reply 89 examples/auth/crackcheck/crackcheck.c char *reply;
reply 132 examples/auth/crackcheck/crackcheck.c reply = FascistCheck(password, dictionary);
reply 133 examples/auth/crackcheck/crackcheck.c if (reply != NULL) {
reply 134 examples/auth/crackcheck/crackcheck.c fprintf(stderr, "ERR - %s\n\n", reply);
reply 65 nsswitch/pam_winbind.h #define _pam_drop_reply(/* struct pam_response * */ reply, /* int */ replies) \
reply 70 nsswitch/pam_winbind.h if (reply[reply_i].resp) { \
reply 71 nsswitch/pam_winbind.h _pam_overwrite(reply[reply_i].resp); \
reply 72 nsswitch/pam_winbind.h free(reply[reply_i].resp); \
reply 75 nsswitch/pam_winbind.h if (reply) \
reply 76 nsswitch/pam_winbind.h free(reply); \
reply 213 source3/auth/auth_ntlmssp.c const DATA_BLOB request, DATA_BLOB *reply)
reply 215 source3/auth/auth_ntlmssp.c return ntlmssp_update(auth_ntlmssp_state->ntlmssp_state, request, reply);
reply 119 source3/auth/pampass.c struct pam_response *reply = NULL;
reply 137 source3/auth/pampass.c reply = SMB_MALLOC_ARRAY(struct pam_response, num_msg);
reply 138 source3/auth/pampass.c if (!reply)
reply 141 source3/auth/pampass.c memset(reply, '\0', sizeof(struct pam_response) * num_msg);
reply 146 source3/auth/pampass.c reply[replies].resp_retcode = PAM_SUCCESS;
reply 147 source3/auth/pampass.c reply[replies].resp = COPY_STRING(udp->PAM_username);
reply 152 source3/auth/pampass.c reply[replies].resp_retcode = PAM_SUCCESS;
reply 153 source3/auth/pampass.c reply[replies].resp = COPY_STRING(udp->PAM_password);
reply 162 source3/auth/pampass.c reply[replies].resp_retcode = PAM_SUCCESS;
reply 163 source3/auth/pampass.c reply[replies].resp = NULL;
reply 168 source3/auth/pampass.c SAFE_FREE(reply);
reply 172 source3/auth/pampass.c if (reply)
reply 173 source3/auth/pampass.c *resp = reply;
reply 202 source3/auth/pampass.c fstring reply;
reply 212 source3/auth/pampass.c char *reply;
reply 242 source3/auth/pampass.c if (!next_token_talloc(frame, &p, &reply, NULL)) {
reply 246 source3/auth/pampass.c if (strequal(reply,".")) {
reply 247 source3/auth/pampass.c fstrcpy(reply,"");
reply 250 source3/auth/pampass.c special_char_sub(reply);
reply 251 source3/auth/pampass.c fstrcpy(t->reply, reply);
reply 252 source3/auth/pampass.c strlower_m(t->reply);
reply 253 source3/auth/pampass.c trim_char(t->reply, ' ', ' ');
reply 275 source3/auth/pampass.c struct pam_response *reply = NULL;
reply 303 source3/auth/pampass.c reply = SMB_MALLOC_ARRAY(struct pam_response, num_msg);
reply 304 source3/auth/pampass.c if (!reply) {
reply 324 source3/auth/pampass.c fstrcpy(current_reply, t->reply);
reply 330 source3/auth/pampass.c reply[replies].resp_retcode = PAM_SUCCESS;
reply 331 source3/auth/pampass.c reply[replies].resp = COPY_FSTRING(current_reply);
reply 340 source3/auth/pampass.c SAFE_FREE(reply);
reply 355 source3/auth/pampass.c fstrcpy(current_reply, t->reply);
reply 358 source3/auth/pampass.c reply[replies].resp_retcode = PAM_SUCCESS;
reply 359 source3/auth/pampass.c reply[replies].resp = COPY_FSTRING(current_reply);
reply 372 source3/auth/pampass.c SAFE_FREE(reply);
reply 382 source3/auth/pampass.c reply[replies].resp_retcode = PAM_SUCCESS;
reply 383 source3/auth/pampass.c reply[replies].resp = NULL;
reply 389 source3/auth/pampass.c SAFE_FREE(reply);
reply 395 source3/auth/pampass.c if (reply)
reply 396 source3/auth/pampass.c *resp = reply;
reply 1007 source3/include/includes.h krb5_data *reply);
reply 56 source3/include/proto.h const DATA_BLOB request, DATA_BLOB *reply) ;
reply 1717 source3/include/proto.h struct netlogon_samlogon_response **reply);
reply 2406 source3/include/proto.h struct netlogon_samlogon_response **reply);
reply 2826 source3/include/proto.h DATA_BLOB spnego_gen_auth_response(DATA_BLOB *reply, NTSTATUS nt_status,
reply 700 source3/lib/ctdbd_conn.c struct ctdb_reply_control *reply = NULL;
reply 755 source3/lib/ctdbd_conn.c status = ctdb_read_req(conn, req.hdr.reqid, NULL, (void *)&reply);
reply 762 source3/lib/ctdbd_conn.c if (reply->hdr.operation != CTDB_REPLY_CONTROL) {
reply 769 source3/lib/ctdbd_conn.c mem_ctx, reply->data, reply->datalen))) {
reply 770 source3/lib/ctdbd_conn.c TALLOC_FREE(reply);
reply 773 source3/lib/ctdbd_conn.c outdata->dsize = reply->datalen;
reply 776 source3/lib/ctdbd_conn.c (*cstatus) = reply->status;
reply 783 source3/lib/ctdbd_conn.c TALLOC_FREE(reply);
reply 894 source3/lib/ctdbd_conn.c struct ctdb_reply_call *reply;
reply 929 source3/lib/ctdbd_conn.c status = ctdb_read_req(conn, req.hdr.reqid, NULL, (void *)&reply);
reply 936 source3/lib/ctdbd_conn.c if (reply->hdr.operation != CTDB_REPLY_CALL) {
reply 945 source3/lib/ctdbd_conn.c TALLOC_FREE(reply);
reply 956 source3/lib/ctdbd_conn.c struct ctdb_reply_call *reply;
reply 988 source3/lib/ctdbd_conn.c status = ctdb_read_req(conn, req.hdr.reqid, NULL, (void *)&reply);
reply 995 source3/lib/ctdbd_conn.c if (reply->hdr.operation != CTDB_REPLY_CALL) {
reply 1001 source3/lib/ctdbd_conn.c data->dsize = reply->datalen;
reply 1007 source3/lib/ctdbd_conn.c data->dptr = (uint8 *)talloc_memdup(mem_ctx, &reply->data[0],
reply 1008 source3/lib/ctdbd_conn.c reply->datalen);
reply 1018 source3/lib/ctdbd_conn.c TALLOC_FREE(reply);
reply 613 source3/lib/ldb/tools/cmdline.c int handle_controls_reply(struct ldb_control **reply, struct ldb_control **request)
reply 618 source3/lib/ldb/tools/cmdline.c if (reply == NULL || request == NULL) return -1;
reply 620 source3/lib/ldb/tools/cmdline.c for (i = 0; reply[i]; i++) {
reply 621 source3/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_VLV_RESP_OID, reply[i]->oid) == 0) {
reply 624 source3/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_vlv_resp_control);
reply 646 source3/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_ASQ_OID, reply[i]->oid) == 0) {
reply 649 source3/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_asq_control);
reply 659 source3/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_PAGED_RESULTS_OID, reply[i]->oid) == 0) {
