resp 48 nsswitch/libwbclient/wbc_pam.c const struct winbindd_response *resp, resp 61 nsswitch/libwbclient/wbc_pam.c i->user_flags = resp->data.auth.info3.user_flgs; resp 63 nsswitch/libwbclient/wbc_pam.c i->account_name = talloc_strdup(i, resp->data.auth.info3.user_name); resp 66 nsswitch/libwbclient/wbc_pam.c i->full_name = talloc_strdup(i, resp->data.auth.info3.full_name); resp 68 nsswitch/libwbclient/wbc_pam.c i->domain_name = talloc_strdup(i, resp->data.auth.info3.logon_dom); resp 72 nsswitch/libwbclient/wbc_pam.c i->acct_flags = resp->data.auth.info3.acct_flags; resp 74 nsswitch/libwbclient/wbc_pam.c resp->data.auth.user_session_key, resp 77 nsswitch/libwbclient/wbc_pam.c resp->data.auth.first_8_lm_hash, resp 80 nsswitch/libwbclient/wbc_pam.c i->logon_count = resp->data.auth.info3.logon_count; resp 81 nsswitch/libwbclient/wbc_pam.c i->bad_password_count = resp->data.auth.info3.bad_pw_count; resp 83 nsswitch/libwbclient/wbc_pam.c i->logon_time = resp->data.auth.info3.logon_time; resp 84 nsswitch/libwbclient/wbc_pam.c i->logoff_time = resp->data.auth.info3.logoff_time; resp 85 nsswitch/libwbclient/wbc_pam.c i->kickoff_time = resp->data.auth.info3.kickoff_time; resp 86 nsswitch/libwbclient/wbc_pam.c i->pass_last_set_time = resp->data.auth.info3.pass_last_set_time; resp 87 nsswitch/libwbclient/wbc_pam.c i->pass_can_change_time = resp->data.auth.info3.pass_can_change_time; resp 88 nsswitch/libwbclient/wbc_pam.c i->pass_must_change_time= resp->data.auth.info3.pass_must_change_time; resp 90 nsswitch/libwbclient/wbc_pam.c i->logon_server = talloc_strdup(i, resp->data.auth.info3.logon_srv); resp 92 nsswitch/libwbclient/wbc_pam.c i->logon_script = talloc_strdup(i, resp->data.auth.info3.logon_script); resp 94 nsswitch/libwbclient/wbc_pam.c i->profile_path = talloc_strdup(i, resp->data.auth.info3.profile_path); resp 96 nsswitch/libwbclient/wbc_pam.c i->home_directory= talloc_strdup(i, resp->data.auth.info3.home_dir); resp 98 nsswitch/libwbclient/wbc_pam.c i->home_drive = talloc_strdup(i, resp->data.auth.info3.dir_drive); resp 102 nsswitch/libwbclient/wbc_pam.c i->num_sids += resp->data.auth.info3.num_groups; resp 103 nsswitch/libwbclient/wbc_pam.c i->num_sids += resp->data.auth.info3.num_other_sids; resp 108 nsswitch/libwbclient/wbc_pam.c wbc_status = wbcStringToSid(resp->data.auth.info3.dom_sid, resp 125 nsswitch/libwbclient/wbc_pam.c resp->data.auth.info3.user_rid, resp 129 nsswitch/libwbclient/wbc_pam.c resp->data.auth.info3.group_rid, resp 133 nsswitch/libwbclient/wbc_pam.c p = (char *)resp->extra_data.data; resp 139 nsswitch/libwbclient/wbc_pam.c for (j=0; j < resp->data.auth.info3.num_groups; j++) { resp 163 nsswitch/libwbclient/wbc_pam.c for (j=0; j < resp->data.auth.info3.num_other_sids; j++) { resp 208 nsswitch/libwbclient/wbc_pam.c const struct winbindd_response *resp, resp 217 nsswitch/libwbclient/wbc_pam.c e->nt_status = resp->data.auth.nt_status; resp 218 nsswitch/libwbclient/wbc_pam.c e->pam_error = resp->data.auth.pam_error; resp 219 nsswitch/libwbclient/wbc_pam.c