resp 48 nsswitch/libwbclient/wbc_pam.c const struct winbindd_response *resp,
resp 61 nsswitch/libwbclient/wbc_pam.c i->user_flags = resp->data.auth.info3.user_flgs;
resp 63 nsswitch/libwbclient/wbc_pam.c i->account_name = talloc_strdup(i, resp->data.auth.info3.user_name);
resp 66 nsswitch/libwbclient/wbc_pam.c i->full_name = talloc_strdup(i, resp->data.auth.info3.full_name);
resp 68 nsswitch/libwbclient/wbc_pam.c i->domain_name = talloc_strdup(i, resp->data.auth.info3.logon_dom);
resp 72 nsswitch/libwbclient/wbc_pam.c i->acct_flags = resp->data.auth.info3.acct_flags;
resp 74 nsswitch/libwbclient/wbc_pam.c resp->data.auth.user_session_key,
resp 77 nsswitch/libwbclient/wbc_pam.c resp->data.auth.first_8_lm_hash,
resp 80 nsswitch/libwbclient/wbc_pam.c i->logon_count = resp->data.auth.info3.logon_count;
resp 81 nsswitch/libwbclient/wbc_pam.c i->bad_password_count = resp->data.auth.info3.bad_pw_count;
resp 83 nsswitch/libwbclient/wbc_pam.c i->logon_time = resp->data.auth.info3.logon_time;
resp 84 nsswitch/libwbclient/wbc_pam.c i->logoff_time = resp->data.auth.info3.logoff_time;
resp 85 nsswitch/libwbclient/wbc_pam.c i->kickoff_time = resp->data.auth.info3.kickoff_time;
resp 86 nsswitch/libwbclient/wbc_pam.c i->pass_last_set_time = resp->data.auth.info3.pass_last_set_time;
resp 87 nsswitch/libwbclient/wbc_pam.c i->pass_can_change_time = resp->data.auth.info3.pass_can_change_time;
resp 88 nsswitch/libwbclient/wbc_pam.c i->pass_must_change_time= resp->data.auth.info3.pass_must_change_time;
resp 90 nsswitch/libwbclient/wbc_pam.c i->logon_server = talloc_strdup(i, resp->data.auth.info3.logon_srv);
resp 92 nsswitch/libwbclient/wbc_pam.c i->logon_script = talloc_strdup(i, resp->data.auth.info3.logon_script);
resp 94 nsswitch/libwbclient/wbc_pam.c i->profile_path = talloc_strdup(i, resp->data.auth.info3.profile_path);
resp 96 nsswitch/libwbclient/wbc_pam.c i->home_directory= talloc_strdup(i, resp->data.auth.info3.home_dir);
resp 98 nsswitch/libwbclient/wbc_pam.c i->home_drive = talloc_strdup(i, resp->data.auth.info3.dir_drive);
resp 102 nsswitch/libwbclient/wbc_pam.c i->num_sids += resp->data.auth.info3.num_groups;
resp 103 nsswitch/libwbclient/wbc_pam.c i->num_sids += resp->data.auth.info3.num_other_sids;
resp 108 nsswitch/libwbclient/wbc_pam.c wbc_status = wbcStringToSid(resp->data.auth.info3.dom_sid,
resp 125 nsswitch/libwbclient/wbc_pam.c resp->data.auth.info3.user_rid,
resp 129 nsswitch/libwbclient/wbc_pam.c resp->data.auth.info3.group_rid,
resp 133 nsswitch/libwbclient/wbc_pam.c p = (char *)resp->extra_data.data;
resp 139 nsswitch/libwbclient/wbc_pam.c for (j=0; j < resp->data.auth.info3.num_groups; j++) {
resp 163 nsswitch/libwbclient/wbc_pam.c for (j=0; j < resp->data.auth.info3.num_other_sids; j++) {
