reply 89 examples/auth/crackcheck/crackcheck.c char *reply; reply 132 examples/auth/crackcheck/crackcheck.c reply = FascistCheck(password, dictionary); reply 133 examples/auth/crackcheck/crackcheck.c if (reply != NULL) { reply 134 examples/auth/crackcheck/crackcheck.c fprintf(stderr, "ERR - %s\n\n", reply); reply 65 nsswitch/pam_winbind.h #define _pam_drop_reply(/* struct pam_response * */ reply, /* int */ replies) \ reply 70 nsswitch/pam_winbind.h if (reply[reply_i].resp) { \ reply 71 nsswitch/pam_winbind.h _pam_overwrite(reply[reply_i].resp); \ reply 72 nsswitch/pam_winbind.h free(reply[reply_i].resp); \ reply 75 nsswitch/pam_winbind.h if (reply) \ reply 76 nsswitch/pam_winbind.h free(reply); \ reply 213 source3/auth/auth_ntlmssp.c const DATA_BLOB request, DATA_BLOB *reply) reply 215 source3/auth/auth_ntlmssp.c return ntlmssp_update(auth_ntlmssp_state->ntlmssp_state, request, reply); reply 119 source3/auth/pampass.c struct pam_response *reply = NULL; reply 137 source3/auth/pampass.c reply = SMB_MALLOC_ARRAY(struct pam_response, num_msg); reply 138 source3/auth/pampass.c if (!reply) reply 141 source3/auth/pampass.c memset(reply, '\0', sizeof(struct pam_response) * num_msg); reply 146 source3/auth/pampass.c reply[replies].resp_retcode = PAM_SUCCESS; reply 147 source3/auth/pampass.c reply[replies].resp = COPY_STRING(udp->PAM_username); reply 152 source3/auth/pampass.c reply[replies].resp_retcode = PAM_SUCCESS; reply 153 source3/auth/pampass.c reply[replies].resp = COPY_STRING(udp->PAM_password); reply 162 source3/auth/pampass.c reply[replies].resp_retcode = PAM_SUCCESS; reply 163 source3/auth/pampass.c reply[replies].resp = NULL; reply 168 source3/auth/pampass.c SAFE_FREE(reply); reply 172 source3/auth/pampass.c if (reply) reply 173 source3/auth/pampass.c *resp = reply; reply 202 source3/auth/pampass.c fstring reply; reply 212 source3/auth/pampass.c char *reply; reply 242 source3/auth/pampass.c if (!next_token_talloc(frame, &p, &reply, NULL)) { reply 246 source3/auth/pampass.c if (strequal(reply,".")) { reply 247 source3/auth/pampass.c fstrcpy(reply,""); reply 250 source3/auth/pampass.c special_char_sub(reply); reply 251 source3/auth/pampass.c fstrcpy(t->reply, reply); reply 252 source3/auth/pampass.c strlower_m(t->reply); reply 253 source3/auth/pampass.c trim_char(t->reply, ' ', ' '); reply 275 source3/auth/pampass.c struct pam_response *reply = NULL; reply 303 source3/auth/pampass.c reply = SMB_MALLOC_ARRAY(struct pam_response, num_msg); reply 304 source3/auth/pampass.c if (!reply) { reply 324 source3/auth/pampass.c fstrcpy(current_reply, t->reply); reply 330 source3/auth/pampass.c reply[replies].resp_retcode = PAM_SUCCESS; reply 331 source3/auth/pampass.c reply[replies].resp = COPY_FSTRING(current_reply); reply 340 source3/auth/pampass.c SAFE_FREE(reply); reply 355 source3/auth/pampass.c fstrcpy(current_reply, t->reply); reply 358 source3/auth/pampass.c reply[replies].resp_retcode = PAM_SUCCESS; reply 359 source3/auth/pampass.c reply[replies].resp = COPY_FSTRING(current_reply); reply 372 source3/auth/pampass.c SAFE_FREE(reply); reply 382 source3/auth/pampass.c reply[replies].resp_retcode = PAM_SUCCESS; reply 383 source3/auth/pampass.c reply[replies].resp = NULL; reply 389 source3/auth/pampass.c SAFE_FREE(reply); reply 395 source3/auth/pampass.c if (reply) reply 396 source3/auth/pampass.c *resp = reply; reply 1007 source3/include/includes.h krb5_data *reply); reply 56 source3/include/proto.h const DATA_BLOB request, DATA_BLOB *reply) ; reply 1717 source3/include/proto.h struct netlogon_samlogon_response **reply); reply 2406 source3/include/proto.h struct netlogon_samlogon_response **reply); reply 2826 source3/include/proto.h DATA_BLOB spnego_gen_auth_response(DATA_BLOB *reply, NTSTATUS nt_status, reply 700 source3/lib/ctdbd_conn.c struct ctdb_reply_control *reply = NULL; reply 755 source3/lib/ctdbd_conn.c status = ctdb_read_req(conn, req.hdr.reqid, NULL, (void *)&reply); reply 762 source3/lib/ctdbd_conn.c if (reply->hdr.operation != CTDB_REPLY_CONTROL) { reply 769 source3/lib/ctdbd_conn.c mem_ctx, reply->data, reply->datalen))) { reply 770 source3/lib/ctdbd_conn.c TALLOC_FREE(reply); reply 773 source3/lib/ctdbd_conn.c outdata->dsize = reply->datalen; reply 776 source3/lib/ctdbd_conn.c (*cstatus) = reply->status; reply 783 source3/lib/ctdbd_conn.c TALLOC_FREE(reply); reply 894 source3/lib/ctdbd_conn.c struct ctdb_reply_call *reply; reply 929 source3/lib/ctdbd_conn.c status = ctdb_read_req(conn, req.hdr.reqid, NULL, (void *)&reply); reply 936 source3/lib/ctdbd_conn.c if (reply->hdr.operation != CTDB_REPLY_CALL) { reply 945 source3/lib/ctdbd_conn.c TALLOC_FREE(reply); reply 956 source3/lib/ctdbd_conn.c struct ctdb_reply_call *reply; reply 988 source3/lib/ctdbd_conn.c status = ctdb_read_req(conn, req.hdr.reqid, NULL, (void *)&reply); reply 995 source3/lib/ctdbd_conn.c if (reply->hdr.operation != CTDB_REPLY_CALL) { reply 1001 source3/lib/ctdbd_conn.c data->dsize = reply->datalen; reply 1007 source3/lib/ctdbd_conn.c data->dptr = (uint8 *)talloc_memdup(mem_ctx, &reply->data[0], reply 1008 source3/lib/ctdbd_conn.c reply->datalen); reply 1018 source3/lib/ctdbd_conn.c TALLOC_FREE(reply); reply 613 source3/lib/ldb/tools/cmdline.c int handle_controls_reply(struct ldb_control **reply, struct ldb_control **request) reply 618 source3/lib/ldb/tools/cmdline.c if (reply == NULL || request == NULL) return -1; reply 620 source3/lib/ldb/tools/cmdline.c for (i = 0; reply[i]; i++) { reply 621 source3/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_VLV_RESP_OID, reply[i]->oid) == 0) { reply 624 source3/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_vlv_resp_control); reply 646 source3/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_ASQ_OID, reply[i]->oid) == 0) { reply 649 source3/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_asq_control); reply 659 source3/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_PAGED_RESULTS_OID, reply[i]->oid) == 0) { reply 662 