reply              89 examples/auth/crackcheck/crackcheck.c 	char *reply;
reply             132 examples/auth/crackcheck/crackcheck.c 	reply = FascistCheck(password, dictionary);
reply             133 examples/auth/crackcheck/crackcheck.c 	if (reply != NULL) {
reply             134 examples/auth/crackcheck/crackcheck.c 		fprintf(stderr, "ERR - %s\n\n", reply);
reply              65 nsswitch/pam_winbind.h #define _pam_drop_reply(/* struct pam_response * */ reply, /* int */ replies) \
reply              70 nsswitch/pam_winbind.h         if (reply[reply_i].resp) {                \
reply              71 nsswitch/pam_winbind.h             _pam_overwrite(reply[reply_i].resp);  \
reply              72 nsswitch/pam_winbind.h             free(reply[reply_i].resp);            \
reply              75 nsswitch/pam_winbind.h     if (reply)                                    \
reply              76 nsswitch/pam_winbind.h         free(reply);                              \
reply             213 source3/auth/auth_ntlmssp.c 			     const DATA_BLOB request, DATA_BLOB *reply) 
reply             215 source3/auth/auth_ntlmssp.c 	return ntlmssp_update(auth_ntlmssp_state->ntlmssp_state, request, reply);
reply             119 source3/auth/pampass.c 	struct pam_response *reply = NULL;
reply             137 source3/auth/pampass.c 	reply = SMB_MALLOC_ARRAY(struct pam_response, num_msg);
reply             138 source3/auth/pampass.c 	if (!reply)
reply             141 source3/auth/pampass.c 	memset(reply, '\0', sizeof(struct pam_response) * num_msg);
reply             146 source3/auth/pampass.c 				reply[replies].resp_retcode = PAM_SUCCESS;
reply             147 source3/auth/pampass.c 				reply[replies].resp = COPY_STRING(udp->PAM_username);
reply             152 source3/auth/pampass.c 				reply[replies].resp_retcode = PAM_SUCCESS;
reply             153 source3/auth/pampass.c 				reply[replies].resp = COPY_STRING(udp->PAM_password);
reply             162 source3/auth/pampass.c 				reply[replies].resp_retcode = PAM_SUCCESS;
reply             163 source3/auth/pampass.c 				reply[replies].resp = NULL;
reply             168 source3/auth/pampass.c 				SAFE_FREE(reply);
reply             172 source3/auth/pampass.c 	if (reply)
reply             173 source3/auth/pampass.c 		*resp = reply;
reply             202 source3/auth/pampass.c 	fstring reply;
reply             212 source3/auth/pampass.c 	char *reply;
reply             242 source3/auth/pampass.c 		if (!next_token_talloc(frame, &p, &reply, NULL)) {
reply             246 source3/auth/pampass.c 		if (strequal(reply,".")) {
reply             247 source3/auth/pampass.c 			fstrcpy(reply,"");
reply             250 source3/auth/pampass.c 		special_char_sub(reply);
reply             251 source3/auth/pampass.c 		fstrcpy(t->reply, reply);
reply             252 source3/auth/pampass.c 		strlower_m(t->reply);
reply             253 source3/auth/pampass.c 		trim_char(t->reply, ' ', ' ');
reply             275 source3/auth/pampass.c 	struct pam_response *reply = NULL;
reply             303 source3/auth/pampass.c 	reply = SMB_MALLOC_ARRAY(struct pam_response, num_msg);
reply             304 source3/auth/pampass.c 	if (!reply) {
reply             324 source3/auth/pampass.c 					fstrcpy(current_reply, t->reply);
reply             330 source3/auth/pampass.c 					reply[replies].resp_retcode = PAM_SUCCESS;
reply             331 source3/auth/pampass.c 					reply[replies].resp = COPY_FSTRING(current_reply);
reply             340 source3/auth/pampass.c 				SAFE_FREE(reply);
reply             355 source3/auth/pampass.c 					fstrcpy(current_reply, t->reply);
reply             358 source3/auth/pampass.c 					reply[replies].resp_retcode = PAM_SUCCESS;
reply             359 source3/auth/pampass.c 					reply[replies].resp = COPY_FSTRING(current_reply);
reply             372 source3/auth/pampass.c 				SAFE_FREE(reply);
reply             382 source3/auth/pampass.c 			reply[replies].resp_retcode = PAM_SUCCESS;
reply             383 source3/auth/pampass.c 			reply[replies].resp = NULL;
reply             389 source3/auth/pampass.c 			SAFE_FREE(reply);
reply             395 source3/auth/pampass.c 	if (reply)
reply             396 source3/auth/pampass.c 		*resp = reply;
reply            1007 source3/include/includes.h 					krb5_data *reply);
reply              56 source3/include/proto.h 			     const DATA_BLOB request, DATA_BLOB *reply) ;
reply            1717 source3/include/proto.h 			struct netlogon_samlogon_response **reply);
reply            2406 source3/include/proto.h 			    struct netlogon_samlogon_response **reply);
reply            2826 source3/include/proto.h DATA_BLOB spnego_gen_auth_response(DATA_BLOB *reply, NTSTATUS nt_status,
reply             700 source3/lib/ctdbd_conn.c 	struct ctdb_reply_control *reply = NULL;
reply             755 source3/lib/ctdbd_conn.c 	status = ctdb_read_req(conn, req.hdr.reqid, NULL, (void *)&reply);
reply             762 source3/lib/ctdbd_conn.c 	if (reply->hdr.operation != CTDB_REPLY_CONTROL) {
reply             769 source3/lib/ctdbd_conn.c 			      mem_ctx, reply->data, reply->datalen))) {
reply             770 source3/lib/ctdbd_conn.c 			TALLOC_FREE(reply);
reply             773 source3/lib/ctdbd_conn.c 		outdata->dsize = reply->datalen;
reply             776 source3/lib/ctdbd_conn.c 		(*cstatus) = reply->status;
reply             783 source3/lib/ctdbd_conn.c 	TALLOC_FREE(reply);
reply             894 source3/lib/ctdbd_conn.c 	struct ctdb_reply_call *reply;
reply             929 source3/lib/ctdbd_conn.c 	status = ctdb_read_req(conn, req.hdr.reqid, NULL, (void *)&reply);
reply             936 source3/lib/ctdbd_conn.c 	if (reply->hdr.operation != CTDB_REPLY_CALL) {
reply             945 source3/lib/ctdbd_conn.c 	TALLOC_FREE(reply);
reply             956 source3/lib/ctdbd_conn.c 	struct ctdb_reply_call *reply;
reply             988 source3/lib/ctdbd_conn.c 	status = ctdb_read_req(conn, req.hdr.reqid, NULL, (void *)&reply);
reply             995 source3/lib/ctdbd_conn.c 	if (reply->hdr.operation != CTDB_REPLY_CALL) {
reply            1001 source3/lib/ctdbd_conn.c 	data->dsize = reply->datalen;
reply            1007 source3/lib/ctdbd_conn.c 	data->dptr = (uint8 *)talloc_memdup(mem_ctx, &reply->data[0],
reply            1008 source3/lib/ctdbd_conn.c 					    reply->datalen);
reply            1018 source3/lib/ctdbd_conn.c 	TALLOC_FREE(reply);
reply             613 source3/lib/ldb/tools/cmdline.c int handle_controls_reply(struct ldb_control **reply, struct ldb_control **request)
reply             618 source3/lib/ldb/tools/cmdline.c 	if (reply == NULL || request == NULL) return -1;
reply             620 source3/lib/ldb/tools/cmdline.c 	for (i = 0; reply[i]; i++) {
reply             621 source3/lib/ldb/tools/cmdline.c 		if (strcmp(LDB_CONTROL_VLV_RESP_OID, reply[i]->oid) == 0) {
reply             624 source3/lib/ldb/tools/cmdline.c 			rep_control = talloc_get_type(reply[i]->data, struct ldb_vlv_resp_control);
reply             646 source3/lib/ldb/tools/cmdline.c 		if (strcmp(LDB_CONTROL_ASQ_OID, reply[i]->oid) == 0) {
reply             649 source3/lib/ldb/tools/cmdline.c 			rep_control = talloc_get_type(reply[i]->data, struct ldb_asq_control);
reply             659 source3/lib/ldb/tools/cmdline.c 		if (strcmp(LDB_CONTROL_PAGED_RESULTS_OID, reply[i]->oid) == 0) {