resp 208 nsswitch/libwbclient/wbc_pam.c const struct winbindd_response *resp,
resp 217 nsswitch/libwbclient/wbc_pam.c e->nt_status = resp->data.auth.nt_status;
resp 218 nsswitch/libwbclient/wbc_pam.c e->pam_error = resp->data.auth.pam_error;
resp 219 nsswitch/libwbclient/wbc_pam.c e->nt_string = talloc_strdup(e, resp->data.auth.nt_status_string);
resp 222 nsswitch/libwbclient/wbc_pam.c e->display_string = talloc_strdup(e, resp->data.auth.error_string);
resp 234 nsswitch/libwbclient/wbc_pam.c const struct winbindd_response *resp,
resp 243 nsswitch/libwbclient/wbc_pam.c i->min_passwordage = resp->data.auth.policy.min_passwordage;
resp 244 nsswitch/libwbclient/wbc_pam.c i->min_length_password = resp->data.auth.policy.min_length_password;
resp 245 nsswitch/libwbclient/wbc_pam.c i->password_history = resp->data.auth.policy.password_history;
resp 246 nsswitch/libwbclient/wbc_pam.c i->password_properties = resp->data.auth.policy.password_properties;
resp 247 nsswitch/libwbclient/wbc_pam.c i->expire = resp->data.auth.policy.expire;
resp 258 nsswitch/libwbclient/wbc_pam.c const struct winbindd_response *resp,
resp 267 nsswitch/libwbclient/wbc_pam.c wbc_status = wbc_create_auth_info(i, resp, &i->info);
resp 270 nsswitch/libwbclient/wbc_pam.c if (resp->data.auth.krb5ccname) {
resp 275 nsswitch/libwbclient/wbc_pam.c (uint8_t *)resp->data.auth.krb5ccname,
resp 276 nsswitch/libwbclient/wbc_pam.c strlen(resp->data.auth.krb5ccname)+1);
resp 280 nsswitch/libwbclient/wbc_pam.c if (resp->data.auth.unix_username) {
resp 285 nsswitch/libwbclient/wbc_pam.c (uint8_t *)resp->data.auth.unix_username,
resp 286 nsswitch/libwbclient/wbc_pam.c strlen(resp->data.auth.unix_username)+1);
resp 516 nsswitch/libwbclient/wbc_util.c const struct winbindd_response *resp,
resp 526 nsswitch/libwbclient/wbc_util.c i->dc_unc = talloc_strdup(i, resp->data.dsgetdcname.dc_unc);
resp 529 nsswitch/libwbclient/wbc_util.c i->dc_address = talloc_strdup(i, resp->data.dsgetdcname.dc_address);
resp 532 nsswitch/libwbclient/wbc_util.c i->dc_address_type = resp->data.dsgetdcname.dc_address_type;
resp 534 nsswitch/libwbclient/wbc_util.c wbc_status = wbcStringToGuid(resp->data.dsgetdcname.domain_guid, &guid);
resp 544 nsswitch/libwbclient/wbc_util.c i->domain_name = talloc_strdup(i, resp->data.dsgetdcname.domain_name);
resp 547 nsswitch/libwbclient/wbc_util.c if (resp->data.dsgetdcname.forest_name[0] != '\0') {
resp 549 nsswitch/libwbclient/wbc_util.c resp->data.dsgetdcname.forest_name);
resp 555 nsswitch/libwbclient/wbc_util.c i->dc_flags = resp->data.dsgetdcname.dc_flags;
resp 557 nsswitch/libwbclient/wbc_util.c if (resp->data.dsgetdcname.dc_site_name[0] != '\0') {
resp 559 nsswitch/libwbclient/wbc_util.c resp->data.dsgetdcname.dc_site_name);
