auth 50 examples/auth/auth_skel.c (*auth_method)->auth = check_skel_security;
auth 1567 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->auth));
auth 1585 librpc/gen_ndr/ndr_netlogon.c if (r->auth) {
auth 1587 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->auth, r->auth_size));
auth 1619 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->auth);
auth 1621 librpc/gen_ndr/ndr_netlogon.c r->auth = NULL;
auth 1644 librpc/gen_ndr/ndr_netlogon.c if (r->auth) {
auth 1646 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->auth, 0);
auth 1647 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_array_size(ndr, &r->auth));
auth 1648 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC_N(ndr, r->auth, ndr_get_array_size(ndr, &r->auth));
auth 1649 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->auth, ndr_get_array_size(ndr, &r->auth)));
auth 1659 librpc/gen_ndr/ndr_netlogon.c if (r->auth) {
auth 1660 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_check_array_size(ndr, (void*)&r->auth, r->auth_size));
auth 1682 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "auth", r->auth);
auth 1684 librpc/gen_ndr/ndr_netlogon.c if (r->auth) {
auth 1685 librpc/gen_ndr/ndr_netlogon.c ndr_print_array_uint8(ndr, "auth", r->auth, r->auth_size);
auth 204 librpc/gen_ndr/netlogon.h uint8_t *auth;/* [unique,size_is(auth_size)] */
auth 61 nsswitch/libwbclient/wbc_pam.c i->user_flags = resp->data.auth.info3.user_flgs;
auth 63 nsswitch/libwbclient/wbc_pam.c i->account_name = talloc_strdup(i, resp->data.auth.info3.user_name);
auth 66 nsswitch/libwbclient/wbc_pam.c i->full_name = talloc_strdup(i, resp->data.auth.info3.full_name);
auth 68 nsswitch/libwbclient/wbc_pam.c i->domain_name = talloc_strdup(i, resp->data.auth.info3.logon_dom);
auth 72 nsswitch/libwbclient/wbc_pam.c i->acct_flags = resp->data.auth.info3.acct_flags;
auth 74 nsswitch/libwbclient/wbc_pam.c resp->data.auth.user_session_key,
auth 77 nsswitch/libwbclient/wbc_pam.c resp->data.auth.first_8_lm_hash,
auth 80 nsswitch/libwbclient/wbc_pam.c i->logon_count = resp->data.auth.info3.logon_count;
auth 81 nsswitch/libwbclient/wbc_pam.c i->bad_password_count = resp->data.auth.info3.bad_pw_count;
auth 83 nsswitch/libwbclient/wbc_pam.c i->logon_time = resp->data.auth.info3.logon_time;
auth 84 nsswitch/libwbclient/wbc_pam.c i->logoff_time = resp->data.auth.info3.logoff_time;
auth 85 nsswitch/libwbclient/wbc_pam.c i->kickoff_time = resp->data.auth.info3.kickoff_time;
auth 86 nsswitch/libwbclient/wbc_pam.c i->pass_last_set_time = resp->data.auth.info3.pass_last_set_time;
auth 87 nsswitch/libwbclient/wbc_pam.c i->pass_can_change_time = resp->data.auth.info3.pass_can_change_time;
auth 88 nsswitch/libwbclient/wbc_pam.c i->pass_must_change_time= resp->data.auth.info3.pass_must_change_time;
auth 90 nsswitch/libwbclient/wbc_pam.c i->logon_server = talloc_strdup(i, resp->data.auth.info3.logon_srv);
auth 92 nsswitch/libwbclient/wbc_pam.c i->logon_script = talloc_strdup(i, resp->data.auth.info3.logon_script);
auth 94 nsswitch/libwbclient/wbc_pam.c i->profile_path = talloc_strdup(i, resp->data.auth.info3.profile_path);
auth 96 nsswitch/libwbclient/wbc_pam.c i->home_directory= talloc_strdup(i, resp->data.auth.info3.home_dir);
auth 98 nsswitch/libwbclient/wbc_pam.c i->home_drive = talloc_strdup(i, resp->data.auth.info3.dir_drive);
auth 102 nsswitch/libwbclient/wbc_pam.c i->num_sids += resp->data.auth.info3.num_groups;
auth 103 nsswitch/libwbclient/wbc_pam.c i->num_sids += resp->data.auth.info3.num_other_sids;
auth 108 nsswitch/libwbclient/wbc_pam.c wbc_status = wbcStringToSid(resp->data.auth.info3.dom_sid,
auth 125 nsswitch/libwbclient/wbc_pam.c resp->data.auth.info3.user_rid,
auth 129 nsswitch/libwbclient/wbc_pam.c resp->data.auth.info3.group_rid,
auth 139 nsswitch/libwbclient/wbc_pam.c for (j=0; j < resp->data.auth.info3.num_groups; j++) {
auth 163 nsswitch/libwbclient/wbc_pam.c for (j=0; j < resp->data.auth.info3.num_other_sids; j++) {
auth 217 nsswitch/libwbclient/wbc_pam.c e->nt_status = resp->data.auth.nt_status;
auth 218 nsswitch/libwbclient/wbc_pam.c e->pam_error = resp->data.auth.pam_error;
auth 219 nsswitch/libwbclient/wbc_pam.c e->nt_string = talloc_strdup(e, resp->data.auth.nt_status_string);
auth 222 nsswitch/libwbclient/wbc_pam.c e->display_string = talloc_strdup(e, resp->data.auth.error_string);
auth 243 nsswitch/libwbclient/wbc_pam.c i->min_passwordage = resp->data.auth.policy.min_passwordage;
auth 244 nsswitch/libwbclient/wbc_pam.c i->min_length_password = resp->data.auth.policy.min_length_password;
auth 245 nsswitch/libwbclient/wbc_pam.c i->password_history = resp->data.auth.policy.password_history;
auth 246 nsswitch/libwbclient/wbc_pam.c i->password_properties = resp->data.auth.policy.password_properties;
auth 247 nsswitch/libwbclient/wbc_pam.c i->expire = resp->data.auth.policy.expire;
auth 270 nsswitch/libwbclient/wbc_pam.c if (resp->data.auth.krb5ccname) {
auth 275 nsswitch/libwbclient/wbc_pam.c (uint8_t *)resp->data.auth.krb5ccname,
auth 276 nsswitch/libwbclient/wbc_pam.c strlen(resp->data.auth.krb5ccname)+1);
auth 280 nsswitch/libwbclient/wbc_pam.c if (resp->data.auth.unix_username) {
auth 285 nsswitch/libwbclient/wbc_pam.c (uint8_t *)resp->data.auth.unix_username,
auth 286 nsswitch/libwbclient/wbc_pam.c strlen(resp->data.auth.unix_username)+1);
auth 352 nsswitch/libwbclient/wbc_pam.c snprintf(request.data.auth.user,
auth 353 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.user)-1,
auth 359 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth.user,
auth 361 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.user)-1);
auth 364 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth.pass,
auth 366 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.pass)-1);
auth 465 nsswitch/libwbclient/wbc_pam.c if (response.data.auth.nt_status != 0) {
auth 519 nsswitch/libwbclient/wbc_pam.c if (response.data.auth.nt_status != 0) {
auth 606 nsswitch/libwbclient/wbc_pam.c if (response.data.auth.nt_status != 0) {
auth 835 nsswitch/libwbclient/wbc_pam.c if (response.data.auth.nt_status != 0) {
auth 853 nsswitch/libwbclient/wbc_pam.c *reject_reason = response.data.auth.reject_reason;
auth 944 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth.user,
auth 946 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.user)-1);
auth 948 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth.pass,
auth 950 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.pass)-1);
auth 956 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth.krb5_cc_type,
auth 958 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.krb5_cc_type) - 1);
auth 965 nsswitch/libwbclient/wbc_pam.c memcpy(&request.data.auth.uid,
auth 967 nsswitch/libwbclient/wbc_pam.c MIN(sizeof(request.data.auth.uid),
auth 988 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth.require_membership_of_sid,
auth 990 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.require_membership_of_sid) - 1);
auth 1000 nsswitch/libwbclient/wbc_pam.c if (response.data.auth.nt_status != 0) {
auth 1195 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username);
auth 1196 nsswitch/wbinfo.c fstrcpy(request.data.auth.pass, p + 1);
auth 1199 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username);
auth 1201 nsswitch/wbinfo.c fstrcpy(request.data.auth.pass, password);
auth 1207 nsswitch/wbinfo.c fstrcpy(request.data.auth.krb5_cc_type, cctype);
