsblobs.h uint8_t *password;
password 511 librpc/gen_ndr/lsa.h struct lsa_DATA_BUF *password;/* [unique] */
password 597 librpc/gen_ndr/lsa.h struct lsa_TrustDomainInfoPassword password;/* [case(LSA_TRUSTED_DOMAIN_INFO_PASSWORD)] */
password 2344 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_push_samr_Password(ndr, NDR_SCALARS, &r->password));
password 2356 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_pull_samr_Password(ndr, NDR_SCALARS, &r->password));
password 2368 librpc/gen_ndr/ndr_drsblobs.c ndr_print_samr_Password(ndr, "password", &r->password);
password 2377 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->password, r->size));
password 2389 librpc/gen_ndr/ndr_drsblobs.c NDR_PULL_ALLOC_N(ndr, r->password, r->size);
password 2390 librpc/gen_ndr/ndr_drsblobs.c NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->password, r->size));
password 2402 librpc/gen_ndr/ndr_drsblobs.c ndr_print_array_uint8(ndr, "password", r->password, r->size);
password 2973 librpc/gen_ndr/ndr_lsa.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->password));
password 2977 librpc/gen_ndr/ndr_lsa.c if (r->password) {
password 2978 librpc/gen_ndr/ndr_lsa.c NDR_CHECK(ndr_push_lsa_DATA_BUF(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password 2997 librpc/gen_ndr/ndr_lsa.c NDR_PULL_ALLOC(ndr, r->password);
password 2999 librpc/gen_ndr/ndr_lsa.c r->password = NULL;
password 3009 librpc/gen_ndr/ndr_lsa.c if (r->password) {
password 3011 librpc/gen_ndr/ndr_lsa.c NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
password 3012 librpc/gen_ndr/ndr_lsa.c NDR_CHECK(ndr_pull_lsa_DATA_BUF(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password 3029 librpc/gen_ndr/ndr_lsa.c ndr_print_ptr(ndr, "password", r->password);
password 3031 librpc/gen_ndr/ndr_lsa.c if (r->password) {
password 3032 librpc/gen_ndr/ndr_lsa.c ndr_print_lsa_DATA_BUF(ndr, "password", r->password);
password 3630 librpc/gen_ndr/ndr_lsa.c NDR_CHECK(ndr_push_lsa_TrustDomainInfoPassword(ndr, NDR_SCALARS, &r->password));
password 3688 librpc/gen_ndr/ndr_lsa.c NDR_CHECK(ndr_push_lsa_TrustDomainInfoPassword(ndr, NDR_BUFFERS, &r->password));
password 3757 librpc/gen_ndr/ndr_lsa.c NDR_CHECK(ndr_pull_lsa_TrustDomainInfoPassword(ndr, NDR_SCALARS, &r->password));
password 3814 librpc/gen_ndr/ndr_lsa.c NDR_CHECK(ndr_pull_lsa_TrustDomainInfoPassword(ndr, NDR_BUFFERS, &r->password));
password 3878 librpc/gen_ndr/ndr_lsa.c ndr_print_lsa_TrustDomainInfoPassword(ndr, "password", &r->password);
password 663 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->password));
password 671 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->password));
password 679 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->password));
password 687 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->password));
password 698 librpc/gen_ndr/ndr_netlogon.c if (r->password) {
password 699 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password 710 librpc/gen_ndr/ndr_netlogon.c if (r->password) {
password 711 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password 722 librpc/gen_ndr/ndr_netlogon.c if (r->password) {
password 723 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password 734 librpc/gen_ndr/ndr_netlogon.c if (r->password) {
password 735 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password 764 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->password);
password 766 librpc/gen_ndr/ndr_netlogon.c r->password = NULL;
password 784 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->password);
password 786 librpc/gen_ndr/ndr_netlogon.c r->password = NULL;
password 804 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->password);
password 806 librpc/gen_ndr/ndr_netlogon.c r->password = NULL;
password 824 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->password);
password 826 librpc/gen_ndr/ndr_netlogon.c r->password = NULL;
password 837 librpc/gen_ndr/ndr_netlogon.c if (r->password) {
password 839 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
password 840 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password 855 librpc/gen_ndr/ndr_netlogon.c if (r->password) {
password 857 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
password 858 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password 873 librpc/gen_ndr/ndr_netlogon.c if (r->password) {
password 875 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
password 876 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password 891 librpc/gen_ndr/ndr_netlogon.c if (r->password) {
password 893 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
password 894 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_netr_PasswordInfo(ndr, NDR_SCALARS|NDR_BUFFERS, r->password));
password 913 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "password", r->password);
password 915 librpc/gen_ndr/ndr_netlogon.c if (r->password) {
password 916 librpc/gen_ndr/ndr_netlogon.c ndr_print_netr_PasswordInfo(ndr, "password", r->password);
password 931 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "password", r->password);
password 933 librpc/gen_ndr/ndr_netlogon.c if (r->password) {
password 934 librpc/gen_ndr/ndr_netlogon.c ndr_print_netr_PasswordInfo(ndr, "password", r->password);
password 949 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "password", r->password);
password 951 librpc/gen_ndr/ndr_netlogon.c if (r->password) {
password 952 librpc/gen_ndr/ndr_netlogon.c ndr_print_netr_PasswordInfo(ndr, "password", r->password);
password 967 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "password", r->password);
password 969 librpc/gen_ndr/ndr_netlogon.c if (r->password) {
password 970 librpc/gen_ndr/ndr_netlogon.c ndr_print_netr_PasswordInfo(ndr, "password", r->password);
password 13714 librpc/gen_ndr/ndr_netlogon.c if (r->out.password == NULL) {
password 13717 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_samr_Password(ndr, NDR_SCALARS, r->out.password));
password 13775 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->out.password);
password 13776 librpc/gen_ndr/ndr_netlogon.c ZERO_STRUCTP(r->out.password);
password 13787 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->out.password);
password 13790 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->out.password, LIBNDR_FLAG_REF_ALLOC);
password 13791 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_samr_Password(ndr, NDR_SCALARS, r->out.password));
password 13830 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "password", r->out.password);
password 13832 librpc/gen_ndr/ndr_netlogon.c ndr_print_samr_Password(ndr, "password", r->out.password);
password 15208 librpc/gen_ndr/ndr_netlogon.c if (r->out.password == NULL) {
password 15211 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_samr_Password(ndr, NDR_SCALARS, r->out.password));
password 15274 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->out.password);
password 15275 librpc/gen_ndr/ndr_netlogon.c ZERO_STRUCTP(r->out.password);
password 15288 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->out.password);
password 15291 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->out.password, LIBNDR_FLAG_REF_ALLOC);
password 15292 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_samr_Password(ndr, NDR_SCALARS, r->out.password));
password 15338 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "password", r->out.password);
password 15340 librpc/gen_ndr/ndr_netlogon.c ndr_print_samr_Password(ndr, "password", r->out.password);
password 3007 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_samr_CryptPassword(ndr, NDR_SCALARS, &r->password));
password 3020 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_pull_samr_CryptPassword(ndr, NDR_SCALARS, &r->password));
password 3033 librpc/gen_ndr/ndr_samr.c ndr_print_samr_CryptPassword(ndr, "password", &r->password);
password 3041 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_samr_CryptPassword(ndr, NDR_SCALARS, &r->password));
password 3053 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_pull_samr_CryptPassword(ndr, NDR_SCALARS, &r->password));
password 3065 librpc/gen_ndr/ndr_samr.c ndr_print_samr_CryptPassword(ndr, "password", &r->password);
password 3120 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_samr_CryptPasswordEx(ndr, NDR_SCALARS, &r->password));
password 3133 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_pull_samr_CryptPasswordEx(ndr, NDR_SCALARS, &r->password));
password 3146 librpc/gen_ndr/ndr_samr.c ndr_print_samr_CryptPasswordEx(ndr, "password", &r->password);
password 3154 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_samr_CryptPasswordEx(ndr, NDR_SCALARS, &r->password));
password 3166 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_pull_samr_CryptPasswordEx(ndr, NDR_SCALARS, &r->password));
password 3178 librpc/gen_ndr/ndr_samr.c ndr_print_samr_CryptPasswordEx(ndr, "password", &r->password);
password 5078 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_lsa_StringLarge(ndr, NDR_SCALARS, &r->password));
password 5086 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_lsa_StringLarge(ndr, NDR_BUFFERS, &r->password));
password 5098 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_pull_lsa_StringLarge(ndr, NDR_SCALARS, &r->password));
password 5106 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_pull_lsa_StringLarge(ndr, NDR_BUFFERS, &r->password));
password 5118 librpc/gen_ndr/ndr_samr.c ndr_print_lsa_StringLarge(ndr, "password", &r->password);
password 5131 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_lsa_StringLarge(ndr, NDR_SCALARS, &r->password));
password 5138 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_lsa_StringLarge(ndr, NDR_BUFFERS, &r->password));
password 5150 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_pull_lsa_StringLarge(ndr, NDR_SCALARS, &r->password));
password 5157 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_pull_lsa_StringLarge(ndr, NDR_BUFFERS, &r->password));
password 5169 librpc/gen_ndr/ndr_samr.c ndr_print_lsa_StringLarge(ndr, "password", &r->password);
password 10631 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password));
password 10632 librpc/gen_ndr/ndr_samr.c if (r->in.password) {
password 10633 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_push_samr_CryptPassword(ndr, NDR_SCALARS, r->in.password));
password 10677 librpc/gen_ndr/ndr_samr.c NDR_PULL_ALLOC(ndr, r->in.password);
password 10679 librpc/gen_ndr/ndr_samr.c r->in.password = NULL;
password 10681 librpc/gen_ndr/ndr_samr.c if (r->in.password) {
password 10683 librpc/gen_ndr/ndr_samr.c NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0);
password 10684 librpc/gen_ndr/ndr_samr.c NDR_CHECK(ndr_pull_samr_CryptPassword(ndr, NDR_SCALARS, r->in.password));
password 10726 librpc/gen_ndr/ndr_samr.c ndr_print_ptr(ndr, "password", r->in.password);
password 10728 librpc/gen_ndr/ndr_samr.c if (r->in.password) {
password 10729 librpc/gen_ndr/ndr_samr.c ndr_print_samr_CryptPassword(ndr, "password", r->in.password);
password 4078 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->password));
password 4099 librpc/gen_ndr/ndr_srvsvc.c if (r->password) {
password 4100 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16)));
password 4102 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16)));
password 4103 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->password, ndr_charset_length(r->password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password 4145 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->password);
password 4147 librpc/gen_ndr/ndr_srvsvc.c r->password = NULL;
password 4187 librpc/gen_ndr/ndr_srvsvc.c if (r->password) {
password 4189 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
password 4190 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->password));
password 4191 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->password));
password 4192 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->password) > ndr_get_array_size(ndr, &r->password)) {
password 4193 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->password), ndr_get_array_length(ndr, &r->password));
password 4195 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t)));
password 4196 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->password, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t), CH_UTF16));
password 4229 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "password", r->password);
password 4231 librpc/gen_ndr/ndr_srvsvc.c if (r->password) {
password 4232 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "password", r->password);
password 4520 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->password));
password 4542 librpc/gen_ndr/ndr_srvsvc.c if (r->password) {
password 4543 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16)));
password 4545 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16)));
password 4546 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->password, ndr_charset_length(r->password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password 4589 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->password);
password 4591 librpc/gen_ndr/ndr_srvsvc.c r->password = NULL;
password 4632 librpc/gen_ndr/ndr_srvsvc.c if (r->password) {
password 4634 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
password 4635 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->password));
password 4636 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->password));
password 4637 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->password) > ndr_get_array_size(ndr, &r->password)) {
password 4638 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->password), ndr_get_array_length(ndr, &r->password));
password 4640 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t)));
password 4641 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->password, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t), CH_UTF16));
password 4675 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "password", r->password);
password 4677 librpc/gen_ndr/ndr_srvsvc.c if (r->password) {
password 4678 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "password", r->password);
password 2175 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password));
password 2176 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) {
password 2177 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password 2179 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password 2180 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.password, ndr_charset_length(r->in.password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password 2303 librpc/gen_ndr/ndr_svcctl.c NDR_PULL_ALLOC(ndr, r->in.password);
password 2305 librpc/gen_ndr/ndr_svcctl.c r->in.password = NULL;
password 2307 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) {
password 2309 librpc/gen_ndr/ndr_svcctl.c NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0);
password 2310 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password));
password 2311 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.password));
password 2312 librpc/gen_ndr/ndr_svcctl.c if (ndr_get_array_length(ndr, &r->in.password) > ndr_get_array_size(ndr, &r->in.password)) {
password 2313 librpc/gen_ndr/ndr_svcctl.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.password), ndr_get_array_length(ndr, &r->in.password));
password 2315 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t)));
password 2316 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.password, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t), CH_UTF16));
password 2394 librpc/gen_ndr/ndr_svcctl.c ndr_print_ptr(ndr, "password", r->in.password);
password 2396 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) {
password 2397 librpc/gen_ndr/ndr_svcctl.c ndr_print_string(ndr, "password", r->in.password);
password 2471 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password));
password 2472 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) {
password 2474 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->in.password, r->in.password_size));
password 2619 librpc/gen_ndr/ndr_svcctl.c NDR_PULL_ALLOC(ndr, r->in.password);
password 2621 librpc/gen_ndr/ndr_svcctl.c r->in.password = NULL;
password 2623 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) {
password 2625 librpc/gen_ndr/ndr_svcctl.c NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0);
password 2626 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password));
password 2627 librpc/gen_ndr/ndr_svcctl.c NDR_PULL_ALLOC_N(ndr, r->in.password, ndr_get_array_size(ndr, &r->in.password));
password 2628 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->in.password, ndr_get_array_size(ndr, &r->in.password)));
password 2637 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) {
password 2638 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_check_array_size(ndr, (void*)&r->in.password, r->in.password_size));
password 2717 librpc/gen_ndr/ndr_svcctl.c ndr_print_ptr(ndr, "password", r->in.password);
password 2719 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) {
password 2720 librpc/gen_ndr/ndr_svcctl.c ndr_print_array_uint8(ndr, "password", r->in.password, r->in.password_size);
password 4071 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password));
password 4072 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) {
password 4073 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password 4075 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password 4076 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.password, ndr_charset_length(r->in.password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password 4199 librpc/gen_ndr/ndr_svcctl.c NDR_PULL_ALLOC(ndr, r->in.password);
password 4201 librpc/gen_ndr/ndr_svcctl.c r->in.password = NULL;
password 4203 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) {
password 4205 librpc/gen_ndr/ndr_svcctl.c NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0);