e->nt_string = talloc_strdup(e, resp->data.auth.nt_status_string); resp 222 nsswitch/libwbclient/wbc_pam.c e->display_string = talloc_strdup(e, resp->data.auth.error_string); resp 234 nsswitch/libwbclient/wbc_pam.c const struct winbindd_response *resp, resp 243 nsswitch/libwbclient/wbc_pam.c i->min_passwordage = resp->data.auth.policy.min_passwordage; resp 244 nsswitch/libwbclient/wbc_pam.c i->min_length_password = resp->data.auth.policy.min_length_password; resp 245 nsswitch/libwbclient/wbc_pam.c i->password_history = resp->data.auth.policy.password_history; resp 246 nsswitch/libwbclient/wbc_pam.c i->password_properties = resp->data.auth.policy.password_properties; resp 247 nsswitch/libwbclient/wbc_pam.c i->expire = resp->data.auth.policy.expire; resp 258 nsswitch/libwbclient/wbc_pam.c const struct winbindd_response *resp, resp 267 nsswitch/libwbclient/wbc_pam.c wbc_status = wbc_create_auth_info(i, resp, &i->info); resp 270 nsswitch/libwbclient/wbc_pam.c if (resp->data.auth.krb5ccname) { resp 275 nsswitch/libwbclient/wbc_pam.c (uint8_t *)resp->data.auth.krb5ccname, resp 276 nsswitch/libwbclient/wbc_pam.c strlen(resp->data.auth.krb5ccname)+1); resp 280 nsswitch/libwbclient/wbc_pam.c if (resp->data.auth.unix_username) { resp 285 nsswitch/libwbclient/wbc_pam.c (uint8_t *)resp->data.auth.unix_username, resp 286 nsswitch/libwbclient/wbc_pam.c strlen(resp->data.auth.unix_username)+1); resp 516 nsswitch/libwbclient/wbc_util.c const struct winbindd_response *resp, resp 526 nsswitch/libwbclient/wbc_util.c i->dc_unc = talloc_strdup(i, resp->data.dsgetdcname.dc_unc); resp 529 nsswitch/libwbclient/wbc_util.c i->dc_address = talloc_strdup(i, resp->data.dsgetdcname.dc_address); resp 532 nsswitch/libwbclient/wbc_util.c i->dc_address_type = resp->data.dsgetdcname.dc_address_type; resp 534 nsswitch/libwbclient/wbc_util.c wbc_status = wbcStringToGuid(resp->data.dsgetdcname.domain_guid, &guid); resp 544 nsswitch/libwbclient/wbc_util.c i->domain_name = talloc_strdup(i, resp->data.dsgetdcname.domain_name); resp 547 nsswitch/libwbclient/wbc_util.c if (resp->data.dsgetdcname.forest_name[0] != '\0') { resp 549 nsswitch/libwbclient/wbc_util.c resp->data.dsgetdcname.forest_name); resp 555 nsswitch/libwbclient/wbc_util.c i->dc_flags = resp->data.dsgetdcname.dc_flags; resp 557 nsswitch/libwbclient/wbc_util.c if (resp->data.dsgetdcname.dc_site_name[0] != '\0') { resp 559 nsswitch/libwbclient/wbc_util.c resp->data.dsgetdcname.dc_site_name); resp 565 nsswitch/libwbclient/wbc_util.c if (resp->data.dsgetdcname.client_site_name[0] != '\0') { resp 567 nsswitch/libwbclient/wbc_util.c resp->data.dsgetdcname.client_site_name); resp 662 nsswitch/pam_winbind.c struct pam_response *resp; resp 672 nsswitch/pam_winbind.c resp = NULL; resp 673 nsswitch/pam_winbind.c retval = converse(ctx->pamh, 1, pmsg, &resp); resp 675 nsswitch/pam_winbind.c if (resp) { resp 676 nsswitch/pam_winbind.c _pam_drop_reply(resp, 1); resp 810 nsswitch/pam_winbind.c struct pam_response *resp = NULL; resp 818 nsswitch/pam_winbind.c ret = converse(ctx->pamh, 1, &pmsg, &resp); resp 819 nsswitch/pam_winbind.c if (resp == NULL) { resp 828 nsswitch/pam_winbind.c _pam_log(ctx, LOG_CRIT, "Received [%s] reply from application.