reply             662 source3/lib/ldb/tools/cmdline.c 			rep_control = talloc_get_type(reply[i]->data, struct ldb_paged_control);
reply             691 source3/lib/ldb/tools/cmdline.c 		if (strcmp(LDB_CONTROL_SORT_RESP_OID, reply[i]->oid) == 0) {
reply             694 source3/lib/ldb/tools/cmdline.c 			rep_control = talloc_get_type(reply[i]->data, struct ldb_sort_resp_control);
reply             714 source3/lib/ldb/tools/cmdline.c 		if (strcmp(LDB_CONTROL_DIRSYNC_OID, reply[i]->oid) == 0) {
reply             718 source3/lib/ldb/tools/cmdline.c 			rep_control = talloc_get_type(reply[i]->data, struct ldb_dirsync_control);
reply             749 source3/lib/ldb/tools/cmdline.c 		fprintf(stderr, "Unknown reply control oid: %s\n", reply[i]->oid);
reply              53 source3/lib/ldb/tools/cmdline.h int handle_controls_reply(struct ldb_control **reply, struct ldb_control **request);
reply             115 source3/libads/cldap.c 			       struct netlogon_samlogon_response **reply)
reply             235 source3/libads/cldap.c 	if (reply) {
reply             236 source3/libads/cldap.c 		*reply = r;
reply             252 source3/libads/cldap.c 			struct netlogon_samlogon_response **reply)
reply             271 source3/libads/cldap.c 	ret = recv_cldap_netlogon(mem_ctx, sock, nt_version, reply);
reply             291 source3/libads/cldap.c 	struct netlogon_samlogon_response *reply = NULL;
reply             294 source3/libads/cldap.c 	ret = ads_cldap_netlogon(mem_ctx, server, realm, nt_version, &reply);
reply             299 source3/libads/cldap.c 	if (reply->ntver != NETLOGON_NT_VERSION_5EX) {
reply             301 source3/libads/cldap.c 			reply->ntver));
reply             305 source3/libads/cldap.c 	*reply5 = reply->data.nt5_ex;
reply              46 source3/libads/kerberos.c 	memset(prompts[0].reply->data, '\0', prompts[0].reply->length);
reply              47 source3/libads/kerberos.c 	if (prompts[0].reply->length > 0) {
reply              49 source3/libads/kerberos.c 			strncpy(prompts[0].reply->data, (const char *)data,
reply              50 source3/libads/kerberos.c 				prompts[0].reply->length-1);
reply              51 source3/libads/kerberos.c 			prompts[0].reply->length = strlen(prompts[0].reply->data);
reply              53 source3/libads/kerberos.c 			prompts[0].reply->length = 0;
reply             703 source3/libads/krb5_setpw.c 	memset(prompts[0].reply->data, 0, prompts[0].reply->length);
reply             704 source3/libads/krb5_setpw.c 	if (prompts[0].reply->length > 0) {
reply             706 source3/libads/krb5_setpw.c 			strncpy((char *)prompts[0].reply->data,
reply             708 source3/libads/krb5_setpw.c 				prompts[0].reply->length-1);
reply             709 source3/libads/krb5_setpw.c 			prompts[0].reply->length = strlen((const char *)prompts[0].reply->data);
reply             711 source3/libads/krb5_setpw.c 			prompts[0].reply->length = 0;
reply            1626 source3/libsmb/clikrb5.c 				krb5_data *reply)
reply            1646 source3/libsmb/clikrb5.c 	return krb5_mk_error(context, &e, reply);
reply            1656 source3/libsmb/clikrb5.c 				reply);
reply             524 source3/libsmb/clispnego.c DATA_BLOB spnego_gen_auth_response(DATA_BLOB *reply, NTSTATUS nt_status,
reply             556 source3/libsmb/clispnego.c 	if (reply && reply->data != NULL) {
reply             558 source3/libsmb/clispnego.c 		asn1_write_OctetString(data, reply->data, reply->length);
reply              27 source3/libsmb/ntlmssp.c 				       DATA_BLOB reply, DATA_BLOB *next_request);
reply              31 source3/libsmb/ntlmssp.c 					 const DATA_BLOB reply, DATA_BLOB *next_request);
reply              33 source3/libsmb/ntlmssp.c 				    const DATA_BLOB request, DATA_BLOB *reply);
reply             511 source3/libsmb/ntlmssp.c 					 const DATA_BLOB request, DATA_BLOB *reply) 
reply             603 source3/libsmb/ntlmssp.c 		msrpc_gen(reply, gen_string,
reply             630 source3/libsmb/ntlmssp.c 				    const DATA_BLOB request, DATA_BLOB *reply) 
reply             651 source3/libsmb/ntlmssp.c 	*reply = data_blob_null;
reply             960 source3/libsmb/ntlmssp.c 				  DATA_BLOB reply, DATA_BLOB *next_request) 
reply             995 source3/libsmb/ntlmssp.c 					 const DATA_BLOB reply, DATA_BLOB *next_request) 
reply            1010 source3/libsmb/ntlmssp.c 	if (!msrpc_parse(&reply, "CdBd",
reply            1016 source3/libsmb/ntlmssp.c 		dump_data(2, reply.data, reply.length);
reply            1048 source3/libsmb/ntlmssp.c 	if (!msrpc_parse(&reply, chal_parse_string,
reply            1057 source3/libsmb/ntlmssp.c 		dump_data(2, reply.data, reply.length);
reply              59 source3/pam_smbpass/support.c #define _pam_drop_reply(/* struct pam_response * */ reply, /* int */ replies) \
reply              64 source3/pam_smbpass/support.c 	if (reply[reply_i].resp) {                \
reply              65 source3/pam_smbpass/support.c 	    _pam_overwrite(reply[reply_i].resp);  \
reply              66 source3/pam_smbpass/support.c 	    free(reply[reply_i].resp);            \
reply              69 source3/pam_smbpass/support.c     if (reply)                                    \
reply              70 source3/pam_smbpass/support.c 	free(reply);                              \
reply             608 source3/rpc_server/srv_pipe.c 	DATA_BLOB session_key, reply;
reply             616 source3/rpc_server/srv_pipe.c 	ZERO_STRUCT(reply);
reply             620 source3/rpc_server/srv_pipe.c 	status = auth_ntlmssp_update(a, *p_resp_blob, &reply);
reply             624 source3/rpc_server/srv_pipe.c 	data_blob_free(&reply);
reply             511 source3/rpc_server/srv_pipe_hnd.c 	bool reply = False;
reply             538 source3/rpc_server/srv_pipe_hnd.c 			reply = process_request_pdu(p, &rpc_in);
reply             570 source3/rpc_server/srv_pipe_hnd.c 				reply = api_pipe_bind_req(p, &rpc_in);
reply             587 source3/rpc_server/srv_pipe_hnd.c 				reply = api_pipe_alter_context(p, &rpc_in);
reply             601 source3/rpc_server/srv_pipe_hnd.c 				reply = api_pipe_bind_auth3(p, &rpc_in);
reply             616 source3/rpc_server/srv_pipe_hnd.c 			reply = True;
reply             624 source3/rpc_server/srv_pipe_hnd.c 				reply = setup_cancel_ack_reply(p, &rpc_in);
reply             633 source3/rpc_server/srv_pipe_hnd.c 			reply = True;
reply             644 source3/rpc_server/srv_pipe_hnd.c 	if (!reply) {
reply            4665 source3/smbd/lanman.c 	bool reply=False;
reply            4732 source3/smbd/lanman.c 	reply = api_commands[i].fn(conn,
reply            4741 source3/smbd/lanman.c 		reply = api_TooSmall(conn,vuid,params,data,mdrcnt,mprcnt,
reply            4746 source3/smbd/lanman.c 	if (!reply) {
reply            4747 source3/smbd/lanman.c 		reply = api_Unsupported(conn,vuid,params,tpscnt,data,tdscnt,mdrcnt,mprcnt,
reply            4752 source3/smbd/lanman.c 	if (reply) {
reply             184 source3/smbd/sesssetup.c 	krb5_data reply;
reply             212 source3/smbd/sesssetup.c 			host_princ, &reply);
reply             220 source3/smbd/sesssetup.c 	*pblob_out = data_blob(reply.data, reply.length);
reply             221 source3/smbd/sesssetup.c 	kerberos_free_data_contents(context,&reply);