password 4206 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password));
password 4207 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.password));
password 4208 librpc/gen_ndr/ndr_svcctl.c if (ndr_get_array_length(ndr, &r->in.password) > ndr_get_array_size(ndr, &r->in.password)) {
password 4209 librpc/gen_ndr/ndr_svcctl.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.password), ndr_get_array_length(ndr, &r->in.password));
password 4211 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t)));
password 4212 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.password, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t), CH_UTF16));
password 4290 librpc/gen_ndr/ndr_svcctl.c ndr_print_ptr(ndr, "password", r->in.password);
password 4292 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) {
password 4293 librpc/gen_ndr/ndr_svcctl.c ndr_print_string(ndr, "password", r->in.password);
password 4370 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password));
password 4371 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) {
password 4372 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password 4374 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password 4375 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.password, ndr_charset_length(r->in.password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password 4531 librpc/gen_ndr/ndr_svcctl.c NDR_PULL_ALLOC(ndr, r->in.password);
password 4533 librpc/gen_ndr/ndr_svcctl.c r->in.password = NULL;
password 4535 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) {
password 4537 librpc/gen_ndr/ndr_svcctl.c NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0);
password 4538 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password));
password 4539 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.password));
password 4540 librpc/gen_ndr/ndr_svcctl.c if (ndr_get_array_length(ndr, &r->in.password) > ndr_get_array_size(ndr, &r->in.password)) {
password 4541 librpc/gen_ndr/ndr_svcctl.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.password), ndr_get_array_length(ndr, &r->in.password));
password 4543 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t)));
password 4544 librpc/gen_ndr/ndr_svcctl.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.password, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t), CH_UTF16));
password 4620 librpc/gen_ndr/ndr_svcctl.c ndr_print_ptr(ndr, "password", r->in.password);
password 4622 librpc/gen_ndr/ndr_svcctl.c if (r->in.password) {
password 4623 librpc/gen_ndr/ndr_svcctl.c ndr_print_string(ndr, "password", r->in.password);
password 4152 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->password));
password 4173 librpc/gen_ndr/ndr_wkssvc.c if (r->password) {
password 4174 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16)));
password 4176 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16)));
password 4177 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->password, ndr_charset_length(r->password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password 4223 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_ALLOC(ndr, r->password);
password 4225 librpc/gen_ndr/ndr_wkssvc.c r->password = NULL;
password 4269 librpc/gen_ndr/ndr_wkssvc.c if (r->password) {
password 4271 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
password 4272 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->password));
password 4273 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->password));
password 4274 librpc/gen_ndr/ndr_wkssvc.c if (ndr_get_array_length(ndr, &r->password) > ndr_get_array_size(ndr, &r->password)) {
password 4275 librpc/gen_ndr/ndr_wkssvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->password), ndr_get_array_length(ndr, &r->password));
password 4277 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t)));
password 4278 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->password, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t), CH_UTF16));
password 4325 librpc/gen_ndr/ndr_wkssvc.c ndr_print_ptr(ndr, "password", r->password);
password 4327 librpc/gen_ndr/ndr_wkssvc.c if (r->password) {
password 4328 librpc/gen_ndr/ndr_wkssvc.c ndr_print_string(ndr, "password", r->password);
password 4356 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->password));
password 4375 librpc/gen_ndr/ndr_wkssvc.c if (r->password) {
password 4376 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16)));
password 4378 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->password, CH_UTF16)));
password 4379 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->password, ndr_charset_length(r->password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password 4409 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_ALLOC(ndr, r->password);
password 4411 librpc/gen_ndr/ndr_wkssvc.c r->password = NULL;
password 4443 librpc/gen_ndr/ndr_wkssvc.c if (r->password) {
password 4445 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_SET_MEM_CTX(ndr, r->password, 0);
password 4446 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->password));
password 4447 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->password));
password 4448 librpc/gen_ndr/ndr_wkssvc.c if (ndr_get_array_length(ndr, &r->password) > ndr_get_array_size(ndr, &r->password)) {
password 4449 librpc/gen_ndr/ndr_wkssvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->password), ndr_get_array_length(ndr, &r->password));
password 4451 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t)));
password 4452 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->password, ndr_get_array_length(ndr, &r->password), sizeof(uint16_t), CH_UTF16));
password 4475 librpc/gen_ndr/ndr_wkssvc.c ndr_print_ptr(ndr, "password", r->password);
password 4477 librpc/gen_ndr/ndr_wkssvc.c if (r->password) {
password 4478 librpc/gen_ndr/ndr_wkssvc.c ndr_print_string(ndr, "password", r->password);
password 7734 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password));
password 7735 librpc/gen_ndr/ndr_wkssvc.c if (r->in.password) {
password 7736 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password 7738 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password 7739 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.password, ndr_charset_length(r->in.password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password 7823 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_ALLOC(ndr, r->in.password);
password 7825 librpc/gen_ndr/ndr_wkssvc.c r->in.password = NULL;
password 7827 librpc/gen_ndr/ndr_wkssvc.c if (r->in.password) {
password 7829 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0);
password 7830 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password));
password 7831 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.password));
password 7832 librpc/gen_ndr/ndr_wkssvc.c if (ndr_get_array_length(ndr, &r->in.password) > ndr_get_array_size(ndr, &r->in.password)) {
password 7833 librpc/gen_ndr/ndr_wkssvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.password), ndr_get_array_length(ndr, &r->in.password));
password 7835 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t)));
password 7836 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.password, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t), CH_UTF16));
password 7879 librpc/gen_ndr/ndr_wkssvc.c ndr_print_ptr(ndr, "password", r->in.password);
password 7881 librpc/gen_ndr/ndr_wkssvc.c if (r->in.password) {
password 7882 librpc/gen_ndr/ndr_wkssvc.c ndr_print_string(ndr, "password", r->in.password);
password 7914 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password));
password 7915 librpc/gen_ndr/ndr_wkssvc.c if (r->in.password) {
password 7916 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password 7918 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password 7919 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.password, ndr_charset_length(r->in.password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password 7976 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_ALLOC(ndr, r->in.password);
password 7978 librpc/gen_ndr/ndr_wkssvc.c r->in.password = NULL;
password 7980 librpc/gen_ndr/ndr_wkssvc.c if (r->in.password) {
password 7982 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0);
password 7983 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password));
password 7984 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.password));
password 7985 librpc/gen_ndr/ndr_wkssvc.c if (ndr_get_array_length(ndr, &r->in.password) > ndr_get_array_size(ndr, &r->in.password)) {
password 7986 librpc/gen_ndr/ndr_wkssvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.password), ndr_get_array_length(ndr, &r->in.password));
password 7988 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t)));
password 7989 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.password, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t), CH_UTF16));
password 8022 librpc/gen_ndr/ndr_wkssvc.c ndr_print_ptr(ndr, "password", r->in.password);
password 8024 librpc/gen_ndr/ndr_wkssvc.c if (r->in.password) {
password 8025 librpc/gen_ndr/ndr_wkssvc.c ndr_print_string(ndr, "password", r->in.password);
password 8064 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.password));
password 8065 librpc/gen_ndr/ndr_wkssvc.c if (r->in.password) {
password 8066 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password 8068 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.password, CH_UTF16)));
password 8069 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.password, ndr_charset_length(r->in.password, CH_UTF16), sizeof(uint16_t), CH_UTF16));
password 8146 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_ALLOC(ndr, r->in.password);
password 8148 librpc/gen_ndr/ndr_wkssvc.c r->in.password = NULL;
password 8150 librpc/gen_ndr/ndr_wkssvc.c if (r->in.password) {
password 8152 librpc/gen_ndr/ndr_wkssvc.c NDR_PULL_SET_MEM_CTX(ndr, r->in.password, 0);
password 8153 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.password));
password 8154 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.password));
password 8155 librpc/gen_ndr/ndr_wkssvc.c if (ndr_get_array_length(ndr, &r->in.password) > ndr_get_array_size(ndr, &r->in.password)) {
password 8156 librpc/gen_ndr/ndr_wkssvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.password), ndr_get_array_length(ndr, &r->in.password));
password 8158 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t)));
password 8159 librpc/gen_ndr/ndr_wkssvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.password, ndr_get_array_length(ndr, &r->in.password), sizeof(uint16_t), CH_UTF16));
password 8198 librpc/gen_ndr/ndr_wkssvc.c ndr_print_ptr(ndr, "password", r->in.password);
password 8200 librpc/gen_ndr/ndr_wkssvc.c if (r->in.password) {
password 8201 librpc/gen_ndr/ndr_wkssvc.c ndr_print_string(ndr, "password", r->in.password);
password 119 librpc/gen_ndr/netlogon.h struct netr_PasswordInfo *password;/* [unique,case(NetlogonInteractiveInformation)] */
password 1528 librpc/gen_ndr/netlogon.h struct samr_Password *password;/* [ref] */
password 1687 librpc/gen_ndr/netlogon.h struct samr_Password *password;/* [ref] */
password 567 librpc/gen_ndr/samr.h struct samr_CryptPassword password;
password 571 librpc/gen_ndr/samr.h struct samr_CryptPassword password;
password 581 librpc/gen_ndr/samr.h struct samr_CryptPasswordEx password;
password 585 librpc/gen_ndr/samr.h struct samr_CryptPasswordEx password;
password 796 librpc/gen_ndr/samr.h struct lsa_StringLarge password;
password 805 librpc/gen_ndr/samr.h struct lsa_StringLarge password;
password 1619 librpc/gen_ndr/samr.h struct samr_CryptPassword *password;/* [unique] */
password 2571 librpc/gen_ndr/srv_netlogon.c r->out.password = talloc_zero(r, struct samr_Password);
password 2572 librpc/gen_ndr/srv_netlogon.c if (r->out.password == NULL) {
password 3443 librpc/gen_ndr/srv_netlogon.c r->out.password = talloc_zero(r, struct samr_Password);
password 3444 librpc/gen_ndr/srv_netlogon.c if (r->out.password == NULL) {
password 4322 librpc/gen_ndr/srv_netlogon.c r->out.password = talloc_zero(mem_ctx, struct samr_Password);
password 4323 librpc/gen_ndr/srv_netlogon.c if (r->out.password == NULL) {
password 4447 librpc/gen_ndr/srv_netlogon.c r->out.password = talloc_zero(mem_ctx, struct samr_Password);
password 4448 librpc/gen_ndr/srv_netlogon.c if (r->out.password == NULL) {
password 300 librpc/gen_ndr/srvsvc.h const char *password;/* [unique,charset(UTF16)] */
password 328 librpc/gen_ndr/srvsvc.h const char *password;/* [unique,charset(UTF16)] */
password 444 librpc/gen_ndr/svcctl.h const char *password;/* [unique,charset(UTF16)] */
password 470 librpc/gen_ndr/svcctl.h uint8_t *password;/* [unique,size_is(password_size)] */
password 652 librpc/gen_ndr/svcctl.h const char *password;/* [unique,charset(UTF16)] */
password 677 librpc/gen_ndr/svcctl.h const char *password;/* [unique,charset(UTF16)] */
password 315 librpc/gen_ndr/wkssvc.h const char *password;/* [unique,charset(UTF16)] */
password 327 librpc/gen_ndr/wkssvc.h const char *password;/* [unique,charset(UTF16)] */
password 747 librpc/gen_ndr/wkssvc.h const char *password;/* [unique,charset(UTF16)] */
password 762 librpc/gen_ndr/wkssvc.h const char *password;/* [unique,charset(UTF16)] */
password 778 librpc/gen_ndr/wkssvc.h const char *password;/* [unique,charset(UTF16)] */
password 29 nsswitch/libwbclient/wbc_pam.c const char *password)
password 38 nsswitch/libwbclient/wbc_pam.c params.password.plaintext = password;
password 337 nsswitch/libwbclient/wbc_pam.c if (!params->password.plaintext) {
password 365 nsswitch/libwbclient/wbc_pam.c params->password.plaintext,
password 380 nsswitch/libwbclient/wbc_pam.c if (params->password.response.lm_length &&
password 381 nsswitch/libwbclient/wbc_pam.c !params->password.response.lm_data) {
password 385 nsswitch/libwbclient/wbc_pam.c if (params->password.response.lm_length == 0 &&
password 386 nsswitch/libwbclient/wbc_pam.c params->password.response.lm_data) {
password 391 nsswitch/libwbclient/wbc_pam.c if (params->password.response.nt_length &&
password 392 nsswitch/libwbclient/wbc_pam.c !params->password.response.nt_data) {
password 396 nsswitch/libwbclient/wbc_pam.c if (params->password.response.nt_length == 0&&
password 397 nsswitch/libwbclient/wbc_pam.c params->password.response.nt_data) {
password 420 nsswitch/libwbclient/wbc_pam.c params->password.response.challenge,
password 424 nsswitch/libwbclient/wbc_pam.c MIN(params->password.response.lm_length,
password 426 nsswitch/libwbclient/wbc_pam.c if (params->password.response.lm_data) {
password 428 nsswitch/libwbclient/wbc_pam.c params->password.response.lm_data,
password 431 nsswitch/libwbclient/wbc_pam.c request.data.auth_crap.nt_resp_len = params->password.response.nt_length;
password 432 nsswitch/libwbclient/wbc_pam.c if (params->password.response.nt_length > sizeof(request.data.auth_crap.nt_resp)) {
password 434 nsswitch/libwbclient/wbc_pam.c request.extra_len = params->password.response.nt_length;
password 441 nsswitch/libwbclient/wbc_pam.c params->password.response.nt_data,
password 443 nsswitch/libwbclient/wbc_pam.c } else if (params->password.response.nt_data) {
password 445 nsswitch/libwbclient/wbc_pam.c params->password.response.nt_data,
password 939 nsswitch/libwbclient/wbc_pam.c if (!params->password) {
password 949 nsswitch/libwbclient/wbc_pam.c params->password,
password 223 nsswitch/libwbclient/wbclient.h } password;
password 251 nsswitch/libwbclient/wbclient.h const char *password;
password 1045 nsswitch/libwbclient/wbclient.h const char *password);
password 1767 nsswitch/pam_winbind.c logon.password = pass;
password 2598 nsswitch/pam_winbind.c const char *password;
password 2665 nsswitch/pam_winbind.c &password);
password 2679 nsswitch/pam_winbind.c real_username, password);
password 2690 nsswitch/pam_winbind.c retval = winbind_auth_request(ctx, real_username, password,
password 1184 nsswitch/wbinfo.c char *password;
password 1200 nsswitch/wbinfo.c password = wbinfo_prompt_pass(NULL, username);
password 1201 nsswitch/wbinfo.c fstrcpy(request.data.auth.pass, password);
password 1202 nsswitch/wbinfo.c SAFE_FREE(password);
password 1249 nsswitch/wbinfo.c char *password = NULL;
password 1259 nsswitch/wbinfo.c password = SMB_STRDUP(p);
password 1261 nsswitch/wbinfo.c password = wbinfo_prompt_pass(NULL, username);
password 1266 nsswitch/wbinfo.c wbc_status = wbcAuthenticateUser(name, password);
password 1280 nsswitch/wbinfo.c SAFE_FREE(password);
password 1321 nsswitch/wbinfo.c generate_random_buffer(params.password.response.challenge, 8);
password 1327 nsswitch/wbinfo.c server_chal = data_blob(params.password.response.challenge, 8);
password 1347 nsswitch/wbinfo.c ok = SMBencrypt(pass, params.password.response.challenge,
password 1354 nsswitch/wbinfo.c SMBNTencrypt(pass, params.password.response.challenge,
password 1358 nsswitch/wbinfo.c params.password.response.nt_length = nt.length;
password 1359 nsswitch/wbinfo.c params.password.response.nt_data = nt.data;
password 1360 nsswitch/wbinfo.c params.password.response.lm_length = lm.length;
password 1361 nsswitch/wbinfo.c params.password.response.lm_data = lm.data;
password 1509 nsswitch/wbinfo.c const char *password;
password 1521 nsswitch/wbinfo.c password = p+1;
password 1525 nsswitch/wbinfo.c password = thepass;
password 1527 nsswitch/wbinfo.c password = "";
password 1556 nsswitch/wbinfo.c if (password[0]) {
password 1558 nsswitch/wbinfo.c if (!secrets_store(SECRETS_AUTH_PASSWORD, password,
password 1559 nsswitch/wbinfo.c strlen(password) + 1)) {
password 1572 nsswitch/wbinfo.c char *user, *domain, *password;
password 1576 nsswitch/wbinfo.c secrets_fetch_ipc_userpass(&user, &domain, &password);
password 1578 nsswitch/wbinfo.c if ((!user || !*user) && (!domain || !*domain ) && (!password || !*password)){
password 1582 nsswitch/wbinfo.c SAFE_FREE(password);
password 1590 nsswitch/wbinfo.c user, password ? "%" : "", password ? password : "");
password 1594 nsswitch/wbinfo.c SAFE_FREE(password);