auth 1209 nsswitch/wbinfo.c request.data.auth.uid = geteuid();
auth 1218 nsswitch/wbinfo.c if (response.data.auth.nt_status)
auth 1220 nsswitch/wbinfo.c response.data.auth.nt_status_string,
auth 1221 nsswitch/wbinfo.c response.data.auth.nt_status,
auth 1222 nsswitch/wbinfo.c response.data.auth.error_string);
auth 1227 nsswitch/wbinfo.c if (response.data.auth.info3.user_flgs & NETLOGON_CACHED_ACCOUNT) {
auth 1232 nsswitch/wbinfo.c if (response.data.auth.krb5ccname[0] != '\0') {
auth 1233 nsswitch/wbinfo.c d_printf("credentials were put in: %s\n", response.data.auth.krb5ccname);
auth 1272 nsswitch/wbinfo.c if (response.data.auth.nt_status)
auth 1274 nsswitch/wbinfo.c response.data.auth.nt_status_string,
auth 1275 nsswitch/wbinfo.c response.data.auth.nt_status,
auth 1276 nsswitch/wbinfo.c response.data.auth.error_string);
auth 1405 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username);
auth 1406 nsswitch/wbinfo.c fstrcpy(request.data.auth.pass, p + 1);
auth 1409 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username);
auth 1410 nsswitch/wbinfo.c fstrcpy(request.data.auth.pass, getpass("Password: "));
auth 1422 nsswitch/wbinfo.c if (response.data.auth.nt_status)
auth 1424 nsswitch/wbinfo.c response.data.auth.nt_status_string,
auth 1425 nsswitch/wbinfo.c response.data.auth.nt_status,
auth 1426 nsswitch/wbinfo.c response.data.auth.error_string);
auth 544 nsswitch/wbinfo4.c response.data.auth.nt_status_string,
auth 545 nsswitch/wbinfo4.c response.data.auth.nt_status);
auth 736 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username);
auth 737 nsswitch/wbinfo4.c fstrcpy(request.data.auth.pass, p + 1);
auth 740 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username);
auth 744 nsswitch/wbinfo4.c fstrcpy(request.data.auth.krb5_cc_type, cctype);
auth 746 nsswitch/wbinfo4.c request.data.auth.uid = geteuid();
auth 755 nsswitch/wbinfo4.c if (response.data.auth.nt_status)
auth 757 nsswitch/wbinfo4.c response.data.auth.nt_status_string,
auth 758 nsswitch/wbinfo4.c response.data.auth.nt_status,
auth 759 nsswitch/wbinfo4.c response.data.auth.error_string);
auth 764 nsswitch/wbinfo4.c if (response.data.auth.info3.user_flgs & NETLOGON_CACHED_ACCOUNT) {
auth 769 nsswitch/wbinfo4.c if (response.data.auth.krb5ccname[0] != '\0') {
auth 770 nsswitch/wbinfo4.c d_printf("credentials were put in: %s\n", response.data.auth.krb5ccname);
auth 797 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username);
auth 798 nsswitch/wbinfo4.c fstrcpy(request.data.auth.pass, p + 1);
auth 801 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username);
auth 810 nsswitch/wbinfo4.c if (response.data.auth.nt_status)
auth 812 nsswitch/wbinfo4.c response.data.auth.nt_status_string,
auth 813 nsswitch/wbinfo4.c response.data.auth.nt_status,
auth 814 nsswitch/wbinfo4.c response.data.auth.error_string);
auth 917 nsswitch/wbinfo4.c if (response.data.auth.nt_status)
auth 919 nsswitch/wbinfo4.c response.data.auth.nt_status_string,
auth 920 nsswitch/wbinfo4.c response.data.auth.nt_status,
auth 921 nsswitch/wbinfo4.c response.data.auth.error_string);
auth 884 nsswitch/winbind_nss_aix.c STRCPY_RET(request.data.auth.user, r_user);
auth 885 nsswitch/winbind_nss_aix.c STRCPY_RET(request.data.auth.pass, pass);
auth 254 nsswitch/winbind_struct_protocol.h } auth; /* pam_winbind auth module */
auth 451 nsswitch/winbind_struct_protocol.h } auth;
auth 258 source3/auth/auth.c result = auth_method->auth(auth_context, auth_method->private_data, mem_ctx, user_info, server_info);
auth 58 source3/auth/auth_builtin.c (*auth_method)->auth = check_guest_security;
auth 110 source3/auth/auth_builtin.c (*auth_method)->auth = check_name_to_ntstatus_security;
auth 159 source3/auth/auth_builtin.c (*auth_method)->auth = check_fixed_challenge_security;
auth 431 source3/auth/auth_domain.c (*auth_method)->auth = check_ntdomain_security;
auth 533 source3/auth/auth_domain.c (*auth_method)->auth = check_trustdomain_security;
auth 34 source3/auth/auth_netlogond.c struct cli_pipe_auth_data *auth;
auth 50 source3/auth/auth_netlogond.c schannel_key, &auth);
auth 58 source3/auth/auth_netlogond.c status = rpc_pipe_bind(p, auth);
auth 163 source3/auth/auth_netlogond.c struct cli_pipe_auth_data *auth;
auth 226 source3/auth/auth_netlogond.c status = rpccli_anon_bind_data(p, &auth);
auth 233 source3/auth/auth_netlogond.c status = rpc_pipe_bind(p, auth);
auth 308 source3/auth/auth_netlogond.c (*auth_method)->auth = check_netlogond_security;
auth 383 source3/auth/auth_sam.c (*auth_method)->auth = check_sam_security;
auth 440 source3/auth/auth_sam.c (*auth_method)->auth = check_samstrict_security;
auth 129 source3/auth/auth_script.c (*auth_method)->auth = script_check_user_credentials;
auth 461 source3/auth/auth_server.c (*auth_method)->auth = check_smbserver_security;
auth 138 source3/auth/auth_unix.c (*auth_method)->auth = check_unix_security;
auth 142 source3/auth/auth_wbc.c (*auth_method)->auth = check_wbc_security;
auth 97 source3/auth/auth_winbind.c return auth_method->auth(auth_context, auth_method->private_data,
auth 136 source3/auth/auth_winbind.c (*auth_method)->auth = check_winbind_security;
auth 72 source3/include/ads.h } auth;
auth 109 source3/include/auth.h NTSTATUS (*auth)(const struct auth_context *auth_context,
auth 135 source3/include/client.h struct cli_pipe_auth_data *auth;
auth 224 source3/include/ntdomain.h struct pipe_auth_data auth;
auth 2825 source3/include/proto.h bool spnego_parse_auth(DATA_BLOB blob, DATA_BLOB *auth);
auth 2830 source3/include/proto.h DATA_BLOB *auth);
auth 5270 source3/include/proto.h struct cli_pipe_auth_data *auth);
auth 5273 source3/include/proto.h struct cli_pipe_auth_data *auth);
auth 117 source3/lib/netapi/joindomain.c &pipe_cli->auth->user_session_key,
auth 243 source3/lib/netapi/joindomain.c &pipe_cli->auth->user_session_key,
auth 363 source3/lib/netapi/joindomain.c SAFE_FREE(ads->auth.user_name);
auth 365 source3/lib/netapi/joindomain.c ads->auth.user_name = SMB_STRDUP(r->in.account);
auth 367 source3/lib/netapi/joindomain.c ads->auth.user_name = SMB_STRDUP(ctx->username);
auth 370 source3/lib/netapi/joindomain.c SAFE_FREE(ads->auth.password);
auth 372 source3/lib/netapi/joindomain.c ads->auth.password = SMB_STRDUP(r->in.password);
auth 374 source3/lib/netapi/joindomain.c ads->auth.password = SMB_STRDUP(ctx->password);
auth 419 source3/lib/netapi/joindomain.c &pipe_cli->auth->user_session_key,
auth 461 source3/lib/netapi/joindomain.c &pipe_cli->auth->user_session_key,
auth 453 source3/lib/netapi/user.c &pipe_cli->auth->user_session_key,
auth 1856 source3/lib/netapi/user.c &pipe_cli->auth->user_session_key,
auth 409 source3/lib/popt_common.c XFILE *auth;
auth 414 source3/lib/popt_common.c if ((auth=x_fopen(file, O_RDONLY, 0)) == NULL)
auth 421 source3/lib/popt_common.c while (!x_feof(auth))
auth 424 source3/lib/popt_common.c if (!x_fgets(buf, sizeof(buf), auth))
auth 458 source3/lib/popt_common.c x_fclose(auth);
auth 149 source3/libads/ads_struct.c ads->auth.flags = wrap_flags;
auth 170 source3/libads/ads_struct.c SAFE_FREE((*ads)->auth.realm);
auth 171 source3/libads/ads_struct.c SAFE_FREE((*ads)->auth.password);
auth 172 source3/libads/ads_struct.c SAFE_FREE((*ads)->auth.user_name);
auth 173 source3/libads/ads_struct.c SAFE_FREE((*ads)->auth.kdc_server);
auth 296 source3/libads/kerberos.c if (ads->auth.flags & ADS_AUTH_USER_CREDS) {
auth 297 source3/libads/kerberos.c account_name = ads->auth.user_name;