reply              47 source3/utils/net_ads.c 	struct NETLOGON_SAM_LOGON_RESPONSE_EX reply;
reply              50 source3/utils/net_ads.c 	if ( !ads_cldap_netlogon_5(talloc_tos(), addr, ads->server.realm, &reply ) ) {
reply              59 source3/utils/net_ads.c 	switch (reply.command) {
reply              67 source3/utils/net_ads.c 		d_printf("0x%x\n", reply.command);
reply              71 source3/utils/net_ads.c 	d_printf("GUID: %s\n", GUID_string(talloc_tos(), &reply.domain_uuid));
reply              86 source3/utils/net_ads.c 		 (reply.server_type & NBT_SERVER_PDC) ? "yes" : "no",
reply              87 source3/utils/net_ads.c 		 (reply.server_type & NBT_SERVER_GC) ? "yes" : "no",
reply              88 source3/utils/net_ads.c 		 (reply.server_type & NBT_SERVER_LDAP) ? "yes" : "no",
reply              89 source3/utils/net_ads.c 		 (reply.server_type & NBT_SERVER_DS) ? "yes" : "no",
reply              90 source3/utils/net_ads.c 		 (reply.server_type & NBT_SERVER_KDC) ? "yes" : "no",
reply              91 source3/utils/net_ads.c 		 (reply.server_type & NBT_SERVER_TIMESERV) ? "yes" : "no",
reply              92 source3/utils/net_ads.c 		 (reply.server_type & NBT_SERVER_CLOSEST) ? "yes" : "no",
reply              93 source3/utils/net_ads.c 		 (reply.server_type & NBT_SERVER_WRITABLE) ? "yes" : "no",
reply              94 source3/utils/net_ads.c 		 (reply.server_type & NBT_SERVER_GOOD_TIMESERV) ? "yes" : "no",
reply              95 source3/utils/net_ads.c 		 (reply.server_type & NBT_SERVER_NDNC) ? "yes" : "no",
reply              96 source3/utils/net_ads.c 		 (reply.server_type & NBT_SERVER_SELECT_SECRET_DOMAIN_6) ? "yes" : "no",
reply              97 source3/utils/net_ads.c 		 (reply.server_type & NBT_SERVER_FULL_SECRET_DOMAIN_6) ? "yes" : "no");
reply             100 source3/utils/net_ads.c 	printf("Forest:\t\t\t%s\n", reply.forest);
reply             101 source3/utils/net_ads.c 	printf("Domain:\t\t\t%s\n", reply.dns_domain);
reply             102 source3/utils/net_ads.c 	printf("Domain Controller:\t%s\n", reply.pdc_dns_name);
reply             104 source3/utils/net_ads.c 	printf("Pre-Win2k Domain:\t%s\n", reply.domain);
reply             105 source3/utils/net_ads.c 	printf("Pre-Win2k Hostname:\t%s\n", reply.pdc_name);
reply             107 source3/utils/net_ads.c 	if (*reply.user_name) printf("User name:\t%s\n", reply.user_name);
reply             109 source3/utils/net_ads.c 	printf("Server Site Name :\t\t%s\n", reply.server_site);
reply             110 source3/utils/net_ads.c 	printf("Client Site Name :\t\t%s\n", reply.client_site);
reply             112 source3/utils/net_ads.c 	d_printf("NT Version: %d\n", reply.nt_version);
reply             113 source3/utils/net_ads.c 	d_printf("LMNT Token: %.2x\n", reply.lmnt_token);
reply             114 source3/utils/net_ads.c 	d_printf("LM20 Token: %.2x\n", reply.lm20_token);
reply             370 source3/utils/net_ads.c 	struct NETLOGON_SAM_LOGON_RESPONSE_EX reply;
reply             390 source3/utils/net_ads.c 	if ( !ads_cldap_netlogon_5(talloc_tos(), addr, ads->server.realm, &reply ) ) {
reply             396 source3/utils/net_ads.c 	d_printf("Workgroup: %s\n", reply.domain);
reply             675 source3/utils/ntlm_auth.c 				DATA_BLOB *reply)
reply             711 source3/utils/ntlm_auth.c 	if (reply) {
reply             712 source3/utils/ntlm_auth.c 		*reply = data_blob(wb_response.extra_data.data,
reply             715 source3/utils/ntlm_auth.c 				reply->data == NULL) {
reply             728 source3/utils/ntlm_auth.c 	DATA_BLOB request, reply;
reply             820 source3/utils/ntlm_auth.c 	nt_status = ntlmssp_update(state->ntlmssp_state, request, &reply);
reply             824 source3/utils/ntlm_auth.c 				reply);
reply             827 source3/utils/ntlm_auth.c 		data_blob_free(&reply);
reply             859 source3/utils/ntlm_auth.c 	DATA_BLOB request, reply;
reply             983 source3/utils/ntlm_auth.c 				&reply);
reply             986 source3/utils/ntlm_auth.c 				&reply);
reply             991 source3/utils/ntlm_auth.c 				reply);
reply             994 source3/utils/ntlm_auth.c 			state->initial_message = reply;
reply             998 source3/utils/ntlm_auth.c 			data_blob_free(&reply);
reply            1004 source3/utils/ntlm_auth.c 				reply);
reply            1491 source3/utils/ntlm_auth.c 	SPNEGO_DATA reply;
reply            1550 source3/utils/ntlm_auth.c 	ZERO_STRUCT(reply);
reply            1552 source3/utils/ntlm_auth.c 	reply.type = SPNEGO_NEG_TOKEN_INIT;
reply            1553 source3/utils/ntlm_auth.c 	reply.negTokenInit.mechTypes = my_mechs;
reply            1554 source3/utils/ntlm_auth.c 	reply.negTokenInit.reqFlags = 0;
reply            1555 source3/utils/ntlm_auth.c 	reply.negTokenInit.mechToken = tkt;
reply            1556 source3/utils/ntlm_auth.c 	reply.negTokenInit.mechListMIC = data_blob_null;
reply            1558 source3/utils/ntlm_auth.c 	len = write_spnego_data(&to_server, &reply);
reply              53 source3/winbindd/winbindd_ccache_access.c 	DATA_BLOB dummy_msg, reply;
reply              98 source3/winbindd/winbindd_ccache_access.c 	reply = data_blob_null;
reply              99 source3/winbindd/winbindd_ccache_access.c 	status = ntlmssp_update(ntlmssp_state, dummy_msg, &reply);
reply             101 source3/winbindd/winbindd_ccache_access.c 	data_blob_free(&reply);
reply             110 source3/winbindd/winbindd_ccache_access.c 	status = ntlmssp_update(ntlmssp_state, challenge_msg, &reply);
reply             115 source3/winbindd/winbindd_ccache_access.c 		data_blob_free(&reply);
reply             118 source3/winbindd/winbindd_ccache_access.c 	*auth_msg = reply;
reply              43 source4/auth/kerberos/krb5_init_context.c 	DATA_BLOB request, reply;
reply             116 source4/auth/kerberos/krb5_init_context.c 	smb_krb5->reply = blob;
reply             124 source4/auth/kerberos/krb5_init_context.c 	smb_krb5->reply = data;
reply             125 source4/auth/kerberos/krb5_init_context.c 	smb_krb5->reply.length -= 4;
reply             126 source4/auth/kerberos/krb5_init_context.c 	smb_krb5->reply.data += 4;
reply             300 source4/auth/kerberos/krb5_init_context.c 		smb_krb5->reply = data_blob(NULL, 0);
reply             331 source4/auth/kerberos/krb5_init_context.c 		while ((NT_STATUS_IS_OK(smb_krb5->status)) && !smb_krb5->reply.length) {
reply             348 source4/auth/kerberos/krb5_init_context.c 		ret = krb5_data_copy(recv_buf, smb_krb5->reply.data, smb_krb5->reply.length);
reply             157 source4/auth/ntlm/auth_unix.c 			 struct pam_response **reply, void *appdata_ptr)
reply             163 source4/auth/ntlm/auth_unix.c 		*reply = NULL;
reply             173 source4/auth/ntlm/auth_unix.c 		*reply = NULL;
reply             181 source4/auth/ntlm/auth_unix.c 	*reply = malloc_array_p(struct pam_response, num_msg);
reply             182 source4/auth/ntlm/auth_unix.c 	if (*reply == NULL) {
reply             189 source4/auth/ntlm/auth_unix.c 				(*reply)[num].resp_retcode = PAM_SUCCESS;
reply             190 source4/auth/ntlm/auth_unix.c 				(*reply)[num].resp = COPY_STRING(info->account_name);
reply             194 source4/auth/ntlm/auth_unix.c 				(*reply)[num].resp_retcode = PAM_SUCCESS;