reply 662 source3/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_paged_control);
reply 691 source3/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_SORT_RESP_OID, reply[i]->oid) == 0) {
reply 694 source3/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_sort_resp_control);
reply 714 source3/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_DIRSYNC_OID, reply[i]->oid) == 0) {
reply 718 source3/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_dirsync_control);
reply 749 source3/lib/ldb/tools/cmdline.c fprintf(stderr, "Unknown reply control oid: %s\n", reply[i]->oid);
reply 53 source3/lib/ldb/tools/cmdline.h int handle_controls_reply(struct ldb_control **reply, struct ldb_control **request);
reply 115 source3/libads/cldap.c struct netlogon_samlogon_response **reply)
reply 235 source3/libads/cldap.c if (reply) {
reply 236 source3/libads/cldap.c *reply = r;
reply 252 source3/libads/cldap.c struct netlogon_samlogon_response **reply)
reply 271 source3/libads/cldap.c ret = recv_cldap_netlogon(mem_ctx, sock, nt_version, reply);
reply 291 source3/libads/cldap.c struct netlogon_samlogon_response *reply = NULL;
reply 294 source3/libads/cldap.c ret = ads_cldap_netlogon(mem_ctx, server, realm, nt_version, &reply);
reply 299 source3/libads/cldap.c if (reply->ntver != NETLOGON_NT_VERSION_5EX) {
reply 301 source3/libads/cldap.c reply->ntver));
reply 305 source3/libads/cldap.c *reply5 = reply->data.nt5_ex;
reply 46 source3/libads/kerberos.c memset(prompts[0].reply->data, '\0', prompts[0].reply->length);
reply 47 source3/libads/kerberos.c if (prompts[0].reply->length > 0) {
reply 49 source3/libads/kerberos.c strncpy(prompts[0].reply->data, (const char *)data,
reply 50 source3/libads/kerberos.c prompts[0].reply->length-1);
reply 51 source3/libads/kerberos.c prompts[0].reply->length = strlen(prompts[0].reply->data);
reply 53 source3/libads/kerberos.c prompts[0].reply->length = 0;
reply 703 source3/libads/krb5_setpw.c memset(prompts[0].reply->data, 0, prompts[0].reply->length);
reply 704 source3/libads/krb5_setpw.c if (prompts[0].reply->length > 0) {
reply 706 source3/libads/krb5_setpw.c strncpy((char *)prompts[0].reply->data,
reply 708 source3/libads/krb5_setpw.c prompts[0].reply->length-1);
reply 709 source3/libads/krb5_setpw.c prompts[0].reply->length = strlen((const char *)prompts[0].reply->data);
reply 711 source3/libads/krb5_setpw.c prompts[0].reply->length = 0;
reply 1626 source3/libsmb/clikrb5.c krb5_data *reply)
reply 1646 source3/libsmb/clikrb5.c return krb5_mk_error(context, &e, reply);
reply 1656 source3/libsmb/clikrb5.c reply);
reply 524 source3/libsmb/clispnego.c DATA_BLOB spnego_gen_auth_response(DATA_BLOB *reply, NTSTATUS nt_status,
reply 556 source3/libsmb/clispnego.c if (reply && reply->data != NULL) {
reply 558 source3/libsmb/clispnego.c asn1_write_OctetString(data, reply->data, reply->length);
reply 27 source3/libsmb/ntlmssp.c DATA_BLOB reply, DATA_BLOB *next_request);
reply 31 source3/libsmb/ntlmssp.c const DATA_BLOB reply, DATA_BLOB *next_request);
reply 33 source3/libsmb/ntlmssp.c const DATA_BLOB request, DATA_BLOB *reply);
reply 511 source3/libsmb/ntlmssp.c const DATA_BLOB request, DATA_BLOB *reply)
reply 603 source3/libsmb/ntlmssp.c msrpc_gen(reply, gen_string,
reply 630 source3/libsmb/ntlmssp.c const DATA_BLOB request, DATA_BLOB *reply)
reply 651 source3/libsmb/ntlmssp.c *reply = data_blob_null;
reply 960 source3/libsmb/ntlmssp.c DATA_BLOB reply, DATA_BLOB *next_request)
reply 995 source3/libsmb/ntlmssp.c const DATA_BLOB reply, DATA_BLOB *next_request)
reply 1010 source3/libsmb/ntlmssp.c if (!msrpc_parse(&reply, "CdBd",
reply 1016 source3/libsmb/ntlmssp.c dump_data(2, reply.data, reply.length);
reply 1048 source3/libsmb/ntlmssp.c if (!msrpc_parse(&reply, chal_parse_string,
reply 1057 source3/libsmb/ntlmssp.c dump_data(2, reply.data, reply.length);
reply 59 source3/pam_smbpass/support.c #define _pam_drop_reply(/* struct pam_response * */ reply, /* int */ replies) \
reply 64 source3/pam_smbpass/support.c if (reply[reply_i].resp) { \
reply 65 source3/pam_smbpass/support.c _pam_overwrite(reply[reply_i].resp); \
reply 66 source3/pam_smbpass/support.c free(reply[reply_i].resp); \
reply 69 source3/pam_smbpass/support.c if (reply) \
reply 70 source3/pam_smbpass/support.c free(reply); \
reply 608 source3/rpc_server/srv_pipe.c DATA_BLOB session_key, reply;
reply 616 source3/rpc_server/srv_pipe.c ZERO_STRUCT(reply);
reply 620 source3/rpc_server/srv_pipe.c status = auth_ntlmssp_update(a, *p_resp_blob, &reply);
reply 624 source3/rpc_server/srv_pipe.c data_blob_free(&reply);
reply 511 source3/rpc_server/srv_pipe_hnd.c bool reply = False;
reply 538 source3/rpc_server/srv_pipe_hnd.c reply = process_request_pdu(p, &rpc_in);
reply 570 source3/rpc_server/srv_pipe_hnd.c reply = api_pipe_bind_req(p, &rpc_in);
reply 587 source3/rpc_server/srv_pipe_hnd.c reply = api_pipe_alter_context(p, &rpc_in);
reply 601 source3/rpc_server/srv_pipe_hnd.c reply = api_pipe_bind_auth3(p, &rpc_in);
reply 616 source3/rpc_server/srv_pipe_hnd.c reply = True;
reply 624 source3/rpc_server/srv_pipe_hnd.c reply = setup_cancel_ack_reply(p, &rpc_in);
reply 633 source3/rpc_server/srv_pipe_hnd.c reply = True;
reply 644 source3/rpc_server/srv_pipe_hnd.c if (!reply) {
reply 4665 source3/smbd/lanman.c bool reply=False;
reply 4732 source3/smbd/lanman.c reply = api_commands[i].fn(conn,
reply 4741 source3/smbd/lanman.c reply = api_TooSmall(conn,vuid,params,data,mdrcnt,mprcnt,
reply 4746 source3/smbd/lanman.c if (!reply) {
reply 4747 source3/smbd/lanman.c reply = api_Unsupported(conn,vuid,params,tpscnt,data,tdscnt,mdrcnt,mprcnt,
reply 4752 source3/smbd/lanman.c if (reply) {
reply 184 source3/smbd/sesssetup.c krb5_data reply;
reply 212 source3/smbd/sesssetup.c host_princ, &reply);
reply 220 source3/smbd/sesssetup.c *pblob_out = data_blob(reply.data, reply.length);
reply 221 source3/smbd/sesssetup.c kerberos_free_data_contents(context,&reply);
reply 47 source3/utils/net_ads.c struct NETLOGON_SAM_LOGON_RESPONSE_EX reply;