auth 313 source3/libads/kerberos.c account_name = ads->auth.user_name;
auth 317 source3/libads/kerberos.c if (asprintf(&s, "%s@%s", account_name, ads->auth.realm) == -1) {
auth 321 source3/libads/kerberos.c if (!ads->auth.password) {
auth 326 source3/libads/kerberos.c ret = kerberos_kinit_password_ext(s, ads->auth.password, ads->auth.time_offset,
auth 327 source3/libads/kerberos.c &ads->auth.tgt_expire, NULL, NULL, False, False, ads->auth.renewable,
auth 832 source3/libads/krb5_setpw.c status = ads_krb5_set_password(ads->auth.kdc_server, principal,
auth 833 source3/libads/krb5_setpw.c password, ads->auth.time_offset);
auth 341 source3/libads/ldap.c if (!(ads->auth.flags & ADS_AUTH_NO_BIND)) {
auth 453 source3/libads/ldap.c ads->auth.flags = ADS_AUTH_NO_BIND;
auth 623 source3/libads/ldap.c if (!ads->auth.user_name) {
auth 627 source3/libads/ldap.c if (asprintf(&ads->auth.user_name, "%s$", global_myname() ) == -1) {
auth 629 source3/libads/ldap.c ads->auth.user_name = NULL;
auth 633 source3/libads/ldap.c if (!ads->auth.realm) {
auth 634 source3/libads/ldap.c ads->auth.realm = SMB_STRDUP(ads->config.realm);
auth 637 source3/libads/ldap.c if (!ads->auth.kdc_server) {
auth 639 source3/libads/ldap.c ads->auth.kdc_server = SMB_STRDUP(addr);
auth 648 source3/libads/ldap.c setenv(env, ads->auth.kdc_server, 1);
auth 656 source3/libads/ldap.c if (ads->auth.flags & ADS_AUTH_NO_BIND) {
auth 701 source3/libads/ldap.c if (ads->auth.flags & ADS_AUTH_ANON_BIND) {
auth 706 source3/libads/ldap.c if (ads->auth.flags & ADS_AUTH_SIMPLE_BIND) {
auth 707 source3/libads/ldap.c status = ADS_ERROR(ldap_simple_bind_s(ads->ldap.ld, ads->auth.user_name, ads->auth.password));
auth 732 source3/libads/ldap.c ads->auth.flags |= ADS_AUTH_USER_CREDS;
auth 2825 source3/libads/ldap.c ads_s->auth.flags = ADS_AUTH_ANON_BIND;
auth 2848 source3/libads/ldap.c ads->auth.time_offset = ads->config.current_time - time(NULL);
auth 2849 source3/libads/ldap.c DEBUG(4,("time offset is %d seconds\n", ads->auth.time_offset));
auth 2887 source3/libads/ldap.c ads_s->auth.flags = ADS_AUTH_ANON_BIND;
auth 57 source3/libads/ldap_utils.c if (ads->auth.flags & ADS_AUTH_ANON_BIND) {
auth 94 source3/libads/ldap_utils.c if (ads->auth.flags & ADS_AUTH_ANON_BIND) {
auth 55 source3/libads/ndr.c ndr_print_string(ndr, "realm", r->auth.realm);
auth 57 source3/libads/ndr.c ndr_print_string(ndr, "password", r->auth.password);
auth 61 source3/libads/ndr.c ndr_print_string(ndr, "user_name", r->auth.user_name);
auth 62 source3/libads/ndr.c ndr_print_string(ndr, "kdc_server", r->auth.kdc_server);
auth 63 source3/libads/ndr.c ndr_print_ads_auth_flags(ndr, "flags", r->auth.flags);
auth 64 source3/libads/ndr.c ndr_print_uint32(ndr, "time_offset", r->auth.time_offset);
auth 65 source3/libads/ndr.c ndr_print_time_t(ndr, "tgt_expire", r->auth.tgt_expire);
auth 66 source3/libads/ndr.c ndr_print_time_t(ndr, "tgs_expire", r->auth.tgs_expire);
auth 67 source3/libads/ndr.c ndr_print_time_t(ndr, "renewable", r->auth.renewable);
auth 140 source3/libads/sasl.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, ads->auth.user_name))) {
auth 143 source3/libads/sasl.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_domain(ntlmssp_state, ads->auth.realm))) {
auth 146 source3/libads/sasl.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_password(ntlmssp_state, ads->auth.password))) {
auth 155 source3/libads/sasl.c if (ads->auth.flags & ADS_AUTH_SASL_FORCE) {
auth 466 source3/libads/sasl.c if (ads->auth.flags & ADS_AUTH_SASL_FORCE) {
auth 481 source3/libads/sasl.c if (ads->auth.flags & ADS_AUTH_SASL_FORCE) {
auth 696 source3/libads/sasl.c rc = spnego_gen_negTokenTarg(principal, ads->auth.time_offset, &blob, &session_key, 0,
auth 697 source3/libads/sasl.c &ads->auth.tgs_expire);
auth 792 source3/libads/sasl.c if (!(ads->auth.flags & ADS_AUTH_DISABLE_KERBEROS) &&
auth 827 source3/libads/sasl.c !(ads->auth.flags & ADS_AUTH_ALLOW_NTLMSSP)) {
auth 1099 source3/libads/sasl.c if (ads->auth.flags & ADS_AUTH_SASL_SEAL) {
auth 1101 source3/libads/sasl.c } else if (ads->auth.flags & ADS_AUTH_SASL_SIGN) {
auth 38 source3/libads/util.c ret = kerberos_set_password(ads->auth.kdc_server, host_principal, password, host_principal, new_password, ads->auth.time_offset);
auth 665 source3/libgpo/gpo_util.c ads->auth.user_name, NULL,
auth 666 source3/libgpo/gpo_util.c ads->auth.password,
auth 112 source3/libnet/libnet_join.c SAFE_FREE(my_ads->auth.user_name);
auth 113 source3/libnet/libnet_join.c my_ads->auth.user_name = SMB_STRDUP(user_name);
auth 117 source3/libnet/libnet_join.c SAFE_FREE(my_ads->auth.password);
auth 118 source3/libnet/libnet_join.c my_ads->auth.password = SMB_STRDUP(password);
auth 55 source3/libnet/libnet_samsync_keytab.c ads->auth.user_name = SMB_STRDUP(username);
auth 56 source3/libnet/libnet_samsync_keytab.c ads->auth.password = SMB_STRDUP(password);
auth 495 source3/libsmb/clispnego.c bool spnego_parse_auth(DATA_BLOB blob, DATA_BLOB *auth)
auth 513 source3/libsmb/clispnego.c *auth = data_blob_talloc(talloc_tos(),
auth 575 source3/libsmb/clispnego.c DATA_BLOB *auth)
auth 600 source3/libsmb/clispnego.c *auth = data_blob_null;
auth 609 source3/libsmb/clispnego.c asn1_read_OctetString(data, NULL, auth);
auth 636 source3/libsmb/clispnego.c data_blob_free(auth);
auth 77 source3/libsmb/namequery_dc.c ads->auth.flags |= ADS_AUTH_NO_BIND;
auth 3340 source3/printing/nt_printing.c SAFE_FREE(ads->auth.password);
auth 3341 source3/printing/nt_printing.c ads->auth.password = secrets_fetch_machine_password(lp_workgroup(),
auth 3382 source3/printing/nt_printing.c SAFE_FREE(ads->auth.password);
auth 3383 source3/printing/nt_printing.c ads->auth.password = secrets_fetch_machine_password(lp_workgroup(),
auth 555 source3/rpc_client/cli_pipe.c NTLMSSP_STATE *ntlmssp_state = cli->auth->a_u.ntlmssp_state;
auth 563 source3/rpc_client/cli_pipe.c if (cli->auth->auth_level == PIPE_AUTH_LEVEL_NONE
auth 564 source3/rpc_client/cli_pipe.c || cli->auth->auth_level == PIPE_AUTH_LEVEL_CONNECT) {
auth 608 source3/rpc_client/cli_pipe.c switch (cli->auth->auth_level) {
auth 641 source3/rpc_client/cli_pipe.c "auth level %d\n", cli->auth->auth_level));
auth 678 source3/rpc_client/cli_pipe.c cli->auth->a_u.schannel_auth;
auth 681 source3/rpc_client/cli_pipe.c if (cli->auth->auth_level == PIPE_AUTH_LEVEL_NONE
auth 682 source3/rpc_client/cli_pipe.c || cli->auth->auth_level == PIPE_AUTH_LEVEL_CONNECT) {
auth 729 source3/rpc_client/cli_pipe.c cli->auth->auth_level,
auth 790 source3/rpc_client/cli_pipe.c switch(cli->auth->auth_type) {
auth 823 source3/rpc_client/cli_pipe.c cli->auth->auth_type ));
auth 1480 source3/rpc_client/cli_pipe.c struct kerberos_auth_struct *a = cli->auth->a_u.kerberos_auth;
auth 1546 source3/rpc_client/cli_pipe.c nt_status = ntlmssp_update(cli->auth->a_u.ntlmssp_state,
auth 1592 source3/rpc_client/cli_pipe.c nt_status = ntlmssp_update(cli->auth->a_u.ntlmssp_state,
auth 1632 source3/rpc_client/cli_pipe.c if (!cli->auth->domain || !cli->auth->domain[0]) {
auth 1633 source3/rpc_client/cli_pipe.c cli->auth->domain = talloc_strdup(cli, lp_workgroup());
auth 1634 source3/rpc_client/cli_pipe.c if (cli->auth->domain == NULL) {
auth 1639 source3/rpc_client/cli_pipe.c init_rpc_auth_schannel_neg(&schannel_neg, cli->auth->domain,
auth 1825 source3/rpc_client/cli_pipe.c if (!cli->auth->a_u.ntlmssp_state) {
auth 1832 source3/rpc_client/cli_pipe.c cli->auth->auth_type),