resp 565 nsswitch/libwbclient/wbc_util.c if (resp->data.dsgetdcname.client_site_name[0] != '\0') {
resp 567 nsswitch/libwbclient/wbc_util.c resp->data.dsgetdcname.client_site_name);
resp 662 nsswitch/pam_winbind.c struct pam_response *resp;
resp 672 nsswitch/pam_winbind.c resp = NULL;
resp 673 nsswitch/pam_winbind.c retval = converse(ctx->pamh, 1, pmsg, &resp);
resp 675 nsswitch/pam_winbind.c if (resp) {
resp 676 nsswitch/pam_winbind.c _pam_drop_reply(resp, 1);
resp 810 nsswitch/pam_winbind.c struct pam_response *resp = NULL;
resp 818 nsswitch/pam_winbind.c ret = converse(ctx->pamh, 1, &pmsg, &resp);
resp 819 nsswitch/pam_winbind.c if (resp == NULL) {
resp 828 nsswitch/pam_winbind.c _pam_log(ctx, LOG_CRIT, "Received [%s] reply from application.\n", resp->resp);
resp 830 nsswitch/pam_winbind.c if (strcasecmp(resp->resp, "yes") == 0) {
resp 834 nsswitch/pam_winbind.c _pam_drop_reply(resp, 1);
resp 2158 nsswitch/pam_winbind.c struct pam_response *resp;
resp 2184 nsswitch/pam_winbind.c resp = NULL;
resp 2185 nsswitch/pam_winbind.c retval = converse(ctx->pamh, i, pmsg, &resp);
resp 2186 nsswitch/pam_winbind.c if (resp == NULL) {
resp 2193 nsswitch/pam_winbind.c _pam_drop_reply(resp, i);
resp 2199 nsswitch/pam_winbind.c token = x_strdup(resp[i - replies].resp);
resp 2210 nsswitch/pam_winbind.c if (!resp[i - 1].resp ||
resp 2211 nsswitch/pam_winbind.c strcmp(token, resp[i - 1].resp)) {
resp 2223 nsswitch/pam_winbind.c _pam_drop_reply(resp, i);
resp 70 nsswitch/pam_winbind.h if (reply[reply_i].resp) { \
resp 71 nsswitch/pam_winbind.h _pam_overwrite(reply[reply_i].resp); \
resp 72 nsswitch/pam_winbind.h free(reply[reply_i].resp); \
resp 115 source3/auth/pampass.c struct pam_response **resp,
resp 122 source3/auth/pampass.c *resp = NULL;
resp 147 source3/auth/pampass.c reply[replies].resp = COPY_STRING(udp->PAM_username);
resp 153 source3/auth/pampass.c reply[replies].resp = COPY_STRING(udp->PAM_password);
resp 163 source3/auth/pampass.c reply[replies].resp = NULL;
resp 173 source3/auth/pampass.c *resp = reply;
resp 271 source3/auth/pampass.c struct pam_response **resp,
resp 282 source3/auth/pampass.c *resp = NULL;
resp 331 source3/auth/pampass.c reply[replies].resp = COPY_FSTRING(current_reply);
resp 359 source3/auth/pampass.c reply[replies].resp = COPY_FSTRING(current_reply);
resp 383 source3/auth/pampass.c reply[replies].resp = NULL;
resp 396 source3/auth/pampass.c *resp = reply;
resp 102 source3/lib/ldb/modules/sort.c struct ldb_sort_resp_control *resp;
resp 126 source3/lib/ldb/modules/sort.c resp = talloc(controls[i], struct ldb_sort_resp_control);
resp 127 source3/lib/ldb/modules/sort.c if (! resp )
resp 130 source3/lib/ldb/modules/sort.c resp->result = result;
resp 131 source3/lib/ldb/modules/sort.c resp->attr_desc = talloc_strdup(resp, desc);