reply 50 source3/utils/net_ads.c if ( !ads_cldap_netlogon_5(talloc_tos(), addr, ads->server.realm, &reply ) ) {
reply 59 source3/utils/net_ads.c switch (reply.command) {
reply 67 source3/utils/net_ads.c d_printf("0x%x\n", reply.command);
reply 71 source3/utils/net_ads.c d_printf("GUID: %s\n", GUID_string(talloc_tos(), &reply.domain_uuid));
reply 86 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_PDC) ? "yes" : "no",
reply 87 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_GC) ? "yes" : "no",
reply 88 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_LDAP) ? "yes" : "no",
reply 89 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_DS) ? "yes" : "no",
reply 90 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_KDC) ? "yes" : "no",
reply 91 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_TIMESERV) ? "yes" : "no",
reply 92 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_CLOSEST) ? "yes" : "no",
reply 93 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_WRITABLE) ? "yes" : "no",
reply 94 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_GOOD_TIMESERV) ? "yes" : "no",
reply 95 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_NDNC) ? "yes" : "no",
reply 96 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_SELECT_SECRET_DOMAIN_6) ? "yes" : "no",
reply 97 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_FULL_SECRET_DOMAIN_6) ? "yes" : "no");
reply 100 source3/utils/net_ads.c printf("Forest:\t\t\t%s\n", reply.forest);
reply 101 source3/utils/net_ads.c printf("Domain:\t\t\t%s\n", reply.dns_domain);
reply 102 source3/utils/net_ads.c printf("Domain Controller:\t%s\n", reply.pdc_dns_name);
reply 104 source3/utils/net_ads.c printf("Pre-Win2k Domain:\t%s\n", reply.domain);
reply 105 source3/utils/net_ads.c printf("Pre-Win2k Hostname:\t%s\n", reply.pdc_name);
reply 107 source3/utils/net_ads.c if (*reply.user_name) printf("User name:\t%s\n", reply.user_name);
reply 109 source3/utils/net_ads.c printf("Server Site Name :\t\t%s\n", reply.server_site);
reply 110 source3/utils/net_ads.c printf("Client Site Name :\t\t%s\n", reply.client_site);
reply 112 source3/utils/net_ads.c d_printf("NT Version: %d\n", reply.nt_version);
reply 113 source3/utils/net_ads.c d_printf("LMNT Token: %.2x\n", reply.lmnt_token);
reply 114 source3/utils/net_ads.c d_printf("LM20 Token: %.2x\n", reply.lm20_token);
reply 370 source3/utils/net_ads.c struct NETLOGON_SAM_LOGON_RESPONSE_EX reply;
reply 390 source3/utils/net_ads.c if ( !ads_cldap_netlogon_5(talloc_tos(), addr, ads->server.realm, &reply ) ) {
reply 396 source3/utils/net_ads.c d_printf("Workgroup: %s\n", reply.domain);
reply 675 source3/utils/ntlm_auth.c DATA_BLOB *reply)
reply 711 source3/utils/ntlm_auth.c if (reply) {
reply 712 source3/utils/ntlm_auth.c *reply = data_blob(wb_response.extra_data.data,
reply 715 source3/utils/ntlm_auth.c reply->data == NULL) {
reply 728 source3/utils/ntlm_auth.c DATA_BLOB request, reply;
reply 820 source3/utils/ntlm_auth.c nt_status = ntlmssp_update(state->ntlmssp_state, request, &reply);
reply 824 source3/utils/ntlm_auth.c reply);
reply 827 source3/utils/ntlm_auth.c data_blob_free(&reply);
reply 859 source3/utils/ntlm_auth.c DATA_BLOB request, reply;
reply 983 source3/utils/ntlm_auth.c &reply);
reply 986 source3/utils/ntlm_auth.c &reply);
reply 991 source3/utils/ntlm_auth.c reply);
reply 994 source3/utils/ntlm_auth.c state->initial_message = reply;
reply 998 source3/utils/ntlm_auth.c data_blob_free(&reply);
reply 1004 source3/utils/ntlm_auth.c reply);
reply 1491 source3/utils/ntlm_auth.c SPNEGO_DATA reply;
reply 1550 source3/utils/ntlm_auth.c ZERO_STRUCT(reply);
reply 1552 source3/utils/ntlm_auth.c reply.type = SPNEGO_NEG_TOKEN_INIT;
reply 1553 source3/utils/ntlm_auth.c reply.negTokenInit.mechTypes = my_mechs;
reply 1554 source3/utils/ntlm_auth.c reply.negTokenInit.reqFlags = 0;
reply 1555 source3/utils/ntlm_auth.c reply.negTokenInit.mechToken = tkt;
reply 1556 source3/utils/ntlm_auth.c reply.negTokenInit.mechListMIC = data_blob_null;
reply 1558 source3/utils/ntlm_auth.c len = write_spnego_data(&to_server, &reply);
reply 53 source3/winbindd/winbindd_ccache_access.c DATA_BLOB dummy_msg, reply;
reply 98 source3/winbindd/winbindd_ccache_access.c reply = data_blob_null;
reply 99 source3/winbindd/winbindd_ccache_access.c status = ntlmssp_update(ntlmssp_state, dummy_msg, &reply);
reply 101 source3/winbindd/winbindd_ccache_access.c data_blob_free(&reply);
reply 110 source3/winbindd/winbindd_ccache_access.c status = ntlmssp_update(ntlmssp_state, challenge_msg, &reply);
reply 115 source3/winbindd/winbindd_ccache_access.c data_blob_free(&reply);
reply 118 source3/winbindd/winbindd_ccache_access.c *auth_msg = reply;
reply 43 source4/auth/kerberos/krb5_init_context.c DATA_BLOB request, reply;
reply 116 source4/auth/kerberos/krb5_init_context.c smb_krb5->reply = blob;
reply 124 source4/auth/kerberos/krb5_init_context.c smb_krb5->reply = data;
reply 125 source4/auth/kerberos/krb5_init_context.c smb_krb5->reply.length -= 4;
reply 126 source4/auth/kerberos/krb5_init_context.c smb_krb5->reply.data += 4;
reply 300 source4/auth/kerberos/krb5_init_context.c smb_krb5->reply = data_blob(NULL, 0);
reply 331 source4/auth/kerberos/krb5_init_context.c while ((NT_STATUS_IS_OK(smb_krb5->status)) && !smb_krb5->reply.length) {
reply 348 source4/auth/kerberos/krb5_init_context.c ret = krb5_data_copy(recv_buf, smb_krb5->reply.data, smb_krb5->reply.length);
reply 157 source4/auth/ntlm/auth_unix.c struct pam_response **reply, void *appdata_ptr)
reply 163 source4/auth/ntlm/auth_unix.c *reply = NULL;
reply 173 source4/auth/ntlm/auth_unix.c *reply = NULL;
reply 181 source4/auth/ntlm/auth_unix.c *reply = malloc_array_p(struct pam_response, num_msg);
reply 182 source4/auth/ntlm/auth_unix.c if (*reply == NULL) {
reply 189 source4/auth/ntlm/auth_unix.c (*reply)[num].resp_retcode = PAM_SUCCESS;
reply 190 source4/auth/ntlm/auth_unix.c (*reply)[num].resp = COPY_STRING(info->account_name);
reply 194 source4/auth/ntlm/auth_unix.c (*reply)[num].resp_retcode = PAM_SUCCESS;