source3/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_paged_control); reply 691 source3/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_SORT_RESP_OID, reply[i]->oid) == 0) { reply 694 source3/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_sort_resp_control); reply 714 source3/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_DIRSYNC_OID, reply[i]->oid) == 0) { reply 718 source3/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_dirsync_control); reply 749 source3/lib/ldb/tools/cmdline.c fprintf(stderr, "Unknown reply control oid: %s\n", reply[i]->oid); reply 53 source3/lib/ldb/tools/cmdline.h int handle_controls_reply(struct ldb_control **reply, struct ldb_control **request); reply 115 source3/libads/cldap.c struct netlogon_samlogon_response **reply) reply 235 source3/libads/cldap.c if (reply) { reply 236 source3/libads/cldap.c *reply = r; reply 252 source3/libads/cldap.c struct netlogon_samlogon_response **reply) reply 271 source3/libads/cldap.c ret = recv_cldap_netlogon(mem_ctx, sock, nt_version, reply); reply 291 source3/libads/cldap.c struct netlogon_samlogon_response *reply = NULL; reply 294 source3/libads/cldap.c ret = ads_cldap_netlogon(mem_ctx, server, realm, nt_version, &reply); reply 299 source3/libads/cldap.c if (reply->ntver != NETLOGON_NT_VERSION_5EX) { reply 301 source3/libads/cldap.c reply->ntver)); reply 305 source3/libads/cldap.c *reply5 = reply->data.nt5_ex; reply 46 source3/libads/kerberos.c memset(prompts[0].reply->data, '\0', prompts[0].reply->length); reply 47 source3/libads/kerberos.c if (prompts[0].reply->length > 0) { reply 49 source3/libads/kerberos.c strncpy(prompts[0].reply->data, (const char *)data, reply 50 source3/libads/kerberos.c prompts[0].reply->length-1); reply 51 source3/libads/kerberos.c prompts[0].reply->length = strlen(prompts[0].reply->data); reply 53 source3/libads/kerberos.c prompts[0].reply->length = 0; reply 703 source3/libads/krb5_setpw.c memset(prompts[0].reply->data, 0, prompts[0].reply->length); reply 704 source3/libads/krb5_setpw.c if (prompts[0].reply->length > 0) { reply 706 source3/libads/krb5_setpw.c strncpy((char *)prompts[0].reply->data, reply 708 source3/libads/krb5_setpw.c prompts[0].reply->length-1); reply 709 source3/libads/krb5_setpw.c prompts[0].reply->length = strlen((const char *)prompts[0].reply->data); reply 711 source3/libads/krb5_setpw.c prompts[0].reply->length = 0; reply 1626 source3/libsmb/clikrb5.c krb5_data *reply) reply 1646 source3/libsmb/clikrb5.c return krb5_mk_error(context, &e, reply); reply 1656 source3/libsmb/clikrb5.c reply); reply 524 source3/libsmb/clispnego.c DATA_BLOB spnego_gen_auth_response(DATA_BLOB *reply, NTSTATUS nt_status, reply 556 source3/libsmb/clispnego.c if (reply && reply->data != NULL) { reply 558 source3/libsmb/clispnego.c asn1_write_OctetString(data, reply->data, reply->length); reply 27 source3/libsmb/ntlmssp.c DATA_BLOB reply, DATA_BLOB *next_request); reply 31 source3/libsmb/ntlmssp.c const DATA_BLOB reply, DATA_BLOB *next_request); reply 33 source3/libsmb/ntlmssp.c const DATA_BLOB request, DATA_BLOB *reply); reply 511 source3/libsmb/ntlmssp.c const DATA_BLOB request, DATA_BLOB *reply) reply 603 source3/libsmb/ntlmssp.c msrpc_gen(reply, gen_string, reply 630 source3/libsmb/ntlmssp.c const DATA_BLOB request, DATA_BLOB *reply) reply 651 source3/libsmb/ntlmssp.c *reply = data_blob_null; reply 960 source3/libsmb/ntlmssp.c DATA_BLOB reply, DATA_BLOB *next_request) reply 995 source3/libsmb/ntlmssp.c const DATA_BLOB reply, DATA_BLOB *next_request) reply 1010 source3/libsmb/ntlmssp.c if (!msrpc_parse(&reply, "CdBd", reply 1016 source3/libsmb/ntlmssp.c dump_data(2, reply.data, reply.length); reply 1048 source3/libsmb/ntlmssp.c if (!msrpc_parse(&reply, chal_parse_string, reply 1057 source3/libsmb/ntlmssp.c dump_data(2, reply.data, reply.length); reply 59 source3/pam_smbpass/support.c #define _pam_drop_reply(/* struct pam_response * */ reply, /* int */ replies) \ reply 64 source3/pam_smbpass/support.c if (reply[reply_i].resp) { \ reply 65 source3/pam_smbpass/support.c _pam_overwrite(reply[reply_i].resp); \ reply 66 source3/pam_smbpass/support.c free(reply[reply_i].resp); \ reply 69 source3/pam_smbpass/support.c if (reply) \ reply 70 source3/pam_smbpass/support.c free(reply); \ reply 608 source3/rpc_server/srv_pipe.c DATA_BLOB session_key, reply; reply 616 source3/rpc_server/srv_pipe.c ZERO_STRUCT(reply); reply 620 source3/rpc_server/srv_pipe.c status = auth_ntlmssp_update(a, *p_resp_blob, &reply); reply 624 source3/rpc_server/srv_pipe.c data_blob_free(&reply); reply 511 source3/rpc_server/srv_pipe_hnd.c bool reply = False; reply 538 source3/rpc_server/srv_pipe_hnd.c reply = process_request_pdu(p, &rpc_in); reply 570 source3/rpc_server/srv_pipe_hnd.c reply = api_pipe_bind_req(p, &rpc_in); reply 587 source3/rpc_server/srv_pipe_hnd.c reply = api_pipe_alter_context(p, &rpc_in); reply 601 source3/rpc_server/srv_pipe_hnd.c reply = api_pipe_bind_auth3(p, &rpc_in); reply 616 source3/rpc_server/srv_pipe_hnd.c reply = True; reply 624 source3/rpc_server/srv_pipe_hnd.c reply = setup_cancel_ack_reply(p, &rpc_in); reply 633 source3/rpc_server/srv_pipe_hnd.c reply = True; reply 644 source3/rpc_server/srv_pipe_hnd.c if (!reply) { reply 4665 source3/smbd/lanman.c bool reply=False; reply 4732 source3/smbd/lanman.c reply = api_commands[i].fn(conn, reply 4741 source3/smbd/lanman.c reply = api_TooSmall(conn,vuid,params,data,mdrcnt,mprcnt, reply 4746 source3/smbd/lanman.c if (!reply) { reply 4747 source3/smbd/lanman.c reply = api_Unsupported(conn,vuid,params,tpscnt,data,tdscnt,mdrcnt,mprcnt, reply 4752 source3/smbd/lanman.c if (reply) { reply 184 source3/smbd/sesssetup.c krb5_data reply; reply 212 source3/smbd/sesssetup.c host_princ, &reply); reply 220 source3/smbd/sesssetup.c *pblob_out = data_blob(reply.data, reply.length); reply 221 source3/smbd/sesssetup.c kerberos_free_data_contents(context,&reply); reply 47 source3/utils/net_ads.c struct NETLOGON_SAM_LOGON_RESPONSE_EX reply; reply 50 source3/utils/net_ads.c if ( !ads_cldap_netlogon_5(talloc_tos(), addr, ads->server.realm, &reply ) ) { reply 59 source3/utils/net_ads.c switch (reply.command) { reply 67 source3/utils/net_ads.c d_printf("0x%x\n", reply.command); reply 71 source3/utils/net_ads.c d_printf("GUID: %s\n", GUID_string(talloc_tos(), &reply.domain_uuid)); reply 86 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_PDC) ? "yes" : "no", reply 87 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_GC) ? "yes" : "no", reply 88 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_LDAP) ? "yes" : "no", reply 89 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_DS) ? "yes" : "no", reply 90 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_KDC) ? "yes" : "no", reply 91 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_TIMESERV) ? "yes" : "no", reply 92 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_CLOSEST) ? "yes" : "no", reply 93 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_WRITABLE) ? "yes" : "no", reply 94 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_GOOD_TIMESERV) ? "yes" : "no", reply 95 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_NDNC) ? "yes" : "no", reply 96 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_SELECT_SECRET_DOMAIN_6) ? "yes" : "no", reply 97 source3/utils/net_ads.c (reply.server_type & NBT_SERVER_FULL_SECRET_DOMAIN_6) ? "yes" : "no"); reply 100 source3/utils/net_ads.c printf("Forest:\t\t\t%s\n", reply.forest); reply 101 source3/utils/net_ads.c printf("Domain:\t\t\t%s\n", reply.dns_domain); reply 102 source3/utils/net_ads.c printf("Domain Controller:\t%s\n", reply.pdc_dns_name); reply 104 source3/utils/net_ads.c printf("Pre-Win2k Domain:\t%s\n", reply.domain); reply 105 source3/utils/net_ads.c printf("Pre-Win2k Hostname:\t%s\n", reply.pdc_name); reply 107 source3/utils/net_ads.c if (*reply.user_name) printf("User name:\t%s\n", reply.user_name); reply 109 source3/utils/net_ads.c printf("Server Site Name :\t\t%s\n", reply.server_site); reply 110 source3/utils/net_ads.c printf("Client Site Name :\t\t%s\n", reply.client_site); reply 112 source3/utils/net_ads.c d_printf("NT Version: %d\n", reply.nt_version); reply 113 source3/utils/net_ads.c d_printf("LMNT Token: %.2x\n", reply.lmnt_token); reply 114 source3/utils/net_ads.c d_printf("LM20 Token: %.2x\n", reply.lm20_token); reply 370 source3/utils/net_ads.c struct NETLOGON_SAM_LOGON_RESPONSE_EX reply; reply 390 source3/utils/net_ads.c if ( !ads_cldap_netlogon_5(talloc_tos(), addr, ads->server.realm, &reply ) ) { reply 396 source3/utils/net_ads.c d_printf("Workgroup: %s\n", reply.domain); reply 675 source3/utils/ntlm_auth.c DATA_BLOB *reply) reply 711 source3/utils/ntlm_auth.c if (reply) { reply 712 source3/utils/ntlm_auth.c *reply = data_blob(wb_response.extra_data.data, reply 715 source3/utils/ntlm_auth.c reply->data == NULL) { reply 728 source3/utils/ntlm_auth.c DATA_BLOB request, reply; reply 820 source3/utils/ntlm_auth.c nt_status = ntlmssp_update(state->ntlmssp_state, request, &reply); reply 824 source3/utils/ntlm_auth.c reply); reply 827 source3/utils/ntlm_auth.c data_blob_free(&reply); reply 859 source3/utils/ntlm_auth.c DATA_BLOB request, reply; reply 983 source3/utils/ntlm_auth.c &reply); reply 986 source3/utils/ntlm_auth.c &reply); reply 991 source3/utils/ntlm_auth.c reply); reply 994 source3/utils/ntlm_auth.c state->initial_message = reply; reply 998 source3/utils/ntlm_auth.c data_blob_free(&reply); reply 1004 source3/utils/ntlm_auth.c reply); reply 1491 source3/utils/ntlm_auth.c SPNEGO_DATA reply; reply 1550 source3/utils/ntlm_auth.c ZERO_STRUCT(reply); reply 1552 source3/utils/ntlm_auth.c reply.type = SPNEGO_NEG_TOKEN_INIT; reply 1553 source3/utils/ntlm_auth.c reply.negTokenInit.mechTypes = my_mechs; reply 1554 source3/utils/ntlm_auth.c reply.negTokenInit.reqFlags = 0; reply 1555 source3/utils/ntlm_auth.c reply.negTokenInit.mechToken = tkt; reply 1556 source3/utils/ntlm_auth.c reply.negTokenInit.mechListMIC = data_blob_null; reply 1558 source3/utils/ntlm_auth.c len = write_spnego_data(&to_server, &reply); reply 53 source3/winbindd/winbindd_ccache_access.c DATA_BLOB dummy_msg, reply; reply 98 source3/winbindd/winbindd_ccache_access.c reply = data_blob_null; reply 99 source3/winbindd/winbindd_ccache_access.c status = ntlmssp_update(ntlmssp_state, dummy_msg, &reply); reply 101 source3/winbindd/winbindd_ccache_access.c data_blob_free(&reply); reply 110 source3/winbindd/winbindd_ccache_access.c status = ntlmssp_update(ntlmssp_state, challenge_msg, &reply); reply 115 source3/winbindd/winbindd_ccache_access.c data_blob_free(&reply); reply 118 source3/winbindd/winbindd_ccache_access.c *auth_msg = reply; reply 43 source4/auth/kerberos/krb5_init_context.c DATA_BLOB request, reply; reply 116 source4/auth/kerberos/krb5_init_context.c smb_krb5->reply = blob; reply 124 source4/auth/kerberos/krb5_init_context.c smb_krb5->reply = data; reply 125 source4/auth/kerberos/krb5_init_context.c smb_krb5->reply.length -= 4; reply 126 source4/auth/kerberos/krb5_init_context.c smb_krb5->reply.data += 4; reply 300 source4/auth/kerberos/krb5_init_context.c smb_krb5->reply = data_blob(NULL, 0); reply 331 source4/auth/kerberos/krb5_init_context.c while ((NT_STATUS_IS_OK(smb_krb5->status)) && !smb_krb5->reply.length) { reply 348 source4/auth/kerberos/krb5_init_context.c ret = krb5_data_copy(recv_buf, smb_krb5->reply.data, smb_krb5->reply.length); reply 157 source4/auth/ntlm/auth_unix.c struct pam_response **reply, void *appdata_ptr) reply 163 source4/auth/ntlm/auth_unix.c *reply = NULL; reply 173 source4/auth/ntlm/auth_unix.c *reply = NULL; reply 181 source4/auth/ntlm/auth_unix.c *reply = malloc_array_p(struct pam_response, num_msg); reply 182 source4/auth/ntlm/auth_unix.c if (*reply == NULL) { reply 189 source4/auth/ntlm/auth_unix.c (*reply)[num].resp_retcode = PAM_SUCCESS; reply 190 source4/auth/ntlm/auth_unix.c (*reply)[num].resp = COPY_STRING(info->account_name); reply 194 source4/auth/ntlm/auth_unix.c (*reply)[num].resp_retcode = PAM_SUCCESS; reply 195 source4/auth/ntlm/auth_unix.c (*reply)[num].resp = COPY_STRING(info->plaintext_password); reply 199 source4/auth/ntlm/auth_unix.c (*reply)[num].resp_retcode = PAM_SUCCESS; reply 200 source4/auth/ntlm/auth_unix.c (*reply)[num].resp = NULL; reply 205 source4/auth/ntlm/auth_unix.c (*reply)[num].resp_retcode = PAM_SUCCESS; reply 206 source4/auth/ntlm/auth_unix.c (*reply)[num].resp = NULL; reply 212 source4/auth/ntlm/auth_unix.c SAFE_FREE((*reply)[num-1].resp); reply 215 source4/auth/ntlm/auth_unix.c SAFE_FREE(*reply); reply 216 source4/auth/ntlm/auth_unix.c *reply = NULL; reply 80 source4/cldap_server/rootdse.c goto reply; reply 88 source4/cldap_server/rootdse.c goto reply; reply 93 source4/cldap_server/rootdse.c goto reply; reply 99 source4/cldap_server/rootdse.c goto reply; reply 111 source4/cldap_server/rootdse.c goto reply; reply 129 source4/cldap_server/rootdse.c reply: reply 160 source4/cldap_server/rootdse.c struct cldap_reply reply; reply 166 source4/cldap_server/rootdse.c reply.messageid = message_id; reply 167 source4/cldap_server/rootdse.c reply.dest = src; reply 168 source4/cldap_server/rootdse.c reply.response = NULL; reply 169 source4/cldap_server/rootdse.c reply.result = &result; reply 171 source4/cldap_server/rootdse.c cldapd_rootdse_fill(cldapd, tmp_ctx, search, &reply.response, reply.result); reply 173 source4/cldap_server/rootdse.c status = cldap_reply_send(cldap, &reply); reply 195 source4/heimdal/kdc/524.c EncryptedData *reply) reply 213 source4/heimdal/kdc/524.c reply); reply 294 source4/heimdal/kdc/524.c const Ticket *t, krb5_data *reply, reply 390 source4/heimdal/kdc/524.c ret = krb5_storage_to_data(sp, reply); reply 391 source4/heimdal/kdc/524.c reply->length = krb5_storage_seek(sp, 0, SEEK_CUR); reply 394 source4/heimdal/kdc/524.c krb5_data_zero(reply); reply 204 source4/heimdal/kdc/digest.c const DigestREQ *req, krb5_data *reply, reply 232 source4/heimdal/kdc/digest.c krb5_data_zero(reply); reply 1417 source4/heimdal/kdc/digest.c ASN1_MALLOC_ENCODE(DigestREP, reply->data, reply->length, &rep, &size, ret); reply 1422 source4/heimdal/kdc/digest.c if (size != reply->length) reply 201 source4/heimdal/kdc/kaserver.c krb5_data *reply) reply 216 source4/heimdal/kdc/kaserver.c krb5_storage_to_data (sp, reply); reply 295 source4/heimdal/kdc/kaserver.c krb5_data *reply) reply 359 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KAANSWERTOOLONG, reply); reply 387 source4/heimdal/kdc/kaserver.c krb5_storage_to_data (sp, reply); reply 439 source4/heimdal/kdc/kaserver.c krb5_data *reply) reply 464 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KABADREQUEST, reply); reply 482 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOENT, reply); reply 492 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOENT, reply); reply 501 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KAPWEXPIRED, reply); reply 509 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOKEYS, reply); reply 517 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOKEYS, reply); reply 541 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KABADREQUEST, reply); reply 550 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KACLOCKSKEW, reply); reply 574 source4/heimdal/kdc/kaserver.c &ckey->key, reply); reply 652 source4/heimdal/kdc/kaserver.c krb5_data *reply) reply 685 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KABADREQUEST, reply); reply 698 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOENT, reply); reply 709 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOENT, reply); reply 717 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOKEYS, reply); reply 725 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOKEYS, reply); reply 744 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KABADTICKET, reply); reply 753 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KABADTICKET, reply); reply 764 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KABADTICKET, reply); reply 782 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOENT, reply); reply 789 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KANOENT, reply); reply 798 source4/heimdal/kdc/kaserver.c make_error_reply (hdr, KAPWEXPIRED, reply); reply 849 source4/heimdal/kdc/kaserver.c &ad.session, reply); reply 878 source4/heimdal/kdc/kaserver.c krb5_data *reply, reply 925 source4/heimdal/kdc/kaserver.c do_authenticate (context, config, &hdr, sp, addr, from, reply); reply 928 source4/heimdal/kdc/kaserver.c do_getticket (context, config, &hdr, sp, addr, from, reply); reply 944 source4/heimdal/kdc/kaserver.c make_error_reply (&hdr, RXGEN_OPCODE, reply); reply 58 source4/heimdal/kdc/kerberos4.c make_err_reply(krb5_context context, krb5_data *reply, reply 62 source4/heimdal/kdc/kerberos4.c kdc_time, code, msg, reply); reply 119 source4/heimdal/kdc/kerberos4.c #define RCHECK(X, L) if(X){make_err_reply(context, reply, KFAILURE, "Packet too short"); goto L;} reply 132 source4/heimdal/kdc/kerberos4.c krb5_data *reply, reply 154 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_GEN_ERR, reply 164 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_PKT_VER, "protocol mismatch"); reply 201 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN, reply 210 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN, reply 221 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_NAME_EXP, reply 232 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_NULL_KEY, reply 249 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_NULL_KEY, reply 257 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_NULL_KEY, reply 265 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_NULL_KEY, reply 282 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KFAILURE, reply 302 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KFAILURE, reply 321 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KFAILURE, reply 335 source4/heimdal/kdc/kerberos4.c reply); reply 367 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KFAILURE, reply 380 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KFAILURE, s); reply 