resp 133 source3/lib/ldb/modules/sort.c if (! resp->attr_desc )
resp 136 source3/lib/ldb/modules/sort.c controls[i]->data = resp;
resp 275 source3/lib/wb_reqtrans.c struct winbindd_response *resp = (struct winbindd_response *)buf;
resp 278 source3/lib/wb_reqtrans.c if (resp->length < sizeof(struct winbindd_response)) {
resp 281 source3/lib/wb_reqtrans.c (int)resp->length,
resp 286 source3/lib/wb_reqtrans.c return resp->length - buflen;
resp 478 source3/libaddns/dns.h struct dns_request **resp);
resp 162 source3/libaddns/dnsgss.c struct dns_request *resp;
resp 169 source3/libaddns/dnsgss.c err = dns_unmarshall_request(buf, buf, &resp);
resp 176 source3/libaddns/dnsgss.c if ((resp->num_additionals != 1) ||
resp 177 source3/libaddns/dnsgss.c (resp->num_answers == 0) ||
resp 178 source3/libaddns/dnsgss.c (resp->answers[0]->type != QTYPE_TKEY)) {
resp 184 source3/libaddns/dnsgss.c mem_ctx, resp->answers[0], &tkey);
resp 340 source3/libaddns/dnssock.c struct dns_request **resp)
resp 355 source3/libaddns/dnssock.c err = dns_unmarshall_request(mem_ctx, buf, resp);
resp 367 source3/libaddns/dnssock.c struct dns_request *resp;
resp 371 source3/libaddns/dnssock.c &resp);
resp 375 source3/libaddns/dnssock.c *up_resp = dns_request2update(resp);
resp 64 source3/pam_smbpass/support.c if (reply[reply_i].resp) { \
resp 65 source3/pam_smbpass/support.c _pam_overwrite(reply[reply_i].resp); \
resp 66 source3/pam_smbpass/support.c free(reply[reply_i].resp); \
resp 150 source3/pam_smbpass/support.c struct pam_response *resp;
resp 155 source3/pam_smbpass/support.c resp = NULL;
resp 157 source3/pam_smbpass/support.c return converse(pamh, ctrl, 1, pmsg, &resp);
resp 513 source3/pam_smbpass/support.c struct pam_response *resp;
resp 574 source3/pam_smbpass/support.c resp = NULL;
resp 576 source3/pam_smbpass/support.c retval = converse( pamh, ctrl, i, pmsg, &resp );
resp 578 source3/pam_smbpass/support.c if (resp != NULL) {
resp 584 source3/pam_smbpass/support.c token = smbpXstrDup(pamh, resp[j++].resp);
resp 588 source3/pam_smbpass/support.c if (!resp[j].resp || strcmp( token, resp[j].resp )) {
resp 602 source3/pam_smbpass/support.c _pam_drop_reply( resp, expect );
resp 49 source3/utils/net_dns.c struct dns_update_request *req, *resp;
resp 72 source3/utils/net_dns.c err = dns_update_transaction(mem_ctx, conn, req, &resp);
resp 75 source3/utils/net_dns.c if (dns_response_code(resp->flags) == DNS_NO_ERROR) {
resp 88 source3/utils/net_dns.c err = dns_update_transaction(mem_ctx, conn, req, &resp);
resp 91 source3/utils/net_dns.c if (dns_response_code(resp->flags) == DNS_NO_ERROR) {
resp 129 source3/utils/net_dns.c err = dns_update_transaction(mem_ctx, conn, req, &resp);
resp 132 source3/utils/net_dns.c err = (dns_response_code(resp->flags) == DNS_NO_ERROR) ?