\n", resp->resp); resp 830 nsswitch/pam_winbind.c if (strcasecmp(resp->resp, "yes") == 0) { resp 834 nsswitch/pam_winbind.c _pam_drop_reply(resp, 1); resp 2158 nsswitch/pam_winbind.c struct pam_response *resp; resp 2184 nsswitch/pam_winbind.c resp = NULL; resp 2185 nsswitch/pam_winbind.c retval = converse(ctx->pamh, i, pmsg, &resp); resp 2186 nsswitch/pam_winbind.c if (resp == NULL) { resp 2193 nsswitch/pam_winbind.c _pam_drop_reply(resp, i); resp 2199 nsswitch/pam_winbind.c token = x_strdup(resp[i - replies].resp); resp 2210 nsswitch/pam_winbind.c if (!resp[i - 1].resp || resp 2211 nsswitch/pam_winbind.c strcmp(token, resp[i - 1].resp)) { resp 2223 nsswitch/pam_winbind.c _pam_drop_reply(resp, i); resp 70 nsswitch/pam_winbind.h if (reply[reply_i].resp) { \ resp 71 nsswitch/pam_winbind.h _pam_overwrite(reply[reply_i].resp); \ resp 72 nsswitch/pam_winbind.h free(reply[reply_i].resp); \ resp 115 source3/auth/pampass.c struct pam_response **resp, resp 122 source3/auth/pampass.c *resp = NULL; resp 147 source3/auth/pampass.c reply[replies].resp = COPY_STRING(udp->PAM_username); resp 153 source3/auth/pampass.c reply[replies].resp = COPY_STRING(udp->PAM_password); resp 163 source3/auth/pampass.c reply[replies].resp = NULL; resp 173 source3/auth/pampass.c *resp = reply; resp 271 source3/auth/pampass.c struct pam_response **resp, resp 282 source3/auth/pampass.c *resp = NULL; resp 331 source3/auth/pampass.c reply[replies].resp = COPY_FSTRING(current_reply); resp 359 source3/auth/pampass.c reply[replies].resp = COPY_FSTRING(current_reply); resp 383 source3/auth/pampass.c reply[replies].resp = NULL; resp 396 source3/auth/pampass.c *resp = reply; resp 102 source3/lib/ldb/modules/sort.c struct ldb_sort_resp_control *resp; resp 126 source3/lib/ldb/modules/sort.c resp = talloc(controls[i], struct ldb_sort_resp_control); resp 127 source3/lib/ldb/modules/sort.c if (! resp ) resp 130 source3/lib/ldb/modules/sort.c resp->result = result; resp 131 source3/lib/ldb/modules/sort.c resp->attr_desc = talloc_strdup(resp, desc); resp 133 source3/lib/ldb/modules/sort.c if (! resp->attr_desc ) resp 136 source3/lib/ldb/modules/sort.c controls[i]->data = resp; resp 275 source3/lib/wb_reqtrans.c struct winbindd_response *resp = (struct winbindd_response *)buf; resp 278 source3/lib/wb_reqtrans.c if (resp->length < sizeof(struct winbindd_response)) { resp 281 source3/lib/wb_reqtrans.c (int)resp->length, resp 286 source3/lib/wb_reqtrans.c return resp->length - buflen; resp 478 source3/libaddns/dns.h struct dns_request **resp); resp 162 source3/libaddns/dnsgss.c struct dns_request *resp; resp 169 source3/libaddns/dnsgss.c err = dns_unmarshall_request(buf, buf, &resp); resp 176 source3/libaddns/dnsgss.c if ((resp->num_additionals != 1) || resp 177 source3/libaddns/dnsgss.c (resp->num_answers == 0) || resp 