auth 1833 source3/rpc_client/cli_pipe.c cli->auth->auth_level,
auth 1843 source3/rpc_client/cli_pipe.c switch (cli->auth->auth_level) {
auth 1846 source3/rpc_client/cli_pipe.c status = ntlmssp_seal_packet(cli->auth->a_u.ntlmssp_state,
auth 1860 source3/rpc_client/cli_pipe.c status = ntlmssp_sign_packet(cli->auth->a_u.ntlmssp_state,
auth 1903 source3/rpc_client/cli_pipe.c struct schannel_auth_struct *sas = cli->auth->a_u.schannel_auth;
auth 1913 source3/rpc_client/cli_pipe.c map_pipe_auth_type_to_rpc_auth_type(cli->auth->auth_type),
auth 1914 source3/rpc_client/cli_pipe.c cli->auth->auth_level,
auth 1923 source3/rpc_client/cli_pipe.c switch (cli->auth->auth_level) {
auth 1930 source3/rpc_client/cli_pipe.c cli->auth->auth_level,
auth 1975 source3/rpc_client/cli_pipe.c switch (cli->auth->auth_level) {
auth 1988 source3/rpc_client/cli_pipe.c switch(cli->auth->auth_type) {
auth 2188 source3/rpc_client/cli_pipe.c switch (state->cli->auth->auth_type) {
auth 2555 source3/rpc_client/cli_pipe.c struct cli_pipe_auth_data *auth)
auth 2568 source3/rpc_client/cli_pipe.c (unsigned int)auth->auth_type,
auth 2569 source3/rpc_client/cli_pipe.c (unsigned int)auth->auth_level ));
auth 2578 source3/rpc_client/cli_pipe.c cli->auth = talloc_move(cli, &auth);
auth 2585 source3/rpc_client/cli_pipe.c cli->auth->auth_type,
auth 2586 source3/rpc_client/cli_pipe.c cli->auth->auth_level);
auth 2661 source3/rpc_client/cli_pipe.c switch(state->cli->auth->auth_type) {
auth 2695 source3/rpc_client/cli_pipe.c (unsigned int)state->cli->auth->auth_type));
auth 2733 source3/rpc_client/cli_pipe.c status = ntlmssp_update(state->cli->auth->a_u.ntlmssp_state,
auth 2745 source3/rpc_client/cli_pipe.c state->cli->auth->auth_type,
auth 2746 source3/rpc_client/cli_pipe.c state->cli->auth->auth_level,
auth 2829 source3/rpc_client/cli_pipe.c status = ntlmssp_update(state->cli->auth->a_u.ntlmssp_state,
auth 2854 source3/rpc_client/cli_pipe.c state->cli->auth->auth_level,
auth 2940 source3/rpc_client/cli_pipe.c struct cli_pipe_auth_data *auth)
auth 2952 source3/rpc_client/cli_pipe.c req = rpc_pipe_bind_send(frame, ev, cli, auth);
auth 3000 source3/rpc_client/cli_pipe.c if ((rpc_cli->auth->auth_type == PIPE_AUTH_TYPE_NTLMSSP)
auth 3001 source3/rpc_client/cli_pipe.c || (rpc_cli->auth->auth_type == PIPE_AUTH_TYPE_SPNEGO_NTLMSSP)) {
auth 3002 source3/rpc_client/cli_pipe.c memcpy(nt_hash, rpc_cli->auth->a_u.ntlmssp_state->nt_hash, 16);
auth 3038 source3/rpc_client/cli_pipe.c static int cli_auth_ntlmssp_data_destructor(struct cli_pipe_auth_data *auth)
auth 3040 source3/rpc_client/cli_pipe.c ntlmssp_end(&auth->a_u.ntlmssp_state);
auth 3153 source3/rpc_client/cli_pipe.c static int cli_auth_kerberos_data_destructor(struct kerberos_auth_struct *auth)
auth 3155 source3/rpc_client/cli_pipe.c data_blob_free(&auth->session_key);
auth 3290 source3/rpc_client/cli_pipe.c struct cli_pipe_auth_data *auth = NULL;
auth 3315 source3/rpc_client/cli_pipe.c status = rpccli_anon_bind_data(tmp_ctx, &auth);
auth 3320 source3/rpc_client/cli_pipe.c status = rpc_pipe_bind(epm_pipe, auth);
auth 3578 source3/rpc_client/cli_pipe.c struct cli_pipe_auth_data *auth;
auth 3608 source3/rpc_client/cli_pipe.c status = rpccli_anon_bind_data(result, &auth);
auth 3616 source3/rpc_client/cli_pipe.c status = rpc_pipe_bind(result, auth);
auth 3659 source3/rpc_client/cli_pipe.c struct cli_pipe_auth_data *auth;
auth 3667 source3/rpc_client/cli_pipe.c status = rpccli_anon_bind_data(result, &auth);
auth 3681 source3/rpc_client/cli_pipe.c TALLOC_FREE(auth->user_name);
auth 3682 source3/rpc_client/cli_pipe.c TALLOC_FREE(auth->domain);
auth 3684 source3/rpc_client/cli_pipe.c auth->user_name = talloc_strdup(auth, cli->user_name);
auth 3685 source3/rpc_client/cli_pipe.c auth->domain = talloc_strdup(auth, cli->domain);
auth 3686 source3/rpc_client/cli_pipe.c auth->user_session_key = data_blob_talloc(auth,
auth 3690 source3/rpc_client/cli_pipe.c if ((auth->user_name == NULL) || (auth->domain == NULL)) {
auth 3695 source3/rpc_client/cli_pipe.c status = rpc_pipe_bind(result, auth);
auth 3746 source3/rpc_client/cli_pipe.c struct cli_pipe_auth_data *auth;
auth 3756 source3/rpc_client/cli_pipe.c password, &auth);
auth 3763 source3/rpc_client/cli_pipe.c status = rpc_pipe_bind(result, auth);
auth 3930 source3/rpc_client/cli_pipe.c struct cli_pipe_auth_data *auth;
auth 3939 source3/rpc_client/cli_pipe.c pdc->sess_key, &auth);
auth 3947 source3/rpc_client/cli_pipe.c status = rpc_pipe_bind(result, auth);
auth 4109 source3/rpc_client/cli_pipe.c struct cli_pipe_auth_data *auth;
auth 4118 source3/rpc_client/cli_pipe.c username, password, &auth);
auth 4126 source3/rpc_client/cli_pipe.c status = rpc_pipe_bind(result, auth);
auth 4150 source3/rpc_client/cli_pipe.c if (!cli->auth) {
auth 4154 source3/rpc_client/cli_pipe.c switch (cli->auth->auth_type) {
auth 4157 source3/rpc_client/cli_pipe.c cli->auth->a_u.schannel_auth->sess_key, 16);
auth 4162 source3/rpc_client/cli_pipe.c cli->auth->a_u.ntlmssp_state->session_key.data,
auth 4163 source3/rpc_client/cli_pipe.c cli->auth->a_u.ntlmssp_state->session_key.length);
auth 4168 source3/rpc_client/cli_pipe.c cli->auth->a_u.kerberos_auth->session_key.data,
auth 4169 source3/rpc_client/cli_pipe.c cli->auth->a_u.kerberos_auth->session_key.length);
auth 4173 source3/rpc_client/cli_pipe.c cli->auth->user_session_key.data,
auth 4174 source3/rpc_client/cli_pipe.c cli->auth->user_session_key.length);
auth 49 source3/rpc_client/cli_spoolss.c level1.user = cli->auth->user_name;
auth 166 source3/rpc_client/cli_spoolss.c level1.user = cli->auth->user_name;
auth 269 source3/rpc_server/srv_lsa_hnd.c if (p->pipe_bound && (p->auth.auth_type == PIPE_AUTH_TYPE_SCHANNEL)) {
auth 945 source3/rpc_server/srv_lsa_nt.c if (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) {
auth 1227 source3/rpc_server/srv_lsa_nt.c if (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) {
auth 677 source3/rpc_server/srv_netlog_nt.c if ( (lp_server_schannel() == True) && (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) ) {
auth 798 source3/rpc_server/srv_netlog_nt.c if ( (lp_server_schannel() == True) && (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) ) {
auth 874 source3/rpc_server/srv_netlog_nt.c if ( (lp_server_schannel() == True) && (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) ) {
auth 1076 source3/rpc_server/srv_netlog_nt.c if ((p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL)
auth 1077 source3/rpc_server/srv_netlog_nt.c || (p->auth.a_u.schannel_auth == NULL)) {
auth 1080 source3/rpc_server/srv_netlog_nt.c memcpy(pipe_session_key, p->auth.a_u.schannel_auth->sess_key, 16);
auth 1099 source3/rpc_server/srv_netlog_nt.c if (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) {
auth 37 source3/rpc_server/srv_pipe.c static void free_pipe_ntlmssp_auth_data(struct pipe_auth_data *auth)
auth 39 source3/rpc_server/srv_pipe.c AUTH_NTLMSSP_STATE *a = auth->a_u.auth_ntlmssp_state;
auth 44 source3/rpc_server/srv_pipe.c auth->a_u.auth_ntlmssp_state = NULL;
auth 68 source3/rpc_server/srv_pipe.c AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state;
auth 192 source3/rpc_server/srv_pipe.c if (p->auth.auth_type == PIPE_AUTH_TYPE_NTLMSSP) {
auth 197 source3/rpc_server/srv_pipe.c if (p->auth.auth_level == PIPE_AUTH_LEVEL_PRIVACY) {
auth 213 source3/rpc_server/srv_pipe.c switch (p->auth.auth_level) {
auth 414 source3/rpc_server/srv_pipe.c p->auth.auth_level == PIPE_AUTH_LEVEL_PRIVACY ?