resp 192 source3/utils/net_dns.c struct dns_request *req, *resp;
resp 201 source3/utils/net_dns.c err = dns_transaction(conn, conn, req, &resp);
resp 603 source3/winbindd/winbindd_proto.h void set_auth_errors(struct winbindd_response *resp, NTSTATUS result);
resp 1689 source3/winbindd/winbindd_util.c void set_auth_errors(struct winbindd_response *resp, NTSTATUS result)
resp 1691 source3/winbindd/winbindd_util.c resp->data.auth.nt_status = NT_STATUS_V(result);
resp 1692 source3/winbindd/winbindd_util.c fstrcpy(resp->data.auth.nt_status_string, nt_errstr(result));
resp 1695 source3/winbindd/winbindd_util.c if (*resp->data.auth.error_string == '\0')
resp 1696 source3/winbindd/winbindd_util.c fstrcpy(resp->data.auth.error_string,
resp 1698 source3/winbindd/winbindd_util.c resp->data.auth.pam_error = nt_status_to_pam(result);
resp 190 source4/auth/ntlm/auth_unix.c (*reply)[num].resp = COPY_STRING(info->account_name);
resp 195 source4/auth/ntlm/auth_unix.c (*reply)[num].resp = COPY_STRING(info->plaintext_password);
resp 200 source4/auth/ntlm/auth_unix.c (*reply)[num].resp = NULL;
resp 206 source4/auth/ntlm/auth_unix.c (*reply)[num].resp = NULL;
resp 212 source4/auth/ntlm/auth_unix.c SAFE_FREE((*reply)[num-1].resp);
resp 395 source4/heimdal/lib/gssapi/spnego/init_sec_context.c NegTokenResp resp;
resp 426 source4/heimdal/lib/gssapi/spnego/init_sec_context.c len, &resp, NULL);
resp 432 source4/heimdal/lib/gssapi/spnego/init_sec_context.c if (resp.negResult == NULL
resp 433 source4/heimdal/lib/gssapi/spnego/init_sec_context.c || *(resp.negResult) == reject
resp 437 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp);
resp 448 source4/heimdal/lib/gssapi/spnego/init_sec_context.c if (resp.supportedMech) {
resp 451 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp);
resp 457 source4/heimdal/lib/gssapi/spnego/init_sec_context.c resp.supportedMech,
resp 465 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp);
resp 481 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp);
resp 487 source4/heimdal/lib/gssapi/spnego/init_sec_context.c if ((resp.responseToken != NULL && resp.responseToken->length) ||
resp 491 source4/heimdal/lib/gssapi/spnego/init_sec_context.c if (resp.responseToken) {
resp 492 source4/heimdal/lib/gssapi/spnego/init_sec_context.c mech_input_token.length = resp.responseToken->length;
resp 493 source4/heimdal/lib/gssapi/spnego/init_sec_context.c mech_input_token.value = resp.responseToken->data;
resp 521 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp);
resp 529 source4/heimdal/lib/gssapi/spnego/init_sec_context.c } else if (*(resp.negResult) == accept_completed) {
resp 534 source4/heimdal/lib/gssapi/spnego/init_sec_context.c if (*(resp.negResult) == request_mic) {
resp 543 source4/heimdal/lib/gssapi/spnego/init_sec_context.c if (resp.mechListMIC != NULL) {
resp 550 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp);
resp 564 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp);
resp 572 source4/heimdal/lib/gssapi/spnego/init_sec_context.c if (resp.mechListMIC == NULL) {
resp 575 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp);
resp 579 source4/heimdal/lib/gssapi/spnego/init_sec_context.c mic_buf.length = resp.mechListMIC->length;
resp 580 source4/heimdal/lib/gssapi/spnego/init_sec_context.c mic_buf.value = resp.mechListMIC->data;