178 source3/libaddns/dnsgss.c (resp->answers[0]->type != QTYPE_TKEY)) { resp 184 source3/libaddns/dnsgss.c mem_ctx, resp->answers[0], &tkey); resp 340 source3/libaddns/dnssock.c struct dns_request **resp) resp 355 source3/libaddns/dnssock.c err = dns_unmarshall_request(mem_ctx, buf, resp); resp 367 source3/libaddns/dnssock.c struct dns_request *resp; resp 371 source3/libaddns/dnssock.c &resp); resp 375 source3/libaddns/dnssock.c *up_resp = dns_request2update(resp); resp 64 source3/pam_smbpass/support.c if (reply[reply_i].resp) { \ resp 65 source3/pam_smbpass/support.c _pam_overwrite(reply[reply_i].resp); \ resp 66 source3/pam_smbpass/support.c free(reply[reply_i].resp); \ resp 150 source3/pam_smbpass/support.c struct pam_response *resp; resp 155 source3/pam_smbpass/support.c resp = NULL; resp 157 source3/pam_smbpass/support.c return converse(pamh, ctrl, 1, pmsg, &resp); resp 513 source3/pam_smbpass/support.c struct pam_response *resp; resp 574 source3/pam_smbpass/support.c resp = NULL; resp 576 source3/pam_smbpass/support.c retval = converse( pamh, ctrl, i, pmsg, &resp ); resp 578 source3/pam_smbpass/support.c if (resp != NULL) { resp 584 source3/pam_smbpass/support.c token = smbpXstrDup(pamh, resp[j++].resp); resp 588 source3/pam_smbpass/support.c if (!resp[j].resp || strcmp( token, resp[j].resp )) { resp 602 source3/pam_smbpass/support.c _pam_drop_reply( resp, expect ); resp 49 source3/utils/net_dns.c struct dns_update_request *req, *resp; resp 72 source3/utils/net_dns.c err = dns_update_transaction(mem_ctx, conn, req, &resp); resp 75 source3/utils/net_dns.c if (dns_response_code(resp->flags) == DNS_NO_ERROR) { resp 88 source3/utils/net_dns.c err = dns_update_transaction(mem_ctx, conn, req, &resp); resp 91 source3/utils/net_dns.c if (dns_response_code(resp->flags) == DNS_NO_ERROR) { resp 129 source3/utils/net_dns.c err = dns_update_transaction(mem_ctx, conn, req, &resp); resp 132 source3/utils/net_dns.c err = (dns_response_code(resp->flags) == DNS_NO_ERROR) ? resp 192 source3/utils/net_dns.c struct dns_request *req, *resp; resp 201 source3/utils/net_dns.c err = dns_transaction(conn, conn, req, &resp); resp 603 source3/winbindd/winbindd_proto.h void set_auth_errors(struct winbindd_response *resp, NTSTATUS result); resp 1689 source3/winbindd/winbindd_util.c void set_auth_errors(struct winbindd_response *resp, NTSTATUS result) resp 1691 source3/winbindd/winbindd_util.c resp->data.auth.nt_status = NT_STATUS_V(result); resp 1692 source3/winbindd/winbindd_util.c fstrcpy(resp->data.auth.nt_status_string, nt_errstr(result)); resp 1695 source3/winbindd/winbindd_util.c if (*resp->data.auth.error_string == '\0') resp 1696 source3/winbindd/winbindd_util.c fstrcpy(resp->data.auth.error_string, resp 1698 source3/winbindd/winbindd_util.c resp->data.auth.pam_error = nt_status_to_pam(result); resp 190 source4/auth/ntlm/auth_unix.c (*reply)[num].resp = COPY_STRING(info->account_name); resp 195 source4/auth/ntlm/auth_unix.c (*reply)[num].resp = COPY_STRING(info->plaintext_password); resp 