password 30 source3/auth/auth_unix.c static bool update_smbpassword_file(const char *user, const char *password)
password 58 source3/auth/auth_unix.c if (!pdb_set_plaintext_passwd (sampass, password)) {
password 77 source3/auth/auth_wbc.c params.password.plaintext = (char *)user_info->plaintext_password.data;
password 83 source3/auth/auth_wbc.c memcpy(params.password.response.challenge,
password 85 source3/auth/auth_wbc.c sizeof(params.password.response.challenge));
password 87 source3/auth/auth_wbc.c params.password.response.nt_length = user_info->nt_resp.length;
password 88 source3/auth/auth_wbc.c params.password.response.nt_data = user_info->nt_resp.data;
password 89 source3/auth/auth_wbc.c params.password.response.lm_length = user_info->lm_resp.length;
password 90 source3/auth/auth_wbc.c params.password.response.lm_data = user_info->lm_resp.data;
password 69 source3/auth/auth_winbind.c memcpy(params.password.response.challenge,
password 71 source3/auth/auth_winbind.c sizeof(params.password.response.challenge));
password 73 source3/auth/auth_winbind.c params.password.response.nt_length = user_info->nt_resp.length;
password 74 source3/auth/auth_winbind.c params.password.response.nt_data = user_info->nt_resp.data;
password 75 source3/auth/auth_winbind.c params.password.response.lm_length = user_info->lm_resp.length;
password 76 source3/auth/auth_winbind.c params.password.response.lm_data = user_info->lm_resp.data;
password 804 source3/auth/pampass.c NTSTATUS smb_pam_passcheck(const char * user, const char * password)
password 816 source3/auth/pampass.c if ((pconv = smb_setup_pam_conv(smb_pam_conv, user, password, NULL)) == NULL)
password 94 source3/auth/pass_check.c static bool afs_auth(char *user, char *password)
password 105 source3/auth/pass_check.c password, 0, /* lifetime, default */
password 143 source3/auth/pass_check.c static bool dfs_auth(char *user, char *password)
password 167 source3/auth/pass_check.c if (strcmp((char *)crypt(password, get_this_salt()), get_this_crypted()))
password 324 source3/auth/pass_check.c passwd_rec.key.tagged_union.plain = (idl_char *) password;
password 435 source3/auth/pass_check.c static int linux_bigcrypt(char *password, char *salt1, char *crypted)
password 444 source3/auth/pass_check.c for (i = strlen(password); i > 0; i -= LINUX_PASSWORD_SEG_CHARS) {
password 445 source3/auth/pass_check.c char *p = crypt(password, salt) + 2;
password 448 source3/auth/pass_check.c password += LINUX_PASSWORD_SEG_CHARS;
password 460 source3/auth/pass_check.c static char *osf1_bigcrypt(char *password, char *salt1)
password 464 source3/auth/pass_check.c char *p2 = password;
password 467 source3/auth/pass_check.c int parts = strlen(password) / AUTH_CLEARTEXT_SEG_CHARS;
password 468 source3/auth/pass_check.c if (strlen(password) % AUTH_CLEARTEXT_SEG_CHARS)
password 543 source3/auth/pass_check.c static NTSTATUS password_check(const char *password)
password 546 source3/auth/pass_check.c return smb_pam_passcheck(get_this_user(), password);
password 552 source3/auth/pass_check.c if (afs_auth(get_this_user(), password))
password 557 source3/auth/pass_check.c if (dfs_auth(get_this_user(), password))
password 563 source3/auth/pass_check.c ret = (strcmp(osf1_bigcrypt(password, get_this_salt()),
password 568 source3/auth/pass_check.c ret = (strcmp((char *)crypt(password, get_this_salt()), get_this_crypted()) == 0);
password 579 source3/auth/pass_check.c ret = (strcmp((char *)crypt16(password, get_this_salt()), get_this_crypted()) == 0);
password 589 source3/auth/pass_check.c ret = (linux_bigcrypt(password, get_this_salt(), get_this_crypted()));
password 606 source3/auth/pass_check.c if (strcmp(bigcrypt(password, get_this_salt()), get_this_crypted()) == 0)
password 609 source3/auth/pass_check.c ret = (strcmp((char *)crypt(password, get_this_salt()), get_this_crypted()) == 0);
password 618 source3/auth/pass_check.c ret = (strcmp(bigcrypt(password, get_this_salt()), get_this_crypted()) == 0);
password 630 source3/auth/pass_check.c ret = (strcmp((char *)crypt(password, get_this_salt()), get_this_crypted()) == 0);
password 650 source3/auth/pass_check.c NTSTATUS pass_check(const struct passwd *pass, const char *user, const char *password,
password 659 source3/auth/pass_check.c DEBUG(100, ("checking user=[%s] pass=[%s]\n", user, password));
password 662 source3/auth/pass_check.c if (!password)
password 665 source3/auth/pass_check.c if (((!*password) || (!pwlen)) && !lp_null_passwords())
password 810 source3/auth/pass_check.c if (!*password) {
password 821 source3/auth/pass_check.c nt_status = password_check(password);
password 824 source3/auth/pass_check.c fn(user, password);
password 839 source3/auth/pass_check.c if (strhasupper(password) && strhaslower(password)) {
password 844 source3/auth/pass_check.c pass2 = talloc_strdup(talloc_tos(), password);
password 2253 source3/client/client.c char *password = NULL;
password 2265 source3/client/client.c if (!next_token_talloc(ctx, &cmd_ptr,&password,NULL)) {
password 2272 source3/client/client.c password,
password 187 source3/client/mount.cifs.c struct passwd *password = getpwuid(getuid());
password 189 source3/client/mount.cifs.c if (password) {
password 190 source3/client/mount.cifs.c username = password->pw_name;
password 84 source3/client/smbspool.c *password; /* Password */
password 188 source3/client/smbspool.c password = uri_unescape_alloc(tmp2);
password 190 source3/client/smbspool.c password = null_str;
password 198 source3/client/smbspool.c if ((password = getenv("AUTH_PASSWORD")) == NULL) {
password 199 source3/client/smbspool.c password = null_str;
password 262 source3/client/smbspool.c username, password, argv[2], &need_auth);
password 392 source3/client/smbspool.c const char *password,
password 414 source3/client/smbspool.c if (!password) {
password 420 source3/client/smbspool.c password, strlen(password) + 1,
password 421 source3/client/smbspool.c password, strlen(password) + 1,
password 435 source3/client/smbspool.c nt_status = cli_tcon_andx(cli, share, "?????", password,
password 436 source3/client/smbspool.c strlen(password) + 1);
password 454 source3/client/smbspool.c password,
password 477 source3/client/smbspool.c const char *password, /* I - Password */
password 500 source3/client/smbspool.c password, workgroup, share, 0, need_auth);
password 596 source3/client/tree.c char *password, int pwmaxlen)
password 600 source3/client/tree.c strncpy(password, "test", pwmaxlen);
password 64 source3/include/ads.h char *password;
password 194 source3/include/client.h char *password; /* Can be null to force use of zero NTLMSSP session key. */
password 938 source3/include/includes.h int create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype, bool no_salt);
password 1025 source3/include/includes.h krb5_data password,
password 2682 source3/include/libsmbclient.h const char *password,
password 2697 source3/include/libsmbclient.h const char *password);
password 50 source3/include/popt_common.h char *password;
password 162 source3/include/proto.h NTSTATUS smb_pam_passcheck(const char * user, const char * password);
password 171 source3/include/proto.h NTSTATUS pass_check(const struct passwd *pass, const char *user, const char *password,
password 1087 source3/include/proto.h const char *password);
password 1764 source3/include/proto.h const char *password,
password 1783 source3/include/proto.h const char *password,
password 1823 source3/include/proto.h const char *password);
password 2335 source3/include/proto.h const char *password, int flags,
password 2358 source3/include/proto.h const char *password,
password 2425 source3/include/proto.h NTSTATUS cli_set_password(struct cli_state *cli, const char *password);
password 2426 source3/include/proto.h NTSTATUS cli_init_creds(struct cli_state *cli, const char *username, const char *domain, const char *password);
password 2590 source3/include/proto.h const char *password,
password 3109 source3/include/proto.h NTSTATUS ntlmssp_set_password(NTLMSSP_STATE *ntlmssp_state, const char *password) ;
password 3258 source3/include/proto.h bool SMBNTLMv2encrypt(const char *user, const char *domain, const char *password,
password 3263 source3/include/proto.h bool encode_pw_buffer(uint8 buffer[516], const char *password, int string_flags);
password 4526 source3/include/proto.h bool pdb_set_plaintext_pw_only(struct samu *sampass, const char *password, enum pdb_value_state flag);
password 4707 source3/include/proto.h void secrets_fetch_ipc_userpass(char **username, char **domain, char **password);
password 5222 source3/include/proto.h const char *password,
password 5284 source3/include/proto.h const char *password,
password 5294 source3/include/proto.h const char *password,
password 5319 source3/include/proto.h const char *password,
password 5327 source3/include/proto.h const char *password,
password 5346 source3/include/proto.h const char *password,
password 5359 source3/include/proto.h const char *password,
password 6730 source3/include/proto.h bool authorise_login(int snum, fstring user, DATA_BLOB password,
password 6990 source3/include/proto.h connection_struct *make_connection(const char *service_in, DATA_BLOB password,
password 502 source3/include/rap.h char password[RAP_SPASSWD_LEN];
password 798 source3/lib/ldb/ldb_ildap/ldb_ildap.c const char *password = cli_credentials_get_password(creds);
password 799 source3/lib/ldb/ldb_ildap/ldb_ildap.c status = ldap_bind_simple(ildb->ldap, bind_dn, password);
password 46 source3/lib/netapi/cm.c if (ctx->password) {
password 47 source3/lib/netapi/cm.c set_cmdline_auth_info_password(auth_info, ctx->password);
password 53 source3/lib/netapi/cm.c ctx->password && ctx->password[0] &&
password 66 source3/lib/netapi/cm.c cli_set_password(cli_ipc, ctx->password);
password 76 source3/lib/netapi/examples/join/getjoinableous.c ctx->password,
password 41 source3/lib/netapi/examples/join/netdomjoin.c const char *password = NULL;
password 55 source3/lib/netapi/examples/join/netdomjoin.c { "passwordd", 0, POPT_ARG_STRING, &password, 'U', "Domain admin password", "PASSWORD" },
password 89 source3/lib/netapi/examples/join/netdomjoin.c password,
password 74 source3/lib/netapi/examples/join/rename_machine.c ctx->password,
password 69 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c char *password;
password 139 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c SAFE_FREE(state->password);
password 155 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c SAFE_FREE(state->password);
password 171 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c SAFE_FREE(s->password);
password 390 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c SAFE_FREE(state->password);
password 391 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c state->password = strdup(entry_text);
password 411 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c SAFE_FREE(state->password);
password 412 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c state->password = strdup(entry_text);
password 424 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c SAFE_FREE(state->password);
password 484 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c if (!state->account || !state->password) {
password 491 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c if (!state->account || !state->password) {
password 499 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c state->password,
password 714 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c if (!state->account || !state->password) {
password 721 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c if (!state->account || !state->password) {
password 729 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c state->password,
password 793 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c if (!state->account || !state->password) {
password 800 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c if (!state->account || !state->password) {
password 813 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c debug("with %s ", state->password);
password 822 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c state->password,
password 1069 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c if (!state->account || !state->password) {
password 1076 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c if (!state->account || !state->password) {
password 1084 source3/lib/netapi/examples/netdomjoin-gui/netdomjoin-gui.c state->password,
password 36 source3/lib/netapi/examples/user/user_add.c const char *password = NULL;
password 76 source3/lib/netapi/examples/user/user_add.c password = poptGetArg(pc);
password 81 source3/lib/netapi/examples/user/user_add.c info1.usri1_password = password;
password 77 source3/lib/netapi/joindomain.c if (r->in.password) {
password 78 source3/lib/netapi/joindomain.c j->in.admin_password = talloc_strdup(mem_ctx, r->in.password);
password 114 source3/lib/netapi/joindomain.c if (r->in.password) {
password 116 source3/lib/netapi/joindomain.c r->in.password,
password 199 source3/lib/netapi/joindomain.c if (r->in.password) {
password 200 source3/lib/netapi/joindomain.c u->in.admin_password = talloc_strdup(mem_ctx, r->in.password);
password 240 source3/lib/netapi/joindomain.c if (r->in.password) {
password 242 source3/lib/netapi/joindomain.c r->in.password,
password 370 source3/lib/netapi/joindomain.c SAFE_FREE(ads->auth.password);
password 371 source3/lib/netapi/joindomain.c if (r->in.password) {
password 372 source3/lib/netapi/joindomain.c ads->auth.password = SMB_STRDUP(r->in.password);
password 373 source3/lib/netapi/joindomain.c } else if (ctx->password) {
password 374 source3/lib/netapi/joindomain.c ads->auth.password = SMB_STRDUP(ctx->password);
password 416 source3/lib/netapi/joindomain.c if (r->in.password) {
password 418 source3/lib/netapi/joindomain.c r->in.password,
password 458 source3/lib/netapi/joindomain.c if (r->in.password) {
password 460 source3/lib/netapi/joindomain.c r->in.password,
password 35 source3/lib/netapi/libnetapi.c const char * password /* [in] [unique] */,
password 53 source3/lib/netapi/libnetapi.c r.in.password = password;
password 83 source3/lib/netapi/libnetapi.c const char * password /* [in] [unique] */,
password 99 source3/lib/netapi/libnetapi.c r.in.password = password;
password 174 source3/lib/netapi/libnetapi.c const char * password /* [in] [unique] */,
password 192 source3/lib/netapi/libnetapi.c r.in.password = password;
password 224 source3/lib/netapi/libnetapi.c const char * password /* [in] */,
password 241 source3/lib/netapi/libnetapi.c r.in.password = password;
password 7 source3/lib/netapi/libnetapi.h const char * password /* [in] [unique] */,
password 15 source3/lib/netapi/libnetapi.h const char * password /* [in] [unique] */,
password 31 source3/lib/netapi/libnetapi.h const char * password /* [in] [unique] */,
password 41 source3/lib/netapi/libnetapi.h const char * password /* [in] */,
password 224 source3/lib/netapi/netapi.c const char *password)
password 226 source3/lib/netapi/netapi.c TALLOC_FREE(ctx->password);
password 227 source3/lib/netapi/netapi.c ctx->password = talloc_strdup(ctx, password);
password 228 source3/lib/netapi/netapi.c if (!ctx->password) {
password 1270 source3/lib/netapi/netapi.h char *password;
password 1309 source3/lib/netapi/netapi.h const char *password);
password 1398 source3/lib/netapi/netapi.h const char * password /* [in] */,
password 1417 source3/lib/netapi/netapi.h const char * password /* [in] */,
password 1461 source3/lib/netapi/netapi.h const char * password /* [in] */,
password 1485 source3/lib/netapi/netapi.h const char * password /* [in] */,
password 48 source3/lib/netapi/netapi_private.h NET_API_STATUS libnetapi_get_password(struct libnetapi_ctx *ctx, char **password);
password 85 source3/lib/netapi/share.c i2.shi2_passwd = talloc_strdup(mem_ctx, s2->password);
password 153 source3/lib/netapi/share.c s2->password = i2->shi2_passwd;
password 313 source3/lib/netapi/user.c &user_info.info25.password);
password 326 source3/lib/netapi/user.c &user_info.info23.password);
password 313 source3/lib/util.c if (!auth_info->password) {
password 316 source3/lib/util.c return auth_info->password;
password 320 source3/lib/util.c const char *password)
password 322 source3/lib/util.c TALLOC_FREE(auth_info->password);
password 323 source3/lib/util.c if (password == NULL) {
password 324 source3/lib/util.c password = "";
password 326 source3/lib/util.c auth_info->password = talloc_strdup(auth_info, password);
password 327 source3/lib/util.c if (!auth_info->password) {
password 426 source3/lib/util.c result->password = talloc_strdup(
password 428 source3/lib/util.c if ((result->username == NULL) || (result->password == NULL)) {
password 171 source3/libads/ads_struct.c SAFE_FREE((*ads)->auth.password);
password 156 source3/libads/kerberos.c const char *password,
password 222 source3/libads/kerberos.c if ((code = krb5_get_init_creds_password(ctx, &my_creds, me, CONST_DISCARD(char *,password),
password 223 source3/libads/kerberos.c kerb_prompter, CONST_DISCARD(char *,password),
password 321 source3/libads/kerberos.c if (!ads->auth.password) {
password 326 source3/libads/kerberos.c ret = kerberos_kinit_password_ext(s, ads->auth.password, ads->auth.time_offset,
password 644 source3/libads/kerberos.c const char *password,
password 649 source3/libads/kerberos.c password,
password 40 source3/libads/kerberos_keytab.c krb5_data password,
password 166 source3/libads/kerberos_keytab.c if (create_kerberos_key_from_string(context, princ, &password, keyp, enctypes[i], no_salt)) {
password 213 source3/libads/kerberos_keytab.c krb5_data password)
password 220 source3/libads/kerberos_keytab.c password,
password 234 source3/libads/kerberos_keytab.c krb5_data password;
password 272 source3/libads/kerberos_keytab.c ZERO_STRUCT(password);
password 273 source3/libads/kerberos_keytab.c password.data = password_s;
password 274 source3/libads/kerberos_keytab.c password.length = strlen(password_s);