reply 195 source4/auth/ntlm/auth_unix.c (*reply)[num].resp = COPY_STRING(info->plaintext_password);
reply 199 source4/auth/ntlm/auth_unix.c (*reply)[num].resp_retcode = PAM_SUCCESS;
reply 200 source4/auth/ntlm/auth_unix.c (*reply)[num].resp = NULL;
reply 205 source4/auth/ntlm/auth_unix.c (*reply)[num].resp_retcode = PAM_SUCCESS;
reply 206 source4/auth/ntlm/auth_unix.c (*reply)[num].resp = NULL;
reply 212 source4/auth/ntlm/auth_unix.c SAFE_FREE((*reply)[num-1].resp);
reply 215 source4/auth/ntlm/auth_unix.c SAFE_FREE(*reply);
reply 216 source4/auth/ntlm/auth_unix.c *reply = NULL;
reply 80 source4/cldap_server/rootdse.c goto reply;
reply 88 source4/cldap_server/rootdse.c goto reply;
reply 93 source4/cldap_server/rootdse.c goto reply;
reply 99 source4/cldap_server/rootdse.c goto reply;
reply 111 source4/cldap_server/rootdse.c goto reply;
reply 129 source4/cldap_server/rootdse.c reply:
reply 160 source4/cldap_server/rootdse.c struct cldap_reply reply;
reply 166 source4/cldap_server/rootdse.c reply.messageid = message_id;
reply 167 source4/cldap_server/rootdse.c reply.dest = src;
reply 168 source4/cldap_server/rootdse.c reply.response = NULL;
reply 169 source4/cldap_server/rootdse.c reply.result = &result;
reply 171 source4/cldap_server/rootdse.c cldapd_rootdse_fill(cldapd, tmp_ctx, search, &reply.response, reply.result);
reply 173 source4/cldap_server/rootdse.c status = cldap_reply_send(cldap, &reply);
reply 195 source4/heimdal/kdc/524.c EncryptedData *reply)
reply 213 source4/heimdal/kdc/524.c reply);
reply 294 source4/heimdal/kdc/524.c const Ticket *t, krb5_data *reply,
reply 390 source4/heimdal/kdc/524.c ret = krb5_storage_to_data(sp, reply);
reply 391 source4/heimdal/kdc/524.c reply->length = krb5_storage_seek(sp, 0, SEEK_CUR);
reply 394 source4/heimdal/kdc/524.c krb5_data_zero(reply);
reply 204 source4/heimdal/kdc/digest.c const DigestREQ *req, krb5_data *reply,
reply 232 source4/heimdal/kdc/digest.c krb5_data_zero(reply);
reply 1417 source4/heimdal/kdc/digest.c ASN1_MALLOC_ENCODE(DigestREP, reply->data, reply->length, &rep, &size, ret);
reply 1422 source4/heimdal/kdc/digest.c if (size != reply->length)
reply 201 source4/heimdal/kdc/kaserver.c krb5_data *reply)
reply 216 source4/heimdal/kdc/kaserver.c krb5_storage_to_data (sp, reply);
reply 295 source4/heimdal/kdc/kaserver.c krb5_data *reply)
reply 359 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KAANSWERTOOLONG, reply);
reply 387 source4/heimdal/kdc/kaserver.c krb5_storage_to_data (sp, reply);
reply 439 source4/heimdal/kdc/kaserver.c krb5_data *reply)
reply 464 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KABADREQUEST, reply);
reply 482 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOENT, reply);
reply 492 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOENT, reply);
reply 501 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KAPWEXPIRED, reply);
reply 509 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOKEYS, reply);
reply 517 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOKEYS, reply);
reply 541 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KABADREQUEST, reply);
reply 550 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KACLOCKSKEW, reply);
reply 574 source4/heimdal/kdc/kaserver.c &ckey->key, reply);
reply 652 source4/heimdal/kdc/kaserver.c krb5_data *reply)
reply 685 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KABADREQUEST, reply);
reply 698 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOENT, reply);
reply 709 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOENT, reply);
reply 717 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOKEYS, reply);
reply 725 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOKEYS, reply);
reply 744 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KABADTICKET, reply);
reply 753 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KABADTICKET, reply);
reply 764 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KABADTICKET, reply);
reply 782 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOENT, reply);
reply 789 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOENT, reply);
reply 798 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KAPWEXPIRED, reply);
reply 849 source4/heimdal/kdc/kaserver.c &ad.session, reply);
reply 878 source4/heimdal/kdc/kaserver.c krb5_data *reply,
reply 925 source4/heimdal/kdc/kaserver.c do_authenticate (context, config, &hdr, sp, addr, from, reply);
reply 928 source4/heimdal/kdc/kaserver.c do_getticket (context, config, &hdr, sp, addr, from, reply);
reply 944 source4/heimdal/kdc/kaserver.c make_error_reply (&hdr, RXGEN_OPCODE, reply);
reply 58 source4/heimdal/kdc/kerberos4.c make_err_reply(krb5_context context, krb5_data *reply,
reply 62 source4/heimdal/kdc/kerberos4.c kdc_time, code, msg, reply);
reply 119 source4/heimdal/kdc/kerberos4.c #define RCHECK(X, L) if(X){make_err_reply(context, reply, KFAILURE, "Packet too short"); goto L;}
reply 132 source4/heimdal/kdc/kerberos4.c krb5_data *reply,
reply 154 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_GEN_ERR,
reply 164 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_PKT_VER, "protocol mismatch");
reply 201 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN,
reply 210 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN,
reply 221 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_NAME_EXP,
reply 232 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_NULL_KEY,
reply 249 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_NULL_KEY,
reply 257 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_NULL_KEY,
reply 265 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_NULL_KEY,
reply 282 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KFAILURE,
reply 302 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KFAILURE,
reply 321 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KFAILURE,
reply 335 source4/heimdal/kdc/kerberos4.c reply);
reply 367 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KFAILURE,