390 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_AUTH_EXP, reply 399 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_NULL_KEY, reply 422 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, ret, "failed to parse request"); reply 445 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN, reply 454 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN, reply 462 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN, reply 474 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN, s); reply 483 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN, s); reply 495 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN, s); reply 505 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_NAME_EXP, reply 514 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KRB4ET_KDC_NULL_KEY, reply 550 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KFAILURE, reply 570 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KFAILURE, reply 588 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KFAILURE, reply 602 source4/heimdal/kdc/kerberos4.c reply); reply 620 source4/heimdal/kdc/kerberos4.c make_err_reply(context, reply, KFAILURE, "Unknown message type"); reply 265 source4/heimdal/kdc/kerberos5.c krb5_data *reply) reply 364 source4/heimdal/kdc/kerberos5.c reply->data = buf; reply 365 source4/heimdal/kdc/kerberos5.c reply->length = buf_size; reply 968 source4/heimdal/kdc/kerberos5.c krb5_data *reply, reply 1766 source4/heimdal/kdc/kerberos5.c reply_key, &e_text, reply); reply 1773 source4/heimdal/kdc/kerberos5.c if (datagram_reply && reply->length > config->max_datagram_reply_length) { reply 1774 source4/heimdal/kdc/kerberos5.c krb5_data_free(reply); reply 1790 source4/heimdal/kdc/kerberos5.c reply); reply 675 source4/heimdal/kdc/krb5tgs.c krb5_data *reply) reply 911 source4/heimdal/kdc/krb5tgs.c serverkey, 0, &tgt->key, e_text, reply); reply 1364 source4/heimdal/kdc/krb5tgs.c krb5_data *reply, reply 1951 source4/heimdal/kdc/krb5tgs.c reply); reply 292 source4/heimdal/kdc/kx509.c const Kx509Request *req, krb5_data *reply, reply 306 source4/heimdal/kdc/kx509.c krb5_data_zero(reply); reply 427 source4/heimdal/kdc/kx509.c ret = krb5_data_alloc(reply, data.length + sizeof(version_2_0)); reply 432 source4/heimdal/kdc/kx509.c memcpy(reply->data, version_2_0, sizeof(version_2_0)); reply 433 source4/heimdal/kdc/kx509.c memcpy(((unsigned char *)reply->data) + sizeof(version_2_0), reply 62 source4/heimdal/kdc/process.c krb5_data *reply, reply 82 source4/heimdal/kdc/process.c reply, from, addr, datagram_reply); reply 86 source4/heimdal/kdc/process.c ret = _kdc_tgs_rep(context, config, &req, reply, from, addr, datagram_reply); reply 90 source4/heimdal/kdc/process.c ret = _kdc_do_524(context, config, &ticket, reply, from, addr); reply 94 source4/heimdal/kdc/process.c ret = _kdc_do_digest(context, config, &digestreq, reply, from, addr); reply 98 source4/heimdal/kdc/process.c ret = _kdc_do_kx509(context, config, &kx509req, reply, from, addr); reply 103 source4/heimdal/kdc/process.c ret = _kdc_do_version4(context, config, buf, len, reply, from, reply 107 source4/heimdal/kdc/process.c ret = _kdc_do_kaserver(context, config, buf, len, reply, from, reply 127 source4/heimdal/kdc/process.c krb5_data *reply, reply 143 source4/heimdal/kdc/process.c reply, from, addr, datagram_reply); reply 147 source4/heimdal/kdc/process.c ret = _kdc_tgs_rep(context, config, &req, reply, from, addr, datagram_reply); reply 163 source4/heimdal/kdc/process.c const krb5_data *reply, reply 204 source4/heimdal/kdc/process.c ret = der_get_tag (reply->data, reply->length, reply 178 source4/heimdal/lib/hdb/db.c DB__get(krb5_context context, HDB *db, krb5_data key, krb5_data *reply) reply 202 source4/heimdal/lib/hdb/db.c krb5_data_copy(reply, v.data, v.size); reply 204 source4/heimdal/lib/hdb/ndbm.c NDBM__get(krb5_context context, HDB *db, krb5_data key, krb5_data *reply) reply 220 source4/heimdal/lib/hdb/ndbm.c krb5_data_copy(reply, v.dptr, v.dsize); reply 87 source4/heimdal/lib/hx509/hx509.h heim_octet_string reply; reply 251 source4/heimdal/lib/hx509/ks_file.c prompt.reply.data = password; reply 252 source4/heimdal/lib/hx509/ks_file.c prompt.reply.length = sizeof(password); reply 429 source4/heimdal/lib/hx509/ks_p11.c prompt.reply.data = pin; reply 430 source4/heimdal/lib/hx509/ks_p11.c prompt.reply.length = sizeof(pin); reply 188 source4/heimdal/lib/hx509/lock.c if(UI_UTIL_read_pw_string(prompter->reply.data, reply 189 source4/heimdal/lib/hx509/lock.c prompter->reply.length, reply 194 source4/heimdal/lib/hx509/lock.c char *s = prompter->reply.data; reply 198 source4/heimdal/lib/hx509/lock.c if(fgets(prompter->reply.data, reply 199 source4/heimdal/lib/hx509/lock.c prompter->reply.length, reply 280 source4/heimdal/lib/krb5/changepw.c u_char reply[1024 * 3]; reply 288 source4/heimdal/lib/krb5/changepw.c while (len < sizeof(reply)) { reply 291 source4/heimdal/lib/krb5/changepw.c ret = recvfrom (sock, reply + len, sizeof(reply) - len, reply 306 source4/heimdal/lib/krb5/changepw.c _krb5_get_int(reply, &size, 4); reply 309 source4/heimdal/lib/krb5/changepw.c memmove(reply, reply + 4, size); reply 313 source4/heimdal/lib/krb5/changepw.c if (len == sizeof(reply)) { reply 320 source4/heimdal/lib/krb5/changepw.c ret = recvfrom (sock, reply, sizeof(reply), 0, NULL, NULL); reply 338 source4/heimdal/lib/krb5/changepw.c pkt_len = (reply[0] << 8) | (reply[1]); reply 339 source4/heimdal/lib/krb5/changepw.c pkt_ver = (reply[2] << 8) | (reply[3]); reply 341 source4/heimdal/lib/krb5/changepw.c if ((pkt_len != len) || (reply[1] == 0x7e || reply[1] == 0x5e)) { reply 348 source4/heimdal/lib/krb5/changepw.c ret = decode_KRB_ERROR(reply, len, &error, &size); reply 384 source4/heimdal/lib/krb5/changepw.c ap_rep_data.data = reply + 6; reply 385 source4/heimdal/lib/krb5/changepw.c ap_rep_data.length = (reply[4] << 8) | (reply[5]); reply 387 source4/heimdal/lib/krb5/changepw.c if (reply + len < (u_char *)ap_rep_data.data + ap_rep_data.length) { reply 