password 350 source3/libads/kerberos_keytab.c ret = smb_krb5_kt_add_entry( context, keytab, kvno, princ_s, enctypes, password );
password 359 source3/libads/kerberos_keytab.c ret = smb_krb5_kt_add_entry( context, keytab, kvno, short_princ_s, enctypes, password );
password 310 source3/libads/kerberos_verify.c krb5_data password;
password 340 source3/libads/kerberos_verify.c password.data = password_s;
password 341 source3/libads/kerberos_verify.c password.length = strlen(password_s);
password 357 source3/libads/kerberos_verify.c if (create_kerberos_key_from_string(context, host_princ, &password, key, enctypes[i], false)) {
password 60 source3/libads/krb5_setpw.c static DATA_BLOB encode_krb5_setpw(const char *principal, const char *password)
password 100 source3/libads/krb5_setpw.c asn1_write_OctetString(req, password, strlen(password));
password 729 source3/libads/krb5_setpw.c char *chpw_princ = NULL, *password;
password 759 source3/libads/krb5_setpw.c password = SMB_STRDUP(oldpw);
password 760 source3/libads/krb5_setpw.c ret = krb5_get_init_creds_password(context, &creds, princ, password,
password 764 source3/libads/krb5_setpw.c SAFE_FREE(password);
password 818 source3/libads/krb5_setpw.c const char *password)
password 833 source3/libads/krb5_setpw.c password, ads->auth.time_offset);
password 707 source3/libads/ldap.c status = ADS_ERROR(ldap_simple_bind_s(ads->ldap.ld, ads->auth.user_name, ads->auth.password));
password 57 source3/libads/ndr.c ndr_print_string(ndr, "password", r->auth.password);
password 146 source3/libads/sasl.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_password(ntlmssp_state, ads->auth.password))) {
password 26 source3/libads/util.c char *password;
password 31 source3/libads/util.c if ((password = secrets_fetch_machine_password(lp_workgroup(), NULL, &sec_channel_type)) == NULL) {
password 38 source3/libads/util.c ret = kerberos_set_password(ads->auth.kdc_server, host_principal, password, host_principal, new_password, ads->auth.time_offset);
password 51 source3/libads/util.c SAFE_FREE(password);
password 666 source3/libgpo/gpo_util.c ads->auth.password,
password 55 source3/libnet/libnet_dssync_keytab.c ndr_err = ndr_pull_struct_blob(&entry->password, old_utdv,
password 389 source3/libnet/libnet_dssync_keytab.c entry->password.data,
password 390 source3/libnet/libnet_dssync_keytab.c entry->password.length);
password 98 source3/libnet/libnet_join.c const char *password,
password 116 source3/libnet/libnet_join.c if (password) {
password 117 source3/libnet/libnet_join.c SAFE_FREE(my_ads->auth.password);
password 118 source3/libnet/libnet_join.c my_ads->auth.password = SMB_STRDUP(password);
password 933 source3/libnet/libnet_join.c user_info.info26.password = crypt_pwd_ex;
password 949 source3/libnet/libnet_join.c user_info.info24.password = crypt_pwd;
password 210 source3/libnet/libnet_keytab.c krb5_data password)
password 238 source3/libnet/libnet_keytab.c &password, keyp, enctype, true))
password 289 source3/libnet/libnet_keytab.c krb5_data password;
password 291 source3/libnet/libnet_keytab.c ZERO_STRUCT(password);
password 292 source3/libnet/libnet_keytab.c password.data = (char *)entry->password.data;
password 293 source3/libnet/libnet_keytab.c password.length = entry->password.length;
password 300 source3/libnet/libnet_keytab.c password);
password 373 source3/libnet/libnet_keytab.c entry->password = data_blob_talloc(entry, KRB5_KEY_DATA(keyp),
password 375 source3/libnet/libnet_keytab.c if (!entry->password.data) {
password 421 source3/libnet/libnet_keytab.c entry.password = blob;
password 424 source3/libnet/libnet_keytab.c NT_STATUS_HAVE_NO_MEMORY(entry.password.data);
password 25 source3/libnet/libnet_keytab.h DATA_BLOB password;
password 64 source3/libnet/libnet_samsync.h const char *password;
password 32 source3/libnet/libnet_samsync_keytab.c const char *password,
password 56 source3/libnet/libnet_samsync_keytab.c ads->auth.password = SMB_STRDUP(password);
password 130 source3/libnet/libnet_samsync_keytab.c ctx->password,
password 143 source3/libnet/libnet_samsync_keytab.c if (entry && (entry->password.length == 8)) {
password 144 source3/libnet/libnet_samsync_keytab.c old_sequence_num = BVAL(entry->password.data, 0);
password 225 source3/libnet/libnet_samsync_keytab.c if (entry && (entry->password.length == 8)) {
password 226 source3/libnet/libnet_samsync_keytab.c old_sequence_num = BVAL(entry->password.data, 0);
password 1305 source3/librpc/gen_ndr/libnetapi.h const char * password;/* [unique] */
password 1320 source3/librpc/gen_ndr/libnetapi.h const char * password;/* [unique] */
password 1350 source3/librpc/gen_ndr/libnetapi.h const char * password;/* [unique] */
password 1367 source3/librpc/gen_ndr/libnetapi.h const char * password;
password 5883 source3/librpc/gen_ndr/ndr_libnetapi.c ndr_print_ptr(ndr, "password", r->in.password);
password 5885 source3/librpc/gen_ndr/ndr_libnetapi.c if (r->in.password) {
password 5886 source3/librpc/gen_ndr/ndr_libnetapi.c ndr_print_string(ndr, "password", r->in.password);
password 5923 source3/librpc/gen_ndr/ndr_libnetapi.c ndr_print_ptr(ndr, "password", r->in.password);
password 5925 source3/librpc/gen_ndr/ndr_libnetapi.c if (r->in.password) {
password 5926 source3/librpc/gen_ndr/ndr_libnetapi.c ndr_print_string(ndr, "password", r->in.password);
password 6007 source3/librpc/gen_ndr/ndr_libnetapi.c ndr_print_ptr(ndr, "password", r->in.password);
password 6009 source3/librpc/gen_ndr/ndr_libnetapi.c if (r->in.password) {
password 6010 source3/librpc/gen_ndr/ndr_libnetapi.c ndr_print_string(ndr, "password", r->in.password);
password 6055 source3/librpc/gen_ndr/ndr_libnetapi.c ndr_print_string(ndr, "password", r->in.password);
password 2103 source3/libsmb/cliconnect.c const char *password, int flags,
password 2109 source3/libsmb/cliconnect.c int pw_len = password ? strlen(password)+1 : 0;
password 2113 source3/libsmb/cliconnect.c if (password == NULL) {
password 2114 source3/libsmb/cliconnect.c password = "";
password 2125 source3/libsmb/cliconnect.c nt_status = cli_session_setup(cli, user, password, pw_len, password,
password 2146 source3/libsmb/cliconnect.c nt_status = cli_tcon_andx(cli, service, service_type, password,
password 2158 source3/libsmb/cliconnect.c nt_status = cli_init_creds(cli, user, domain, password);
password 2294 source3/libsmb/cliconnect.c user_info->password ? user_info->password : "",
password 42 source3/libsmb/clidfs.c const char *password,
password 51 source3/libsmb/clidfs.c const char *password,
password 57 source3/libsmb/clidfs.c password,
password 104 source3/libsmb/clidfs.c const char *password;
password 197 source3/libsmb/clidfs.c password = get_cmdline_auth_info_password(auth_info);
password 200 source3/libsmb/clidfs.c password, strlen(password),
password 201 source3/libsmb/clidfs.c password, strlen(password),
password 205 source3/libsmb/clidfs.c if (password[0] || !username[0] ||
password 221 source3/libsmb/clidfs.c status = cli_init_creds(c, username, lp_workgroup(), password);
password 251 source3/libsmb/clidfs.c password,
password 263 source3/libsmb/clidfs.c password, strlen(password)+1);
password 273 source3/libsmb/clidfs.c password,
password 994 source3/libsmb/clidfs.c const char *password,
password 1033 source3/libsmb/clidfs.c password,
password 435 source3/libsmb/clientgen.c NTSTATUS cli_set_password(struct cli_state *cli, const char *password)
password 437 source3/libsmb/clientgen.c TALLOC_FREE(cli->password);
password 440 source3/libsmb/clientgen.c if (password) {
password 441 source3/libsmb/clientgen.c cli->password = talloc_strdup(cli, password);
password 442 source3/libsmb/clientgen.c if (cli->password == NULL) {
password 447 source3/libsmb/clientgen.c cli->password = NULL;
password 457 source3/libsmb/clientgen.c NTSTATUS cli_init_creds(struct cli_state *cli, const char *username, const char *domain, const char *password)
password 469 source3/libsmb/clientgen.c return cli_set_password(cli, password);
password 786 source3/libsmb/clifsinfo.c const char *password,
password 809 source3/libsmb/clifsinfo.c password,
password 218 source3/libsmb/clikrb5.c krb5_data *password,
password 232 source3/libsmb/clikrb5.c ret = krb5_string_to_key(context, &eblock, key, password, &salt);
password 240 source3/libsmb/clikrb5.c krb5_data *password,
password 253 source3/libsmb/clikrb5.c ret = krb5_string_to_key_salt(context, enctype, (const char *)password->data, salt, key);
password 264 source3/libsmb/clikrb5.c krb5_data *password,
password 277 source3/libsmb/clikrb5.c KRB5_KEY_DATA(key) = (KRB5_KEY_DATA_CAST *)SMB_MALLOC(password->length);
password 281 source3/libsmb/clikrb5.c memcpy(KRB5_KEY_DATA(key), password->data, password->length);
password 282 source3/libsmb/clikrb5.c KRB5_KEY_LENGTH(key) = password->length;
password 287 source3/libsmb/clikrb5.c ret = create_kerberos_key_from_string_direct(context, salt_princ ? salt_princ : host_princ, password, key, enctype);
password 1377 source3/libsmb/clirap2.c PUTSTRINGF(p, sinfo->password, RAP_SPASSWD_LEN);
password 640 source3/libsmb/libsmb_context.c const char *password,
password 650 source3/libsmb/libsmb_context.c const char *password)
password 669 source3/libsmb/libsmb_context.c if (! password) {
password 670 source3/libsmb/libsmb_context.c password = "";
password 693 source3/libsmb/libsmb_context.c set_cmdline_auth_info_password(auth_info, password);
password 359 source3/libsmb/libsmb_dir.c char *password = NULL;
password 393 source3/libsmb/libsmb_dir.c &password,
password 466 source3/libsmb/libsmb_dir.c u_info.password = talloc_strdup(frame,password);
password 467 source3/libsmb/libsmb_dir.c if (!u_info.username || !u_info.password) {
password 555 source3/libsmb/libsmb_dir.c &workgroup, &user, &password);
password 610 source3/libsmb/libsmb_dir.c &workgroup, &user, &password);
password 660 source3/libsmb/libsmb_dir.c &user, &password);
password 696 source3/libsmb/libsmb_dir.c &user, &password);
password 756 source3/libsmb/libsmb_dir.c &workgroup, &user, &password);
password 1123 source3/libsmb/libsmb_dir.c char *password = NULL;
password 1152 source3/libsmb/libsmb_dir.c &password,
password 1169 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password);
password 1231 source3/libsmb/libsmb_dir.c char *password = NULL;
password 1260 source3/libsmb/libsmb_dir.c &password,
password 1277 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password);
password 1515 source3/libsmb/libsmb_dir.c char *password = NULL;
password 1546 source3/libsmb/libsmb_dir.c &password,
password 1563 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password);
password 1606 source3/libsmb/libsmb_dir.c char *password = NULL;
password 1662 source3/libsmb/libsmb_dir.c &password,
password 1679 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password);
password 1707 source3/libsmb/libsmb_dir.c char *password = NULL;
password 1738 source3/libsmb/libsmb_dir.c &password,
password 1755 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password);
password 43 source3/libsmb/libsmb_file.c char *password = NULL;
password 77 source3/libsmb/libsmb_file.c &password,
password 94 source3/libsmb/libsmb_file.c server, share, &workgroup, &user, &password);
password 238 source3/libsmb/libsmb_file.c char *server = NULL, *share = NULL, *user = NULL, *password = NULL;
password 292 source3/libsmb/libsmb_file.c &password,
password 341 source3/libsmb/libsmb_file.c char *server = NULL, *share = NULL, *user = NULL, *password = NULL;
password 383 source3/libsmb/libsmb_file.c &password,
password 426 source3/libsmb/libsmb_file.c char *server = NULL, *share = NULL, *user = NULL, *password = NULL;
password 460 source3/libsmb/libsmb_file.c &password,
password 710 source3/libsmb/libsmb_file.c char *server = NULL, *share = NULL, *user = NULL, *password = NULL;
password 758 source3/libsmb/libsmb_file.c &password,
password 817 source3/libsmb/libsmb_file.c char *password = NULL;
password 851 source3/libsmb/libsmb_file.c &password,
password 41 source3/libsmb/libsmb_printjob.c char *password = NULL;
password 68 source3/libsmb/libsmb_printjob.c &password,
password 189 source3/libsmb/libsmb_printjob.c char *password = NULL;
password 217 source3/libsmb/libsmb_printjob.c &password,
password 234 source3/libsmb/libsmb_printjob.c server, share, &workgroup, &user, &password);
password 266 source3/libsmb/libsmb_printjob.c char *password = NULL;
password 295 source3/libsmb/libsmb_printjob.c &password,
password 312 source3/libsmb/libsmb_printjob.c server, share, &workgroup, &user, &password);
password 103 source3/libsmb/libsmb_server.c fstring password;
password 108 source3/libsmb/libsmb_server.c strlcpy(password, *pp_password, sizeof(password));
password 118 source3/libsmb/libsmb_server.c password, sizeof(password));
password 125 source3/libsmb/libsmb_server.c password, sizeof(password));
password 134 source3/libsmb/libsmb_server.c *pp_password = talloc_strdup(ctx, password);
password 118 source3/libsmb/libsmb_stat.c char *password = NULL;
password 152 source3/libsmb/libsmb_stat.c &password,
password 169 source3/libsmb/libsmb_stat.c server, share, &workgroup, &user, &password);
password 218 source3/libsmb/libsmb_stat.c char *password = NULL;
password 252 source3/libsmb/libsmb_stat.c &password,
password 1713 source3/libsmb/libsmb_xattr.c char *password = NULL;
password 1749 source3/libsmb/libsmb_xattr.c &password,
password 1766 source3/libsmb/libsmb_xattr.c server, share, &workgroup, &user, &password);
password 1774 source3/libsmb/libsmb_xattr.c &workgroup, &user, &password);
password 2009 source3/libsmb/libsmb_xattr.c char *password = NULL;
password 2043 source3/libsmb/libsmb_xattr.c &password,
password 2060 source3/libsmb/libsmb_xattr.c server, share, &workgroup, &user, &password);
password 2068 source3/libsmb/libsmb_xattr.c &workgroup, &user, &password);
password 2151 source3/libsmb/libsmb_xattr.c char *password = NULL;
password 2179 source3/libsmb/libsmb_xattr.c &password,
password 2196 source3/libsmb/libsmb_xattr.c server, share, &workgroup, &user, &password);
password 2204 source3/libsmb/libsmb_xattr.c &workgroup, &user, &password);
password 180 source3/libsmb/ntlmssp.c NTSTATUS ntlmssp_set_password(NTLMSSP_STATE *ntlmssp_state, const char *password)
password 182 source3/libsmb/ntlmssp.c if (!password) {
password 189 source3/libsmb/ntlmssp.c E_deshash(password, lm_hash);
password 190 source3/libsmb/ntlmssp.c E_md4hash(password, nt_hash);
password 474 source3/libsmb/smbencrypt.c bool SMBNTLMv2encrypt(const char *user, const char *domain, const char *password,
password 481 source3/libsmb/smbencrypt.c E_md4hash(password, nt_hash);
password 494 source3/libsmb/smbencrypt.c bool encode_pw_buffer(uint8 buffer[516], const char *password, int string_flags)
password 503 source3/libsmb/smbencrypt.c password,
password 896 source3/passdb/pdb_get_set.c bool pdb_set_plaintext_pw_only(struct samu *sampass, const char *password, enum pdb_value_state flag)
password 898 source3/passdb/pdb_get_set.c if (password) {
password 902 source3/passdb/pdb_get_set.c sampass->plaintext_pw = talloc_strdup(sampass, password);
password 46 source3/passdb/pdb_nds.c const char *password,
password 64 source3/passdb/pdb_nds.c if (password != NULL)
password 66 source3/passdb/pdb_nds.c utf8PwdSize = strlen(password)+1;
password 67 source3/passdb/pdb_nds.c utf8PwdPtr = password;
password 83 source3/passdb/pdb_nds.c if (password != NULL && password2 != NULL)
password 88 source3/passdb/pdb_nds.c else if (password != NULL)
password 1107 source3/passdb/secrets.c void secrets_fetch_ipc_userpass(char **username, char **domain, char **password)
password 1111 source3/passdb/secrets.c *password = (char *)secrets_fetch(SECRETS_AUTH_PASSWORD, NULL);
password 1118 source3/passdb/secrets.c if (!*password || !**password)
password 1119 source3/passdb/secrets.c *password = smb_xstrdup("");
password 1128 source3/passdb/secrets.c *password = smb_xstrdup("");
password 3340 source3/printing/nt_printing.c SAFE_FREE(ads->auth.password);
password 3341 source3/printing/nt_printing.c ads->auth.password = secrets_fetch_machine_password(lp_workgroup(),
password 3382 source3/printing/nt_printing.c SAFE_FREE(ads->auth.password);
password 3383 source3/printing/nt_printing.c ads->auth.password = secrets_fetch_machine_password(lp_workgroup(),
password 142 source3/rpc_client/cli_netlogon.c const char *password,
password 193 source3/rpc_client/cli_netlogon.c nt_lm_owf_gen(password, nt_owf_user_pwd, lm_owf_user_pwd);
password 230 source3/rpc_client/cli_netlogon.c logon->password = password_info;
password 252 source3/rpc_client/cli_netlogon.c SMBencrypt(password, chal, local_lm_response);
password 253 source3/rpc_client/cli_netlogon.c SMBNTencrypt(password, chal, local_nt_response);
password 3010 source3/rpc_client/cli_pipe.c E_md4hash(cli->password ? cli->password : "", nt_hash);
password 3049 source3/rpc_client/cli_pipe.c const char *password,
password 3087 source3/rpc_client/cli_pipe.c status = ntlmssp_set_password(result->a_u.ntlmssp_state, password);
password 3164 source3/rpc_client/cli_pipe.c const char *password,
password 3170 source3/rpc_client/cli_pipe.c if ((username != NULL) && (password != NULL)) {
password 3171 source3/rpc_client/cli_pipe.c int ret = kerberos_kinit_password(username, password, 0, NULL);
password 3742 source3/rpc_client/cli_pipe.c const char *password,
password 3756 source3/rpc_client/cli_pipe.c password, &auth);
password 3795 source3/rpc_client/cli_pipe.c const char *password,
password 3805 source3/rpc_client/cli_pipe.c password,
password 3820 source3/rpc_client/cli_pipe.c const char *password,
password 3830 source3/rpc_client/cli_pipe.c password,
password 3985 source3/rpc_client/cli_pipe.c const char *password,
password 3995 source3/rpc_client/cli_pipe.c domain, username, password, &netlogon_pipe);
password 4023 source3/rpc_client/cli_pipe.c const char *password,
password 4032 source3/rpc_client/cli_pipe.c cli, domain, username, password, &neg_flags, &netlogon_pipe);
password 4104 source3/rpc_client/cli_pipe.c const char *password,
password 4118 source3/rpc_client/cli_pipe.c username, password, &auth);