auth 425 source3/rpc_server/srv_pipe.c schannel_encode(p->auth.a_u.schannel_auth,
auth 426 source3/rpc_server/srv_pipe.c p->auth.auth_level, SENDER_IS_ACCEPTOR, &verf,
auth 436 source3/rpc_server/srv_pipe.c p->auth.a_u.schannel_auth->seq_num++;
auth 575 source3/rpc_server/srv_pipe.c switch(p->auth.auth_level) {
auth 582 source3/rpc_server/srv_pipe.c switch(p->auth.auth_type) {
auth 594 source3/rpc_server/srv_pipe.c (unsigned int)p->auth.auth_level,
auth 595 source3/rpc_server/srv_pipe.c (unsigned int)p->auth.auth_type));
auth 610 source3/rpc_server/srv_pipe.c AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state;
auth 634 source3/rpc_server/srv_pipe.c if (p->auth.auth_level == PIPE_AUTH_LEVEL_INTEGRITY) {
auth 642 source3/rpc_server/srv_pipe.c if (p->auth.auth_level == PIPE_AUTH_LEVEL_PRIVACY) {
auth 769 source3/rpc_server/srv_pipe.c free_pipe_ntlmssp_auth_data(&p->auth);
auth 770 source3/rpc_server/srv_pipe.c p->auth.a_u.auth_ntlmssp_state = NULL;
auth 824 source3/rpc_server/srv_pipe.c if (p->auth.auth_data_free_func) {
auth 825 source3/rpc_server/srv_pipe.c (*p->auth.auth_data_free_func)(&p->auth);
auth 827 source3/rpc_server/srv_pipe.c p->auth.auth_level = PIPE_AUTH_LEVEL_NONE;
auth 828 source3/rpc_server/srv_pipe.c p->auth.auth_type = PIPE_AUTH_TYPE_NONE;
auth 1150 source3/rpc_server/srv_pipe.c if (p->auth.auth_type == PIPE_AUTH_TYPE_SPNEGO_NTLMSSP && p->auth.a_u.auth_ntlmssp_state) {
auth 1152 source3/rpc_server/srv_pipe.c free_pipe_ntlmssp_auth_data(&p->auth);
auth 1200 source3/rpc_server/srv_pipe.c p->auth.a_u.auth_ntlmssp_state = a;
auth 1201 source3/rpc_server/srv_pipe.c p->auth.auth_data_free_func = &free_pipe_ntlmssp_auth_data;
auth 1202 source3/rpc_server/srv_pipe.c p->auth.auth_type = PIPE_AUTH_TYPE_SPNEGO_NTLMSSP;
auth 1219 source3/rpc_server/srv_pipe.c p->auth.a_u.auth_ntlmssp_state = NULL;
auth 1236 source3/rpc_server/srv_pipe.c AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state;
auth 1247 source3/rpc_server/srv_pipe.c if (p->auth.auth_type != PIPE_AUTH_TYPE_SPNEGO_NTLMSSP || !a) {
auth 1312 source3/rpc_server/srv_pipe.c free_pipe_ntlmssp_auth_data(&p->auth);
auth 1313 source3/rpc_server/srv_pipe.c p->auth.a_u.auth_ntlmssp_state = NULL;
auth 1353 source3/rpc_server/srv_pipe.c p->auth.a_u.schannel_auth = talloc(p, struct schannel_auth_struct);
auth 1354 source3/rpc_server/srv_pipe.c if (!p->auth.a_u.schannel_auth) {
auth 1359 source3/rpc_server/srv_pipe.c memset(p->auth.a_u.schannel_auth->sess_key, 0, sizeof(p->auth.a_u.schannel_auth->sess_key));
auth 1360 source3/rpc_server/srv_pipe.c memcpy(p->auth.a_u.schannel_auth->sess_key, pdcinfo->sess_key,
auth 1365 source3/rpc_server/srv_pipe.c p->auth.a_u.schannel_auth->seq_num = 0;
auth 1419 source3/rpc_server/srv_pipe.c p->auth.auth_data_free_func = NULL;
auth 1420 source3/rpc_server/srv_pipe.c p->auth.auth_type = PIPE_AUTH_TYPE_SCHANNEL;
auth 1486 source3/rpc_server/srv_pipe.c p->auth.a_u.auth_ntlmssp_state = a;
auth 1487 source3/rpc_server/srv_pipe.c p->auth.auth_data_free_func = &free_pipe_ntlmssp_auth_data;
auth 1488 source3/rpc_server/srv_pipe.c p->auth.auth_type = PIPE_AUTH_TYPE_NTLMSSP;
auth 1503 source3/rpc_server/srv_pipe.c free_pipe_ntlmssp_auth_data(&p->auth);
auth 1504 source3/rpc_server/srv_pipe.c p->auth.a_u.auth_ntlmssp_state = NULL;
auth 1649 source3/rpc_server/srv_pipe.c p->auth.auth_level = PIPE_AUTH_LEVEL_INTEGRITY;
auth 1652 source3/rpc_server/srv_pipe.c p->auth.auth_level = PIPE_AUTH_LEVEL_PRIVACY;
auth 1688 source3/rpc_server/srv_pipe.c p->auth.auth_type = PIPE_AUTH_TYPE_NONE;
auth 1690 source3/rpc_server/srv_pipe.c p->auth.auth_level = PIPE_AUTH_LEVEL_NONE;
auth 1996 source3/rpc_server/srv_pipe.c AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state;
auth 2005 source3/rpc_server/srv_pipe.c if (p->auth.auth_level == PIPE_AUTH_LEVEL_NONE || p->auth.auth_level == PIPE_AUTH_LEVEL_CONNECT) {
auth 2053 source3/rpc_server/srv_pipe.c switch (p->auth.auth_level) {
auth 2165 source3/rpc_server/srv_pipe.c if (!schannel_decode(p->auth.a_u.schannel_auth,
auth 2166 source3/rpc_server/srv_pipe.c p->auth.auth_level,
auth 2185 source3/rpc_server/srv_pipe.c p->auth.a_u.schannel_auth->seq_num++;
auth 2251 source3/rpc_server/srv_pipe.c ((p->auth.auth_type == PIPE_AUTH_TYPE_NTLMSSP) ||
auth 2252 source3/rpc_server/srv_pipe.c (p->auth.auth_type == PIPE_AUTH_TYPE_SPNEGO_NTLMSSP))) {
auth 386 source3/rpc_server/srv_pipe_hnd.c switch(p->auth.auth_type) {
auth 412 source3/rpc_server/srv_pipe_hnd.c DEBUG(0,("process_request_pdu: unknown auth type %u set.\n", (unsigned int)p->auth.auth_type ));
auth 918 source3/rpc_server/srv_pipe_hnd.c if (p->auth.auth_data_free_func) {
auth 919 source3/rpc_server/srv_pipe_hnd.c (*p->auth.auth_data_free_func)(&p->auth);
auth 2837 source3/rpc_server/srv_samr_nt.c if (p->auth.auth_type != PIPE_AUTH_TYPE_NTLMSSP || p->auth.auth_type != PIPE_AUTH_TYPE_SPNEGO_NTLMSSP) {
auth 2841 source3/rpc_server/srv_samr_nt.c if (p->auth.auth_level != PIPE_AUTH_LEVEL_PRIVACY) {
auth 341 source3/rpcclient/rpcclient.c if ((tmp_set->rpc_pipe->auth->auth_type
auth 343 source3/rpcclient/rpcclient.c || (tmp_set->rpc_pipe->auth->auth_level
auth 552 source3/smbd/seal.c DATA_BLOB auth = data_blob_null;
auth 565 source3/smbd/seal.c if (!spnego_parse_auth(blob, &auth)) {
auth 570 source3/smbd/seal.c status = auth_ntlmssp_update(ec->auth_ntlmssp_state, auth, &auth_reply);
auth 571 source3/smbd/seal.c data_blob_free(&auth);
auth 848 source3/smbd/sesssetup.c DATA_BLOB auth = data_blob_null;
auth 853 source3/smbd/sesssetup.c if (!spnego_parse_auth(blob1, &auth)) {
auth 865 source3/smbd/sesssetup.c if (auth.data[0] == ASN1_APPLICATION(0)) {
auth 869 source3/smbd/sesssetup.c status = parse_spnego_mechanisms(auth, &secblob, &kerb_mech);
auth 887 source3/smbd/sesssetup.c data_blob_free(&auth);
auth 926 source3/smbd/sesssetup.c auth, &auth_reply);
auth 928 source3/smbd/sesssetup.c data_blob_free(&auth);
auth 194 source3/utils/net_ads.c d_printf("KDC server: %s\n", ads->auth.kdc_server );
auth 195 source3/utils/net_ads.c d_printf("Server time offset: %d\n", ads->auth.time_offset );
auth 253 source3/utils/net_ads.c SAFE_FREE(ads->auth.password);
auth 254 source3/utils/net_ads.c ads->auth.password = smb_xstrdup(c->opt_password);
auth 257 source3/utils/net_ads.c ads->auth.flags |= auth_flags;
auth 258 source3/utils/net_ads.c SAFE_FREE(ads->auth.user_name);
auth 259 source3/utils/net_ads.c ads->auth.user_name = smb_xstrdup(c->opt_user_name);
auth 266 source3/utils/net_ads.c if ((cp = strchr_m(ads->auth.user_name, '@'))!=0) {
auth 268 source3/utils/net_ads.c SAFE_FREE(ads->auth.realm);
auth 269 source3/utils/net_ads.c ads->auth.realm = smb_xstrdup(cp);
auth 270 source3/utils/net_ads.c strupper_m(ads->auth.realm);
auth 342 source3/utils/net_ads.c ads->auth.flags |= ADS_AUTH_NO_BIND;
auth 491 source3/utils/net_ads.c status = ads_krb5_set_password(ads->auth.kdc_server, upn, argv[1],
auth 492 source3/utils/net_ads.c ads->auth.time_offset);
auth 1319 source3/utils/net_ads.c if (asprintf( &ads_dns->auth.user_name, "%s$", global_myname()) == -1) {
auth 1322 source3/utils/net_ads.c ads_dns->auth.password = secrets_fetch_machine_password(
auth 1324 source3/utils/net_ads.c ads_dns->auth.realm = SMB_STRDUP( r->out.dns_domain_name );
auth 1325 source3/utils/net_ads.c strupper_m(ads_dns->auth.realm );
auth 1878 source3/utils/net_ads.c ret = kerberos_set_password(ads->auth.kdc_server, auth_principal,
auth 1879 source3/utils/net_ads.c auth_password, user, new_password, ads->auth.time_offset);
auth 1063 source3/utils/net_rpc_printer.c pipe_hnd->auth->user_name,
auth 1250 source3/utils/net_rpc_printer.c PRINTER_ALL_ACCESS, pipe_hnd->auth->user_name, &hnd))
auth 1853 source3/utils/net_rpc_printer.c pipe_hnd->auth->user_name,
auth 299 source3/utils/ntlm_auth.c fstrcpy(request.data.auth.user, user);
auth 300 source3/utils/ntlm_auth.c fstrcpy(request.data.auth.pass, pass);
auth 302 source3/utils/ntlm_auth.c strlcpy(request.data.auth.require_membership_of_sid,
auth 304 source3/utils/ntlm_auth.c sizeof(request.data.auth.require_membership_of_sid));
auth 312 source3/utils/ntlm_auth.c if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) {
auth 317 source3/utils/ntlm_auth.c response.data.auth.nt_status_string,
auth 318 source3/utils/ntlm_auth.c response.data.auth.error_string,
auth 319 source3/utils/ntlm_auth.c response.data.auth.nt_status);
auth 321 source3/utils/ntlm_auth.c if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) {