reply             195 source4/auth/ntlm/auth_unix.c 				(*reply)[num].resp = COPY_STRING(info->plaintext_password);
reply             199 source4/auth/ntlm/auth_unix.c 				(*reply)[num].resp_retcode = PAM_SUCCESS;
reply             200 source4/auth/ntlm/auth_unix.c 				(*reply)[num].resp = NULL;
reply             205 source4/auth/ntlm/auth_unix.c 				(*reply)[num].resp_retcode = PAM_SUCCESS;
reply             206 source4/auth/ntlm/auth_unix.c 				(*reply)[num].resp = NULL;
reply             212 source4/auth/ntlm/auth_unix.c 					SAFE_FREE((*reply)[num-1].resp);
reply             215 source4/auth/ntlm/auth_unix.c 				SAFE_FREE(*reply);
reply             216 source4/auth/ntlm/auth_unix.c 				*reply = NULL;
reply              80 source4/cldap_server/rootdse.c 		goto reply;
reply              88 source4/cldap_server/rootdse.c 		goto reply;
reply              93 source4/cldap_server/rootdse.c 		goto reply;
reply              99 source4/cldap_server/rootdse.c 		goto reply;
reply             111 source4/cldap_server/rootdse.c 			goto reply;
reply             129 source4/cldap_server/rootdse.c reply:
reply             160 source4/cldap_server/rootdse.c 	struct cldap_reply reply;
reply             166 source4/cldap_server/rootdse.c 	reply.messageid		= message_id;
reply             167 source4/cldap_server/rootdse.c 	reply.dest		= src;
reply             168 source4/cldap_server/rootdse.c 	reply.response		= NULL;
reply             169 source4/cldap_server/rootdse.c 	reply.result		= &result;
reply             171 source4/cldap_server/rootdse.c 	cldapd_rootdse_fill(cldapd, tmp_ctx, search, &reply.response, reply.result);
reply             173 source4/cldap_server/rootdse.c 	status = cldap_reply_send(cldap, &reply);
reply             195 source4/heimdal/kdc/524.c 		  EncryptedData *reply)
reply             213 source4/heimdal/kdc/524.c 				     reply);
reply             294 source4/heimdal/kdc/524.c 	    const Ticket *t, krb5_data *reply,
reply             390 source4/heimdal/kdc/524.c 	ret = krb5_storage_to_data(sp, reply);
reply             391 source4/heimdal/kdc/524.c 	reply->length = krb5_storage_seek(sp, 0, SEEK_CUR);
reply             394 source4/heimdal/kdc/524.c 	krb5_data_zero(reply);
reply             204 source4/heimdal/kdc/digest.c 	       const DigestREQ *req, krb5_data *reply,
reply             232 source4/heimdal/kdc/digest.c     krb5_data_zero(reply);
reply            1417 source4/heimdal/kdc/digest.c     ASN1_MALLOC_ENCODE(DigestREP, reply->data, reply->length, &rep, &size, ret);
reply            1422 source4/heimdal/kdc/digest.c     if (size != reply->length)
reply             201 source4/heimdal/kdc/kaserver.c 		  krb5_data *reply)
reply             216 source4/heimdal/kdc/kaserver.c     krb5_storage_to_data (sp, reply);
reply             295 source4/heimdal/kdc/kaserver.c 		     krb5_data *reply)
reply             359 source4/heimdal/kdc/kaserver.c 	make_error_reply (hdr, KAANSWERTOOLONG, reply);
reply             387 source4/heimdal/kdc/kaserver.c     krb5_storage_to_data (sp, reply);
reply             439 source4/heimdal/kdc/kaserver.c 		 krb5_data *reply)
reply             464 source4/heimdal/kdc/kaserver.c 	make_error_reply (hdr, KABADREQUEST, reply);
reply             482 source4/heimdal/kdc/kaserver.c 	make_error_reply (hdr, KANOENT, reply);
reply             492 source4/heimdal/kdc/kaserver.c 	make_error_reply (hdr, KANOENT, reply);
reply             501 source4/heimdal/kdc/kaserver.c 	make_error_reply (hdr, KAPWEXPIRED, reply);
reply             509 source4/heimdal/kdc/kaserver.c 	make_error_reply (hdr, KANOKEYS, reply);
reply             517 source4/heimdal/kdc/kaserver.c 	make_error_reply (hdr, KANOKEYS, reply);
reply             541 source4/heimdal/kdc/kaserver.c 	make_error_reply (hdr, KABADREQUEST, reply);
reply             550 source4/heimdal/kdc/kaserver.c 	make_error_reply (hdr, KACLOCKSKEW, reply);
reply             574 source4/heimdal/kdc/kaserver.c 			 &ckey->key, reply);
reply             652 source4/heimdal/kdc/kaserver.c 	      krb5_data *reply)
reply             685 source4/heimdal/kdc/kaserver.c 	make_error_reply (hdr, KABADREQUEST, reply);
reply             698 source4/heimdal/kdc/kaserver.c 	make_error_reply (hdr, KANOENT, reply);
reply             709 source4/heimdal/kdc/kaserver.c 	make_error_reply (hdr, KANOENT, reply);
reply             717 source4/heimdal/kdc/kaserver.c 	make_error_reply (hdr, KANOKEYS, reply);
reply             725 source4/heimdal/kdc/kaserver.c 	make_error_reply (hdr, KANOKEYS, reply);
reply             744 source4/heimdal/kdc/kaserver.c 	    make_error_reply (hdr, KABADTICKET, reply);
reply             753 source4/heimdal/kdc/kaserver.c 	    make_error_reply (hdr, KABADTICKET, reply);
reply             764 source4/heimdal/kdc/kaserver.c 	    make_error_reply (hdr, KABADTICKET, reply);
reply             782 source4/heimdal/kdc/kaserver.c 	make_error_reply (hdr, KANOENT, reply);
reply             789 source4/heimdal/kdc/kaserver.c 	make_error_reply (hdr, KANOENT, reply);
reply             798 source4/heimdal/kdc/kaserver.c 	make_error_reply (hdr, KAPWEXPIRED, reply);
reply             849 source4/heimdal/kdc/kaserver.c 			 &ad.session, reply);
reply             878 source4/heimdal/kdc/kaserver.c 		 krb5_data *reply,
reply             925 source4/heimdal/kdc/kaserver.c 	do_authenticate (context, config, &hdr, sp, addr, from, reply);
reply             928 source4/heimdal/kdc/kaserver.c 	do_getticket (context, config, &hdr, sp, addr, from, reply);
reply             944 source4/heimdal/kdc/kaserver.c 	make_error_reply (&hdr, RXGEN_OPCODE, reply);
reply              58 source4/heimdal/kdc/kerberos4.c make_err_reply(krb5_context context, krb5_data *reply,
reply              62 source4/heimdal/kdc/kerberos4.c 			   kdc_time, code, msg, reply);
reply             119 source4/heimdal/kdc/kerberos4.c #define RCHECK(X, L) if(X){make_err_reply(context, reply, KFAILURE, "Packet too short"); goto L;}
reply             132 source4/heimdal/kdc/kerberos4.c 		 krb5_data *reply,
reply             154 source4/heimdal/kdc/kerberos4.c 	make_err_reply(context, reply, KRB4ET_KDC_GEN_ERR,
reply             164 source4/heimdal/kdc/kerberos4.c 	make_err_reply(context, reply, KRB4ET_KDC_PKT_VER, "protocol mismatch");
reply             201 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN,
reply             210 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN,
reply             221 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KRB4ET_KDC_NAME_EXP,
reply             232 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KRB4ET_KDC_NULL_KEY,
reply             249 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KRB4ET_KDC_NULL_KEY,
reply             257 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KRB4ET_KDC_NULL_KEY,
reply             265 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KRB4ET_KDC_NULL_KEY,
reply             282 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KFAILURE,
reply             302 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KFAILURE,
reply             321 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KFAILURE,
reply             335 source4/heimdal/kdc/kerberos4.c 					  reply);
reply             367 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KFAILURE,