password 939 source3/rpc_server/srv_netlog_nt.c logon->password->identity_info.account_name.string);
password 941 source3/rpc_server/srv_netlog_nt.c logon->password->identity_info.domain_name.string);
password 943 source3/rpc_server/srv_netlog_nt.c logon->password->identity_info.workstation.string);
password 1018 source3/rpc_server/srv_netlog_nt.c logon->password->identity_info.parameter_control,
password 1020 source3/rpc_server/srv_netlog_nt.c logon->password->lmpassword.hash,
password 1021 source3/rpc_server/srv_netlog_nt.c logon->password->ntpassword.hash,
password 2084 source3/rpc_server/srv_samr_nt.c if (!r->in.hash || !r->in.password) {
password 2089 source3/rpc_server/srv_samr_nt.c r->in.password->data,
password 4742 source3/rpc_server/srv_samr_nt.c id23->password.data,
password 4877 source3/rpc_server/srv_samr_nt.c if (!set_user_info_pw(id24->password.data, pwd)) {
password 4917 source3/rpc_server/srv_samr_nt.c if (!set_user_info_pw(id25->password.data, pwd)) {
password 4962 source3/rpc_server/srv_samr_nt.c if (!set_user_info_pw(id26->password.data, pwd)) {
password 5240 source3/rpc_server/srv_samr_nt.c SamOEMhashBlob(info->info23.password.data, 516,
password 5243 source3/rpc_server/srv_samr_nt.c dump_data(100, info->info23.password.data, 516);
password 5253 source3/rpc_server/srv_samr_nt.c SamOEMhashBlob(info->info24.password.data,
password 5257 source3/rpc_server/srv_samr_nt.c dump_data(100, info->info24.password.data, 516);
password 5268 source3/rpc_server/srv_samr_nt.c info->info25.password.data,
password 5271 source3/rpc_server/srv_samr_nt.c dump_data(100, info->info25.password.data, 532);
password 5282 source3/rpc_server/srv_samr_nt.c info->info26.password.data,
password 5285 source3/rpc_server/srv_samr_nt.c dump_data(100, info->info26.password.data, 516);
password 315 source3/rpc_server/srv_srvsvc_nt.c r->password = "";
password 407 source3/rpc_server/srv_srvsvc_nt.c r->password = "";
password 954 source3/rpcclient/cmd_lsarpc.c DATA_BLOB data = data_blob(NULL, p->password->length);
password 957 source3/rpcclient/cmd_lsarpc.c memcpy(data.data, p->password->data, p->password->length);
password 980 source3/rpcclient/cmd_lsarpc.c display_trust_dom_info_4(&info->password, nt_hash);
password 692 source3/rpcclient/cmd_netlogon.c const char *username, *password;
password 706 source3/rpcclient/cmd_netlogon.c password = argv[2];
password 722 source3/rpcclient/cmd_netlogon.c result = rpccli_netlogon_sam_logon(cli, mem_ctx, logon_param, lp_workgroup(), username, password, workstation, logon_type);
password 2712 source3/rpcclient/cmd_samr.c info.info23.password = pwd_buf;
password 2716 source3/rpcclient/cmd_samr.c info.info24.password = pwd_buf;
password 2730 source3/rpcclient/cmd_samr.c info.info25.password = pwd_buf_ex;
password 2734 source3/rpcclient/cmd_samr.c info.info26.password = pwd_buf_ex;
password 226 source3/rpcclient/cmd_srvsvc.c printf("\tpassword:\t%s\n", r->password);
password 234 source3/rpcclient/cmd_srvsvc.c printf("\tpassword:\t%s\n", r->password);
password 916 source3/rpcclient/rpcclient.c memset(cmdline_auth_info.password,'X',sizeof(cmdline_auth_info.password));
password 2622 source3/smbd/lanman.c DATA_BLOB password = data_blob(pass1, strlen(pass1)+1);
password 2624 source3/smbd/lanman.c if (NT_STATUS_IS_OK(check_plaintext_password(user,password,&server_info))) {
password 2634 source3/smbd/lanman.c data_blob_clear_free(&password);
password 577 source3/smbd/password.c static char *validate_group(char *group, DATA_BLOB password,int snum)
password 586 source3/smbd/password.c password_ok(user,password)) {
password 647 source3/smbd/password.c password_ok(member,password)) {
password 675 source3/smbd/password.c bool authorise_login(int snum, fstring user, DATA_BLOB password,
password 682 source3/smbd/password.c "user=%s pass=%s\n", user,password.data));
password 723 source3/smbd/password.c if (password_ok(user2,password)) {
password 759 source3/smbd/password.c auser = validate_group(auser+1,password,snum);
password 771 source3/smbd/password.c password_ok(user2,password)) {
password 514 source3/smbd/reply.c char *password = NULL;
password 533 source3/smbd/reply.c pwlen = srvstr_pull_req_talloc(ctx, req, &password, p, STR_TERMINATE);
password 538 source3/smbd/reply.c if (service_buf == NULL || password == NULL || dev == NULL) {
password 550 source3/smbd/reply.c password_blob = data_blob(password, pwlen+1);
password 584 source3/smbd/reply.c DATA_BLOB password;
password 621 source3/smbd/reply.c password = data_blob_talloc(talloc_tos(), req->buf, passlen);
password 632 source3/smbd/reply.c password = data_blob_talloc(talloc_tos(), req->buf, passlen+1);
password 634 source3/smbd/reply.c password.data[passlen]=0;
password 641 source3/smbd/reply.c data_blob_clear_free(&password);
password 654 source3/smbd/reply.c data_blob_clear_free(&password);
password 669 source3/smbd/reply.c data_blob_clear_free(&password);
password 677 source3/smbd/reply.c conn = make_connection(service, password, client_devicetype,
password 681 source3/smbd/reply.c data_blob_clear_free(&password);
password 565 source3/smbd/service.c DATA_BLOB password,
password 621 source3/smbd/service.c if (!authorise_login(snum,user,password,&guest)) {
password 642 source3/smbd/service.c DATA_BLOB password,
password 671 source3/smbd/service.c conn, snum, vuser ? vuser->server_info : NULL, password,
password 1088 source3/smbd/service.c connection_struct *make_connection(const char *service_in, DATA_BLOB password,
password 1164 source3/smbd/service.c password,
password 1213 source3/smbd/service.c password,
password 22 source3/torture/locktest.c static fstring password[2];
password 226 source3/torture/locktest.c fstrcpy(password[0], pass);
password 227 source3/torture/locktest.c fstrcpy(password[1], pass);
password 232 source3/torture/locktest.c fstrcpy(password[1], password[0]);
password 237 source3/torture/locktest.c password[snum],
password 238 source3/torture/locktest.c strlen(password[snum]),
password 239 source3/torture/locktest.c password[snum],
password 240 source3/torture/locktest.c strlen(password[snum]),
password 260 source3/torture/locktest.c status = cli_tcon_andx(c, share, "?????", password[snum],
password 261 source3/torture/locktest.c strlen(password[snum])+1);
password 653 source3/torture/locktest.c fstrcpy(password[got_pass], p+1);
password 22 source3/torture/locktest2.c static fstring password;
password 179 source3/torture/locktest2.c fstrcpy(password, pass);
password 186 source3/torture/locktest2.c username, lp_workgroup(), password, 0,
password 524 source3/torture/locktest2.c fstrcpy(password, p+1);
password 22 source3/torture/masktest.c static fstring password;
password 226 source3/torture/masktest.c fstrcpy(password, pass);
password 231 source3/torture/masktest.c password, strlen(password),
password 232 source3/torture/masktest.c password, strlen(password),
password 252 source3/torture/masktest.c status = cli_tcon_andx(c, share, "?????", password,
password 253 source3/torture/masktest.c strlen(password)+1);
password 522 source3/torture/masktest.c fstrcpy(password, p+1);
password 26 source3/torture/torture.c static fstring host, workgroup, share, password, username, myname;
password 138 source3/torture/torture.c password,
password 281 source3/torture/torture.c password, flags, Undefined, &retry);
password 335 source3/torture/torture.c size_t passlen = strlen(password);
password 342 source3/torture/torture.c password, passlen,
password 343 source3/torture/torture.c password, passlen,
password 1137 source3/torture/torture.c password, strlen(password)+1);
password 1227 source3/torture/torture.c status = cli_raw_tcon(cli, service, password, "?????", &max_xmit, &cnum);
password 1253 source3/torture/torture.c password, strlen(password)+1);
password 1307 source3/torture/torture.c password, flags, Undefined, &retry);
password 4925 source3/torture/torture.c password, strlen(password),
password 4926 source3/torture/torture.c password, strlen(password),
password 4943 source3/torture/torture.c password, strlen(password),
password 4944 source3/torture/torture.c password, strlen(password),
password 4997 source3/torture/torture.c password, strlen(password),
password 4998 source3/torture/torture.c password, strlen(password),
password 6240 source3/torture/torture.c fstrcpy(password, p+1);
password 6266 source3/torture/torture.c fstrcpy(password, p);
password 253 source3/utils/net_ads.c SAFE_FREE(ads->auth.password);
password 254 source3/utils/net_ads.c ads->auth.password = smb_xstrdup(c->opt_password);
password 1322 source3/utils/net_ads.c ads_dns->auth.password = secrets_fetch_machine_password(
password 43 source3/utils/net_dom.c const char *password = NULL;
password 70 source3/utils/net_dom.c password = get_string_param(argv[i]);
password 71 source3/utils/net_dom.c if (!password) {
password 89 source3/utils/net_dom.c status = NetUnjoinDomain(server_name, account, password, unjoin_flags);
password 132 source3/utils/net_dom.c const char *password = NULL;
password 174 source3/utils/net_dom.c password = get_string_param(argv[i]);
password 175 source3/utils/net_dom.c if (!password) {
password 196 source3/utils/net_dom.c Account, password, join_flags);
password 236 source3/utils/net_dom.c const char *password = NULL;
password 262 source3/utils/net_dom.c password = get_string_param(argv[i]);
password 263 source3/utils/net_dom.c if (!password) {
password 288 source3/utils/net_dom.c account, password, rename_options);
password 255 source3/utils/net_rap.c memset(sinfo.password, '\0', sizeof(sinfo.password));
password 2808 source3/utils/net_rpc.c char *password=NULL; /* don't allow a share password */
password 2834 source3/utils/net_rpc.c i2.shi2_passwd = password;
password 4676 source3/utils/net_rpc.c d_printf("Password: %s\n", info.info2->password);
password 5244 source3/utils/net_rpc.c info.info23.password = crypt_pwd;
password 5756 source3/utils/net_rpc.c data = data_blob(info->password.password->data,
password 5757 source3/utils/net_rpc.c info->password.password->length);
password 346 source3/utils/net_rpc_join.c set_info.info24.password = crypt_pwd;
password 383 source3/utils/net_rpc_samsync.c ctx->password = c->opt_password;
password 446 source3/utils/ntlm_auth_diagnostics.c char *password;
password 471 source3/utils/ntlm_auth_diagnostics.c if ((password = strdup_upper(opt_password)) == NULL) {
password 477 source3/utils/ntlm_auth_diagnostics.c CH_DOS, password,
password 478 source3/utils/ntlm_auth_diagnostics.c strlen(password)+1,
password 485 source3/utils/ntlm_auth_diagnostics.c SAFE_FREE(password);
password 48 source3/utils/smbget.c static const char *username = NULL, *password = NULL, *workgroup = NULL;
password 101 source3/utils/smbget.c if(!nonprompt && !password) {
password 109 source3/utils/smbget.c } else if(password) strncpy(pw, password, pwlen-1);
password 574 source3/utils/smbget.c {"password", 'p', POPT_ARG_STRING, &password, 'p', "Password to use" },
password 615 source3/utils/smbget.c username = ""; password = "";
password 131 source3/winbindd/idmap_ad.c SAFE_FREE(ads->auth.password);
password 132 source3/winbindd/idmap_ad.c ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), NULL, NULL);
password 81 source3/winbindd/idmap_adex/idmap_adex.c ads->auth.password =
password 276 source3/winbindd/idmap_adex/likewise_cell.c ads->auth.password =
password 83 source3/winbindd/winbindd_ads.c SAFE_FREE(ads->auth.password);
password 90 source3/winbindd/winbindd_ads.c if ( !pdb_get_trusteddom_pw( domain->name, &ads->auth.password, &sid, &last_set_time ) ) {
password 100 source3/winbindd/winbindd_ads.c ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), NULL, NULL);
password 552 source3/winbindd/winbindd_cm.c static void cm_get_ipc_userpass(char **username, char **domain, char **password)
password 556 source3/winbindd/winbindd_cm.c *password = (char *)secrets_fetch(SECRETS_AUTH_PASSWORD, NULL);
password 563 source3/winbindd/winbindd_cm.c if (!*password || !**password)
password 564 source3/winbindd/winbindd_cm.c *password = smb_xstrdup("");
password 573 source3/winbindd/winbindd_cm.c *password = smb_xstrdup("");
password 2033 source3/winbindd/winbindd_cm.c (conn->cli->password == NULL || conn->cli->password[0] == '\0'))
password 2044 source3/winbindd/winbindd_cm.c machine_password = SMB_STRDUP(conn->cli->password);
password 2252 source3/winbindd/winbindd_cm.c (conn->cli->password == NULL || conn->cli->password[0] == '\0')) {
password 2263 source3/winbindd/winbindd_cm.c conn->cli->domain, conn->cli->user_name, conn->cli->password,
password 82 source4/auth/auth.h } password;
password 271 source4/auth/auth.h const char *password,
password 288 source4/auth/credentials/credentials.c cred->password = cred->password_cb(cred);
password 294 source4/auth/credentials/credentials.c return cred->password;
password 305 source4/auth/credentials/credentials.c cred->password = talloc_strdup(cred, val);
password 366 source4/auth/credentials/credentials.c const char *password = cli_credentials_get_password(cred);
password 368 source4/auth/credentials/credentials.c if (password) {
password 374 source4/auth/credentials/credentials.c E_md4hash(password, nt_hash->hash);
password 643 source4/auth/credentials/credentials.c memset(p,0,strlen(cred->password));
password 74 source4/auth/credentials/credentials.h const char *password;
password 203 source4/auth/credentials/credentials_files.c const char *password;
password 252 source4/auth/credentials/credentials_files.c password = ldb_msg_find_attr_as_string(msgs[0], "secret", NULL);
password 281 source4/auth/credentials/credentials_files.c if (!password) {
password 294 source4/auth/credentials/credentials_files.c cli_credentials_set_password(cred, password, CRED_SPECIFIED);
password 173 source4/auth/credentials/credentials_ntlm.c const char *password;
password 174 source4/auth/credentials/credentials_ntlm.c password = cli_credentials_get_password(cred);
password 175 source4/auth/credentials/credentials_ntlm.c if (!password) {
password 179 source4/auth/credentials/credentials_ntlm.c if (!SMBencrypt(password,challenge.data,
password 191 source4/auth/credentials/credentials_ntlm.c E_deshash(password, lm_hash);
password 202 source4/auth/credentials/credentials_ntlm.c const char *password;
password 208 source4/auth/credentials/credentials_ntlm.c password = cli_credentials_get_password(cred);
password 209 source4/auth/credentials/credentials_ntlm.c if (password) {
password 210 source4/auth/credentials/credentials_ntlm.c E_deshash(password, lm_hash);
password 93 source4/auth/gensec/cyrus_sasl.c const char *password = cli_credentials_get_password(gensec_get_credentials(gensec_security));
password 96 source4/auth/gensec/cyrus_sasl.c if (!password) {
password 100 source4/auth/gensec/cyrus_sasl.c secret = talloc_size(gensec_security, sizeof(sasl_secret_t)+strlen(password));
password 104 source4/auth/gensec/cyrus_sasl.c secret->len = strlen(password);
password 105 source4/auth/gensec/cyrus_sasl.c safe_strcpy((char*)secret->data, password, secret->len+1);
password 33 source4/auth/kerberos/clikrb5.c krb5_data *password,
password 47 source4/auth/kerberos/clikrb5.c ret = krb5_string_to_key(context, &eblock, key, password, &salt);
password 54 source4/auth/kerberos/clikrb5.c krb5_data *password,
password 66 source4/auth/kerberos/clikrb5.c ret = krb5_string_to_key_salt(context, enctype, password->data,
password 82 source4/auth/kerberos/kerberos.c krb5_principal principal, const char *password,
password 93 source4/auth/kerberos/kerberos.c if ((code = krb5_get_init_creds_password(ctx, &my_creds, principal, password,
password 78 source4/auth/kerberos/kerberos.h int create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype);
password 79 source4/auth/kerberos/kerberos.h int create_kerberos_key_from_string_direct(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype);
password 92 source4/auth/kerberos/kerberos.h krb5_principal principal, const char *password,
password 151 source4/auth/kerberos/kerberos_util.c const char *password;
password 167 source4/auth/kerberos/kerberos_util.c password = cli_credentials_get_password(credentials);
password 171 source4/auth/kerberos/kerberos_util.c if (password) {
password 174 source4/auth/kerberos/kerberos_util.c password, NULL, &kdc_time);
password 287 source4/auth/kerberos/kerberos_util.c krb5_data password;
password 293 source4/auth/kerberos/kerberos_util.c password.data = discard_const_p(char *, password_s);
password 294 source4/auth/kerberos/kerberos_util.c password.length = strlen(password_s);
password 309 source4/auth/kerberos/kerberos_util.c salt_princ, &password, &entry.keyblock, enctype);
password 189 source4/auth/ntlm/auth_sam.c user_info->password.hash.lanman,
password 190 source4/auth/ntlm/auth_sam.c user_info->password.hash.nt,
password 202 source4/auth/ntlm/auth_sam.c &user_info->password.response.lanman,
password 203 source4/auth/ntlm/auth_sam.c &user_info->password.response.nt,
password 132 source4/auth/ntlm/auth_server.c cli_credentials_set_password(creds, user_info->password.plaintext,
password 136 source4/auth/ntlm/auth_server.c cli_credentials_set_nt_hash(creds, user_info->password.hash.nt,
password 141 source4/auth/ntlm/auth_server.c cli_credentials_set_ntlm_response(creds, &user_info->password.response.lanman, &user_info->password.response.nt, CRED_SPECIFIED);
password 40 source4/auth/ntlm/auth_simple.c const char *password,
password 79 source4/auth/ntlm/auth_simple.c user_info->password.plaintext = talloc_strdup(user_info, password);
password 446 source4/auth/ntlm/auth_unix.c info->plaintext_password = user_info->password.plaintext;
password 502 source4/auth/ntlm/auth_unix.c static NTSTATUS password_check(const char *username, const char *password,
password 508 source4/auth/ntlm/auth_unix.c if (afs_auth(username, password))
password 513 source4/auth/ntlm/auth_unix.c if (dfs_auth(username, password))
password 519 source4/auth/ntlm/auth_unix.c ret = (strcmp(osf1_bigcrypt(password, salt), crypted) == 0);
password 524 source4/auth/ntlm/auth_unix.c ret = (strcmp((char *)crypt(password, salt), crypted) == 0);