reply 380 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KFAILURE, s);
reply 390 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_AUTH_EXP,
reply 399 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_NULL_KEY,
reply 422 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, ret, "failed to parse request");
reply 445 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN,
reply 454 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN,
reply 462 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN,
reply 474 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN, s);
reply 483 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN, s);
reply 495 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN, s);
reply 505 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_NAME_EXP,
reply 514 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_NULL_KEY,
reply 550 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KFAILURE,
reply 570 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KFAILURE,
reply 588 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KFAILURE,
reply 602 source4/heimdal/kdc/kerberos4.c reply);
reply 620 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KFAILURE, "Unknown message type");
reply 265 source4/heimdal/kdc/kerberos5.c krb5_data *reply)
reply 364 source4/heimdal/kdc/kerberos5.c reply->data = buf;
reply 365 source4/heimdal/kdc/kerberos5.c reply->length = buf_size;
reply 968 source4/heimdal/kdc/kerberos5.c krb5_data *reply,
reply 1766 source4/heimdal/kdc/kerberos5.c reply_key, &e_text, reply);
reply 1773 source4/heimdal/kdc/kerberos5.c if (datagram_reply && reply->length > config->max_datagram_reply_length) {
reply 1774 source4/heimdal/kdc/kerberos5.c krb5_data_free(reply);
reply 1790 source4/heimdal/kdc/kerberos5.c reply);
reply 675 source4/heimdal/kdc/krb5tgs.c krb5_data *reply)
reply 911 source4/heimdal/kdc/krb5tgs.c serverkey, 0, &tgt->key, e_text, reply);
reply 1364 source4/heimdal/kdc/krb5tgs.c krb5_data *reply,
reply 1951 source4/heimdal/kdc/krb5tgs.c reply);
reply 292 source4/heimdal/kdc/kx509.c const Kx509Request *req, krb5_data *reply,
reply 306 source4/heimdal/kdc/kx509.c krb5_data_zero(reply);
reply 427 source4/heimdal/kdc/kx509.c ret = krb5_data_alloc(reply, data.length + sizeof(version_2_0));
reply 432 source4/heimdal/kdc/kx509.c memcpy(reply->data, version_2_0, sizeof(version_2_0));
reply 433 source4/heimdal/kdc/kx509.c memcpy(((unsigned char *)reply->data) + sizeof(version_2_0),
reply 62 source4/heimdal/kdc/process.c krb5_data *reply,
reply 82 source4/heimdal/kdc/process.c reply, from, addr, datagram_reply);
reply 86 source4/heimdal/kdc/process.c ret = _kdc_tgs_rep(context, config, &req, reply, from, addr, datagram_reply);
reply 90 source4/heimdal/kdc/process.c ret = _kdc_do_524(context, config, &ticket, reply, from, addr);
reply 94 source4/heimdal/kdc/process.c ret = _kdc_do_digest(context, config, &digestreq, reply, from, addr);
reply 98 source4/heimdal/kdc/process.c ret = _kdc_do_kx509(context, config, &kx509req, reply, from, addr);
reply 103 source4/heimdal/kdc/process.c ret = _kdc_do_version4(context, config, buf, len, reply, from,
reply 107 source4/heimdal/kdc/process.c ret = _kdc_do_kaserver(context, config, buf, len, reply, from,
reply 127 source4/heimdal/kdc/process.c krb5_data *reply,
reply 143 source4/heimdal/kdc/process.c reply, from, addr, datagram_reply);
reply 147 source4/heimdal/kdc/process.c ret = _kdc_tgs_rep(context, config, &req, reply, from, addr, datagram_reply);
reply 163 source4/heimdal/kdc/process.c const krb5_data *reply,
reply 204 source4/heimdal/kdc/process.c ret = der_get_tag (reply->data, reply->length,
reply 178 source4/heimdal/lib/hdb/db.c DB__get(krb5_context context, HDB *db, krb5_data key, krb5_data *reply)
reply 202 source4/heimdal/lib/hdb/db.c krb5_data_copy(reply, v.data, v.size);
reply 204 source4/heimdal/lib/hdb/ndbm.c NDBM__get(krb5_context context, HDB *db, krb5_data key, krb5_data *reply)
reply 220 source4/heimdal/lib/hdb/ndbm.c krb5_data_copy(reply, v.dptr, v.dsize);
reply 87 source4/heimdal/lib/hx509/hx509.h heim_octet_string reply;
reply 251 source4/heimdal/lib/hx509/ks_file.c prompt.reply.data = password;
reply 252 source4/heimdal/lib/hx509/ks_file.c prompt.reply.length = sizeof(password);
reply 429 source4/heimdal/lib/hx509/ks_p11.c prompt.reply.data = pin;
reply 430 source4/heimdal/lib/hx509/ks_p11.c prompt.reply.length = sizeof(pin);
reply 188 source4/heimdal/lib/hx509/lock.c if(UI_UTIL_read_pw_string(prompter->reply.data,
reply 189 source4/heimdal/lib/hx509/lock.c prompter->reply.length,
reply 194 source4/heimdal/lib/hx509/lock.c char *s = prompter->reply.data;
reply 198 source4/heimdal/lib/hx509/lock.c if(fgets(prompter->reply.data,
reply 199 source4/heimdal/lib/hx509/lock.c prompter->reply.length,
reply 280 source4/heimdal/lib/krb5/changepw.c u_char reply[1024 * 3];
reply 288 source4/heimdal/lib/krb5/changepw.c while (len < sizeof(reply)) {
reply 291 source4/heimdal/lib/krb5/changepw.c ret = recvfrom (sock, reply + len, sizeof(reply) - len,
reply 306 source4/heimdal/lib/krb5/changepw.c _krb5_get_int(reply, &size, 4);
reply 309 source4/heimdal/lib/krb5/changepw.c memmove(reply, reply + 4, size);
reply 313 source4/heimdal/lib/krb5/changepw.c if (len == sizeof(reply)) {
reply 320 source4/heimdal/lib/krb5/changepw.c ret = recvfrom (sock, reply, sizeof(reply), 0, NULL, NULL);
reply 338 source4/heimdal/lib/krb5/changepw.c pkt_len = (reply[0] << 8) | (reply[1]);
reply 339 source4/heimdal/lib/krb5/changepw.c pkt_ver = (reply[2] << 8) | (reply[3]);
reply 341 source4/heimdal/lib/krb5/changepw.c if ((pkt_len != len) || (reply[1] == 0x7e || reply[1] == 0x5e)) {
reply 348 source4/heimdal/lib/krb5/changepw.c ret = decode_KRB_ERROR(reply, len, &error, &size);
reply 384 source4/heimdal/lib/krb5/changepw.c ap_rep_data.data = reply + 6;
reply 385 source4/heimdal/lib/krb5/changepw.c ap_rep_data.length = (reply[4] << 8) | (reply[5]);
reply 387 source4/heimdal/lib/krb5/changepw.c if (reply + len < (u_char *)ap_rep_data.data + ap_rep_data.length) {