reply             380 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KFAILURE, s);
reply             390 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KRB4ET_KDC_AUTH_EXP,
reply             399 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KRB4ET_KDC_NULL_KEY,
reply             422 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, ret, "failed to parse request");
reply             445 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN,
reply             454 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN,
reply             462 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN,
reply             474 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN, s);
reply             483 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN, s);
reply             495 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KRB4ET_KDC_PR_UNKNOWN, s);
reply             505 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KRB4ET_KDC_NAME_EXP,
reply             514 source4/heimdal/kdc/kerberos4.c 	    make_err_reply(context, reply, KRB4ET_KDC_NULL_KEY,
reply             550 source4/heimdal/kdc/kerberos4.c 		make_err_reply(context, reply, KFAILURE,
reply             570 source4/heimdal/kdc/kerberos4.c 		make_err_reply(context, reply, KFAILURE,
reply             588 source4/heimdal/kdc/kerberos4.c 		make_err_reply(context, reply, KFAILURE,
reply             602 source4/heimdal/kdc/kerberos4.c 					      reply);
reply             620 source4/heimdal/kdc/kerberos4.c 	make_err_reply(context, reply, KFAILURE, "Unknown message type");
reply             265 source4/heimdal/kdc/kerberos5.c 		  krb5_data *reply)
reply             364 source4/heimdal/kdc/kerberos5.c     reply->data = buf;
reply             365 source4/heimdal/kdc/kerberos5.c     reply->length = buf_size;
reply             968 source4/heimdal/kdc/kerberos5.c 	    krb5_data *reply,
reply            1766 source4/heimdal/kdc/kerberos5.c 			    reply_key, &e_text, reply);
reply            1773 source4/heimdal/kdc/kerberos5.c     if (datagram_reply && reply->length > config->max_datagram_reply_length) {
reply            1774 source4/heimdal/kdc/kerberos5.c 	krb5_data_free(reply);
reply            1790 source4/heimdal/kdc/kerberos5.c 		      reply);
reply             675 source4/heimdal/kdc/krb5tgs.c 	       krb5_data *reply)
reply             911 source4/heimdal/kdc/krb5tgs.c 			    serverkey, 0, &tgt->key, e_text, reply);
reply            1364 source4/heimdal/kdc/krb5tgs.c 		krb5_data *reply,
reply            1951 source4/heimdal/kdc/krb5tgs.c 			 reply);
reply             292 source4/heimdal/kdc/kx509.c 	      const Kx509Request *req, krb5_data *reply,
reply             306 source4/heimdal/kdc/kx509.c     krb5_data_zero(reply);
reply             427 source4/heimdal/kdc/kx509.c 	ret = krb5_data_alloc(reply, data.length + sizeof(version_2_0));
reply             432 source4/heimdal/kdc/kx509.c 	memcpy(reply->data, version_2_0, sizeof(version_2_0));
reply             433 source4/heimdal/kdc/kx509.c 	memcpy(((unsigned char *)reply->data) + sizeof(version_2_0),
reply              62 source4/heimdal/kdc/process.c 			 krb5_data *reply,
reply              82 source4/heimdal/kdc/process.c 			  reply, from, addr, datagram_reply);
reply              86 source4/heimdal/kdc/process.c 	ret = _kdc_tgs_rep(context, config, &req, reply, from, addr, datagram_reply);
reply              90 source4/heimdal/kdc/process.c 	ret = _kdc_do_524(context, config, &ticket, reply, from, addr);
reply              94 source4/heimdal/kdc/process.c 	ret = _kdc_do_digest(context, config, &digestreq, reply, from, addr);
reply              98 source4/heimdal/kdc/process.c 	ret = _kdc_do_kx509(context, config, &kx509req, reply, from, addr);
reply             103 source4/heimdal/kdc/process.c 	ret = _kdc_do_version4(context, config, buf, len, reply, from,
reply             107 source4/heimdal/kdc/process.c 	ret = _kdc_do_kaserver(context, config, buf, len, reply, from,
reply             127 source4/heimdal/kdc/process.c 			      krb5_data *reply,
reply             143 source4/heimdal/kdc/process.c 			  reply, from, addr, datagram_reply);
reply             147 source4/heimdal/kdc/process.c 	ret = _kdc_tgs_rep(context, config, &req, reply, from, addr, datagram_reply);
reply             163 source4/heimdal/kdc/process.c 		      const krb5_data *reply,
reply             204 source4/heimdal/kdc/process.c 	ret = der_get_tag (reply->data, reply->length,
reply             178 source4/heimdal/lib/hdb/db.c DB__get(krb5_context context, HDB *db, krb5_data key, krb5_data *reply)
reply             202 source4/heimdal/lib/hdb/db.c     krb5_data_copy(reply, v.data, v.size);
reply             204 source4/heimdal/lib/hdb/ndbm.c NDBM__get(krb5_context context, HDB *db, krb5_data key, krb5_data *reply)
reply             220 source4/heimdal/lib/hdb/ndbm.c     krb5_data_copy(reply, v.dptr, v.dsize);
reply              87 source4/heimdal/lib/hx509/hx509.h     heim_octet_string reply;
reply             251 source4/heimdal/lib/hx509/ks_file.c 	    prompt.reply.data = password;
reply             252 source4/heimdal/lib/hx509/ks_file.c 	    prompt.reply.length = sizeof(password);
reply             429 source4/heimdal/lib/hx509/ks_p11.c 	    prompt.reply.data = pin;
reply             430 source4/heimdal/lib/hx509/ks_p11.c 	    prompt.reply.length = sizeof(pin);
reply             188 source4/heimdal/lib/hx509/lock.c 	if(UI_UTIL_read_pw_string(prompter->reply.data,
reply             189 source4/heimdal/lib/hx509/lock.c 				  prompter->reply.length,
reply             194 source4/heimdal/lib/hx509/lock.c 	char *s = prompter->reply.data;
reply             198 source4/heimdal/lib/hx509/lock.c 	if(fgets(prompter->reply.data,
reply             199 source4/heimdal/lib/hx509/lock.c 		 prompter->reply.length,
reply             280 source4/heimdal/lib/krb5/changepw.c     u_char reply[1024 * 3];
reply             288 source4/heimdal/lib/krb5/changepw.c 	while (len < sizeof(reply)) {
reply             291 source4/heimdal/lib/krb5/changepw.c 	    ret = recvfrom (sock, reply + len, sizeof(reply) - len,
reply             306 source4/heimdal/lib/krb5/changepw.c 	    _krb5_get_int(reply, &size, 4);
reply             309 source4/heimdal/lib/krb5/changepw.c 	    memmove(reply, reply + 4, size);		
reply             313 source4/heimdal/lib/krb5/changepw.c 	if (len == sizeof(reply)) {
reply             320 source4/heimdal/lib/krb5/changepw.c 	ret = recvfrom (sock, reply, sizeof(reply), 0, NULL, NULL);
reply             338 source4/heimdal/lib/krb5/changepw.c     pkt_len = (reply[0] << 8) | (reply[1]);
reply             339 source4/heimdal/lib/krb5/changepw.c     pkt_ver = (reply[2] << 8) | (reply[3]);
reply             341 source4/heimdal/lib/krb5/changepw.c     if ((pkt_len != len) || (reply[1] == 0x7e || reply[1] == 0x5e)) {
reply             348 source4/heimdal/lib/krb5/changepw.c 	ret = decode_KRB_ERROR(reply, len, &error, &size);
reply             384 source4/heimdal/lib/krb5/changepw.c     ap_rep_data.data = reply + 6;
reply             385 source4/heimdal/lib/krb5/changepw.c     ap_rep_data.length  = (reply[4] << 8) | (reply[5]);
reply             387 source4/heimdal/lib/krb5/changepw.c     if (reply + len < (u_char *)ap_rep_data.data + ap_rep_data.length) {