password 535 source4/auth/ntlm/auth_unix.c ret = (strcmp((char *)crypt16(password, salt), crypted) == 0);
password 545 source4/auth/ntlm/auth_unix.c ret = (linux_bigcrypt(password, salt, crypted));
password 562 source4/auth/ntlm/auth_unix.c if (strcmp(bigcrypt(password, salt), crypted) == 0)
password 565 source4/auth/ntlm/auth_unix.c ret = (strcmp((char *)crypt(password, salt), crypted) == 0);
password 574 source4/auth/ntlm/auth_unix.c ret = (strcmp(bigcrypt(password, salt), crypted) == 0);
password 586 source4/auth/ntlm/auth_unix.c ret = (strcmp((char *)crypt(password, salt), crypted) == 0);
password 600 source4/auth/ntlm/auth_unix.c char *password;
password 611 source4/auth/ntlm/auth_unix.c password = talloc_strdup(ctx, user_info->password.plaintext);
password 713 source4/auth/ntlm/auth_unix.c if (password == NULL) {
password 721 source4/auth/ntlm/auth_unix.c nt_status = password_check(username, password, crypted, salt);
password 738 source4/auth/ntlm/auth_unix.c if (strhasupper(password) && strhaslower(password)) {
password 743 source4/auth/ntlm/auth_unix.c pwcopy = talloc_strdup(ctx, password);
password 154 source4/auth/ntlm/auth_util.c user_info_in->password.hash.nt->hash, &chall_blob,
password 162 source4/auth/ntlm/auth_util.c user_info_temp->password.response.lanman = lmv2_response;
password 163 source4/auth/ntlm/auth_util.c user_info_temp->password.response.nt = ntlmv2_response;
password 169 source4/auth/ntlm/auth_util.c SMBOWFencrypt(user_info_in->password.hash.nt->hash, challenge, blob.data);
password 171 source4/auth/ntlm/auth_util.c user_info_temp->password.response.nt = blob;
password 172 source4/auth/ntlm/auth_util.c if (lp_client_lanman_auth(auth_context->lp_ctx) && user_info_in->password.hash.lanman) {
password 174 source4/auth/ntlm/auth_util.c SMBOWFencrypt(user_info_in->password.hash.lanman->hash, challenge, blob.data);
password 175 source4/auth/ntlm/auth_util.c user_info_temp->password.response.lanman = lm_blob;
password 178 source4/auth/ntlm/auth_util.c user_info_temp->password.response.lanman = user_info_temp->password.response.nt;
password 207 source4/auth/ntlm/auth_util.c if (E_deshash(user_info_in->password.plaintext, lanman.hash)) {
password 208 source4/auth/ntlm/auth_util.c user_info_temp->password.hash.lanman = talloc(user_info_temp,
password 210 source4/auth/ntlm/auth_util.c *user_info_temp->password.hash.lanman = lanman;
password 212 source4/auth/ntlm/auth_util.c user_info_temp->password.hash.lanman = NULL;
password 215 source4/auth/ntlm/auth_util.c E_md4hash(user_info_in->password.plaintext, nt.hash);
password 216 source4/auth/ntlm/auth_util.c user_info_temp->password.hash.nt = talloc(user_info_temp,
password 218 source4/auth/ntlm/auth_util.c *user_info_temp->password.hash.nt = nt;
password 109 source4/auth/ntlm/auth_winbind.c request.data.auth_crap.lm_resp_len = MIN(user_info->password.response.lanman.length,
password 111 source4/auth/ntlm/auth_winbind.c request.data.auth_crap.nt_resp_len = MIN(user_info->password.response.nt.length,
password 114 source4/auth/ntlm/auth_winbind.c memcpy(request.data.auth_crap.lm_resp, user_info->password.response.lanman.data,
password 116 source4/auth/ntlm/auth_winbind.c memcpy(request.data.auth_crap.nt_resp, user_info->password.response.nt.data,
password 193 source4/auth/ntlm/auth_winbind.c password_info->lmpassword = *user_info->password.hash.lanman;
password 194 source4/auth/ntlm/auth_winbind.c password_info->ntpassword = *user_info->password.hash.nt;
password 198 source4/auth/ntlm/auth_winbind.c s->req.in.logon.password= password_info;
password 216 source4/auth/ntlm/auth_winbind.c network_info->nt.length = user_info->password.response.nt.length;
password 217 source4/auth/ntlm/auth_winbind.c network_info->nt.data = user_info->password.response.nt.data;
password 219 source4/auth/ntlm/auth_winbind.c network_info->lm.length = user_info->password.response.lanman.length;
password 220 source4/auth/ntlm/auth_winbind.c network_info->lm.data = user_info->password.response.lanman.data;
password 679 source4/auth/ntlmssp/ntlmssp_server.c user_info->password.response.lanman = gensec_ntlmssp_state->lm_resp;
password 680 source4/auth/ntlmssp/ntlmssp_server.c user_info->password.response.lanman.data = talloc_steal(user_info, gensec_ntlmssp_state->lm_resp.data);
password 681 source4/auth/ntlmssp/ntlmssp_server.c user_info->password.response.nt = gensec_ntlmssp_state->nt_resp;
password 682 source4/auth/ntlmssp/ntlmssp_server.c user_info->password.response.nt.data = talloc_steal(user_info, gensec_ntlmssp_state->nt_resp.data);
password 47 source4/client/mount.cifs.c struct passwd *password = getpwuid(getuid());
password 49 source4/client/mount.cifs.c if (password) {
password 50 source4/client/mount.cifs.c username = password->pw_name;
password 32 source4/client/smbmount.c static pstring password;
password 197 source4/client/smbmount.c pstrcpy(password, pass);
password 215 source4/client/smbmount.c password, strlen(password),
password 216 source4/client/smbmount.c password, strlen(password),
password 220 source4/client/smbmount.c if (password[0] || !username[0] ||
password 233 source4/client/smbmount.c if (!smbcli_tconX(c, share, "?????", password, strlen(password)+1)) {
password 602 source4/client/smbmount.c pstrcpy(password, pass);
password 654 source4/client/smbmount.c pstrcpy(password, val);
password 772 source4/client/smbmount.c pstrcpy(password,lp+1);
password 774 source4/client/smbmount.c memset(strchr_m(opteq+1,'%')+1,'X',strlen(password));
password 782 source4/client/smbmount.c pstrcpy(password,opteq+1);
password 784 source4/client/smbmount.c memset(opteq+1,'X',strlen(password));
password 824 source4/client/smbmount.c *password = '\0';
password 891 source4/client/smbmount.c pstrcpy(password,p+1);
password 893 source4/client/smbmount.c memset(strchr_m(getenv("USER"),'%')+1,'X',strlen(password));
password 899 source4/client/smbmount.c pstrcpy(password, getenv("PASSWD"));
password 595 source4/client/tree.c char *password, int pwmaxlen)
password 599 source4/client/tree.c strncpy(password, "test", pwmaxlen);
password 70 source4/dsdb/samdb/ldb_modules/proxy.c const char *olddn, *newdn, *url, *username, *password, *oldstr, *newstr;
password 93 source4/dsdb/samdb/ldb_modules/proxy.c password = ldb_msg_find_attr_as_string(res->msgs[0], "password", NULL);
password 97 source4/dsdb/samdb/ldb_modules/proxy.c if (url == NULL || olddn == NULL || newdn == NULL || username == NULL || password == NULL) {
password 140 source4/dsdb/samdb/ldb_modules/proxy.c cli_credentials_set_password(creds, password, CRED_SPECIFIED);
password 167 source4/heimdal/kdc/digest.c char **password)
password 185 source4/heimdal/kdc/digest.c ret = hdb_entry_get_password(context, db, &user->entry, password);
password 186 source4/heimdal/kdc/digest.c if (ret || password == NULL) {
password 222 source4/heimdal/kdc/digest.c char *client_name = NULL, *password = NULL;
password 635 source4/heimdal/kdc/digest.c &password);
password 641 source4/heimdal/kdc/digest.c MD5_Update(&ctx, password, strlen(password));
password 687 source4/heimdal/kdc/digest.c &password);
password 698 source4/heimdal/kdc/digest.c MD5_Update(&ctx, password, strlen(password));
password 1445 source4/heimdal/kdc/digest.c if (password) {
password 1446 source4/heimdal/kdc/digest.c memset(password, 0, strlen(password));
password 1447 source4/heimdal/kdc/digest.c free (password);
password 69 source4/heimdal/lib/hcrypto/pkcs5.c PKCS5_PBKDF2_HMAC_SHA1(const void * password, size_t password_len,
password 112 source4/heimdal/lib/hcrypto/pkcs5.c HMAC(md, password, password_len, data, datalen,
password 117 source4/heimdal/lib/hcrypto/pkcs5.c HMAC(md, password, password_len, tmpcksum, checksumsize,
password 280 source4/heimdal/lib/hdb/ext.c if (db->hdb_master_key_set && ext->data.u.password.mkvno) {
password 283 source4/heimdal/lib/hdb/ext.c key = _hdb_find_master_key(ext->data.u.password.mkvno,
password 289 source4/heimdal/lib/hdb/ext.c *ext->data.u.password.mkvno);
password 294 source4/heimdal/lib/hdb/ext.c ext->data.u.password.password.data,
password 295 source4/heimdal/lib/hdb/ext.c ext->data.u.password.password.length,
password 298 source4/heimdal/lib/hdb/ext.c ret = der_copy_octet_string(&ext->data.u.password.password, &pw);
password 354 source4/heimdal/lib/hdb/ext.c &ext.data.u.password.password);
password 358 source4/heimdal/lib/hdb/ext.c ext.data.u.password.mkvno =
password 359 source4/heimdal/lib/hdb/ext.c malloc(sizeof(*ext.data.u.password.mkvno));
password 360 source4/heimdal/lib/hdb/ext.c if (ext.data.u.password.mkvno == NULL) {
password 365 source4/heimdal/lib/hdb/ext.c *ext.data.u.password.mkvno = _hdb_mkey_version(key);
password 368 source4/heimdal/lib/hdb/ext.c ext.data.u.password.mkvno = NULL;
password 370 source4/heimdal/lib/hdb/ext.c ret = krb5_data_copy(&ext.data.u.password.password,
password 368 source4/heimdal/lib/hdb/keys.c const char *password,
password 388 source4/heimdal/lib/hdb/keys.c password,
password 2268 source4/heimdal/lib/hx509/crypto.c const char *password,
password 2281 source4/heimdal/lib/hx509/crypto.c passwordlen = password ? strlen(password) : 0;
password 2299 source4/heimdal/lib/hx509/crypto.c if (!PKCS12_key_gen (password, passwordlen, salt, saltlen,
password 2305 source4/heimdal/lib/hx509/crypto.c if (!PKCS12_key_gen (password, passwordlen, salt, saltlen,
password 2433 source4/heimdal/lib/hx509/crypto.c const char *password;
password 2436 source4/heimdal/lib/hx509/crypto.c password = pw->val[i];
password 2438 source4/heimdal/lib/hx509/crypto.c password = "";
password 2440 source4/heimdal/lib/hx509/crypto.c password = NULL;
password 2442 source4/heimdal/lib/hx509/crypto.c ret = (*s2k)(context, password, ai->parameters, &crypto,
password 73 source4/heimdal/lib/hx509/ks_file.c const void *password,
password 92 source4/heimdal/lib/hx509/ks_file.c password, passwordlen,
password 227 source4/heimdal/lib/hx509/ks_file.c const void *password;
password 231 source4/heimdal/lib/hx509/ks_file.c password = pw->val[i];
password 232 source4/heimdal/lib/hx509/ks_file.c passwordlen = strlen(password);
password 235 source4/heimdal/lib/hx509/ks_file.c cipher, ivdata, password, passwordlen,
password 245 source4/heimdal/lib/hx509/ks_file.c char password[128];
password 251 source4/heimdal/lib/hx509/ks_file.c prompt.reply.data = password;
password 252 source4/heimdal/lib/hx509/ks_file.c prompt.reply.length = sizeof(password);
password 257 source4/heimdal/lib/hx509/ks_file.c cipher, ivdata, password, strlen(password),
password 260 source4/heimdal/lib/hx509/ks_file.c memset(password, 0, sizeof(password));
password 44 source4/heimdal/lib/hx509/lock.c struct _hx509_password password;
password 88 source4/heimdal/lib/hx509/lock.c hx509_lock_add_password(hx509_lock lock, const char *password)
password 93 source4/heimdal/lib/hx509/lock.c s = strdup(password);
password 97 source4/heimdal/lib/hx509/lock.c d = realloc(lock->password.val,
password 98 source4/heimdal/lib/hx509/lock.c (lock->password.len + 1) * sizeof(lock->password.val[0]));
password 103 source4/heimdal/lib/hx509/lock.c lock->password.val = d;
password 104 source4/heimdal/lib/hx509/lock.c lock->password.val[lock->password.len] = s;
password 105 source4/heimdal/lib/hx509/lock.c lock->password.len++;
password 113 source4/heimdal/lib/hx509/lock.c return &lock->password;
password 126 source4/heimdal/lib/hx509/lock.c for (i = 0; i < lock->password.len; i++)
password 127 source4/heimdal/lib/hx509/lock.c free(lock->password.val[i]);
password 128 source4/heimdal/lib/hx509/lock.c free(lock->password.val);
password 129 source4/heimdal/lib/hx509/lock.c lock->password.val = NULL;
password 130 source4/heimdal/lib/hx509/lock.c lock->password.len = 0;
password 218 source4/heimdal/lib/krb5/crypto.c char password[8+1]; /* crypt is limited to 8 chars anyway */
password 225 source4/heimdal/lib/krb5/crypto.c password[i] = c ? c : 'X';
password 227 source4/heimdal/lib/krb5/crypto.c password[8] = '\0';
password 229 source4/heimdal/lib/krb5/crypto.c memcpy(key, crypt(password, "p1") + 2, sizeof(DES_cblock));
password 250 source4/heimdal/lib/krb5/crypto.c char password[512];
password 253 source4/heimdal/lib/krb5/crypto.c memcpy(password, pw.data, min(pw.length, sizeof(password)));
password 254 source4/heimdal/lib/krb5/crypto.c if(pw.length < sizeof(password)) {
password 255 source4/heimdal/lib/krb5/crypto.c int len = min(cell.length, sizeof(password) - pw.length);
password 258 source4/heimdal/lib/krb5/crypto.c memcpy(password + pw.length, cell.data, len);
password 260 source4/heimdal/lib/krb5/crypto.c password[i] = tolower((unsigned char)password[i]);
password 262 source4/heimdal/lib/krb5/crypto.c passlen = min(sizeof(password), pw.length + cell.length);
password 267 source4/heimdal/lib/krb5/crypto.c DES_cbc_cksum ((void*)password, &ivec, passlen, &schedule, &ivec);
password 272 source4/heimdal/lib/krb5/crypto.c DES_cbc_cksum ((void*)password, key, passlen, &schedule, &ivec);
password 276 source4/heimdal/lib/krb5/crypto.c memset(password, 0, sizeof(password));
password 284 source4/heimdal/lib/krb5/crypto.c krb5_data password,
password 290 source4/heimdal/lib/krb5/crypto.c if(password.length > 8)
password 291 source4/heimdal/lib/krb5/crypto.c krb5_DES_AFS3_Transarc_string_to_key(password, salt.saltvalue, &tmp);
password 293 source4/heimdal/lib/krb5/crypto.c krb5_DES_AFS3_CMU_string_to_key(password, salt.saltvalue, &tmp);
password 337 source4/heimdal/lib/krb5/crypto.c krb5_data password,
password 351 source4/heimdal/lib/krb5/crypto.c return DES_AFS3_string_to_key(context, enctype, password,
password 356 source4/heimdal/lib/krb5/crypto.c len = password.length + salt.saltvalue.length;
password 362 source4/heimdal/lib/krb5/crypto.c memcpy(s, password.data, password.length);
password 363 source4/heimdal/lib/krb5/crypto.c memcpy(s + password.length, salt.saltvalue.data, salt.saltvalue.length);
password 428 source4/heimdal/lib/krb5/crypto.c krb5_data password,
password 439 source4/heimdal/lib/krb5/crypto.c len = password.length + salt.saltvalue.length;
password 445 source4/heimdal/lib/krb5/crypto.c memcpy(str, password.data, password.length);
password 446 source4/heimdal/lib/krb5/crypto.c memcpy(str + password.length, salt.saltvalue.data, salt.saltvalue.length);
password 493 source4/heimdal/lib/krb5/crypto.c krb5_data password,
password 499 source4/heimdal/lib/krb5/crypto.c size_t len = password.length + salt.saltvalue.length;
password 507 source4/heimdal/lib/krb5/crypto.c memcpy(s, password.data, password.length);
password 508 source4/heimdal/lib/krb5/crypto.c memcpy(s + password.length, salt.saltvalue.data, salt.saltvalue.length);
password 569 source4/heimdal/lib/krb5/crypto.c krb5_data password,
password 588 source4/heimdal/lib/krb5/crypto.c ret = wind_utf8ucs2_length(password.data, &len);
password 603 source4/heimdal/lib/krb5/crypto.c ret = wind_utf8ucs2(password.data, s, &len);
password 644 source4/heimdal/lib/krb5/crypto.c krb5_data password,
password 680 source4/heimdal/lib/krb5/crypto.c ret = PKCS5_PBKDF2_HMAC_SHA1(password.data, password.length,
password 991 source4/heimdal/lib/krb5/crypto.c krb5_data password,
password 1001 source4/heimdal/lib/krb5/crypto.c ret = krb5_string_to_key_data_salt(context, enctype, password, salt, key);
password 1009 source4/heimdal/lib/krb5/crypto.c const char *password,
password 1014 source4/heimdal/lib/krb5/crypto.c pw.data = rk_UNCONST(password);
password 1015 source4/heimdal/lib/krb5/crypto.c pw.length = strlen(password);
password 1022 source4/heimdal/lib/krb5/crypto.c krb5_data password,
password 1028 source4/heimdal/lib/krb5/crypto.c return krb5_string_to_key_data_salt_opaque(context, enctype, password,
password 1041 source4/heimdal/lib/krb5/crypto.c krb5_data password,
password 1056 source4/heimdal/lib/krb5/crypto.c return (*st->string_to_key)(context, enctype, password,
password 1073 source4/heimdal/lib/krb5/crypto.c const char *password,
password 1078 source4/heimdal/lib/krb5/crypto.c pw.data = rk_UNCONST(password);
password 1079 source4/heimdal/lib/krb5/crypto.c pw.length = strlen(password);
password 1086 source4/heimdal/lib/krb5/crypto.c const char *password,
password 1092 source4/heimdal/lib/krb5/crypto.c pw.data = rk_UNCONST(password);
password 1093 source4/heimdal/lib/krb5/crypto.c pw.length = strlen(password);
password 344 source4/heimdal/lib/krb5/init_creds.c const char *password,
password 351 source4/heimdal/lib/krb5/init_creds.c opt->opt_private->password = password;
password 52 source4/heimdal/lib/krb5/init_creds_pw.c const char *password;
password 68 source4/heimdal/lib/krb5/init_creds_pw.c krb5_data password;
password 71 source4/heimdal/lib/krb5/init_creds_pw.c password.data = rk_UNCONST(keyseed);
password 72 source4/heimdal/lib/krb5/init_creds_pw.c password.length = strlen(keyseed);
password 81 source4/heimdal/lib/krb5/init_creds_pw.c ret = krb5_string_to_key_data_salt_opaque(context, type, password,
password 281 source4/heimdal/lib/krb5/init_creds_pw.c ctx->password = options->opt_private->password;
password 369 source4/heimdal/lib/krb5/init_creds_pw.c const char *password,
password 404 source4/heimdal/lib/krb5/init_creds_pw.c password,
password 976 source4/heimdal/lib/krb5/init_creds_pw.c if (ctx->key_proc == NULL || ctx->password == NULL)
password 981 source4/heimdal/lib/krb5/init_creds_pw.c ctx->key_proc, ctx->password,
password 989 source4/heimdal/lib/krb5/init_creds_pw.c ctx->key_proc, ctx->password,
password 997 source4/heimdal/lib/krb5/init_creds_pw.c ctx->key_proc, ctx->password,
password 1015 source4/heimdal/lib/krb5/init_creds_pw.c ret = (*ctx->key_proc)(context, etype, ctx->password,
password 1196 source4/heimdal/lib/krb5/init_creds_pw.c } else if (ctx->password)
password 1436 source4/heimdal/lib/krb5/init_creds_pw.c if (prompter == NULL || ctx.password == NULL)
password 1447 source4/heimdal/lib/krb5/init_creds_pw.c ctx.password,
password 1455 source4/heimdal/lib/krb5/init_creds_pw.c ctx.password = buf;
password 1485 source4/heimdal/lib/krb5/init_creds_pw.c const char *password,