resp 592 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp);
resp 607 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp);
resp 270 source4/heimdal/lib/hx509/revoke.c OCSPResponse resp;
resp 276 source4/heimdal/lib/hx509/revoke.c ret = decode_OCSPResponse(data, length, &resp, &size);
resp 280 source4/heimdal/lib/hx509/revoke.c free_OCSPResponse(&resp);
resp 284 source4/heimdal/lib/hx509/revoke.c switch (resp.responseStatus) {
resp 288 source4/heimdal/lib/hx509/revoke.c free_OCSPResponse(&resp);
resp 292 source4/heimdal/lib/hx509/revoke.c if (resp.responseBytes == NULL) {
resp 293 source4/heimdal/lib/hx509/revoke.c free_OCSPResponse(&resp);
resp 297 source4/heimdal/lib/hx509/revoke.c ret = der_heim_oid_cmp(&resp.responseBytes->responseType,
resp 300 source4/heimdal/lib/hx509/revoke.c free_OCSPResponse(&resp);
resp 304 source4/heimdal/lib/hx509/revoke.c ret = decode_OCSPBasicOCSPResponse(resp.responseBytes->response.data,
resp 305 source4/heimdal/lib/hx509/revoke.c resp.responseBytes->response.length,
resp 309 source4/heimdal/lib/hx509/revoke.c free_OCSPResponse(&resp);
resp 312 source4/heimdal/lib/hx509/revoke.c if (size != resp.responseBytes->response.length) {
resp 313 source4/heimdal/lib/hx509/revoke.c free_OCSPResponse(&resp);
resp 317 source4/heimdal/lib/hx509/revoke.c free_OCSPResponse(&resp);
resp 406 source4/heimdal/lib/krb5/get_cred.c krb5_data resp;
resp 416 source4/heimdal/lib/krb5/get_cred.c krb5_data_zero(&resp);
resp 521 source4/heimdal/lib/krb5/get_cred.c &resp);
resp 528 source4/heimdal/lib/krb5/get_cred.c if(decode_TGS_REP(resp.data, resp.length, &rep.kdc_rep, &len) == 0) {
resp 561 source4/heimdal/lib/krb5/get_cred.c } else if(krb5_rd_error(context, &resp, &error) == 0) {
resp 564 source4/heimdal/lib/krb5/get_cred.c } else if(resp.data && ((char*)resp.data)[0] == 4) {
resp 576 source4/heimdal/lib/krb5/get_cred.c krb5_data_free(&resp);
resp 898 source4/heimdal/lib/krb5/get_in_tkt.c krb5_data req, resp;
resp 943 source4/heimdal/lib/krb5/get_in_tkt.c ret = krb5_sendto_kdc (context, &req, &creds->client->realm, &resp);
resp 949 source4/heimdal/lib/krb5/get_in_tkt.c ret = decode_AS_REP(resp.data, resp.length, &rep.kdc_rep, &size);
resp 955 source4/heimdal/lib/krb5/get_in_tkt.c ret2 = krb5_rd_error(context, &resp, &error);
resp 956 source4/heimdal/lib/krb5/get_in_tkt.c if(ret2 && resp.data && ((char*)resp.data)[0] == 4)
resp 958 source4/heimdal/lib/krb5/get_in_tkt.c krb5_data_free(&resp);
resp 983 source4/heimdal/lib/krb5/get_in_tkt.c krb5_data_free(&resp);
resp 1220 source4/heimdal/lib/krb5/init_creds_pw.c krb5_data resp;
resp 1289 source4/heimdal/lib/krb5/init_creds_pw.c creds->client->realm, &resp);
resp 1294 source4/heimdal/lib/krb5/init_creds_pw.c ret = decode_AS_REP(resp.data, resp.length, &rep.kdc_rep, &size);
resp 1296 source4/heimdal/lib/krb5/init_creds_pw.c krb5_data_free(&resp);
resp 1303 source4/heimdal/lib/krb5/init_creds_pw.c ret = krb5_rd_error(context, &resp, &error);
resp 1304 source4/heimdal/lib/krb5/init_creds_pw.c if(ret && resp.data && ((char*)resp.data)[0] == 4)
resp 1306 source4/heimdal/lib/krb5/init_creds_pw.c krb5_data_free(&resp);
resp 1341 source4/heimdal/lib/ntlm/ntlm.c unsigned char res[21], *resp;
resp 1369 source4/heimdal/lib/ntlm/ntlm.c resp = ntlm->data;
resp 1370 source4/heimdal/lib/ntlm/ntlm.c splitandenc(&res[0], ntlm2_sess_hash, resp + 0);