auth 326 source3/utils/ntlm_auth.c response.data.auth.nt_status_string,
auth 327 source3/utils/ntlm_auth.c response.data.auth.error_string,
auth 328 source3/utils/ntlm_auth.c response.data.auth.nt_status));
auth 405 source3/utils/ntlm_auth.c if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) {
auth 413 source3/utils/ntlm_auth.c nt_status = (NT_STATUS(response.data.auth.nt_status));
auth 416 source3/utils/ntlm_auth.c *error_string = smb_xstrdup(response.data.auth.error_string);
auth 422 source3/utils/ntlm_auth.c memcpy(lm_key, response.data.auth.first_8_lm_hash,
auth 423 source3/utils/ntlm_auth.c sizeof(response.data.auth.first_8_lm_hash));
auth 426 source3/utils/ntlm_auth.c memcpy(user_session_key, response.data.auth.user_session_key,
auth 427 source3/utils/ntlm_auth.c sizeof(response.data.auth.user_session_key));
auth 431 source3/utils/ntlm_auth.c *unix_name = SMB_STRDUP(response.data.auth.unix_username);
auth 499 source3/utils/ntlm_auth.c if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0))
auth 508 source3/utils/ntlm_auth.c nt_status = (NT_STATUS(response.data.auth.nt_status));
auth 512 source3/utils/ntlm_auth.c *error_string = smb_xstrdup(response.data.auth.error_string);
auth 82 source3/winbindd/idmap_ad.c expire = MIN(ads->auth.tgt_expire, ads->auth.tgs_expire);
auth 131 source3/winbindd/idmap_ad.c SAFE_FREE(ads->auth.password);
auth 132 source3/winbindd/idmap_ad.c ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), NULL, NULL);
auth 134 source3/winbindd/idmap_ad.c SAFE_FREE(ads->auth.realm);
auth 135 source3/winbindd/idmap_ad.c ads->auth.realm = SMB_STRDUP(lp_realm());
auth 116 source3/winbindd/idmap_adex/gc_util.c ads->auth.flags = ADS_AUTH_NO_BIND;
auth 81 source3/winbindd/idmap_adex/idmap_adex.c ads->auth.password =
auth 83 source3/winbindd/idmap_adex/idmap_adex.c ads->auth.realm = SMB_STRDUP(lp_realm());
auth 276 source3/winbindd/idmap_adex/likewise_cell.c ads->auth.password =
auth 278 source3/winbindd/idmap_adex/likewise_cell.c ads->auth.realm = SMB_STRDUP(lp_realm());
auth 55 source3/winbindd/winbindd_ads.c expire = MIN(ads->auth.tgt_expire, ads->auth.tgs_expire);
auth 83 source3/winbindd/winbindd_ads.c SAFE_FREE(ads->auth.password);
auth 84 source3/winbindd/winbindd_ads.c SAFE_FREE(ads->auth.realm);
auth 90 source3/winbindd/winbindd_ads.c if ( !pdb_get_trusteddom_pw( domain->name, &ads->auth.password, &sid, &last_set_time ) ) {
auth 94 source3/winbindd/winbindd_ads.c ads->auth.realm = SMB_STRDUP( ads->server.realm );
auth 95 source3/winbindd/winbindd_ads.c strupper_m( ads->auth.realm );
auth 100 source3/winbindd/winbindd_ads.c ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), NULL, NULL);
auth 109 source3/winbindd/winbindd_ads.c ads->auth.realm = SMB_STRDUP( our_domain->alt_name );
auth 110 source3/winbindd/winbindd_ads.c strupper_m( ads->auth.realm );
auth 113 source3/winbindd/winbindd_ads.c ads->auth.realm = SMB_STRDUP( lp_realm() );
auth 116 source3/winbindd/winbindd_ads.c ads->auth.renewable = WINBINDD_PAM_AUTH_KRB5_RENEW_TIME;
auth 194 source3/winbindd/winbindd_ccache_access.c DATA_BLOB initial, challenge, auth;
auth 262 source3/winbindd/winbindd_ccache_access.c initial, challenge, &auth);
auth 272 source3/winbindd/winbindd_ccache_access.c state->response.extra_data.data = smb_xmemdup(auth.data, auth.length);
auth 277 source3/winbindd/winbindd_ccache_access.c state->response.length += auth.length;
auth 278 source3/winbindd/winbindd_ccache_access.c state->response.data.ccache_ntlm_auth.auth_blob_len = auth.length;
auth 280 source3/winbindd/winbindd_ccache_access.c data_blob_free(&auth);
auth 1101 source3/winbindd/winbindd_cm.c ads->auth.flags |= ADS_AUTH_NO_BIND;
auth 2203 source3/winbindd/winbindd_cm.c conn->lsa_pipe_tcp->auth->auth_level == PIPE_AUTH_LEVEL_PRIVACY &&
auth 92 source3/winbindd/winbindd_misc.c state->response.data.auth.nt_status_string));
auth 40 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.logon_time =
auth 42 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.logoff_time =
auth 44 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.kickoff_time =
auth 46 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.pass_last_set_time =
auth 48 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.pass_can_change_time =
auth 50 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.pass_must_change_time =
auth 53 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.logon_count = info3->base.logon_count;
auth 54 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.bad_pw_count = info3->base.bad_password_count;
auth 56 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.user_rid = info3->base.rid;
auth 57 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.group_rid = info3->base.primary_gid;
auth 58 source3/winbindd/winbindd_pam.c sid_to_fstring(state->response.data.auth.info3.dom_sid, info3->base.domain_sid);
auth 60 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.num_groups = info3->base.groups.count;
auth 61 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.user_flgs = info3->base.user_flags;
auth 63 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.acct_flags = info3->base.acct_flags;
auth 64 source3/winbindd/winbindd_pam.c state->response.data.auth.info3.num_other_sids = info3->sidcount;
auth 66 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.info3.user_name,
auth 68 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.info3.full_name,
auth 70 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.info3.logon_script,
auth 72 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.info3.profile_path,
auth 74 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.info3.home_dir,
auth 76 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.info3.dir_drive,
auth 79 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.info3.logon_srv,
auth 81 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.info3.logon_dom,
auth 178 source3/winbindd/winbindd_pam.c fill_domain_username(state->response.data.auth.unix_username,
auth 182 source3/winbindd/winbindd_pam.c state->response.data.auth.unix_username));
auth 387 source3/winbindd/winbindd_pam.c r->data.auth.policy.min_length_password =
auth 389 source3/winbindd/winbindd_pam.c r->data.auth.policy.password_history =
auth 391 source3/winbindd/winbindd_pam.c r->data.auth.policy.password_properties =
auth 393 source3/winbindd/winbindd_pam.c r->data.auth.policy.expire =
auth 395 source3/winbindd/winbindd_pam.c r->data.auth.policy.min_passwordage =
auth 519 source3/winbindd/winbindd_pam.c const char *type = state->request.data.auth.krb5_cc_type;
auth 521 source3/winbindd/winbindd_pam.c state->response.data.auth.krb5ccname[0] = '\0';
auth 534 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.krb5ccname, cc);
auth 543 source3/winbindd/winbindd_pam.c uid = state->request.data.auth.uid;
auth 589 source3/winbindd/winbindd_pam.c state->request.data.auth.krb5_cc_type,
auth 590 source3/winbindd/winbindd_pam.c state->request.data.auth.uid,
auth 602 source3/winbindd/winbindd_pam.c time_offset = ads->auth.time_offset;
auth 609 source3/winbindd/winbindd_pam.c parse_domain_user(state->request.data.auth.user, name_domain, name_user);
auth 636 source3/winbindd/winbindd_pam.c state->request.data.auth.pass,
auth 668 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
auth 709 source3/winbindd/winbindd_pam.c if (!NT_STATUS_IS_OK(remove_ccache(state->request.data.auth.user))) {
auth 712 source3/winbindd/winbindd_pam.c state->request.data.auth.user));
auth 754 source3/winbindd/winbindd_pam.c memcpy(state->response.data.auth.user_session_key,
auth 756 source3/winbindd/winbindd_pam.c sizeof(state->response.data.auth.user_session_key)
auth 761 source3/winbindd/winbindd_pam.c memcpy(state->response.data.auth.first_8_lm_hash,
auth 763 source3/winbindd/winbindd_pam.c sizeof(state->response.data.auth.first_8_lm_hash)
auth 819 source3/winbindd/winbindd_pam.c state->request.data.auth.user
auth 820 source3/winbindd/winbindd_pam.c [sizeof(state->request.data.auth.user)-1]='\0';
auth 823 source3/winbindd/winbindd_pam.c state->request.data.auth.pass
auth 824 source3/winbindd/winbindd_pam.c [sizeof(state->request.data.auth.pass)-1]='\0';
auth 827 source3/winbindd/winbindd_pam.c state->request.data.auth.user));
auth 837 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
auth 847 source3/winbindd/winbindd_pam.c fstrcpy(mapped_user, state->request.data.auth.user);
auth 868 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