200 source4/auth/ntlm/auth_unix.c (*reply)[num].resp = NULL; resp 206 source4/auth/ntlm/auth_unix.c (*reply)[num].resp = NULL; resp 212 source4/auth/ntlm/auth_unix.c SAFE_FREE((*reply)[num-1].resp); resp 395 source4/heimdal/lib/gssapi/spnego/init_sec_context.c NegTokenResp resp; resp 426 source4/heimdal/lib/gssapi/spnego/init_sec_context.c len, &resp, NULL); resp 432 source4/heimdal/lib/gssapi/spnego/init_sec_context.c if (resp.negResult == NULL resp 433 source4/heimdal/lib/gssapi/spnego/init_sec_context.c || *(resp.negResult) == reject resp 437 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp); resp 448 source4/heimdal/lib/gssapi/spnego/init_sec_context.c if (resp.supportedMech) { resp 451 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp); resp 457 source4/heimdal/lib/gssapi/spnego/init_sec_context.c resp.supportedMech, resp 465 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp); resp 481 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp); resp 487 source4/heimdal/lib/gssapi/spnego/init_sec_context.c if ((resp.responseToken != NULL && resp.responseToken->length) || resp 491 source4/heimdal/lib/gssapi/spnego/init_sec_context.c if (resp.responseToken) { resp 492 source4/heimdal/lib/gssapi/spnego/init_sec_context.c mech_input_token.length = resp.responseToken->length; resp 493 source4/heimdal/lib/gssapi/spnego/init_sec_context.c mech_input_token.value = resp.responseToken->data; resp 521 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp); resp 529 source4/heimdal/lib/gssapi/spnego/init_sec_context.c } else if (*(resp.negResult) == accept_completed) { resp 534 source4/heimdal/lib/gssapi/spnego/init_sec_context.c if (*(resp.negResult) == request_mic) { resp 543 source4/heimdal/lib/gssapi/spnego/init_sec_context.c if (resp.mechListMIC != NULL) { resp 550 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp); resp 564 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp); resp 572 source4/heimdal/lib/gssapi/spnego/init_sec_context.c if (resp.mechListMIC == NULL) { resp 575 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp); resp 579 source4/heimdal/lib/gssapi/spnego/init_sec_context.c mic_buf.length = resp.mechListMIC->length; resp 580 source4/heimdal/lib/gssapi/spnego/init_sec_context.c mic_buf.value = resp.mechListMIC->data; resp 592 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp); resp 607 source4/heimdal/lib/gssapi/spnego/init_sec_context.c free_NegTokenResp(&resp); resp 270 source4/heimdal/lib/hx509/revoke.c OCSPResponse resp; resp 276 source4/heimdal/lib/hx509/revoke.c ret = decode_OCSPResponse(data, length, &resp, &size); resp 280 source4/heimdal/lib/hx509/revoke.c free_OCSPResponse(&resp); resp 284 source4/heimdal/lib/hx509/revoke.c switch (resp.responseStatus) { resp 288 source4/heimdal/lib/hx509/revoke.c free_OCSPResponse(&resp); resp 292 source4/heimdal/lib/hx509/revoke.c if (resp.responseBytes == NULL) { resp 293 source4/heimdal/lib/hx509/revoke.c free_OCSPResponse(&resp); resp 297 