reply 439 source4/heimdal/lib/krb5/changepw.c ret = decode_KRB_ERROR(reply + 6, len - 6, &error, &size);
reply 67 source4/heimdal/lib/krb5/convert_creds.c krb5_data reply;
reply 92 source4/heimdal/lib/krb5/convert_creds.c &reply);
reply 97 source4/heimdal/lib/krb5/convert_creds.c sp = krb5_storage_from_mem(reply.data, reply.length);
reply 142 source4/heimdal/lib/krb5/convert_creds.c krb5_data_free(&reply);
reply 419 source4/heimdal/lib/krb5/init_creds_pw.c prompts[0].reply = &password_data[0];
reply 427 source4/heimdal/lib/krb5/init_creds_pw.c prompts[1].reply = &password_data[1];
reply 1524 source4/heimdal/lib/krb5/init_creds_pw.c prompt.reply = &password_data;
reply 610 source4/heimdal/lib/krb5/krb5.h krb5_data *reply;
reply 400 source4/heimdal/lib/krb5/log.c char **reply,
reply 429 source4/heimdal/lib/krb5/log.c if(reply == NULL)
reply 432 source4/heimdal/lib/krb5/log.c *reply = msg;
reply 451 source4/heimdal/lib/krb5/log.c char **reply,
reply 460 source4/heimdal/lib/krb5/log.c ret = krb5_vlog_msg(context, fac, reply, level, fmt, ap);
reply 47 source4/heimdal/lib/krb5/mk_error.c krb5_data *reply)
reply 86 source4/heimdal/lib/krb5/mk_error.c ASN1_MALLOC_ENCODE(KRB_ERROR, reply->data, reply->length, &msg, &len, ret);
reply 89 source4/heimdal/lib/krb5/mk_error.c if(reply->length != len)
reply 1461 source4/heimdal/lib/krb5/pkinit.c password_data.data = prompter->reply.data;
reply 1462 source4/heimdal/lib/krb5/pkinit.c password_data.length = prompter->reply.length;
reply 1466 source4/heimdal/lib/krb5/pkinit.c prompt.reply = &password_data;
reply 1481 source4/heimdal/lib/krb5/pkinit.c memset (prompter->reply.data, 0, prompter->reply.length);
reply 56 source4/heimdal/lib/krb5/prompter_posix.c if(UI_UTIL_read_pw_string(prompts[i].reply->data,
reply 57 source4/heimdal/lib/krb5/prompter_posix.c prompts[i].reply->length,
reply 62 source4/heimdal/lib/krb5/prompter_posix.c char *s = prompts[i].reply->data;
reply 66 source4/heimdal/lib/krb5/prompter_posix.c if(fgets(prompts[i].reply->data,
reply 67 source4/heimdal/lib/krb5/prompter_posix.c prompts[i].reply->length,
reply 646 source4/heimdal/lib/krb5/send_to_kdc.c const krb5_data *reply, int *action)
reply 651 source4/heimdal/lib/krb5/send_to_kdc.c if(krb5_rd_error(context, reply, &error))
reply 508 source4/heimdal/lib/roken/resolve.c unsigned char *reply = NULL;
reply 523 source4/heimdal/lib/roken/resolve.c if (reply) {
reply 524 source4/heimdal/lib/roken/resolve.c free(reply);
reply 525 source4/heimdal/lib/roken/resolve.c reply = NULL;
reply 539 source4/heimdal/lib/roken/resolve.c reply = malloc(size);
reply 540 source4/heimdal/lib/roken/resolve.c if (reply == NULL) {
reply 547 source4/heimdal/lib/roken/resolve.c len = res_nsearch(&state, domain, rr_class, rr_type, reply, size);
reply 549 source4/heimdal/lib/roken/resolve.c len = res_search(domain, rr_class, rr_type, reply, size);
reply 562 source4/heimdal/lib/roken/resolve.c free(reply);
reply 571 source4/heimdal/lib/roken/resolve.c r = parse_reply(reply, len);
reply 572 source4/heimdal/lib/roken/resolve.c free(reply);
reply 60 source4/kdc/kdc.c DATA_BLOB *reply,
reply 129 source4/kdc/kdc.c DATA_BLOB reply;
reply 170 source4/kdc/kdc.c &reply,
reply 185 source4/kdc/kdc.c rep->packet = reply;
reply 186 source4/kdc/kdc.c talloc_steal(rep, reply.data);
reply 229 source4/kdc/kdc.c DATA_BLOB input, reply;
reply 253 source4/kdc/kdc.c &reply,
reply 263 source4/kdc/kdc.c blob = data_blob_talloc(kdcconn, NULL, reply.length + 4);
reply 269 source4/kdc/kdc.c RSIVAL(blob.data, 0, reply.length);
reply 270 source4/kdc/kdc.c memcpy(blob.data + 4, reply.data, reply.length);
reply 321 source4/kdc/kdc.c DATA_BLOB *reply,
reply 343 source4/kdc/kdc.c *reply = data_blob(NULL, 0);
reply 347 source4/kdc/kdc.c *reply = data_blob_talloc(mem_ctx, k5_reply.data, k5_reply.length);
reply 350 source4/kdc/kdc.c *reply = data_blob(NULL, 0);
reply 40 source4/kdc/kdc.h DATA_BLOB *reply,
reply 178 source4/kdc/kpasswdd.c DATA_BLOB *reply)
reply 190 source4/kdc/kpasswdd.c reply);
reply 209 source4/kdc/kpasswdd.c reply);
reply 218 source4/kdc/kpasswdd.c DATA_BLOB *reply)
reply 228 source4/kdc/kpasswdd.c reply);
reply 245 source4/kdc/kpasswdd.c &password, reply);
reply 278 source4/kdc/kpasswdd.c reply);
reply 297 source4/kdc/kpasswdd.c reply);
reply 308 source4/kdc/kpasswdd.c reply);
reply 315 source4/kdc/kpasswdd.c reply);
reply 320 source4/kdc/kpasswdd.c &password, reply);
reply 329 source4/kdc/kpasswdd.c reply);
reply 339 source4/kdc/kpasswdd.c reply);
reply 354 source4/kdc/kpasswdd.c reply);
reply 367 source4/kdc/kpasswdd.c reply);
reply 415 source4/kdc/kpasswdd.c reply);
reply 423 source4/kdc/kpasswdd.c reply);
reply 431 source4/kdc/kpasswdd.c DATA_BLOB *reply,
reply 502 source4/kdc/kpasswdd.c goto reply;
reply 557 source4/kdc/kpasswdd.c goto reply;
reply 574 source4/kdc/kpasswdd.c goto reply;
reply 603 source4/kdc/kpasswdd.c goto reply;
reply 609 source4/kdc/kpasswdd.c reply:
reply 610 source4/kdc/kpasswdd.c *reply = data_blob_talloc(mem_ctx, NULL, krb_priv_rep.length + ap_rep.length + header_len);
reply 611 source4/kdc/kpasswdd.c if (!reply->data) {
reply 615 source4/kdc/kpasswdd.c RSSVAL(reply->data, 0, reply->length);
reply 616 source4/kdc/kpasswdd.c RSSVAL(reply->data, 2, 1); /* This is a version 1 reply, MS change/set or otherwise */
reply 617 source4/kdc/kpasswdd.c RSSVAL(reply->data, 4, ap_rep.length);
reply 618 source4/kdc/kpasswdd.c memcpy(reply->data + header_len,
reply 621 source4/kdc/kpasswdd.c memcpy(reply->data + header_len + ap_rep.length,
reply 38 source4/ldap_server/ldap_backend.c goto reply;\
reply 101 source4/ldap_server/ldap_backend.c struct ldapsrv_reply *reply;
reply 103 source4/ldap_server/ldap_backend.c reply = talloc(call, struct ldapsrv_reply);
reply 104 source4/ldap_server/ldap_backend.c if (!reply) {
reply 107 source4/ldap_server/ldap_backend.c reply->msg = talloc(reply, struct ldap_message);
reply 108 source4/ldap_server/ldap_backend.c if (reply->msg == NULL) {
reply 109 source4/ldap_server/ldap_backend.c talloc_free(reply);