auth 869 source3/winbindd/winbindd_pam.c state->response.data.auth.nt_status_string,
auth 870 source3/winbindd/winbindd_pam.c state->response.data.auth.pam_error));
auth 901 source3/winbindd/winbindd_pam.c parse_domain_user(state->request.data.auth.user, name_domain, name_user);
auth 931 source3/winbindd/winbindd_pam.c E_md4hash(state->request.data.auth.pass, new_nt_pass);
auth 1020 source3/winbindd/winbindd_pam.c state->request.data.auth.krb5_cc_type,
auth 1021 source3/winbindd/winbindd_pam.c state->request.data.auth.uid,
auth 1047 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
auth 1072 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
auth 1073 source3/winbindd/winbindd_pam.c state->request.data.auth.pass,
auth 1120 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
auth 1144 source3/winbindd/winbindd_pam.c parse_domain_user(state->request.data.auth.user, name_domain, name_user);
auth 1151 source3/winbindd/winbindd_pam.c state->request.data.auth.user, name_domain, name_user, name_domain));
auth 1166 source3/winbindd/winbindd_pam.c state->request.data.auth.user, name_domain, name_user, name_domain));
auth 1227 source3/winbindd/winbindd_pam.c parse_domain_user(state->request.data.auth.user, name_domain, name_user);
auth 1247 source3/winbindd/winbindd_pam.c state->request.data.auth.pass,
auth 1268 source3/winbindd/winbindd_pam.c && SMBencrypt(state->request.data.auth.pass,
auth 1277 source3/winbindd/winbindd_pam.c SMBNTencrypt(state->request.data.auth.pass,
auth 1291 source3/winbindd/winbindd_pam.c state->request.data.auth.user, name_domain, name_user, name_domain));
auth 1471 source3/winbindd/winbindd_pam.c state->request.data.auth.user[sizeof(state->request.data.auth.user)-1]='\0';
auth 1474 source3/winbindd/winbindd_pam.c state->request.data.auth.pass[sizeof(state->request.data.auth.pass)-1]='\0';
auth 1477 source3/winbindd/winbindd_pam.c state->request.data.auth.user));
auth 1487 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
auth 1496 source3/winbindd/winbindd_pam.c mapped_user = state->request.data.auth.user;
auth 1501 source3/winbindd/winbindd_pam.c if ( mapped_user != state->request.data.auth.user ) {
auth 1503 source3/winbindd/winbindd_pam.c safe_strcpy( state->request.data.auth.user, domain_user,
auth 1504 source3/winbindd/winbindd_pam.c sizeof(state->request.data.auth.user)-1 );
auth 1650 source3/winbindd/winbindd_pam.c state->request.data.auth.require_membership_of_sid))) {
auth 1652 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
auth 1653 source3/winbindd/winbindd_pam.c state->request.data.auth.require_membership_of_sid));
auth 1665 source3/winbindd/winbindd_pam.c result = winbindd_add_memory_creds(state->request.data.auth.user,
auth 1667 source3/winbindd/winbindd_pam.c state->request.data.auth.pass);
auth 1677 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
auth 1678 source3/winbindd/winbindd_pam.c state->request.data.auth.pass,
auth 1683 source3/winbindd/winbindd_pam.c winbindd_delete_memory_creds(state->request.data.auth.user);
auth 1728 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
auth 1729 source3/winbindd/winbindd_pam.c state->response.data.auth.nt_status_string,
auth 1730 source3/winbindd/winbindd_pam.c state->response.data.auth.pam_error));
auth 1765 source3/winbindd/winbindd_pam.c fstrcpy(state->response.data.auth.error_string, error_string);
auth 1802 source3/winbindd/winbindd_pam.c state->response.data.auth.nt_status_string,
auth 1803 source3/winbindd/winbindd_pam.c state->response.data.auth.pam_error));
auth 2008 source3/winbindd/winbindd_pam.c state->response.data.auth.nt_status_string,
auth 2009 source3/winbindd/winbindd_pam.c state->response.data.auth.pam_error));
auth 2048 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
auth 2049 source3/winbindd/winbindd_pam.c state->response.data.auth.nt_status_string,
auth 2050 source3/winbindd/winbindd_pam.c state->response.data.auth.pam_error));
auth 2081 source3/winbindd/winbindd_pam.c state->request.data.auth.user));
auth 2093 source3/winbindd/winbindd_pam.c state->response.data.auth.reject_reason = Undefined;
auth 2117 source3/winbindd/winbindd_pam.c state->response.data.auth.reject_reason =
auth 2216 source3/winbindd/winbindd_pam.c state->response.data.auth.nt_status_string,
auth 2217 source3/winbindd/winbindd_pam.c state->response.data.auth.pam_error));
auth 2281 source3/winbindd/winbindd_pam.c state->response.data.auth.nt_status_string,
auth 2282 source3/winbindd/winbindd_pam.c state->response.data.auth.pam_error));
auth 2386 source3/winbindd/winbindd_pam.c state->response.data.auth.nt_status_string,
auth 2387 source3/winbindd/winbindd_pam.c state->response.data.auth.pam_error));
auth 2495 source3/winbindd/winbindd_pam.c state->response.data.auth.nt_status_string,
auth 2496 source3/winbindd/winbindd_pam.c state->response.data.auth.pam_error));
auth 1691 source3/winbindd/winbindd_util.c resp->data.auth.nt_status = NT_STATUS_V(result);
auth 1692 source3/winbindd/winbindd_util.c fstrcpy(resp->data.auth.nt_status_string, nt_errstr(result));
auth 1695 source3/winbindd/winbindd_util.c if (*resp->data.auth.error_string == '\0')
auth 1696 source3/winbindd/winbindd_util.c fstrcpy(resp->data.auth.error_string,
auth 1698 source3/winbindd/winbindd_util.c resp->data.auth.pam_error = nt_status_to_pam(result);
auth 121 source4/auth/ntlm/auth_winbind.c nt_status = NT_STATUS(response.data.auth.nt_status);
auth 613 source4/client/smbmount.c FILE *auth;
auth 618 source4/client/smbmount.c if ((auth=sys_fopen(filename, "r")) == NULL)
auth 625 source4/client/smbmount.c while (!feof(auth))
auth 628 source4/client/smbmount.c if (!fgets (buf, sizeof(buf), auth))
auth 663 source4/client/smbmount.c fclose(auth);
auth 346 source4/heimdal/kdc/kerberos4.c krb5_data auth;
auth 355 source4/heimdal/kdc/kerberos4.c krb5_data_zero(&auth);
auth 409 source4/heimdal/kdc/kerberos4.c auth.data = buf;
auth 410 source4/heimdal/kdc/kerberos4.c auth.length = pos;
auth 417 source4/heimdal/kdc/kerberos4.c ret = _krb5_krb_rd_req(context, &auth, "krbtgt", realm,
auth 940 source4/heimdal/kdc/krb5tgs.c krb5_authenticator auth;
auth 947 source4/heimdal/kdc/krb5tgs.c krb5_auth_con_getauthenticator(context, ac, &auth);
auth 948 source4/heimdal/kdc/krb5tgs.c if(auth->cksum == NULL){
auth 959 source4/heimdal/kdc/krb5tgs.c !krb5_checksum_is_keyed(context, auth->cksum->cksumtype)
auth 962 source4/heimdal/kdc/krb5tgs.c !krb5_checksum_is_collision_proof(context, auth->cksum->cksumtype)) {
auth 964 source4/heimdal/kdc/krb5tgs.c auth->cksum->cksumtype);
auth 995 source4/heimdal/kdc/krb5tgs.c auth->cksum);
auth 1004 source4/heimdal/kdc/krb5tgs.c free_Authenticator(auth);
auth 1005 source4/heimdal/kdc/krb5tgs.c free(auth);
auth 1174 source4/heimdal/kdc/krb5tgs.c krb5_authenticator auth;
auth 1176 source4/heimdal/kdc/krb5tgs.c ret = krb5_auth_con_getauthenticator(context, ac, &auth);
auth 1180 source4/heimdal/kdc/krb5tgs.c krb5_free_authenticator(context, &auth);
auth 1184 source4/heimdal/kdc/krb5tgs.c **csec = auth->ctime;
auth 1187 source4/heimdal/kdc/krb5tgs.c krb5_free_authenticator(context, &auth);
auth 1191 source4/heimdal/kdc/krb5tgs.c **cusec = auth->cusec;
auth 1192 source4/heimdal/kdc/krb5tgs.c krb5_free_authenticator(context, &auth);
auth 112 source4/heimdal/lib/krb5/build_auth.c Authenticator *auth;
auth 119 source4/heimdal/lib/krb5/build_auth.c auth = calloc(1, sizeof(*auth));
auth 120 source4/heimdal/lib/krb5/build_auth.c if (auth == NULL) {
auth 125 source4/heimdal/lib/krb5/build_auth.c auth->authenticator_vno = 5;
auth 126 source4/heimdal/lib/krb5/build_auth.c copy_Realm(&cred->client->realm, &auth->crealm);
auth 127 source4/heimdal/lib/krb5/build_auth.c copy_PrincipalName(&cred->client->name, &auth->cname);
auth 129 source4/heimdal/lib/krb5/build_auth.c krb5_us_timeofday (context, &auth->ctime, &auth->cusec);
auth 131 source4/heimdal/lib/krb5/build_auth.c ret = krb5_auth_con_getlocalsubkey(context, auth_context, &auth->subkey);
auth 140 source4/heimdal/lib/krb5/build_auth.c ALLOC(auth->seq_number, 1);
auth 141 source4/heimdal/lib/krb5/build_auth.c if(auth->seq_number == NULL) {
auth 145 source4/heimdal/lib/krb5/build_auth.c *auth->seq_number = auth_context->local_seqnumber;
auth 147 source4/heimdal/lib/krb5/build_auth.c auth->seq_number = NULL;
auth 148 source4/heimdal/lib/krb5/build_auth.c auth->authorization_data = NULL;
auth 149 source4/heimdal/lib/krb5/build_auth.c auth->cksum = cksum;