reply             439 source4/heimdal/lib/krb5/changepw.c 	ret = decode_KRB_ERROR(reply + 6, len - 6, &error, &size);
reply              67 source4/heimdal/lib/krb5/convert_creds.c     krb5_data reply;
reply              92 source4/heimdal/lib/krb5/convert_creds.c 			   &reply);
reply              97 source4/heimdal/lib/krb5/convert_creds.c     sp = krb5_storage_from_mem(reply.data, reply.length);
reply             142 source4/heimdal/lib/krb5/convert_creds.c     krb5_data_free(&reply);
reply             419 source4/heimdal/lib/krb5/init_creds_pw.c 	prompts[0].reply  = &password_data[0];
reply             427 source4/heimdal/lib/krb5/init_creds_pw.c 	prompts[1].reply  = &password_data[1];
reply            1524 source4/heimdal/lib/krb5/init_creds_pw.c 	prompt.reply  = &password_data;
reply             610 source4/heimdal/lib/krb5/krb5.h     krb5_data *reply;
reply             400 source4/heimdal/lib/krb5/log.c 	      char **reply,
reply             429 source4/heimdal/lib/krb5/log.c     if(reply == NULL)
reply             432 source4/heimdal/lib/krb5/log.c 	*reply = msg;
reply             451 source4/heimdal/lib/krb5/log.c 	     char **reply,
reply             460 source4/heimdal/lib/krb5/log.c     ret = krb5_vlog_msg(context, fac, reply, level, fmt, ap);
reply              47 source4/heimdal/lib/krb5/mk_error.c 	      krb5_data *reply)
reply              86 source4/heimdal/lib/krb5/mk_error.c     ASN1_MALLOC_ENCODE(KRB_ERROR, reply->data, reply->length, &msg, &len, ret);
reply              89 source4/heimdal/lib/krb5/mk_error.c     if(reply->length != len)
reply            1461 source4/heimdal/lib/krb5/pkinit.c     password_data.data   = prompter->reply.data;
reply            1462 source4/heimdal/lib/krb5/pkinit.c     password_data.length = prompter->reply.length;
reply            1466 source4/heimdal/lib/krb5/pkinit.c     prompt.reply  = &password_data;
reply            1481 source4/heimdal/lib/krb5/pkinit.c 	memset (prompter->reply.data, 0, prompter->reply.length);
reply              56 source4/heimdal/lib/krb5/prompter_posix.c 	    if(UI_UTIL_read_pw_string(prompts[i].reply->data,
reply              57 source4/heimdal/lib/krb5/prompter_posix.c 				  prompts[i].reply->length,
reply              62 source4/heimdal/lib/krb5/prompter_posix.c 	    char *s = prompts[i].reply->data;
reply              66 source4/heimdal/lib/krb5/prompter_posix.c 	    if(fgets(prompts[i].reply->data,
reply              67 source4/heimdal/lib/krb5/prompter_posix.c 		     prompts[i].reply->length,
reply             646 source4/heimdal/lib/krb5/send_to_kdc.c 		const krb5_data *reply, int *action)
reply             651 source4/heimdal/lib/krb5/send_to_kdc.c     if(krb5_rd_error(context, reply, &error))
reply             508 source4/heimdal/lib/roken/resolve.c     unsigned char *reply = NULL;
reply             523 source4/heimdal/lib/roken/resolve.c 	if (reply) {
reply             524 source4/heimdal/lib/roken/resolve.c 	    free(reply);
reply             525 source4/heimdal/lib/roken/resolve.c 	    reply = NULL;
reply             539 source4/heimdal/lib/roken/resolve.c 	reply = malloc(size);
reply             540 source4/heimdal/lib/roken/resolve.c 	if (reply == NULL) {
reply             547 source4/heimdal/lib/roken/resolve.c 	len = res_nsearch(&state, domain, rr_class, rr_type, reply, size);
reply             549 source4/heimdal/lib/roken/resolve.c 	len = res_search(domain, rr_class, rr_type, reply, size);
reply             562 source4/heimdal/lib/roken/resolve.c 	    free(reply);
reply             571 source4/heimdal/lib/roken/resolve.c     r = parse_reply(reply, len);
reply             572 source4/heimdal/lib/roken/resolve.c     free(reply);
reply              60 source4/kdc/kdc.c 				 DATA_BLOB *reply,
reply             129 source4/kdc/kdc.c 	DATA_BLOB reply;
reply             170 source4/kdc/kdc.c 				  &reply,
reply             185 source4/kdc/kdc.c 	rep->packet       = reply;
reply             186 source4/kdc/kdc.c 	talloc_steal(rep, reply.data);
reply             229 source4/kdc/kdc.c 	DATA_BLOB input, reply;
reply             253 source4/kdc/kdc.c 			       &reply,
reply             263 source4/kdc/kdc.c 	blob = data_blob_talloc(kdcconn, NULL, reply.length + 4);
reply             269 source4/kdc/kdc.c 	RSIVAL(blob.data, 0, reply.length);
reply             270 source4/kdc/kdc.c 	memcpy(blob.data + 4, reply.data, reply.length);	
reply             321 source4/kdc/kdc.c 			DATA_BLOB *reply,
reply             343 source4/kdc/kdc.c 		*reply = data_blob(NULL, 0);
reply             347 source4/kdc/kdc.c 		*reply = data_blob_talloc(mem_ctx, k5_reply.data, k5_reply.length);
reply             350 source4/kdc/kdc.c 		*reply = data_blob(NULL, 0);	
reply              40 source4/kdc/kdc.h 		      DATA_BLOB *reply,
reply             178 source4/kdc/kpasswdd.c 				     DATA_BLOB *reply)
reply             190 source4/kdc/kpasswdd.c 						reply);
reply             209 source4/kdc/kpasswdd.c 					   reply);
reply             218 source4/kdc/kpasswdd.c 				    DATA_BLOB *reply)
reply             228 source4/kdc/kpasswdd.c 						reply);
reply             245 source4/kdc/kpasswdd.c 						&password, reply);
reply             278 source4/kdc/kpasswdd.c 							reply);
reply             297 source4/kdc/kpasswdd.c 							reply);
reply             308 source4/kdc/kpasswdd.c 								reply);
reply             315 source4/kdc/kpasswdd.c 								reply);
reply             320 source4/kdc/kpasswdd.c 							&password, reply);
reply             329 source4/kdc/kpasswdd.c 							reply);
reply             339 source4/kdc/kpasswdd.c 							 reply);
reply             354 source4/kdc/kpasswdd.c 							   reply);
reply             367 source4/kdc/kpasswdd.c 							   reply);
reply             415 source4/kdc/kpasswdd.c 						   reply);
reply             423 source4/kdc/kpasswdd.c 						 reply);
reply             431 source4/kdc/kpasswdd.c 		      DATA_BLOB *reply,
reply             502 source4/kdc/kpasswdd.c 			goto reply;
reply             557 source4/kdc/kpasswdd.c 			goto reply;
reply             574 source4/kdc/kpasswdd.c 			goto reply;
reply             603 source4/kdc/kpasswdd.c 			goto reply;
reply             609 source4/kdc/kpasswdd.c reply:
reply             610 source4/kdc/kpasswdd.c 	*reply = data_blob_talloc(mem_ctx, NULL, krb_priv_rep.length + ap_rep.length + header_len);
reply             611 source4/kdc/kpasswdd.c 	if (!reply->data) {
reply             615 source4/kdc/kpasswdd.c 	RSSVAL(reply->data, 0, reply->length);
reply             616 source4/kdc/kpasswdd.c 	RSSVAL(reply->data, 2, 1); /* This is a version 1 reply, MS change/set or otherwise */
reply             617 source4/kdc/kpasswdd.c 	RSSVAL(reply->data, 4, ap_rep.length);
reply             618 source4/kdc/kpasswdd.c 	memcpy(reply->data + header_len, 
reply             621 source4/kdc/kpasswdd.c 	memcpy(reply->data + header_len + ap_rep.length, 
reply              38 source4/ldap_server/ldap_backend.c 		goto reply;\
reply             101 source4/ldap_server/ldap_backend.c 	struct ldapsrv_reply *reply;
reply             103 source4/ldap_server/ldap_backend.c 	reply = talloc(call, struct ldapsrv_reply);
reply             104 source4/ldap_server/ldap_backend.c 	if (!reply) {