password 1509 source4/heimdal/lib/krb5/init_creds_pw.c if (password == NULL &&
password 1510 source4/heimdal/lib/krb5/init_creds_pw.c options->opt_private->password == NULL &&
password 1536 source4/heimdal/lib/krb5/init_creds_pw.c password = password_data.data;
password 1539 source4/heimdal/lib/krb5/init_creds_pw.c if (options->opt_private->password == NULL) {
password 1541 source4/heimdal/lib/krb5/init_creds_pw.c password, NULL);
password 211 source4/heimdal/lib/krb5/krb5_locl.h const char *password;
password 1505 source4/heimdal/lib/krb5/pkinit.c char *password)
password 1540 source4/heimdal/lib/krb5/pkinit.c if (password && password[0])
password 1541 source4/heimdal/lib/krb5/pkinit.c hx509_lock_add_password(lock, password);
password 2040 source4/heimdal/lib/krb5/pkinit.c char *password)
password 2095 source4/heimdal/lib/krb5/pkinit.c password);
password 909 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_nt_key(const char *password, struct ntlm_buf *key)
password 920 source4/heimdal/lib/ntlm/ntlm.c ret = ascii2ucs2le(password, 0, &buf);
password 775 source4/kdc/hdb-samba4.c password_utf16 = data_blob_const(password_blob.current->array[i].AuthInfo.clear.password,
password 786 source4/kdc/hdb-samba4.c password_hash = password_blob.current->array[i].AuthInfo.nt4owf.password;
password 177 source4/kdc/kpasswdd.c const DATA_BLOB *password,
password 201 source4/kdc/kpasswdd.c password, NULL, NULL,
password 234 source4/kdc/kpasswdd.c DATA_BLOB password;
password 239 source4/kdc/kpasswdd.c (void **)&password.data, &pw_len, false)) {
password 242 source4/kdc/kpasswdd.c password.length = pw_len;
password 245 source4/kdc/kpasswdd.c &password, reply);
password 258 source4/kdc/kpasswdd.c DATA_BLOB password;
password 285 source4/kdc/kpasswdd.c (void **)&password.data, &pw_len, false)) {
password 290 source4/kdc/kpasswdd.c password.length = pw_len;
password 320 source4/kdc/kpasswdd.c &password, reply);
password 385 source4/kdc/kpasswdd.c msg, &password, NULL, NULL,
password 54 source4/ldap_server/ldap_bind.c req->creds.password,
password 810 source4/lib/ldb/ldb_ildap/ldb_ildap.c const char *password = cli_credentials_get_password(creds);
password 811 source4/lib/ldb/ldb_ildap/ldb_ildap.c status = ldap_bind_simple(ildb->ldap, bind_dn, password);
password 2575 source4/lib/wmi/wmi_wrap.c WERROR WBEM_ConnectServer(struct com_context *ctx, const char *server, const char *nspace, const char *user, const char *password,
password 448 source4/libcli/auth/smbencrypt.c const char *password,
password 455 source4/libcli/auth/smbencrypt.c E_md4hash(password, nt_hash);
password 466 source4/libcli/auth/smbencrypt.c bool encode_pw_buffer(uint8_t buffer[516], const char *password, int string_flags)
password 475 source4/libcli/auth/smbencrypt.c password,
password 548 source4/libcli/auth/smbencrypt.c bool set_pw_in_buffer(uint8_t buffer[516], DATA_BLOB *password)
password 550 source4/libcli/auth/smbencrypt.c if (password->length > 512) {
password 554 source4/libcli/auth/smbencrypt.c memcpy(&buffer[512 - password->length], password->data, password->length);
password 556 source4/libcli/auth/smbencrypt.c generate_random_buffer(buffer, 512 - password->length);
password 562 source4/libcli/auth/smbencrypt.c SIVAL(buffer, 512, password->length);
password 101 source4/libcli/cliconnect.c const char *devtype, const char *password)
password 119 source4/libcli/cliconnect.c tcon.tconx.in.password = data_blob(NULL, 0);
password 121 source4/libcli/cliconnect.c tcon.tconx.in.password = data_blob_talloc(mem_ctx, NULL, 24);
password 125 source4/libcli/cliconnect.c SMBencrypt(password, cli->transport->negotiate.secblob.data, tcon.tconx.in.password.data);
password 127 source4/libcli/cliconnect.c tcon.tconx.in.password = data_blob_talloc(mem_ctx, password, strlen(password)+1);
password 82 source4/libcli/ldap/ldap_bind.c res->r.BindRequest.creds.password = talloc_strdup(res, pw);
password 93 source4/libcli/ldap/ldap_bind.c const char *userdn, const char *password)
password 114 source4/libcli/ldap/ldap_bind.c if (password) {
password 115 source4/libcli/ldap/ldap_bind.c pw = password;
password 108 source4/libcli/ldap/ldap_client.h const char *userdn, const char *password);
password 97 source4/libcli/raw/clisession.c SSVAL(req->out.vwv,VWV(7),parms->old.in.password.length);
password 99 source4/libcli/raw/clisession.c smbcli_req_append_blob(req, &parms->old.in.password);
password 68 source4/libcli/raw/clitree.c smbcli_req_append_ascii4(req, parms->tcon.in.password,STR_ASCII);
password 77 source4/libcli/raw/clitree.c SSVAL(req->out.vwv, VWV(3), parms->tconx.in.password.length);
password 78 source4/libcli/raw/clitree.c smbcli_req_append_blob(req, &parms->tconx.in.password);
password 241 source4/libcli/raw/interfaces.h const char *password;
password 256 source4/libcli/raw/interfaces.h DATA_BLOB password;
password 314 source4/libcli/raw/interfaces.h DATA_BLOB password;
password 112 source4/libcli/smb_composite/connect.c state->io_tcon->tconx.in.password = data_blob(NULL, 0);
password 198 source4/libcli/smb_composite/connect.c state->io_tcon->tconx.in.password = data_blob(NULL, 0);
password 301 source4/libcli/smb_composite/sesssetup.c const char *password = cli_credentials_get_password(io->in.credentials);
password 302 source4/libcli/smb_composite/sesssetup.c state->setup.nt1.in.password1 = data_blob_talloc(state, password, strlen(password));
password 336 source4/libcli/smb_composite/sesssetup.c const char *password = cli_credentials_get_password(io->in.credentials);
password 364 source4/libcli/smb_composite/sesssetup.c &state->setup.old.in.password,
password 372 source4/libcli/smb_composite/sesssetup.c state->setup.old.in.password = data_blob_talloc(state, password, strlen(password));
password 72 source4/libcli/util/clilsa.c tcon.tconx.in.password = data_blob(NULL, 0);
password 178 source4/libnet/libnet_passwd.c oe2.in.password = &lm_pass;
password 309 source4/libnet/libnet_passwd.c encode_pw_buffer(u_info.info26.password.data, r->samr_handle.in.newpassword, STR_UNICODE);
password 327 source4/libnet/libnet_passwd.c arcfour_crypt_blob(u_info.info26.password.data, 516, &confounded_session_key);
password 328 source4/libnet/libnet_passwd.c memcpy(&u_info.info26.password.data[516], confounder, 16);
password 364 source4/libnet/libnet_passwd.c encode_pw_buffer(u_info.info25.password.data, r->samr_handle.in.newpassword, STR_UNICODE);
password 381 source4/libnet/libnet_passwd.c arcfour_crypt_blob(u_info.info25.password.data, 516, &confounded_session_key);
password 382 source4/libnet/libnet_passwd.c memcpy(&u_info.info25.password.data[516], confounder, 16);
password 412 source4/libnet/libnet_passwd.c encode_pw_buffer(u_info.info24.password.data, r->samr_handle.in.newpassword, STR_UNICODE);
password 423 source4/libnet/libnet_passwd.c arcfour_crypt_blob(u_info.info24.password.data, 516, &session_key);
password 455 source4/libnet/libnet_passwd.c encode_pw_buffer(u_info.info23.password.data, r->samr_handle.in.newpassword, STR_UNICODE);
password 466 source4/libnet/libnet_passwd.c arcfour_crypt_blob(u_info.info23.password.data, 516, &session_key);
password 973 source4/rpc_server/lsa/dcesrv_lsa.c &auth_struct.incoming.current[i]->AuthInfo.nt4owf.password);
password 975 source4/rpc_server/lsa/dcesrv_lsa.c DATA_BLOB new_password = data_blob_const(auth_struct.incoming.current[i]->AuthInfo.clear.password,
password 513 source4/rpc_server/netlogon/dcerpc_netlogon.c r->in.logon->password->lmpassword.hash,
password 514 source4/rpc_server/netlogon/dcerpc_netlogon.c sizeof(r->in.logon->password->lmpassword.hash));
password 516 source4/rpc_server/netlogon/dcerpc_netlogon.c r->in.logon->password->ntpassword.hash,
password 517 source4/rpc_server/netlogon/dcerpc_netlogon.c sizeof(r->in.logon->password->ntpassword.hash));
password 519 source4/rpc_server/netlogon/dcerpc_netlogon.c creds_des_decrypt(creds, &r->in.logon->password->lmpassword);
password 520 source4/rpc_server/netlogon/dcerpc_netlogon.c creds_des_decrypt(creds, &r->in.logon->password->ntpassword);
password 530 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->logon_parameters = r->in.logon->password->identity_info.parameter_control;
password 531 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->client.account_name = r->in.logon->password->identity_info.account_name.string;
password 532 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->client.domain_name = r->in.logon->password->identity_info.domain_name.string;
password 533 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->workstation_name = r->in.logon->password->identity_info.workstation.string;
password 538 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->password.hash.lanman = talloc(user_info, struct samr_Password);
password 539 source4/rpc_server/netlogon/dcerpc_netlogon.c NT_STATUS_HAVE_NO_MEMORY(user_info->password.hash.lanman);
password 540 source4/rpc_server/netlogon/dcerpc_netlogon.c *user_info->password.hash.lanman = r->in.logon->password->lmpassword;
password 542 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->password.hash.nt = talloc(user_info, struct samr_Password);
password 543 source4/rpc_server/netlogon/dcerpc_netlogon.c NT_STATUS_HAVE_NO_MEMORY(user_info->password.hash.nt);
password 544 source4/rpc_server/netlogon/dcerpc_netlogon.c *user_info->password.hash.nt = r->in.logon->password->ntpassword;
password 566 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->password.response.lanman = data_blob_talloc(mem_ctx, r->in.logon->network->lm.data, r->in.logon->network->lm.length);
password 567 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->password.response.nt = data_blob_talloc(mem_ctx, r->in.logon->network->nt.data, r->in.logon->network->nt.length);
password 3522 source4/rpc_server/samr/dcesrv_samr.c &r->in.info->info23.password);
password 3529 source4/rpc_server/samr/dcesrv_samr.c &r->in.info->info23.password);
password 3541 source4/rpc_server/samr/dcesrv_samr.c &r->in.info->info24.password);
password 3578 source4/rpc_server/samr/dcesrv_samr.c &r->in.info->info25.password);
password 3585 source4/rpc_server/samr/dcesrv_samr.c &r->in.info->info25.password);
password 3597 source4/rpc_server/samr/dcesrv_samr.c &r->in.info->info26.password);
password 189 source4/rpc_server/samr/samr_password.c struct samr_CryptPassword *pwbuf = r->in.password;
password 493 source4/rpc_server/srvsvc/dcesrv_srvsvc.c if (r->in.info->info2->password && r->in.info->info2->password[0]) {
password 496 source4/rpc_server/srvsvc/dcesrv_srvsvc.c info[i].value = talloc_strdup(info, r->in.info->info2->password);
password 591 source4/rpc_server/srvsvc/dcesrv_srvsvc.c if (r->in.info->info502->password && r->in.info->info502->password[0]) {
password 594 source4/rpc_server/srvsvc/dcesrv_srvsvc.c info[i].value = talloc_strdup(info, r->in.info->info502->password);
password 662 source4/rpc_server/srvsvc/dcesrv_srvsvc.c info->info2->password = talloc_strdup(mem_ctx, share_string_option(scfg, SHARE_PASSWORD, NULL));
password 689 source4/rpc_server/srvsvc/dcesrv_srvsvc.c info->info502->password = talloc_strdup(mem_ctx, share_string_option(scfg, SHARE_PASSWORD, NULL));
password 1100 source4/rpc_server/srvsvc/dcesrv_srvsvc.c const char *password,
password 1141 source4/rpc_server/srvsvc/dcesrv_srvsvc.c if (password && password[0]) {
password 1144 source4/rpc_server/srvsvc/dcesrv_srvsvc.c info[i].value = talloc_strdup(info, password);
password 1278 source4/rpc_server/srvsvc/dcesrv_srvsvc.c r->in.info->info2->password,
password 1312 source4/rpc_server/srvsvc/dcesrv_srvsvc.c r->in.info->info502->password,
password 62 source4/smb_server/smb/reply.c p += req_pull_ascii4(&req->in.bufinfo, &con.tcon.in.password, p, STR_TERMINATE);
password 65 source4/smb_server/smb/reply.c if (!con.tcon.in.service || !con.tcon.in.password || !con.tcon.in.dev) {
password 109 source4/smb_server/smb/reply.c if (!req_pull_blob(&req->in.bufinfo, p, passlen, &con.tconx.in.password)) {
password 1886 source4/smb_server/smb/reply.c if (!req_pull_blob(&req->in.bufinfo, p, passlen, &io->old.in.password)) {
password 34 source4/smb_server/smb/service.c DATA_BLOB password,
password 122 source4/smb_server/smb/service.c const char *service, DATA_BLOB password,
password 173 source4/smb_server/smb/service.c return make_connection_scfg(req, scfg, type, password, dev);
password 184 source4/smb_server/smb/service.c DATA_BLOB password;
password 185 source4/smb_server/smb/service.c password = data_blob_string_const(con->tcon.in.password);
password 187 source4/smb_server/smb/service.c status = make_connection(req, con->tcon.in.service, password, con->tcon.in.dev);
password 201 source4/smb_server/smb/service.c status = make_connection(req, con->tconx.in.path, con->tconx.in.password,
password 143 source4/smb_server/smb/sesssetup.c user_info->password.response.lanman = sess->old.in.password;
password 144 source4/smb_server/smb/sesssetup.c user_info->password.response.lanman.data = talloc_steal(user_info, sess->old.in.password.data);
password 145 source4/smb_server/smb/sesssetup.c user_info->password.response.nt = data_blob(NULL, 0);
password 269 source4/smb_server/smb/sesssetup.c user_info->password.response.lanman = sess->nt1.in.password1;
password 270 source4/smb_server/smb/sesssetup.c user_info->password.response.lanman.data = talloc_steal(user_info, sess->nt1.in.password1.data);
password 271 source4/smb_server/smb/sesssetup.c user_info->password.response.nt = sess->nt1.in.password2;
password 272 source4/smb_server/smb/sesssetup.c user_info->password.response.nt.data = talloc_steal(user_info, sess->nt1.in.password2.data);
password 84 source4/torture/basic/base.c const char *password = torture_setting_string(tctx, "password", NULL);
password 87 source4/torture/basic/base.c password));
password 410 source4/torture/basic/base.c const char *password = torture_setting_string(tctx, "password", NULL);
password 432 source4/torture/basic/base.c if (NT_STATUS_IS_ERR(smbcli_tconX(cli, share, "?????", password))) {
password 32 source4/torture/ldap/basic.c static bool test_bind_simple(struct ldap_connection *conn, const char *userdn, const char *password)
password 37 source4/torture/ldap/basic.c status = torture_ldap_bind(conn, userdn, password);
password 61 source4/torture/ldap/basic.c static bool test_multibind(struct ldap_connection *conn, const char *userdn, const char *password)
password 73 source4/torture/ldap/basic.c ret = test_bind_simple(conn, userdn, password);
password 28 source4/torture/ldap/common.c NTSTATUS torture_ldap_bind(struct ldap_connection *conn, const char *userdn, const char *password)
password 32 source4/torture/ldap/common.c status = ldap_bind_simple(conn, userdn, password);
password 81 source4/torture/ldap/common.c const char *url, const char *userdn, const char *password)
password 88 source4/torture/ldap/common.c status = ldap_bind_simple(*conn, userdn, password);
password 83 source4/torture/libnet/libnet_share.c info->password);
password 109 source4/torture/libnet/libnet_share.c info->password);
password 181 source4/torture/libnet/libnet_share.c i.password = NULL;
password 24 source4/torture/locktest2.c static fstring password;
password 168 source4/torture/locktest2.c password = talloc_strdup(mem_ctx, pass);
password 176 source4/torture/locktest2.c username, lp_workgroup(), password, ev,
password 531 source4/torture/locktest2.c password = talloc_strdup(mem_ctx, p+1);
password 296 source4/torture/raw/context.c tcon.tconx.in.password = data_blob(NULL, 0);
password 418 source4/torture/raw/context.c tcon.tconx.in.password = data_blob(NULL, 0);
password 773 source4/torture/raw/context.c tcon.tconx.in.password = data_blob(NULL, 0);
password 645 source4/torture/raw/lock.c tcon.tconx.in.password = data_blob(NULL, 0);
password 1453 source4/torture/raw/notify.c tcon.tconx.in.password = data_blob(NULL, 0);
password 70 source4/torture/rpc/dfs.c i.password = NULL;
password 272 source4/torture/rpc/netlogon.c const char *password;
password 289 source4/torture/rpc/netlogon.c password = generate_random_str(tctx, 8);
password 290 source4/torture/rpc/netlogon.c E_md4hash(password, new_password.hash);
password 296 source4/torture/rpc/netlogon.c password);
password 314 source4/torture/rpc/netlogon.c "Changing machine account password to '%s' (same as previous run)\n", password);
password 325 source4/torture/rpc/netlogon.c cli_credentials_set_password(machine_credentials, password, CRED_SPECIFIED);
password 340 source4/torture/rpc/netlogon.c DATA_BLOB password = data_blob_talloc(mem_ctx, NULL, len * 2 /* number of unicode chars */);
password 341 source4/torture/rpc/netlogon.c generate_random_buffer(password.data, password.length);
password 344 source4/torture/rpc/netlogon.c if (((uint16_t *)password.data)[i] == 0) {
password 345 source4/torture/rpc/netlogon.c ((uint16_t *)password.data)[i] = 1;
password 349 source4/torture/rpc/netlogon.c return password;
password 361 source4/torture/rpc/netlogon.c const char *password;
password 381 source4/torture/rpc/netlogon.c password = generate_random_str(tctx, 8);
password 382 source4/torture/rpc/netlogon.c encode_pw_buffer(password_buf.data, password, STR_UNICODE);
password 389 source4/torture/rpc/netlogon.c torture_comment(tctx, "Changing machine account password to '%s'\n", password);
password 400 source4/torture/rpc/netlogon.c cli_credentials_set_password(machine_credentials, password, CRED_SPECIFIED);
password 411 source4/torture/rpc/netlogon.c password = "";
password 412 source4/torture/rpc/netlogon.c encode_pw_buffer(password_buf.data, password, STR_UNICODE);
password 421 source4/torture/rpc/netlogon.c "Changing machine account password to '%s'\n", password);
password 432 source4/torture/rpc/netlogon.c cli_credentials_set_password(machine_credentials, password, CRED_SPECIFIED);
password 439 source4/torture/rpc/netlogon.c password = generate_random_str(tctx, 8);
password 440 source4/torture/rpc/netlogon.c encode_pw_buffer(password_buf.data, password, STR_UNICODE);
password 447 source4/torture/rpc/netlogon.c torture_comment(tctx, "Changing machine account password to '%s'\n", password);