source4/heimdal/lib/hx509/revoke.c ret = der_heim_oid_cmp(&resp.responseBytes->responseType, resp 300 source4/heimdal/lib/hx509/revoke.c free_OCSPResponse(&resp); resp 304 source4/heimdal/lib/hx509/revoke.c ret = decode_OCSPBasicOCSPResponse(resp.responseBytes->response.data, resp 305 source4/heimdal/lib/hx509/revoke.c resp.responseBytes->response.length, resp 309 source4/heimdal/lib/hx509/revoke.c free_OCSPResponse(&resp); resp 312 source4/heimdal/lib/hx509/revoke.c if (size != resp.responseBytes->response.length) { resp 313 source4/heimdal/lib/hx509/revoke.c free_OCSPResponse(&resp); resp 317 source4/heimdal/lib/hx509/revoke.c free_OCSPResponse(&resp); resp 406 source4/heimdal/lib/krb5/get_cred.c krb5_data resp; resp 416 source4/heimdal/lib/krb5/get_cred.c krb5_data_zero(&resp); resp 521 source4/heimdal/lib/krb5/get_cred.c &resp); resp 528 source4/heimdal/lib/krb5/get_cred.c if(decode_TGS_REP(resp.data, resp.length, &rep.kdc_rep, &len) == 0) { resp 561 source4/heimdal/lib/krb5/get_cred.c } else if(krb5_rd_error(context, &resp, &error) == 0) { resp 564 source4/heimdal/lib/krb5/get_cred.c } else if(resp.data && ((char*)resp.data)[0] == 4) { resp 576 source4/heimdal/lib/krb5/get_cred.c krb5_data_free(&resp); resp 898 source4/heimdal/lib/krb5/get_in_tkt.c krb5_data req, resp; resp 943 source4/heimdal/lib/krb5/get_in_tkt.c ret = krb5_sendto_kdc (context, &req, &creds->client->realm, &resp); resp 949 source4/heimdal/lib/krb5/get_in_tkt.c ret = decode_AS_REP(resp.data, resp.length, &rep.kdc_rep, &size); resp 955 source4/heimdal/lib/krb5/get_in_tkt.c ret2 = krb5_rd_error(context, &resp, &error); resp 956 source4/heimdal/lib/krb5/get_in_tkt.c if(ret2 && resp.data && ((char*)resp.data)[0] == 4) resp 958 source4/heimdal/lib/krb5/get_in_tkt.c krb5_data_free(&resp); resp 983 source4/heimdal/lib/krb5/get_in_tkt.c krb5_data_free(&resp); resp 1220 source4/heimdal/lib/krb5/init_creds_pw.c krb5_data resp; resp 1289 source4/heimdal/lib/krb5/init_creds_pw.c creds->client->realm, &resp); resp 1294 source4/heimdal/lib/krb5/init_creds_pw.c ret = decode_AS_REP(resp.data, resp.length, &rep.kdc_rep, &size); resp 1296 source4/heimdal/lib/krb5/init_creds_pw.c krb5_data_free(&resp); resp 1303 source4/heimdal/lib/krb5/init_creds_pw.c ret = krb5_rd_error(context, &resp, &error); resp 1304 source4/heimdal/lib/krb5/init_creds_pw.c if(ret && resp.data && ((char*)resp.data)[0] == 4) resp 1306 source4/heimdal/lib/krb5/init_creds_pw.c krb5_data_free(&resp); resp 1341 source4/heimdal/lib/ntlm/ntlm.c unsigned char res[21], *resp; resp 1369 source4/heimdal/lib/ntlm/ntlm.c resp = ntlm->data; resp 1370 source4/heimdal/lib/ntlm/ntlm.c splitandenc(&res[0], ntlm2_sess_hash, resp + 0); resp 1371 source4/heimdal/lib/ntlm/ntlm.c splitandenc(&res[7], ntlm2_sess_hash, resp + 8); resp 1372 source4/heimdal/lib/ntlm/ntlm.c splitandenc(&res[14], ntlm2_sess_hash, resp + 16); resp 35 source4/ldap_server/ldap_bind.c struct ldap_BindResponse *resp; resp 87 source4/ldap_server/ldap_bind.c resp = &reply->msg->r.BindResponse; resp 88 