reply 113 source4/ldap_server/ldap_backend.c reply->msg->messageid = call->request->messageid;
reply 114 source4/ldap_server/ldap_backend.c reply->msg->type = type;
reply 115 source4/ldap_server/ldap_backend.c reply->msg->controls = NULL;
reply 117 source4/ldap_server/ldap_backend.c return reply;
reply 120 source4/ldap_server/ldap_backend.c void ldapsrv_queue_reply(struct ldapsrv_call *call, struct ldapsrv_reply *reply)
reply 122 source4/ldap_server/ldap_backend.c DLIST_ADD_END(call->replies, reply, struct ldapsrv_reply *);
reply 127 source4/ldap_server/ldap_backend.c struct ldapsrv_reply *reply;
reply 132 source4/ldap_server/ldap_backend.c reply = ldapsrv_init_reply(call, LDAP_TAG_ExtendedResponse);
reply 133 source4/ldap_server/ldap_backend.c if (!reply) {
reply 137 source4/ldap_server/ldap_backend.c r = &reply->msg->r.ExtendedResponse;
reply 145 source4/ldap_server/ldap_backend.c ldapsrv_queue_reply(call, reply);
reply 205 source4/ldap_server/ldap_backend.c goto reply;
reply 234 source4/ldap_server/ldap_backend.c goto reply;
reply 268 source4/ldap_server/ldap_backend.c goto reply;
reply 309 source4/ldap_server/ldap_backend.c reply:
reply 388 source4/ldap_server/ldap_backend.c goto reply;
reply 410 source4/ldap_server/ldap_backend.c goto reply;
reply 420 source4/ldap_server/ldap_backend.c goto reply;
reply 423 source4/ldap_server/ldap_backend.c reply:
reply 498 source4/ldap_server/ldap_backend.c goto reply;
reply 506 source4/ldap_server/ldap_backend.c goto reply;
reply 512 source4/ldap_server/ldap_backend.c goto reply;
reply 515 source4/ldap_server/ldap_backend.c reply:
reply 560 source4/ldap_server/ldap_backend.c reply:
reply 614 source4/ldap_server/ldap_backend.c goto reply;
reply 625 source4/ldap_server/ldap_backend.c goto reply;
reply 639 source4/ldap_server/ldap_backend.c goto reply;
reply 643 source4/ldap_server/ldap_backend.c reply:
reply 697 source4/ldap_server/ldap_backend.c reply:
reply 34 source4/ldap_server/ldap_bind.c struct ldapsrv_reply *reply;
reply 58 source4/ldap_server/ldap_bind.c reply = ldapsrv_init_reply(call, LDAP_TAG_BindResponse);
reply 59 source4/ldap_server/ldap_bind.c if (!reply) {
reply 78 source4/ldap_server/ldap_bind.c errstr = talloc_asprintf(reply, "Simple Bind: Failed to advise ldb new credentials: %s", nt_errstr(status));
reply 84 source4/ldap_server/ldap_bind.c errstr = talloc_asprintf(reply, "Simple Bind Failed: %s", nt_errstr(status));
reply 87 source4/ldap_server/ldap_bind.c resp = &reply->msg->r.BindResponse;
reply 94 source4/ldap_server/ldap_bind.c ldapsrv_queue_reply(call, reply);
reply 117 source4/ldap_server/ldap_bind.c struct ldapsrv_reply *reply;
reply 126 source4/ldap_server/ldap_bind.c reply = ldapsrv_init_reply(call, LDAP_TAG_BindResponse);
reply 127 source4/ldap_server/ldap_bind.c if (!reply) {
reply 130 source4/ldap_server/ldap_bind.c resp = &reply->msg->r.BindResponse;
reply 153 source4/ldap_server/ldap_bind.c errstr = talloc_asprintf(reply, "SASL: Failed to start authentication system: %s",
reply 167 source4/ldap_server/ldap_bind.c errstr = talloc_asprintf(reply, "SASL:[%s]: Failed to start authentication backend: %s",
reply 181 source4/ldap_server/ldap_bind.c status = gensec_update(conn->gensec, reply,
reply 185 source4/ldap_server/ldap_bind.c resp->SASL.secblob = talloc(reply, DATA_BLOB);
reply 220 source4/ldap_server/ldap_bind.c errstr = talloc_asprintf(reply,
reply 234 source4/ldap_server/ldap_bind.c errstr = talloc_asprintf(reply,
reply 248 source4/ldap_server/ldap_bind.c errstr = talloc_asprintf(reply,
reply 259 source4/ldap_server/ldap_bind.c errstr = talloc_asprintf(reply, "SASL:[%s]: %s", req->creds.SASL.mechanism, nt_errstr(status));
reply 268 source4/ldap_server/ldap_bind.c ldapsrv_queue_reply(call, reply);
reply 275 source4/ldap_server/ldap_bind.c struct ldapsrv_reply *reply;
reply 293 source4/ldap_server/ldap_bind.c reply = ldapsrv_init_reply(call, LDAP_TAG_BindResponse);
reply 294 source4/ldap_server/ldap_bind.c if (!reply) {
reply 298 source4/ldap_server/ldap_bind.c resp = &reply->msg->r.BindResponse;
reply 301 source4/ldap_server/ldap_bind.c resp->response.errormessage = talloc_asprintf(reply, "Bad AuthenticationChoice [%d]", req->mechanism);
reply 305 source4/ldap_server/ldap_bind.c ldapsrv_queue_reply(call, reply);
reply 45 source4/ldap_server/ldap_extended.c struct ldapsrv_reply *reply,
reply 59 source4/ldap_server/ldap_extended.c (*errstr) = talloc_asprintf(reply, "START-TLS: TLS is already enabled on this LDAP session");
reply 72 source4/ldap_server/ldap_extended.c (*errstr) = talloc_asprintf(reply, "START-TLS: Failed to setup TLS socket");
reply 79 source4/ldap_server/ldap_extended.c reply->msg->r.ExtendedResponse.response.resultcode = LDAP_SUCCESS;
reply 80 source4/ldap_server/ldap_extended.c reply->msg->r.ExtendedResponse.response.errormessage = NULL;
reply 82 source4/ldap_server/ldap_extended.c ldapsrv_queue_reply(call, reply);
reply 88 source4/ldap_server/ldap_extended.c NTSTATUS (*fn)(struct ldapsrv_call *call, struct ldapsrv_reply *reply, const char **errorstr);
reply 104 source4/ldap_server/ldap_extended.c struct ldapsrv_reply *reply;
reply 112 source4/ldap_server/ldap_extended.c reply = ldapsrv_init_reply(call, LDAP_TAG_ExtendedResponse);
reply 113 source4/ldap_server/ldap_extended.c NT_STATUS_HAVE_NO_MEMORY(reply);
reply 115 source4/ldap_server/ldap_extended.c ZERO_STRUCT(reply->msg->r);
reply 116 source4/ldap_server/ldap_extended.c reply->msg->r.ExtendedResponse.oid = talloc_steal(reply, req->oid);
reply 117 source4/ldap_server/ldap_extended.c reply->msg->r.ExtendedResponse.response.resultcode = LDAP_PROTOCOL_ERROR;
reply 118 source4/ldap_server/ldap_extended.c reply->msg->r.ExtendedResponse.response.errormessage = NULL;
reply 128 source4/ldap_server/ldap_extended.c status = extended_ops[i].fn(call, reply, &error_str);
reply 135 source4/ldap_server/ldap_extended.c error_str = talloc_asprintf(reply, "Extended Operation(%s) failed: %s",