reply             107 source4/ldap_server/ldap_backend.c 	reply->msg = talloc(reply, struct ldap_message);
reply             108 source4/ldap_server/ldap_backend.c 	if (reply->msg == NULL) {
reply             109 source4/ldap_server/ldap_backend.c 		talloc_free(reply);
reply             113 source4/ldap_server/ldap_backend.c 	reply->msg->messageid = call->request->messageid;
reply             114 source4/ldap_server/ldap_backend.c 	reply->msg->type = type;
reply             115 source4/ldap_server/ldap_backend.c 	reply->msg->controls = NULL;
reply             117 source4/ldap_server/ldap_backend.c 	return reply;
reply             120 source4/ldap_server/ldap_backend.c void ldapsrv_queue_reply(struct ldapsrv_call *call, struct ldapsrv_reply *reply)
reply             122 source4/ldap_server/ldap_backend.c 	DLIST_ADD_END(call->replies, reply, struct ldapsrv_reply *);
reply             127 source4/ldap_server/ldap_backend.c 	struct ldapsrv_reply *reply;
reply             132 source4/ldap_server/ldap_backend.c 	reply = ldapsrv_init_reply(call, LDAP_TAG_ExtendedResponse);
reply             133 source4/ldap_server/ldap_backend.c 	if (!reply) {
reply             137 source4/ldap_server/ldap_backend.c 	r = &reply->msg->r.ExtendedResponse;
reply             145 source4/ldap_server/ldap_backend.c 	ldapsrv_queue_reply(call, reply);
reply             205 source4/ldap_server/ldap_backend.c 			goto reply;
reply             234 source4/ldap_server/ldap_backend.c 		goto reply;
reply             268 source4/ldap_server/ldap_backend.c 		goto reply;
reply             309 source4/ldap_server/ldap_backend.c reply:
reply             388 source4/ldap_server/ldap_backend.c 				goto reply;
reply             410 source4/ldap_server/ldap_backend.c 						goto reply;
reply             420 source4/ldap_server/ldap_backend.c 		goto reply;
reply             423 source4/ldap_server/ldap_backend.c reply:
reply             498 source4/ldap_server/ldap_backend.c 						goto reply;
reply             506 source4/ldap_server/ldap_backend.c 				goto reply;
reply             512 source4/ldap_server/ldap_backend.c 		goto reply;
reply             515 source4/ldap_server/ldap_backend.c reply:
reply             560 source4/ldap_server/ldap_backend.c reply:
reply             614 source4/ldap_server/ldap_backend.c 		goto reply;
reply             625 source4/ldap_server/ldap_backend.c 			goto reply;
reply             639 source4/ldap_server/ldap_backend.c 		goto reply;
reply             643 source4/ldap_server/ldap_backend.c reply:
reply             697 source4/ldap_server/ldap_backend.c reply:
reply              34 source4/ldap_server/ldap_bind.c 	struct ldapsrv_reply *reply;
reply              58 source4/ldap_server/ldap_bind.c 	reply = ldapsrv_init_reply(call, LDAP_TAG_BindResponse);
reply              59 source4/ldap_server/ldap_bind.c 	if (!reply) {
reply              78 source4/ldap_server/ldap_bind.c 			errstr = talloc_asprintf(reply, "Simple Bind: Failed to advise ldb new credentials: %s", nt_errstr(status));
reply              84 source4/ldap_server/ldap_bind.c 		errstr = talloc_asprintf(reply, "Simple Bind Failed: %s", nt_errstr(status));
reply              87 source4/ldap_server/ldap_bind.c 	resp = &reply->msg->r.BindResponse;
reply              94 source4/ldap_server/ldap_bind.c 	ldapsrv_queue_reply(call, reply);
reply             117 source4/ldap_server/ldap_bind.c 	struct ldapsrv_reply *reply;
reply             126 source4/ldap_server/ldap_bind.c 	reply = ldapsrv_init_reply(call, LDAP_TAG_BindResponse);
reply             127 source4/ldap_server/ldap_bind.c 	if (!reply) {
reply             130 source4/ldap_server/ldap_bind.c 	resp = &reply->msg->r.BindResponse;
reply             153 source4/ldap_server/ldap_bind.c 			errstr = talloc_asprintf(reply, "SASL: Failed to start authentication system: %s", 
reply             167 source4/ldap_server/ldap_bind.c 				errstr = talloc_asprintf(reply, "SASL:[%s]: Failed to start authentication backend: %s", 
reply             181 source4/ldap_server/ldap_bind.c 		status = gensec_update(conn->gensec, reply,
reply             185 source4/ldap_server/ldap_bind.c 		resp->SASL.secblob = talloc(reply, DATA_BLOB);
reply             220 source4/ldap_server/ldap_bind.c 			errstr = talloc_asprintf(reply, 
reply             234 source4/ldap_server/ldap_bind.c 				errstr = talloc_asprintf(reply, 
reply             248 source4/ldap_server/ldap_bind.c 					errstr = talloc_asprintf(reply, 
reply             259 source4/ldap_server/ldap_bind.c 			errstr = talloc_asprintf(reply, "SASL:[%s]: %s", req->creds.SASL.mechanism, nt_errstr(status));
reply             268 source4/ldap_server/ldap_bind.c 	ldapsrv_queue_reply(call, reply);
reply             275 source4/ldap_server/ldap_bind.c 	struct ldapsrv_reply *reply;
reply             293 source4/ldap_server/ldap_bind.c 	reply = ldapsrv_init_reply(call, LDAP_TAG_BindResponse);
reply             294 source4/ldap_server/ldap_bind.c 	if (!reply) {
reply             298 source4/ldap_server/ldap_bind.c 	resp = &reply->msg->r.BindResponse;
reply             301 source4/ldap_server/ldap_bind.c 	resp->response.errormessage = talloc_asprintf(reply, "Bad AuthenticationChoice [%d]", req->mechanism);
reply             305 source4/ldap_server/ldap_bind.c 	ldapsrv_queue_reply(call, reply);
reply              45 source4/ldap_server/ldap_extended.c 				 struct ldapsrv_reply *reply,
reply              59 source4/ldap_server/ldap_extended.c 		(*errstr) = talloc_asprintf(reply, "START-TLS: TLS is already enabled on this LDAP session");
reply              72 source4/ldap_server/ldap_extended.c 		(*errstr) = talloc_asprintf(reply, "START-TLS: Failed to setup TLS socket");
reply              79 source4/ldap_server/ldap_extended.c 	reply->msg->r.ExtendedResponse.response.resultcode = LDAP_SUCCESS;
reply              80 source4/ldap_server/ldap_extended.c 	reply->msg->r.ExtendedResponse.response.errormessage = NULL;
reply              82 source4/ldap_server/ldap_extended.c 	ldapsrv_queue_reply(call, reply);
reply              88 source4/ldap_server/ldap_extended.c 	NTSTATUS (*fn)(struct ldapsrv_call *call, struct ldapsrv_reply *reply, const char **errorstr);
reply             104 source4/ldap_server/ldap_extended.c 	struct ldapsrv_reply *reply;
reply             112 source4/ldap_server/ldap_extended.c 	reply = ldapsrv_init_reply(call, LDAP_TAG_ExtendedResponse);
reply             113 source4/ldap_server/ldap_extended.c 	NT_STATUS_HAVE_NO_MEMORY(reply);
reply             115 source4/ldap_server/ldap_extended.c  	ZERO_STRUCT(reply->msg->r);
reply             116 source4/ldap_server/ldap_extended.c 	reply->msg->r.ExtendedResponse.oid = talloc_steal(reply, req->oid);
reply             117 source4/ldap_server/ldap_extended.c 	reply->msg->r.ExtendedResponse.response.resultcode = LDAP_PROTOCOL_ERROR;
reply             118 source4/ldap_server/ldap_extended.c 	reply->msg->r.ExtendedResponse.response.errormessage = NULL;
reply             128 source4/ldap_server/ldap_extended.c 		status = extended_ops[i].fn(call, reply, &error_str);
reply             135 source4/ldap_server/ldap_extended.c 			error_str = talloc_asprintf(reply, "Extended Operation(%s) failed: %s",