password 465 source4/torture/rpc/netlogon.c "Changing machine account password to '%s' (same as previous run)\n", password);
password 476 source4/torture/rpc/netlogon.c cli_credentials_set_password(machine_credentials, password, CRED_SPECIFIED);
password 525 source4/torture/rpc/netlogon.c struct samr_Password password;
password 539 source4/torture/rpc/netlogon.c r.out.password = &password;
password 556 source4/torture/rpc/netlogon.c struct samr_Password password, password2;
password 570 source4/torture/rpc/netlogon.c r.out.password = &password;
password 537 source4/torture/rpc/samba3rpc.c const char *username, const char *password,
password 572 source4/torture/rpc/samba3rpc.c encode_pw_buffer(u_info.info23.password.data, password,
password 580 source4/torture/rpc/samba3rpc.c arcfour_crypt_blob(u_info.info23.password.data, 516,
password 776 source4/torture/rpc/samba3rpc.c encode_pw_buffer(u_info.info25.password.data,
password 792 source4/torture/rpc/samba3rpc.c arcfour_crypt_blob(u_info.info25.password.data, 516,
password 794 source4/torture/rpc/samba3rpc.c memcpy(&u_info.info25.password.data[516], confounder, 16);
password 812 source4/torture/rpc/samba3rpc.c encode_pw_buffer(u_info.info24.password.data,
password 823 source4/torture/rpc/samba3rpc.c arcfour_crypt_blob(u_info.info24.password.data, 516,
password 1150 source4/torture/rpc/samba3rpc.c logon.password = &pinfo;
password 1173 source4/torture/rpc/samba3rpc.c char *password = generate_random_str(wks_creds, 8);
password 1188 source4/torture/rpc/samba3rpc.c E_md4hash(password, new_password.hash);
password 1205 source4/torture/rpc/samba3rpc.c cli_credentials_set_password(wks_creds, password,
password 1702 source4/torture/rpc/samba3rpc.c tcon.tconx.in.password = data_blob(NULL, 0);
password 57 source4/torture/rpc/samlogon.c const char *password;
password 287 source4/torture/rpc/samlogon.c lm_good = SMBencrypt(samlogon_state->password, samlogon_state->chall.data, lm_response.data);
password 291 source4/torture/rpc/samlogon.c E_deshash(samlogon_state->password, lm_hash);
password 294 source4/torture/rpc/samlogon.c SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, nt_response.data);
password 296 source4/torture/rpc/samlogon.c E_md4hash(samlogon_state->password, nt_hash);
password 418 source4/torture/rpc/samlogon.c SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data,
password 420 source4/torture/rpc/samlogon.c E_md4hash(samlogon_state->password, nt_hash);
password 424 source4/torture/rpc/samlogon.c lm_good = E_deshash(samlogon_state->password, lm_hash);
password 514 source4/torture/rpc/samlogon.c SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data,
password 516 source4/torture/rpc/samlogon.c E_md4hash(samlogon_state->password, nt_hash);
password 520 source4/torture/rpc/samlogon.c lm_good = E_deshash(samlogon_state->password, lm_hash);
password 610 source4/torture/rpc/samlogon.c samlogon_state->password, &samlogon_state->chall,
password 621 source4/torture/rpc/samlogon.c samlogon_state->password, &samlogon_state->chall,
password 757 source4/torture/rpc/samlogon.c SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data,
password 759 source4/torture/rpc/samlogon.c E_md4hash(samlogon_state->password, nt_hash);
password 763 source4/torture/rpc/samlogon.c lm_good = E_deshash(samlogon_state->password, lm_hash);
password 776 source4/torture/rpc/samlogon.c samlogon_state->password, &samlogon_state->chall,
password 788 source4/torture/rpc/samlogon.c samlogon_state->password, &samlogon_state->chall,
password 1072 source4/torture/rpc/samlogon.c E_md4hash(samlogon_state->password, (uint8_t *)nt_hash);
password 1073 source4/torture/rpc/samlogon.c lm_good = E_deshash(samlogon_state->password, (uint8_t *)lm_hash);
password 1077 source4/torture/rpc/samlogon.c SMBNTencrypt(samlogon_state->password, samlogon_state->chall.data, nt_response.data);
password 1151 source4/torture/rpc/samlogon.c char *password;
password 1160 source4/torture/rpc/samlogon.c bool lm_good = E_deshash(samlogon_state->password, lm_hash);
password 1165 source4/torture/rpc/samlogon.c &unicodepw, samlogon_state->password, NULL)) {
password 1170 source4/torture/rpc/samlogon.c nt_response = data_blob_talloc(samlogon_state->mem_ctx, unicodepw, strlen_m(samlogon_state->password)*2);
password 1172 source4/torture/rpc/samlogon.c password = strupper_talloc(samlogon_state->mem_ctx, samlogon_state->password);
password 1177 source4/torture/rpc/samlogon.c password, strlen(password)+1,
password 1347 source4/torture/rpc/samlogon.c samlogon_state.password = plain_pass;
password 1459 source4/torture/rpc/samlogon.c logon.password = &pinfo;
password 1660 source4/torture/rpc/samlogon.c const char *password;
password 1671 source4/torture/rpc/samlogon.c .password = cli_credentials_get_password(cmdline_credentials),
password 1680 source4/torture/rpc/samlogon.c .password = cli_credentials_get_password(cmdline_credentials),
password 1693 source4/torture/rpc/samlogon.c .password = cli_credentials_get_password(cmdline_credentials),
password 1706 source4/torture/rpc/samlogon.c .password = cli_credentials_get_password(cmdline_credentials),
password 1715 source4/torture/rpc/samlogon.c .password = cli_credentials_get_password(machine_credentials),
password 1724 source4/torture/rpc/samlogon.c .password = cli_credentials_get_password(machine_credentials),
password 1733 source4/torture/rpc/samlogon.c .password = cli_credentials_get_password(machine_credentials),
password 1746 source4/torture/rpc/samlogon.c .password = cli_credentials_get_password(machine_credentials),
password 1759 source4/torture/rpc/samlogon.c .password = cli_credentials_get_password(machine_credentials),
password 1768 source4/torture/rpc/samlogon.c .password = user_password,
password 1780 source4/torture/rpc/samlogon.c .password = user_password,
password 1792 source4/torture/rpc/samlogon.c .password = user_password,
password 1802 source4/torture/rpc/samlogon.c .password = old_user_password,
password 1812 source4/torture/rpc/samlogon.c .password = user_password_wrong_wks,
password 1827 source4/torture/rpc/samlogon.c usercreds[ci].password,
password 1838 source4/torture/rpc/samlogon.c usercreds[ci].password,
password 1860 source4/torture/rpc/samlogon.c usercreds[0].password,
password 1871 source4/torture/rpc/samlogon.c usercreds[0].password,
password 72 source4/torture/rpc/samr.c struct policy_handle *domain_handle, char **password);
password 587 source4/torture/rpc/samr.c DATA_BLOB password = data_blob_talloc(mem_ctx, NULL, len * 2 /* number of unicode chars */);
password 588 source4/torture/rpc/samr.c generate_random_buffer(password.data, password.length);
password 591 source4/torture/rpc/samr.c if (((uint16_t *)password.data)[i] == 0) {
password 592 source4/torture/rpc/samr.c ((uint16_t *)password.data)[i] = 1;
password 596 source4/torture/rpc/samr.c return password;
password 610 source4/torture/rpc/samr.c struct policy_handle *handle, char **password)
password 634 source4/torture/rpc/samr.c encode_pw_buffer(u.info24.password.data, newpass, STR_UNICODE);
password 644 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info24.password.data, 516, &session_key);
password 654 source4/torture/rpc/samr.c *password = newpass;
password 663 source4/torture/rpc/samr.c char **password)
password 691 source4/torture/rpc/samr.c encode_pw_buffer(u.info23.password.data, newpass, STR_UNICODE);
password 700 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info23.password.data, 516, &session_key);
password 710 source4/torture/rpc/samr.c *password = newpass;
password 713 source4/torture/rpc/samr.c encode_pw_buffer(u.info23.password.data, newpass, STR_UNICODE);
password 724 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info23.password.data, 516, &session_key);
password 741 source4/torture/rpc/samr.c char **password)
password 772 source4/torture/rpc/samr.c encode_pw_buffer(u.info26.password.data, newpass, STR_UNICODE);
password 789 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info26.password.data, 516, &confounded_session_key);
password 790 source4/torture/rpc/samr.c memcpy(&u.info26.password.data[516], confounder, 16);
password 800 source4/torture/rpc/samr.c *password = newpass;
password 806 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info26.password.data, 516, &confounded_session_key);
password 807 source4/torture/rpc/samr.c memcpy(&u.info26.password.data[516], confounder, 16);
password 817 source4/torture/rpc/samr.c *password = newpass;
password 825 source4/torture/rpc/samr.c char **password)
password 856 source4/torture/rpc/samr.c encode_pw_buffer(u.info25.password.data, newpass, STR_UNICODE);
password 872 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info25.password.data, 516, &confounded_session_key);
password 873 source4/torture/rpc/samr.c memcpy(&u.info25.password.data[516], confounder, 16);
password 883 source4/torture/rpc/samr.c *password = newpass;
password 889 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info25.password.data, 516, &confounded_session_key);
password 890 source4/torture/rpc/samr.c memcpy(&u.info25.password.data[516], confounder, 16);
password 905 source4/torture/rpc/samr.c struct policy_handle *handle, char **password)
password 969 source4/torture/rpc/samr.c *password = newpass;
password 977 source4/torture/rpc/samr.c char **password)
password 1057 source4/torture/rpc/samr.c *password = newpass;
password 1095 source4/torture/rpc/samr.c char **password, uint8_t password_expired,
password 1182 source4/torture/rpc/samr.c encode_pw_buffer(u.info23.password.data, newpass, STR_UNICODE);
password 1188 source4/torture/rpc/samr.c encode_pw_buffer(u.info24.password.data, newpass, STR_UNICODE);
password 1196 source4/torture/rpc/samr.c encode_pw_buffer(u.info25.password.data, newpass, STR_UNICODE);
password 1202 source4/torture/rpc/samr.c encode_pw_buffer(u.info26.password.data, newpass, STR_UNICODE);
password 1258 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info23.password.data, 516, &session_key);
password 1261 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info24.password.data, 516, &session_key);
password 1264 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info25.password.data, 516, &confounded_session_key);
password 1265 source4/torture/rpc/samr.c memcpy(&u.info25.password.data[516], confounder, 16);
password 1268 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info26.password.data, 516, &confounded_session_key);
password 1269 source4/torture/rpc/samr.c memcpy(&u.info26.password.data[516], confounder, 16);
password 1307 source4/torture/rpc/samr.c *password = newpass;
password 1594 source4/torture/rpc/samr.c struct policy_handle *handle, char **password)
password 1626 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL,
password 1629 source4/torture/rpc/samr.c oldpass = *password;
password 1755 source4/torture/rpc/samr.c *password = newpass;
password 1793 source4/torture/rpc/samr.c *password = newpass;
password 1836 source4/torture/rpc/samr.c *password = newpass;
password 1872 source4/torture/rpc/samr.c struct policy_handle *handle, char **password)
password 1896 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL,
password 1899 source4/torture/rpc/samr.c oldpass = *password;
password 1920 source4/torture/rpc/samr.c r.in.password = &lm_pass;
password 1945 source4/torture/rpc/samr.c r.in.password = &lm_pass;
password 1962 source4/torture/rpc/samr.c r.in.password = &lm_pass;
password 1989 source4/torture/rpc/samr.c r.in.password = &lm_pass;
password 2003 source4/torture/rpc/samr.c r.in.password = NULL;
password 2023 source4/torture/rpc/samr.c r.in.password = &lm_pass;
password 2033 source4/torture/rpc/samr.c *password = newpass;
password 2042 source4/torture/rpc/samr.c char **password,
password 2066 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL,
password 2068 source4/torture/rpc/samr.c oldpass = *password;
password 2112 source4/torture/rpc/samr.c *password = newpass;
password 2122 source4/torture/rpc/samr.c char **password,
password 2154 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL,
password 2157 source4/torture/rpc/samr.c oldpass = *password;
password 2331 source4/torture/rpc/samr.c password, NULL, 0, false);
password 2345 source4/torture/rpc/samr.c *password = talloc_strdup(tctx, newpass);
password 2354 source4/torture/rpc/samr.c char **password)
password 2379 source4/torture/rpc/samr.c torture_assert(tctx, *password != NULL,
password 2382 source4/torture/rpc/samr.c oldpass = *password;
password 2394 source4/torture/rpc/samr.c set_pw_in_buffer(u.info25.password.data, &new_random_pass);
password 2410 source4/torture/rpc/samr.c arcfour_crypt_blob(u.info25.password.data, 516, &confounded_session_key);
password 2411 source4/torture/rpc/samr.c memcpy(&u.info25.password.data[516], confounder, 16);
password 2497 source4/torture/rpc/samr.c *password = talloc_strdup(tctx, newpass);
password 2785 source4/torture/rpc/samr.c char *password,
password 2800 source4/torture/rpc/samr.c password, CRED_SPECIFIED);
password 2804 source4/torture/rpc/samr.c acct_name, TEST_ACCOUNT_NAME_PWD, password);
password 2825 source4/torture/rpc/samr.c char **password,
password 2852 source4/torture/rpc/samr.c password,
password 2872 source4/torture/rpc/samr.c *password,
password 2885 source4/torture/rpc/samr.c char **password,
password 2973 source4/torture/rpc/samr.c password,
password 3046 source4/torture/rpc/samr.c password,
password 3126 source4/torture/rpc/samr.c password,
password 3179 source4/torture/rpc/samr.c password,
password 3586 source4/torture/rpc/samr.c char *password = NULL;
password 3633 source4/torture/rpc/samr.c if (!test_SetUserPass(p, tctx, user_handle, &password)) {
password 3648 source4/torture/rpc/samr.c if (!test_SetUserPassEx(p, tctx, user_handle, true, &password)) {
password 3652 source4/torture/rpc/samr.c if (!test_ChangePasswordUser2(p, tctx, base_acct_name, &password, simple_pass, false)) {
password 3657 source4/torture/rpc/samr.c if (!test_SetUserPassEx(p, tctx, user_handle, true, &password)) {
password 3662 source4/torture/rpc/samr.c if (!test_ChangePasswordUser2(p, tctx, base_acct_name, &password, samr_rand_pass(tctx, 4), false)) {
password 3667 source4/torture/rpc/samr.c if (!test_ChangePasswordRandomBytes(p, tctx, base_acct_name, user_handle, &password)) {
password 3673 source4/torture/rpc/samr.c if (!test_SetUserPass_23(p, tctx, user_handle, password_fields[i], &password)) {
password 3678 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) {
password 3684 source4/torture/rpc/samr.c if (!test_SetUserPass_25(p, tctx, user_handle, password_fields[i], &password)) {
password 3689 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) {
password 3694 source4/torture/rpc/samr.c if (!test_SetUserPassEx(p, tctx, user_handle, false, &password)) {
password 3698 source4/torture/rpc/samr.c if (!test_ChangePassword(p, tctx, base_acct_name, domain_handle, &password)) {
password 3706 source4/torture/rpc/samr.c if (!test_SetUserPass_18(p, tctx, user_handle, &password)) {
password 3710 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) {
password 3722 source4/torture/rpc/samr.c if (!test_SetUserPass_21(p, tctx, user_handle, password_fields[i], &password)) {
password 3727 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, base_acct_name, 0, &password, NULL, 0, false)) {
password 3767 source4/torture/rpc/samr.c user_handle, &password,
password 4065 source4/torture/rpc/samr.c struct policy_handle *domain_handle, char **password)
password 4069 source4/torture/rpc/samr.c if (!*password) {
password 4073 source4/torture/rpc/samr.c if (!test_ChangePasswordUser(p, tctx, acct_name, domain_handle, password)) {
password 4077 source4/torture/rpc/samr.c if (!test_ChangePasswordUser2(p, tctx, acct_name, password, 0, true)) {
password 4081 source4/torture/rpc/samr.c if (!test_OemChangePasswordUser2(p, tctx, acct_name, domain_handle, password)) {
password 4086 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, *password, 0, true)) {
password 4098 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, simple_pass, 0, true)) {
password 4147 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, len - 1, password, NULL, 0, true)) {
password 4208 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, NULL,
password 4216 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, NULL, 0, true)) {
password 4220 source4/torture/rpc/samr.c if (!test_ChangePasswordUser3(p, tctx, acct_name, 0, password, NULL, 0, true)) {
password 773 source4/torture/rpc/schannel.c char *password = generate_random_str(s->join_ctx1, 8);
password 798 source4/torture/rpc/schannel.c E_md4hash(password, new_password.hash);
password 814 source4/torture/rpc/schannel.c cli_credentials_set_password(s->wks_creds1, password,
password 576 source4/torture/rpc/srvsvc.c info.info2->password = NULL;
password 618 source4/torture/rpc/srvsvc.c info.info2->password = NULL;
password 637 source4/torture/rpc/srvsvc.c info.info502->password = NULL;
password 249 source4/torture/rpc/testjoin.c encode_pw_buffer(u.info24.password.data, random_pw, STR_UNICODE);
password 260 source4/torture/rpc/testjoin.c arcfour_crypt_blob(u.info24.password.data, 516, &session_key);
password 349 source4/torture/rpc/wkssvc.c info1.password = NULL;
password 831 source4/torture/rpc/wkssvc.c r.in.password = NULL;
password 1108 source4/torture/rpc/wkssvc.c r.in.password = NULL;
password 1138 source4/torture/rpc/wkssvc.c r.in.password = NULL;
password 897 source4/torture/util_smb.c tcon.tconx.in.password = data_blob(NULL, 0);
password 284 source4/utils/ntlm_auth.c unsigned int mux_id, void **password)
password 301 source4/utils/ntlm_auth.c *password = talloc_strndup(*private1 /* hopefully the right gensec context, useful to use for talloc */,
password 304 source4/utils/ntlm_auth.c if (*password == NULL) {
password 328 source4/utils/ntlm_auth.c char *password = NULL;
password 334 source4/utils/ntlm_auth.c manage_squid_request(cmdline_lp_ctx, NUM_HELPER_MODES /* bogus */, manage_gensec_get_pw_request, (void **)&password);
password 335 source4/utils/ntlm_auth.c return password;