reply 141 source4/ldap_server/ldap_extended.c error_str = talloc_asprintf(reply, "Extended Operation(%s) not supported",
reply 145 source4/ldap_server/ldap_extended.c reply->msg->r.ExtendedResponse.response.resultcode = result;
reply 146 source4/ldap_server/ldap_extended.c reply->msg->r.ExtendedResponse.response.errormessage = error_str;
reply 148 source4/ldap_server/ldap_extended.c ldapsrv_queue_reply(call, reply);
reply 257 source4/lib/ldb/tools/cmdline.c int handle_controls_reply(struct ldb_control **reply, struct ldb_control **request)
reply 262 source4/lib/ldb/tools/cmdline.c if (reply == NULL || request == NULL) return -1;
reply 264 source4/lib/ldb/tools/cmdline.c for (i = 0; reply[i]; i++) {
reply 265 source4/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_VLV_RESP_OID, reply[i]->oid) == 0) {
reply 268 source4/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_vlv_resp_control);
reply 290 source4/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_ASQ_OID, reply[i]->oid) == 0) {
reply 293 source4/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_asq_control);
reply 303 source4/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_PAGED_RESULTS_OID, reply[i]->oid) == 0) {
reply 306 source4/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_paged_control);
reply 335 source4/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_SORT_RESP_OID, reply[i]->oid) == 0) {
reply 338 source4/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_sort_resp_control);
reply 358 source4/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_DIRSYNC_OID, reply[i]->oid) == 0) {
reply 362 source4/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_dirsync_control);
reply 393 source4/lib/ldb/tools/cmdline.c fprintf(stderr, "Unknown reply control oid: %s\n", reply[i]->oid);
reply 53 source4/lib/ldb/tools/cmdline.h int handle_controls_reply(struct ldb_control **reply, struct ldb_control **request);
reply 651 source4/libcli/cldap/cldap.c struct cldap_reply reply;
reply 654 source4/libcli/cldap/cldap.c reply.messageid = message_id;
reply 655 source4/libcli/cldap/cldap.c reply.dest = src;
reply 656 source4/libcli/cldap/cldap.c reply.response = NULL;
reply 657 source4/libcli/cldap/cldap.c reply.result = &result;
reply 661 source4/libcli/cldap/cldap.c status = cldap_reply_send(cldap, &reply);
reply 677 source4/libcli/cldap/cldap.c struct cldap_reply reply;
reply 680 source4/libcli/cldap/cldap.c reply.messageid = message_id;
reply 681 source4/libcli/cldap/cldap.c reply.dest = src;
reply 682 source4/libcli/cldap/cldap.c reply.response = NULL;
reply 683 source4/libcli/cldap/cldap.c reply.result = &result;
reply 689 source4/libcli/cldap/cldap.c status = cldap_reply_send(cldap, &reply);
reply 705 source4/libcli/cldap/cldap.c struct cldap_reply reply;
reply 716 source4/libcli/cldap/cldap.c reply.messageid = message_id;
reply 717 source4/libcli/cldap/cldap.c reply.dest = src;
reply 718 source4/libcli/cldap/cldap.c reply.response = &response;
reply 719 source4/libcli/cldap/cldap.c reply.result = &result;
reply 731 source4/libcli/cldap/cldap.c status = cldap_reply_send(cldap, &reply);
reply 60 source4/libcli/dgram/browse.c struct nbt_browse_packet *reply)
reply 69 source4/libcli/dgram/browse.c ndr_err = ndr_push_struct_blob(&blob, tmp_ctx, dgmsock->iconv_convenience, reply,
reply 131 source4/libcli/dgram/libdgram.h struct nbt_netlogon_response *reply);
reply 152 source4/libcli/dgram/libdgram.h struct nbt_browse_packet *reply);
reply 69 source4/libcli/dgram/netlogon.c struct nbt_netlogon_response *reply)
reply 78 source4/libcli/dgram/netlogon.c reply);
reply 84 source4/libcli/resolve/dns_ex.c struct dns_reply *reply;
reply 98 source4/libcli/resolve/dns_ex.c reply = dns_lookup(state->name.name, do_srv?"SRV":"A");
reply 99 source4/libcli/resolve/dns_ex.c if (!reply) {
reply 104 source4/libcli/resolve/dns_ex.c dns_srv_order(reply);
reply 108 source4/libcli/resolve/dns_ex.c for (rr=reply->head; rr; rr=rr->next) {
reply 163 source4/libcli/resolve/dns_ex.c for (rr=reply->head;rr;rr=rr->next) {
reply 205 source4/libcli/resolve/dns_ex.c for (rr=reply->head;rr;rr=rr->next) {
reply 801 source4/libcli/wrepl/winsrepl.c io->out.num_names = packet->message.replication.info.reply.num_names;
reply 808 source4/libcli/wrepl/winsrepl.c struct wrepl_wins_name *wname = &packet->message.replication.info.reply.names[i];
reply 40 source4/nbt_server/dgram/ntlogon.c struct nbt_ntlogon_packet reply;
reply 49 source4/nbt_server/dgram/ntlogon.c ZERO_STRUCT(reply);
reply 50 source4/nbt_server/dgram/ntlogon.c reply.command = NTLOGON_SAM_LOGON_REPLY;
reply 51 source4/nbt_server/dgram/ntlogon.c logon = &reply.req.reply;
reply 67 source4/nbt_server/dgram/ntlogon.c &reply);
reply 72 source4/ntp_signd/ntp_signd.c DATA_BLOB reply, blob;
reply 82 source4/ntp_signd/ntp_signd.c ndr_err = ndr_push_struct_blob(&reply, tmp_ctx,
reply 93 source4/ntp_signd/ntp_signd.c blob = data_blob_talloc(ntp_signdconn, NULL, reply.length + 4);
reply 99 source4/ntp_signd/ntp_signd.c RSIVAL(blob.data, 0, reply.length);
reply 100 source4/ntp_signd/ntp_signd.c memcpy(blob.data + 4, reply.data, reply.length);
reply 958 source4/rpc_server/dcerpc_server.c status = context->iface->reply(call, call, call->r);
reply 62 source4/rpc_server/dcerpc_server.h NTSTATUS (*reply)(struct dcesrv_call_state *, TALLOC_CTX *, void *);
reply 268 source4/rpc_server/remote/dcesrv_remote.c iface->reply = remote_op_reply;
reply 123 source4/smbd/service_named_pipe.c goto reply;
reply 130 source4/smbd/service_named_pipe.c goto reply;
reply 153 source4/smbd/service_named_pipe.c goto reply;
reply 165 source4/smbd/service_named_pipe.c goto reply;
reply 174 source4/smbd/service_named_pipe.c goto reply;
reply 177 source4/smbd/service_named_pipe.c reply:
reply 760 source4/torture/nbt/winsreplication.c send_reply = &repl_send.message.replication.info.reply;
reply 142 source4/torture/rpc/spoolss_notify.c .reply = spoolss__op_reply,
reply 192 source4/wrepl_server/wrepl_in_call.c struct wrepl_send_reply *reply_out = &call->rep_packet.message.replication.info.reply;