reply             141 source4/ldap_server/ldap_extended.c 		error_str = talloc_asprintf(reply, "Extended Operation(%s) not supported",
reply             145 source4/ldap_server/ldap_extended.c 	reply->msg->r.ExtendedResponse.response.resultcode = result;
reply             146 source4/ldap_server/ldap_extended.c 	reply->msg->r.ExtendedResponse.response.errormessage = error_str;
reply             148 source4/ldap_server/ldap_extended.c  	ldapsrv_queue_reply(call, reply);
reply             257 source4/lib/ldb/tools/cmdline.c int handle_controls_reply(struct ldb_control **reply, struct ldb_control **request)
reply             262 source4/lib/ldb/tools/cmdline.c 	if (reply == NULL || request == NULL) return -1;
reply             264 source4/lib/ldb/tools/cmdline.c 	for (i = 0; reply[i]; i++) {
reply             265 source4/lib/ldb/tools/cmdline.c 		if (strcmp(LDB_CONTROL_VLV_RESP_OID, reply[i]->oid) == 0) {
reply             268 source4/lib/ldb/tools/cmdline.c 			rep_control = talloc_get_type(reply[i]->data, struct ldb_vlv_resp_control);
reply             290 source4/lib/ldb/tools/cmdline.c 		if (strcmp(LDB_CONTROL_ASQ_OID, reply[i]->oid) == 0) {
reply             293 source4/lib/ldb/tools/cmdline.c 			rep_control = talloc_get_type(reply[i]->data, struct ldb_asq_control);
reply             303 source4/lib/ldb/tools/cmdline.c 		if (strcmp(LDB_CONTROL_PAGED_RESULTS_OID, reply[i]->oid) == 0) {
reply             306 source4/lib/ldb/tools/cmdline.c 			rep_control = talloc_get_type(reply[i]->data, struct ldb_paged_control);
reply             335 source4/lib/ldb/tools/cmdline.c 		if (strcmp(LDB_CONTROL_SORT_RESP_OID, reply[i]->oid) == 0) {
reply             338 source4/lib/ldb/tools/cmdline.c 			rep_control = talloc_get_type(reply[i]->data, struct ldb_sort_resp_control);
reply             358 source4/lib/ldb/tools/cmdline.c 		if (strcmp(LDB_CONTROL_DIRSYNC_OID, reply[i]->oid) == 0) {
reply             362 source4/lib/ldb/tools/cmdline.c 			rep_control = talloc_get_type(reply[i]->data, struct ldb_dirsync_control);
reply             393 source4/lib/ldb/tools/cmdline.c 		fprintf(stderr, "Unknown reply control oid: %s\n", reply[i]->oid);
reply              53 source4/lib/ldb/tools/cmdline.h int handle_controls_reply(struct ldb_control **reply, struct ldb_control **request);
reply             651 source4/libcli/cldap/cldap.c 	struct cldap_reply reply;
reply             654 source4/libcli/cldap/cldap.c 	reply.messageid    = message_id;
reply             655 source4/libcli/cldap/cldap.c 	reply.dest         = src;
reply             656 source4/libcli/cldap/cldap.c 	reply.response     = NULL;
reply             657 source4/libcli/cldap/cldap.c 	reply.result       = &result;
reply             661 source4/libcli/cldap/cldap.c 	status = cldap_reply_send(cldap, &reply);
reply             677 source4/libcli/cldap/cldap.c 	struct cldap_reply reply;
reply             680 source4/libcli/cldap/cldap.c 	reply.messageid    = message_id;
reply             681 source4/libcli/cldap/cldap.c 	reply.dest         = src;
reply             682 source4/libcli/cldap/cldap.c 	reply.response     = NULL;
reply             683 source4/libcli/cldap/cldap.c 	reply.result       = &result;
reply             689 source4/libcli/cldap/cldap.c 	status = cldap_reply_send(cldap, &reply);
reply             705 source4/libcli/cldap/cldap.c 	struct cldap_reply reply;
reply             716 source4/libcli/cldap/cldap.c 	reply.messageid    = message_id;
reply             717 source4/libcli/cldap/cldap.c 	reply.dest         = src;
reply             718 source4/libcli/cldap/cldap.c 	reply.response     = &response;
reply             719 source4/libcli/cldap/cldap.c 	reply.result       = &result;
reply             731 source4/libcli/cldap/cldap.c 	status = cldap_reply_send(cldap, &reply);
reply              60 source4/libcli/dgram/browse.c 				     struct nbt_browse_packet *reply)
reply              69 source4/libcli/dgram/browse.c 	ndr_err = ndr_push_struct_blob(&blob, tmp_ctx, dgmsock->iconv_convenience, reply,
reply             131 source4/libcli/dgram/libdgram.h 				       struct nbt_netlogon_response *reply);
reply             152 source4/libcli/dgram/libdgram.h 				     struct nbt_browse_packet *reply);
reply              69 source4/libcli/dgram/netlogon.c 				       struct nbt_netlogon_response *reply)
reply              78 source4/libcli/dgram/netlogon.c 					    reply);
reply              84 source4/libcli/resolve/dns_ex.c 	struct dns_reply *reply;
reply              98 source4/libcli/resolve/dns_ex.c 	reply = dns_lookup(state->name.name, do_srv?"SRV":"A");
reply              99 source4/libcli/resolve/dns_ex.c 	if (!reply) {
reply             104 source4/libcli/resolve/dns_ex.c 		dns_srv_order(reply);
reply             108 source4/libcli/resolve/dns_ex.c 	for (rr=reply->head; rr; rr=rr->next) {
reply             163 source4/libcli/resolve/dns_ex.c 	for (rr=reply->head;rr;rr=rr->next) {
reply             205 source4/libcli/resolve/dns_ex.c 		for (rr=reply->head;rr;rr=rr->next) {
reply             801 source4/libcli/wrepl/winsrepl.c 	io->out.num_names = packet->message.replication.info.reply.num_names;
reply             808 source4/libcli/wrepl/winsrepl.c 		struct wrepl_wins_name *wname = &packet->message.replication.info.reply.names[i];
reply              40 source4/nbt_server/dgram/ntlogon.c 	struct nbt_ntlogon_packet reply;
reply              49 source4/nbt_server/dgram/ntlogon.c 	ZERO_STRUCT(reply);
reply              50 source4/nbt_server/dgram/ntlogon.c 	reply.command = NTLOGON_SAM_LOGON_REPLY;
reply              51 source4/nbt_server/dgram/ntlogon.c 	logon = &reply.req.reply;
reply              67 source4/nbt_server/dgram/ntlogon.c 				     &reply);
reply              72 source4/ntp_signd/ntp_signd.c 	DATA_BLOB reply, blob;
reply              82 source4/ntp_signd/ntp_signd.c 	ndr_err = ndr_push_struct_blob(&reply, tmp_ctx, 
reply              93 source4/ntp_signd/ntp_signd.c 	blob = data_blob_talloc(ntp_signdconn, NULL, reply.length + 4);
reply              99 source4/ntp_signd/ntp_signd.c 	RSIVAL(blob.data, 0, reply.length);
reply             100 source4/ntp_signd/ntp_signd.c 	memcpy(blob.data + 4, reply.data, reply.length);	
reply             958 source4/rpc_server/dcerpc_server.c 	status = context->iface->reply(call, call, call->r);
reply              62 source4/rpc_server/dcerpc_server.h 	NTSTATUS (*reply)(struct dcesrv_call_state *, TALLOC_CTX *, void *);
reply             268 source4/rpc_server/remote/dcesrv_remote.c 	iface->reply = remote_op_reply;
reply             123 source4/smbd/service_named_pipe.c 		goto reply;
reply             130 source4/smbd/service_named_pipe.c 		goto reply;
reply             153 source4/smbd/service_named_pipe.c 			goto reply;
reply             165 source4/smbd/service_named_pipe.c 			goto reply;
reply             174 source4/smbd/service_named_pipe.c 		goto reply;
reply             177 source4/smbd/service_named_pipe.c reply:
reply             760 source4/torture/nbt/winsreplication.c 	send_reply = &repl_send.message.replication.info.reply;
reply             142 source4/torture/rpc/spoolss_notify.c 	.reply		= spoolss__op_reply,
reply             192 source4/wrepl_server/wrepl_in_call.c 	struct wrepl_send_reply *reply_out = &call->rep_packet.message.replication.info.reply;