439 source4/heimdal/lib/krb5/changepw.c ret = decode_KRB_ERROR(reply + 6, len - 6, &error, &size); reply 67 source4/heimdal/lib/krb5/convert_creds.c krb5_data reply; reply 92 source4/heimdal/lib/krb5/convert_creds.c &reply); reply 97 source4/heimdal/lib/krb5/convert_creds.c sp = krb5_storage_from_mem(reply.data, reply.length); reply 142 source4/heimdal/lib/krb5/convert_creds.c krb5_data_free(&reply); reply 419 source4/heimdal/lib/krb5/init_creds_pw.c prompts[0].reply = &password_data[0]; reply 427 source4/heimdal/lib/krb5/init_creds_pw.c prompts[1].reply = &password_data[1]; reply 1524 source4/heimdal/lib/krb5/init_creds_pw.c prompt.reply = &password_data; reply 610 source4/heimdal/lib/krb5/krb5.h krb5_data *reply; reply 400 source4/heimdal/lib/krb5/log.c char **reply, reply 429 source4/heimdal/lib/krb5/log.c if(reply == NULL) reply 432 source4/heimdal/lib/krb5/log.c *reply = msg; reply 451 source4/heimdal/lib/krb5/log.c char **reply, reply 460 source4/heimdal/lib/krb5/log.c ret = krb5_vlog_msg(context, fac, reply, level, fmt, ap); reply 47 source4/heimdal/lib/krb5/mk_error.c krb5_data *reply) reply 86 source4/heimdal/lib/krb5/mk_error.c ASN1_MALLOC_ENCODE(KRB_ERROR, reply->data, reply->length, &msg, &len, ret); reply 89 source4/heimdal/lib/krb5/mk_error.c if(reply->length != len) reply 1461 source4/heimdal/lib/krb5/pkinit.c password_data.data = prompter->reply.data; reply 1462 source4/heimdal/lib/krb5/pkinit.c password_data.length = prompter->reply.length; reply 1466 source4/heimdal/lib/krb5/pkinit.c prompt.reply = &password_data; reply 1481 source4/heimdal/lib/krb5/pkinit.c memset (prompter->reply.data, 0, prompter->reply.length); reply 56 source4/heimdal/lib/krb5/prompter_posix.c if(UI_UTIL_read_pw_string(prompts[i].reply->data, reply 57 source4/heimdal/lib/krb5/prompter_posix.c prompts[i].reply->length, reply 62 source4/heimdal/lib/krb5/prompter_posix.c char *s = prompts[i].reply->data; reply 66 source4/heimdal/lib/krb5/prompter_posix.c if(fgets(prompts[i].reply->data, reply 67 source4/heimdal/lib/krb5/prompter_posix.c prompts[i].reply->length, reply 646 source4/heimdal/lib/krb5/send_to_kdc.c const krb5_data *reply, int *action) reply 651 source4/heimdal/lib/krb5/send_to_kdc.c if(krb5_rd_error(context, reply, &error)) reply 508 source4/heimdal/lib/roken/resolve.c unsigned char *reply = NULL; reply 523 source4/heimdal/lib/roken/resolve.c if (reply) { reply 524 source4/heimdal/lib/roken/resolve.c free(reply); reply 525 source4/heimdal/lib/roken/resolve.c reply = NULL; reply 539 source4/heimdal/lib/roken/resolve.c reply = malloc(size); reply 540 source4/heimdal/lib/roken/resolve.c if (reply == NULL) { reply 547 source4/heimdal/lib/roken/resolve.c len = res_nsearch(&state, domain, rr_class, rr_type, reply, size); reply 549 source4/heimdal/lib/roken/resolve.c len = res_search(domain, rr_class, rr_type, reply, size); reply 562 source4/heimdal/lib/roken/resolve.c free(reply); reply 571 source4/heimdal/lib/roken/resolve.c r = parse_reply(reply, len); reply 572 source4/heimdal/lib/roken/resolve.c free(reply); reply 60 source4/kdc/kdc.c DATA_BLOB *reply, reply 129 source4/kdc/kdc.c DATA_BLOB reply; reply 170 source4/kdc/kdc.c &reply, reply 185 source4/kdc/kdc.c rep->packet = reply; reply 186 source4/kdc/kdc.c talloc_steal(rep, reply.data); reply 229 source4/kdc/kdc.c DATA_BLOB input, reply; reply 253 source4/kdc/kdc.c &reply, reply 263 source4/kdc/kdc.c blob = data_blob_talloc(kdcconn, NULL, reply.length + 4); reply 269 source4/kdc/kdc.c RSIVAL(blob.data, 0, reply.length); reply 270 source4/kdc/kdc.c memcpy(blob.data + 4, reply.data, reply.length); reply 321 source4/kdc/kdc.c DATA_BLOB *reply, reply 343 source4/kdc/kdc.c *reply = data_blob(NULL, 0); reply 347 source4/kdc/kdc.c *reply = data_blob_talloc(mem_ctx, k5_reply.data, k5_reply.length); reply 350 source4/kdc/kdc.c *reply = data_blob(NULL, 0); reply 40 source4/kdc/kdc.h DATA_BLOB *reply, reply 178 source4/kdc/kpasswdd.c DATA_BLOB *reply) reply 190 source4/kdc/kpasswdd.c reply); reply 209 source4/kdc/kpasswdd.c reply); reply 218 source4/kdc/kpasswdd.c DATA_BLOB *reply) reply 228 source4/kdc/kpasswdd.c reply); reply 245 source4/kdc/kpasswdd.c &password, reply); reply 278 source4/kdc/kpasswdd.c reply); reply 297 source4/kdc/kpasswdd.c reply); reply 308 source4/kdc/kpasswdd.c reply); reply 315 source4/kdc/kpasswdd.c reply); reply 320 source4/kdc/kpasswdd.c &password, reply); reply 329 source4/kdc/kpasswdd.c reply); reply 339 source4/kdc/kpasswdd.c reply); reply 354 source4/kdc/kpasswdd.c reply); reply 367 source4/kdc/kpasswdd.c reply); reply 415 source4/kdc/kpasswdd.c reply); reply 423 source4/kdc/kpasswdd.c reply); reply 431 source4/kdc/kpasswdd.c DATA_BLOB *reply, reply 502 source4/kdc/kpasswdd.c goto reply; reply 557 source4/kdc/kpasswdd.c goto reply; reply 574 source4/kdc/kpasswdd.c goto reply; reply 603 source4/kdc/kpasswdd.c goto reply; reply 609 source4/kdc/kpasswdd.c reply: reply 610 source4/kdc/kpasswdd.c *reply = data_blob_talloc(mem_ctx, NULL, krb_priv_rep.length + ap_rep.length + header_len); reply 611 source4/kdc/kpasswdd.c if (!reply->data) { reply 615 source4/kdc/kpasswdd.c RSSVAL(reply->data, 0, reply->length); reply 616 source4/kdc/kpasswdd.c RSSVAL(reply->data, 2, 1); /* This is a version 1 reply, MS change/set or otherwise */ reply 617 source4/kdc/kpasswdd.c RSSVAL(reply->data, 4, ap_rep.length); reply 618 source4/kdc/kpasswdd.c memcpy(reply->data + header_len, reply 621 source4/kdc/kpasswdd.c memcpy(reply->data + header_len + ap_rep.length, reply 38 source4/ldap_server/ldap_backend.c goto reply;\ reply 101 source4/ldap_server/ldap_backend.c struct ldapsrv_reply *reply; reply 103 source4/ldap_server/ldap_backend.c reply = talloc(call, struct ldapsrv_reply); reply 104 source4/ldap_server/ldap_backend.c if (!reply) { reply 107 source4/ldap_server/ldap_backend.c reply->msg = talloc(reply, struct ldap_message); reply 108 source4/ldap_server/ldap_backend.c if (reply->msg == NULL) { reply 109 source4/ldap_server/ldap_backend.c