auth 156 source4/heimdal/lib/krb5/build_auth.c ret = make_etypelist(context, &auth->authorization_data);
auth 163 source4/heimdal/lib/krb5/build_auth.c auth_context->authenticator->ctime = auth->ctime;
auth 164 source4/heimdal/lib/krb5/build_auth.c auth_context->authenticator->cusec = auth->cusec;
auth 166 source4/heimdal/lib/krb5/build_auth.c ASN1_MALLOC_ENCODE(Authenticator, buf, buf_size, auth, &len, ret);
auth 189 source4/heimdal/lib/krb5/build_auth.c *auth_result = auth;
auth 192 source4/heimdal/lib/krb5/build_auth.c auth->cksum = NULL;
auth 193 source4/heimdal/lib/krb5/build_auth.c free_Authenticator (auth);
auth 194 source4/heimdal/lib/krb5/build_auth.c free (auth);
auth 198 source4/heimdal/lib/krb5/build_auth.c free_Authenticator (auth);
auth 199 source4/heimdal/lib/krb5/build_auth.c free (auth);
auth 443 source4/heimdal/lib/krb5/get_cred.c self.auth = estrdup("Kerberos");
auth 447 source4/heimdal/lib/krb5/get_cred.c free(self.auth);
auth 453 source4/heimdal/lib/krb5/get_cred.c free(self.auth);
auth 468 source4/heimdal/lib/krb5/get_cred.c free(self.auth);
auth 473 source4/heimdal/lib/krb5/get_cred.c free(self.auth);
auth 72 source4/heimdal/lib/krb5/misc.c size = strlen(self->auth);
auth 73 source4/heimdal/lib/krb5/misc.c ssize = krb5_storage_write(sp, self->auth, size);
auth 181 source4/heimdal/lib/krb5/replay.c checksum_authenticator(Authenticator *auth, void *data)
auth 187 source4/heimdal/lib/krb5/replay.c MD5_Update (&md5, auth->crealm, strlen(auth->crealm));
auth 188 source4/heimdal/lib/krb5/replay.c for(i = 0; i < auth->cname.name_string.len; i++)
auth 189 source4/heimdal/lib/krb5/replay.c MD5_Update(&md5, auth->cname.name_string.val[i],
auth 190 source4/heimdal/lib/krb5/replay.c strlen(auth->cname.name_string.val[i]));
auth 191 source4/heimdal/lib/krb5/replay.c MD5_Update (&md5, &auth->ctime, sizeof(auth->ctime));
auth 192 source4/heimdal/lib/krb5/replay.c MD5_Update (&md5, &auth->cusec, sizeof(auth->cusec));
auth 724 source4/heimdal/lib/krb5/store.c krb5_store_authdata(krb5_storage *sp, krb5_authdata auth)
auth 728 source4/heimdal/lib/krb5/store.c ret = krb5_store_int32(sp, auth.len);
auth 730 source4/heimdal/lib/krb5/store.c for(i = 0; i < auth.len; i++){
auth 731 source4/heimdal/lib/krb5/store.c ret = krb5_store_int16(sp, auth.val[i].ad_type);
auth 733 source4/heimdal/lib/krb5/store.c ret = krb5_store_data(sp, auth.val[i].ad_data);
auth 740 source4/heimdal/lib/krb5/store.c krb5_ret_authdata(krb5_storage *sp, krb5_authdata *auth)
auth 748 source4/heimdal/lib/krb5/store.c ALLOC_SEQ(auth, tmp);
auth 749 source4/heimdal/lib/krb5/store.c if (auth->val == NULL && tmp != 0)
auth 754 source4/heimdal/lib/krb5/store.c auth->val[i].ad_type = tmp2;
auth 755 source4/heimdal/lib/krb5/store.c ret = krb5_ret_data(sp, &auth->val[i].ad_data);
auth 220 source4/librpc/rpc/dcerpc.c struct dcerpc_auth auth;
auth 271 source4/librpc/rpc/dcerpc.c ndr_err = ndr_pull_dcerpc_auth(ndr, NDR_SCALARS|NDR_BUFFERS, &auth);
auth 285 source4/librpc/rpc/dcerpc.c raw_packet->length - auth.credentials.length,
auth 286 source4/librpc/rpc/dcerpc.c &auth.credentials);
auth 298 source4/librpc/rpc/dcerpc.c raw_packet->length - auth.credentials.length,
auth 299 source4/librpc/rpc/dcerpc.c &auth.credentials);
auth 313 source4/librpc/rpc/dcerpc.c if (pkt->u.response.stub_and_verifier.length < auth.auth_pad_length) {
auth 316 source4/librpc/rpc/dcerpc.c pkt->u.response.stub_and_verifier.length -= auth.auth_pad_length;
auth 43 source4/rpc_server/dcesrv_auth.c struct dcesrv_auth *auth = &dce_conn->auth_state;
auth 85 source4/rpc_server/dcesrv_auth.c &auth->gensec_security);
auth 87 source4/rpc_server/dcesrv_auth.c status = gensec_start_mech_by_authtype(auth->gensec_security, auth->auth_info->auth_type,
auth 88 source4/rpc_server/dcesrv_auth.c auth->auth_info->auth_level);
auth 92 source4/rpc_server/dcesrv_auth.c (int)auth->auth_info->auth_type,
auth 93 source4/rpc_server/dcesrv_auth.c (int)auth->auth_info->auth_level,
auth 99 source4/rpc_server/dcesrv_auth.c gensec_want_feature(auth->gensec_security, GENSEC_FEATURE_SIGN_PKT_HEADER);
auth 290 source4/rpc_server/dcesrv_auth.c struct dcerpc_auth auth;
auth 348 source4/rpc_server/dcesrv_auth.c ndr_err = ndr_pull_dcerpc_auth(ndr, NDR_SCALARS|NDR_BUFFERS, &auth);
auth 362 source4/rpc_server/dcesrv_auth.c full_packet->length-auth.credentials.length,
auth 363 source4/rpc_server/dcesrv_auth.c &auth.credentials);
auth 375 source4/rpc_server/dcesrv_auth.c full_packet->length-auth.credentials.length,
auth 376 source4/rpc_server/dcesrv_auth.c &auth.credentials);
auth 390 source4/rpc_server/dcesrv_auth.c if (pkt->u.request.stub_and_verifier.length < auth.auth_pad_length) {
auth 394 source4/rpc_server/dcesrv_auth.c pkt->u.request.stub_and_verifier.length -= auth.auth_pad_length;
auth 588 source4/torture/rpc/netlogon.c struct netr_Authenticator auth, auth2;
auth 639 source4/torture/rpc/netlogon.c r.in.credential = &auth;
auth 650 source4/torture/rpc/netlogon.c creds_client_authenticator(creds, &auth);
auth 57 source4/torture/rpc/remote_pac.c struct netr_Authenticator auth, auth2;
auth 171 source4/torture/rpc/remote_pac.c creds_client_authenticator(creds, &auth);
auth 172 source4/torture/rpc/remote_pac.c r.in.credential = &auth;
auth 193 source4/torture/rpc/remote_pac.c creds_client_authenticator(creds, &auth);
auth 194 source4/torture/rpc/remote_pac.c r.in.credential = &auth;
auth 215 source4/torture/rpc/remote_pac.c creds_client_authenticator(creds, &auth);
auth 216 source4/torture/rpc/remote_pac.c r.in.credential = &auth;
auth 262 source4/torture/rpc/remote_pac.c creds_client_authenticator(creds, &auth);
auth 263 source4/torture/rpc/remote_pac.c r.in.credential = &auth;
auth 309 source4/torture/rpc/remote_pac.c creds_client_authenticator(creds, &auth);
auth 310 source4/torture/rpc/remote_pac.c r.in.credential = &auth;
auth 65 source4/torture/rpc/samlogon.c struct netr_Authenticator auth, auth2;
auth 156 source4/torture/rpc/samlogon.c creds_client_authenticator(samlogon_state->creds, &samlogon_state->auth);
auth 214 source4/torture/rpc/samlogon.c creds_client_authenticator(samlogon_state->creds, &samlogon_state->auth);
auth 1361 source4/torture/rpc/samlogon.c samlogon_state.r_flags.in.credential = &samlogon_state.auth;
auth 1379 source4/torture/rpc/samlogon.c samlogon_state.r.in.credential = &samlogon_state.auth;
auth 2684 source4/torture/rpc/samr.c struct netr_Authenticator auth, auth2;
auth 2737 source4/torture/rpc/samr.c r.in.credential = &auth;
auth 2747 source4/torture/rpc/samr.c creds_client_authenticator(creds, &auth);
auth 59 source4/torture/rpc/samsync.c struct netr_Authenticator auth, auth2;
auth 95 source4/torture/rpc/samsync.c r.in.credential = &auth;
auth 103 source4/torture/rpc/samsync.c creds_client_authenticator(creds, &auth);
auth 231 source4/torture/winbind/struct_based.c strlen(rep.data.auth.nt_status_string)>0,
auth 235 source4/torture/winbind/struct_based.c nt_errstr(NT_STATUS(rep.data.auth.nt_status)),
auth 236 source4/torture/winbind/struct_based.c rep.data.auth.nt_status_string,
auth 237 source4/torture/winbind/struct_based.c rep.data.auth.error_string,
auth 238 source4/torture/winbind/struct_based.c rep.data.auth.pam_error);
auth 243 source4/torture/winbind/struct_based.c NT_STATUS(rep.data.auth.nt_status),
auth 247 source4/torture/winbind/struct_based.c rep.data.auth.nt_status_string,
auth 252 source4/torture/winbind/struct_based.c rep.data.auth.error_string,
auth 257 source4/torture/winbind/struct_based.c rep.data.auth.pam_error,
auth 51 source4/winbind/wb_samba3_cmd.c WBSRV_SAMBA3_SET_STRING(resp->data.auth.nt_status_string,
auth 53 source4/winbind/wb_samba3_cmd.c WBSRV_SAMBA3_SET_STRING(resp->data.auth.error_string,
auth 56 source4/winbind/wb_samba3_cmd.c resp->data.auth.pam_error = nt_status_to_pam(status);
auth 57 source4/winbind/wb_samba3_cmd.c resp->data.auth.nt_status = NT_STATUS_V(status);
auth 536 source4/winbind/wb_samba3_cmd.c memcpy(s3call->response.data.auth.user_session_key,
auth 538 source4/winbind/wb_samba3_cmd.c sizeof(s3call->response.data.auth.user_session_key));
auth 547 source4/winbind/wb_samba3_cmd.c memcpy(s3call->response.data.auth.first_8_lm_hash,
auth 549 source4/winbind/wb_samba3_cmd.c sizeof(s3call->response.data.auth.first_8_lm_hash));
auth 579 source4/winbind/wb_samba3_cmd.c s3call->request.data.auth.user,
auth 592 source4/winbind/wb_samba3_cmd.c cli_credentials_set_password(credentials, s3call->request.data.auth.pass, CRED_SPECIFIED);