source4/ldap_server/ldap_bind.c resp->response.resultcode = result; resp 89 source4/ldap_server/ldap_bind.c resp->response.errormessage = errstr; resp 90 source4/ldap_server/ldap_bind.c resp->response.dn = NULL; resp 91 source4/ldap_server/ldap_bind.c resp->response.referral = NULL; resp 92 source4/ldap_server/ldap_bind.c resp->SASL.secblob = NULL; resp 118 source4/ldap_server/ldap_bind.c struct ldap_BindResponse *resp; resp 130 source4/ldap_server/ldap_bind.c resp = &reply->msg->r.BindResponse; resp 185 source4/ldap_server/ldap_bind.c resp->SASL.secblob = talloc(reply, DATA_BLOB); resp 186 source4/ldap_server/ldap_bind.c NT_STATUS_HAVE_NO_MEMORY(resp->SASL.secblob); resp 187 source4/ldap_server/ldap_bind.c *resp->SASL.secblob = output; resp 189 source4/ldap_server/ldap_bind.c resp->SASL.secblob = NULL; resp 263 source4/ldap_server/ldap_bind.c resp->response.resultcode = result; resp 264 source4/ldap_server/ldap_bind.c resp->response.dn = NULL; resp 265 source4/ldap_server/ldap_bind.c resp->response.errormessage = errstr; resp 266 source4/ldap_server/ldap_bind.c resp->response.referral = NULL; resp 276 source4/ldap_server/ldap_bind.c struct ldap_BindResponse *resp; resp 298 source4/ldap_server/ldap_bind.c resp = &reply->msg->r.BindResponse; resp 299 source4/ldap_server/ldap_bind.c resp->response.resultcode = 7; resp 300 source4/ldap_server/ldap_bind.c resp->response.dn = NULL; resp 301 source4/ldap_server/ldap_bind.c resp->response.errormessage = talloc_asprintf(reply, "Bad AuthenticationChoice [%d]", req->mechanism); resp 302 source4/ldap_server/ldap_bind.c resp->response.referral = NULL; resp 303 source4/ldap_server/ldap_bind.c resp->SASL.secblob = NULL; resp 64 source4/lib/ldb/modules/sort.c struct ldb_sort_resp_control *resp; resp 88 source4/lib/ldb/modules/sort.c resp = talloc(controls[i], struct ldb_sort_resp_control); resp 89 source4/lib/ldb/modules/sort.c if (! resp ) resp 92 source4/lib/ldb/modules/sort.c resp->result = result; resp 93 source4/lib/ldb/modules/sort.c resp->attr_desc = talloc_strdup(resp, desc); resp 95 source4/lib/ldb/modules/sort.c if (! resp->attr_desc ) resp 98 source4/lib/ldb/modules/sort.c controls[i]->data = resp; resp 44 source4/winbind/wb_samba3_cmd.c struct winbindd_response *resp = &s3call->response; resp 46 source4/winbind/wb_samba3_cmd.c resp->result = WINBINDD_ERROR; resp 48 source4/winbind/wb_samba3_cmd.c resp->result = WINBINDD_OK; resp 51 source4/winbind/wb_samba3_cmd.c WBSRV_SAMBA3_SET_STRING(resp->data.auth.nt_status_string, resp 53 source4/winbind/wb_samba3_cmd.c WBSRV_SAMBA3_SET_STRING(resp->data.auth.error_string, resp 56 source4/winbind/wb_samba3_cmd.c resp->data.auth.pam_error = nt_status_to_pam(status); resp 57 source4/winbind/wb_samba3_cmd.c resp->data.auth.nt_status = NT_STATUS_V(status); resp 69 source4/winbind/wb_samba3_cmd.c struct winbindd_response *resp = &s3call->response; resp 71 source4/winbind/wb_samba3_cmd.c resp->result = WINBINDD_OK; resp 73 source4/winbind/wb_samba3_cmd.c resp->result = WINBINDD_ERROR;