talloc_free(reply); reply 113 source4/ldap_server/ldap_backend.c reply->msg->messageid = call->request->messageid; reply 114 source4/ldap_server/ldap_backend.c reply->msg->type = type; reply 115 source4/ldap_server/ldap_backend.c reply->msg->controls = NULL; reply 117 source4/ldap_server/ldap_backend.c return reply; reply 120 source4/ldap_server/ldap_backend.c void ldapsrv_queue_reply(struct ldapsrv_call *call, struct ldapsrv_reply *reply) reply 122 source4/ldap_server/ldap_backend.c DLIST_ADD_END(call->replies, reply, struct ldapsrv_reply *); reply 127 source4/ldap_server/ldap_backend.c struct ldapsrv_reply *reply; reply 132 source4/ldap_server/ldap_backend.c reply = ldapsrv_init_reply(call, LDAP_TAG_ExtendedResponse); reply 133 source4/ldap_server/ldap_backend.c if (!reply) { reply 137 source4/ldap_server/ldap_backend.c r = &reply->msg->r.ExtendedResponse; reply 145 source4/ldap_server/ldap_backend.c ldapsrv_queue_reply(call, reply); reply 205 source4/ldap_server/ldap_backend.c goto reply; reply 234 source4/ldap_server/ldap_backend.c goto reply; reply 268 source4/ldap_server/ldap_backend.c goto reply; reply 309 source4/ldap_server/ldap_backend.c reply: reply 388 source4/ldap_server/ldap_backend.c goto reply; reply 410 source4/ldap_server/ldap_backend.c goto reply; reply 420 source4/ldap_server/ldap_backend.c goto reply; reply 423 source4/ldap_server/ldap_backend.c reply: reply 498 source4/ldap_server/ldap_backend.c goto reply; reply 506 source4/ldap_server/ldap_backend.c goto reply; reply 512 source4/ldap_server/ldap_backend.c goto reply; reply 515 source4/ldap_server/ldap_backend.c reply: reply 560 source4/ldap_server/ldap_backend.c reply: reply 614 source4/ldap_server/ldap_backend.c goto reply; reply 625 source4/ldap_server/ldap_backend.c goto reply; reply 639 source4/ldap_server/ldap_backend.c goto reply; reply 643 source4/ldap_server/ldap_backend.c reply: reply 697 source4/ldap_server/ldap_backend.c reply: reply 34 source4/ldap_server/ldap_bind.c struct ldapsrv_reply *reply; reply 58 source4/ldap_server/ldap_bind.c reply = ldapsrv_init_reply(call, LDAP_TAG_BindResponse); reply 59 source4/ldap_server/ldap_bind.c if (!reply) { reply 78 source4/ldap_server/ldap_bind.c errstr = talloc_asprintf(reply, "Simple Bind: Failed to advise ldb new credentials: %s", nt_errstr(status)); reply 84 source4/ldap_server/ldap_bind.c errstr = talloc_asprintf(reply, "Simple Bind Failed: %s", nt_errstr(status)); reply 87 source4/ldap_server/ldap_bind.c resp = &reply->msg->r.BindResponse; reply 94 source4/ldap_server/ldap_bind.c ldapsrv_queue_reply(call, reply); reply 117 source4/ldap_server/ldap_bind.c struct ldapsrv_reply *reply; reply 126 source4/ldap_server/ldap_bind.c reply = ldapsrv_init_reply(call, LDAP_TAG_BindResponse); reply 127 source4/ldap_server/ldap_bind.c if (!reply) { reply 130 source4/ldap_server/ldap_bind.c resp = &reply->msg->r.BindResponse; reply 153 source4/ldap_server/ldap_bind.c errstr = talloc_asprintf(reply, "SASL: Failed to start authentication system: %s", reply 167 source4/ldap_server/ldap_bind.c errstr = talloc_asprintf(reply, "SASL:[%s]: Failed to start authentication backend: %s", reply 181 source4/ldap_server/ldap_bind.c status = gensec_update(conn->gensec, reply, reply 185 source4/ldap_server/ldap_bind.c resp->SASL.secblob = talloc(reply, DATA_BLOB); reply 220 source4/ldap_server/ldap_bind.c errstr = talloc_asprintf(reply, reply 234 source4/ldap_server/ldap_bind.c errstr = talloc_asprintf(reply, reply 248 source4/ldap_server/ldap_bind.c errstr = talloc_asprintf(reply, reply 259 source4/ldap_server/ldap_bind.c errstr = talloc_asprintf(reply, "SASL:[%s]: %s", req->creds.SASL.mechanism, nt_errstr(status)); reply 268 source4/ldap_server/ldap_bind.c ldapsrv_queue_reply(call, reply); reply 275 source4/ldap_server/ldap_bind.c struct ldapsrv_reply *reply; reply 293 source4/ldap_server/ldap_bind.c reply = ldapsrv_init_reply(call, LDAP_TAG_BindResponse); reply 294 source4/ldap_server/ldap_bind.c if (!reply) { reply 298 source4/ldap_server/ldap_bind.c resp = &reply->msg->r.BindResponse; reply 301 source4/ldap_server/ldap_bind.c resp->response.errormessage = talloc_asprintf(reply, "Bad AuthenticationChoice [%d]", req->mechanism); reply 305 source4/ldap_server/ldap_bind.c ldapsrv_queue_reply(call, reply); reply 45 source4/ldap_server/ldap_extended.c struct ldapsrv_reply *reply, reply 59 source4/ldap_server/ldap_extended.c (*errstr) = talloc_asprintf(reply, "START-TLS: TLS is already enabled on this LDAP session"); reply 72 source4/ldap_server/ldap_extended.c (*errstr) = talloc_asprintf(reply, "START-TLS: Failed to setup TLS socket"); reply 79 source4/ldap_server/ldap_extended.c reply->msg->r.ExtendedResponse.response.resultcode = LDAP_SUCCESS; reply 80 source4/ldap_server/ldap_extended.c reply->msg->r.ExtendedResponse.response.errormessage = NULL; reply 82 source4/ldap_server/ldap_extended.c ldapsrv_queue_reply(call, reply); reply 88 source4/ldap_server/ldap_extended.c NTSTATUS (*fn)(struct ldapsrv_call *call, struct ldapsrv_reply *reply, const char **errorstr); reply 104 source4/ldap_server/ldap_extended.c struct ldapsrv_reply *reply; reply 112 source4/ldap_server/ldap_extended.c reply = ldapsrv_init_reply(call, LDAP_TAG_ExtendedResponse); reply 113 source4/ldap_server/ldap_extended.c NT_STATUS_HAVE_NO_MEMORY(reply); reply 115 source4/ldap_server/ldap_extended.c ZERO_STRUCT(reply->msg->r); reply 116 source4/ldap_server/ldap_extended.c reply->msg->r.ExtendedResponse.oid = talloc_steal(reply, req->oid); reply 117 source4/ldap_server/ldap_extended.c reply->msg->r.ExtendedResponse.response.resultcode = LDAP_PROTOCOL_ERROR; reply 118 source4/ldap_server/ldap_extended.c reply->msg->r.ExtendedResponse.response.errormessage = NULL; reply 128 source4/ldap_server/ldap_extended.c status = extended_ops[i].fn(call, reply, &error_str); reply 135 source4/ldap_server/ldap_extended.c error_str = talloc_asprintf(reply, "Extended Operation(%s) failed: %s", reply 141 source4/ldap_server/ldap_extended.c error_str = talloc_asprintf(reply, "Extended Operation(%s) not supported", reply 145 source4/ldap_server/ldap_extended.c reply->msg->r.ExtendedResponse.response.resultcode = result; reply 146 source4/ldap_server/ldap_extended.c reply->msg->r.ExtendedResponse.response.errormessage = error_str; reply 148 source4/ldap_server/ldap_extended.c ldapsrv_queue_reply(call, reply); reply 257 source4/lib/ldb/tools/cmdline.c int handle_controls_reply(struct ldb_control **reply, struct ldb_control **request) reply 262 source4/lib/ldb/tools/cmdline.c if (reply == NULL || request == NULL) return -1; reply 264 source4/lib/ldb/tools/cmdline.c for (i = 0; reply[i]; i++) { reply 265 source4/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_VLV_RESP_OID, reply[i]->oid) == 0) { reply 268 source4/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_vlv_resp_control); reply 290 source4/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_ASQ_OID, reply[i]->oid) == 0) { reply 293 source4/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_asq_control); reply 303 source4/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_PAGED_RESULTS_OID, reply[i]->oid) == 0) { reply 306 source4/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_paged_control); reply 335 source4/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_SORT_RESP_OID, reply[i]->oid) == 0) { reply 338 source4/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_sort_resp_control); reply 358 source4/lib/ldb/tools/cmdline.c if (strcmp(LDB_CONTROL_DIRSYNC_OID, reply[i]->oid) == 0) { reply 362 source4/lib/ldb/tools/cmdline.c rep_control = talloc_get_type(reply[i]->data, struct ldb_dirsync_control); reply 393 source4/lib/ldb/tools/cmdline.c fprintf(stderr, "Unknown reply control oid: %s\n", reply[i]->oid); reply 53 source4/lib/ldb/tools/cmdline.h int handle_controls_reply(struct ldb_control **reply, struct ldb_control **request); reply 651 source4/libcli/cldap/cldap.c struct cldap_reply reply; reply 654 source4/libcli/cldap/cldap.c reply.messageid = message_id; reply 655 source4/libcli/cldap/cldap.c reply.dest = src; reply 656 source4/libcli/cldap/cldap.c reply.response = NULL; reply 657 source4/libcli/cldap/cldap.c reply.result = &result; reply 661 source4/libcli/cldap/cldap.c status = cldap_reply_send(cldap, &reply); reply 677 source4/libcli/cldap/cldap.c struct cldap_reply reply; reply 680 source4/libcli/cldap/cldap.c reply.messageid = message_id; reply 681 source4/libcli/cldap/cldap.c reply.dest = src; reply 682 source4/libcli/cldap/cldap.c reply.response = NULL; reply 683 source4/libcli/cldap/cldap.c reply.result = &result; reply 689 source4/libcli/cldap/cldap.c status = cldap_reply_send(cldap, &reply); reply 705 source4/libcli/cldap/cldap.c struct cldap_reply reply; reply 716 source4/libcli/cldap/cldap.c reply.messageid = message_id; reply 717 source4/libcli/cldap/cldap.c reply.dest = src; reply 718 source4/libcli/cldap/cldap.c reply.response = &response; reply 719 source4/libcli/cldap/cldap.c reply.result = &result; reply 731 source4/libcli/cldap/cldap.c status = cldap_reply_send(cldap, &reply); reply 60 source4/libcli/dgram/browse.c struct nbt_browse_packet *reply) reply 69 source4/libcli/dgram/browse.c ndr_err = ndr_push_struct_blob(&blob, tmp_ctx, dgmsock->iconv_convenience, reply, reply 131 source4/libcli/dgram/libdgram.h struct nbt_netlogon_response *reply); reply 152 source4/libcli/dgram/libdgram.h struct nbt_browse_packet *reply); reply 69 source4/libcli/dgram/netlogon.c struct nbt_netlogon_response *reply) reply 78 source4/libcli/dgram/netlogon.c reply); reply 84 source4/libcli/resolve/dns_ex.c struct dns_reply *reply; reply 98 source4/libcli/resolve/dns_ex.c reply = dns_lookup(state->name.name, do_srv?"SRV":"A"); reply 99 source4/libcli/resolve/dns_ex.c if (!reply) { reply 104 source4/libcli/resolve/dns_ex.c dns_srv_order(reply); reply 108 source4/libcli/resolve/dns_ex.c for (rr=reply->head; rr; rr=rr->next) { reply 163 source4/libcli/resolve/dns_ex.c for (rr=reply->head;rr;rr=rr->next) { reply 205 source4/libcli/resolve/dns_ex.c for (rr=reply->head;rr;rr=rr->next) { reply 801 source4/libcli/wrepl/winsrepl.c io->out.num_names = packet->message.replication.info.reply.num_names; reply 808 source4/libcli/wrepl/winsrepl.c struct wrepl_wins_name *wname = &packet->message.replication.info.reply.names[i]; reply 40 source4/nbt_server/dgram/ntlogon.c struct nbt_ntlogon_packet reply; reply 49 source4/nbt_server/dgram/ntlogon.c ZERO_STRUCT(reply); reply 50 source4/nbt_server/dgram/ntlogon.c reply.command = NTLOGON_SAM_LOGON_REPLY; reply 51 source4/nbt_server/dgram/ntlogon.c logon = &reply.req.reply; reply 67 source4/nbt_server/dgram/ntlogon.c &reply); reply 72 source4/ntp_signd/ntp_signd.c DATA_BLOB reply, blob; reply 82 source4/ntp_signd/ntp_signd.c ndr_err = ndr_push_struct_blob(&reply, tmp_ctx, reply 93 source4/ntp_signd/ntp_signd.c blob = data_blob_talloc(ntp_signdconn, NULL, reply.length + 4); reply 99 source4/ntp_signd/ntp_signd.c RSIVAL(blob.data, 0, reply.length); reply 100 source4/ntp_signd/ntp_signd.c memcpy(blob.data + 4, reply.data, reply.length); reply 958 source4/rpc_server/dcerpc_server.c status = context->iface->reply(call, call, call->r); reply 62 source4/rpc_server/dcerpc_server.h NTSTATUS (*reply)(struct dcesrv_call_state *, TALLOC_CTX *, void *); reply 268 source4/rpc_server/remote/dcesrv_remote.c iface->reply = remote_op_reply; reply 123 source4/smbd/service_named_pipe.c goto reply; reply 130 source4/smbd/service_named_pipe.c goto reply; reply 153 source4/smbd/service_named_pipe.c goto reply; reply 165 source4/smbd/service_named_pipe.c goto reply; reply 174 source4/smbd/service_named_pipe.c goto reply; reply 177 source4/smbd/service_named_pipe.c reply: reply 760 source4/torture/nbt/winsreplication.c send_reply = &repl_send.message.replication.info.reply; reply 142 source4/torture/rpc/spoolss_notify.c .reply = spoolss__op_reply, reply 192 source4/wrepl_server/wrepl_in_call.c struct wrepl_send_reply *reply_out = &call->rep_packet.message.replication.info.reply;