resp 1371 source4/heimdal/lib/ntlm/ntlm.c splitandenc(&res[7], ntlm2_sess_hash, resp + 8);
resp 1372 source4/heimdal/lib/ntlm/ntlm.c splitandenc(&res[14], ntlm2_sess_hash, resp + 16);
resp 35 source4/ldap_server/ldap_bind.c struct ldap_BindResponse *resp;
resp 87 source4/ldap_server/ldap_bind.c resp = &reply->msg->r.BindResponse;
resp 88 source4/ldap_server/ldap_bind.c resp->response.resultcode = result;
resp 89 source4/ldap_server/ldap_bind.c resp->response.errormessage = errstr;
resp 90 source4/ldap_server/ldap_bind.c resp->response.dn = NULL;
resp 91 source4/ldap_server/ldap_bind.c resp->response.referral = NULL;
resp 92 source4/ldap_server/ldap_bind.c resp->SASL.secblob = NULL;
resp 118 source4/ldap_server/ldap_bind.c struct ldap_BindResponse *resp;
resp 130 source4/ldap_server/ldap_bind.c resp = &reply->msg->r.BindResponse;
resp 185 source4/ldap_server/ldap_bind.c resp->SASL.secblob = talloc(reply, DATA_BLOB);
resp 186 source4/ldap_server/ldap_bind.c NT_STATUS_HAVE_NO_MEMORY(resp->SASL.secblob);
resp 187 source4/ldap_server/ldap_bind.c *resp->SASL.secblob = output;
resp 189 source4/ldap_server/ldap_bind.c resp->SASL.secblob = NULL;
resp 263 source4/ldap_server/ldap_bind.c resp->response.resultcode = result;
resp 264 source4/ldap_server/ldap_bind.c resp->response.dn = NULL;
resp 265 source4/ldap_server/ldap_bind.c resp->response.errormessage = errstr;
resp 266 source4/ldap_server/ldap_bind.c resp->response.referral = NULL;
resp 276 source4/ldap_server/ldap_bind.c struct ldap_BindResponse *resp;
resp 298 source4/ldap_server/ldap_bind.c resp = &reply->msg->r.BindResponse;
resp 299 source4/ldap_server/ldap_bind.c resp->response.resultcode = 7;
resp 300 source4/ldap_server/ldap_bind.c resp->response.dn = NULL;
resp 301 source4/ldap_server/ldap_bind.c resp->response.errormessage = talloc_asprintf(reply, "Bad AuthenticationChoice [%d]", req->mechanism);
resp 302 source4/ldap_server/ldap_bind.c resp->response.referral = NULL;
resp 303 source4/ldap_server/ldap_bind.c resp->SASL.secblob = NULL;
resp 64 source4/lib/ldb/modules/sort.c struct ldb_sort_resp_control *resp;
resp 88 source4/lib/ldb/modules/sort.c resp = talloc(controls[i], struct ldb_sort_resp_control);
resp 89 source4/lib/ldb/modules/sort.c if (! resp )
resp 92 source4/lib/ldb/modules/sort.c resp->result = result;
resp 93 source4/lib/ldb/modules/sort.c resp->attr_desc = talloc_strdup(resp, desc);
resp 95 source4/lib/ldb/modules/sort.c if (! resp->attr_desc )
resp 98 source4/lib/ldb/modules/sort.c controls[i]->data = resp;
resp 44 source4/winbind/wb_samba3_cmd.c struct winbindd_response *resp = &s3call->response;
resp 46 source4/winbind/wb_samba3_cmd.c resp->result = WINBINDD_ERROR;
resp 48 source4/winbind/wb_samba3_cmd.c resp->result = WINBINDD_OK;
resp 51 source4/winbind/wb_samba3_cmd.c WBSRV_SAMBA3_SET_STRING(resp->data.auth.nt_status_string,
resp 53 source4/winbind/wb_samba3_cmd.c WBSRV_SAMBA3_SET_STRING(resp->data.auth.error_string,
resp 56 source4/winbind/wb_samba3_cmd.c resp->data.auth.pam_error = nt_status_to_pam(status);
resp 57 source4/winbind/wb_samba3_cmd.c resp->data.auth.nt_status = NT_STATUS_V(status);
resp 69 source4/winbind/wb_samba3_cmd.c struct winbindd_response *resp = &s3call->response;
resp 71 source4/winbind/wb_samba3_cmd.c resp->result = WINBINDD_OK;
resp 73 source4/winbind/wb_samba3_cmd.c resp->result = WINBINDD_ERROR;