resp               48 nsswitch/libwbclient/wbc_pam.c 				   const struct winbindd_response *resp,
resp               61 nsswitch/libwbclient/wbc_pam.c 	i->user_flags	= resp->data.auth.info3.user_flgs;
resp               63 nsswitch/libwbclient/wbc_pam.c 	i->account_name	= talloc_strdup(i, resp->data.auth.info3.user_name);
resp               66 nsswitch/libwbclient/wbc_pam.c 	i->full_name	= talloc_strdup(i, resp->data.auth.info3.full_name);
resp               68 nsswitch/libwbclient/wbc_pam.c 	i->domain_name	= talloc_strdup(i, resp->data.auth.info3.logon_dom);
resp               72 nsswitch/libwbclient/wbc_pam.c 	i->acct_flags	= resp->data.auth.info3.acct_flags;
resp               74 nsswitch/libwbclient/wbc_pam.c 	       resp->data.auth.user_session_key,
resp               77 nsswitch/libwbclient/wbc_pam.c 	       resp->data.auth.first_8_lm_hash,
resp               80 nsswitch/libwbclient/wbc_pam.c 	i->logon_count		= resp->data.auth.info3.logon_count;
resp               81 nsswitch/libwbclient/wbc_pam.c 	i->bad_password_count	= resp->data.auth.info3.bad_pw_count;
resp               83 nsswitch/libwbclient/wbc_pam.c 	i->logon_time		= resp->data.auth.info3.logon_time;
resp               84 nsswitch/libwbclient/wbc_pam.c 	i->logoff_time		= resp->data.auth.info3.logoff_time;
resp               85 nsswitch/libwbclient/wbc_pam.c 	i->kickoff_time		= resp->data.auth.info3.kickoff_time;
resp               86 nsswitch/libwbclient/wbc_pam.c 	i->pass_last_set_time	= resp->data.auth.info3.pass_last_set_time;
resp               87 nsswitch/libwbclient/wbc_pam.c 	i->pass_can_change_time	= resp->data.auth.info3.pass_can_change_time;
resp               88 nsswitch/libwbclient/wbc_pam.c 	i->pass_must_change_time= resp->data.auth.info3.pass_must_change_time;
resp               90 nsswitch/libwbclient/wbc_pam.c 	i->logon_server	= talloc_strdup(i, resp->data.auth.info3.logon_srv);
resp               92 nsswitch/libwbclient/wbc_pam.c 	i->logon_script	= talloc_strdup(i, resp->data.auth.info3.logon_script);
resp               94 nsswitch/libwbclient/wbc_pam.c 	i->profile_path	= talloc_strdup(i, resp->data.auth.info3.profile_path);
resp               96 nsswitch/libwbclient/wbc_pam.c 	i->home_directory= talloc_strdup(i, resp->data.auth.info3.home_dir);
resp               98 nsswitch/libwbclient/wbc_pam.c 	i->home_drive	= talloc_strdup(i, resp->data.auth.info3.dir_drive);
resp              102 nsswitch/libwbclient/wbc_pam.c 	i->num_sids 	+= resp->data.auth.info3.num_groups;
resp              103 nsswitch/libwbclient/wbc_pam.c 	i->num_sids	+= resp->data.auth.info3.num_other_sids;
resp              108 nsswitch/libwbclient/wbc_pam.c 	wbc_status = wbcStringToSid(resp->data.auth.info3.dom_sid,
resp              125 nsswitch/libwbclient/wbc_pam.c 		     resp->data.auth.info3.user_rid,
resp              129 nsswitch/libwbclient/wbc_pam.c 		     resp->data.auth.info3.group_rid,
resp              133 nsswitch/libwbclient/wbc_pam.c 	p = (char *)resp->extra_data.data;
resp              139 nsswitch/libwbclient/wbc_pam.c 	for (j=0; j < resp->data.auth.info3.num_groups; j++) {
resp              163 nsswitch/libwbclient/wbc_pam.c 	for (j=0; j < resp->data.auth.info3.num_other_sids; j++) {
resp              208 nsswitch/libwbclient/wbc_pam.c 				  const struct winbindd_response *resp,
resp              217 nsswitch/libwbclient/wbc_pam.c 	e->nt_status = resp->data.auth.nt_status;
resp              218 nsswitch/libwbclient/wbc_pam.c 	e->pam_error = resp->data.auth.pam_error;
resp              219 nsswitch/libwbclient/wbc_pam.c 	e->nt_string = talloc_strdup(e, resp->data.auth.nt_status_string);
resp              222 nsswitch/libwbclient/wbc_pam.c 	e->display_string = talloc_strdup(e, resp->data.auth.error_string);
resp              234 nsswitch/libwbclient/wbc_pam.c 					      const struct winbindd_response *resp,
resp              243 nsswitch/libwbclient/wbc_pam.c 	i->min_passwordage	= resp->data.auth.policy.min_passwordage;
resp              244 nsswitch/libwbclient/wbc_pam.c 	i->min_length_password	= resp->data.auth.policy.min_length_password;
resp              245 nsswitch/libwbclient/wbc_pam.c 	i->password_history	= resp->data.auth.policy.password_history;
resp              246 nsswitch/libwbclient/wbc_pam.c 	i->password_properties	= resp->data.auth.policy.password_properties;
resp              247 nsswitch/libwbclient/wbc_pam.c 	i->expire		= resp->data.auth.policy.expire;
resp              258 nsswitch/libwbclient/wbc_pam.c 				    const struct winbindd_response *resp,
resp              267 nsswitch/libwbclient/wbc_pam.c 	wbc_status = wbc_create_auth_info(i, resp, &i->info);
resp              270 nsswitch/libwbclient/wbc_pam.c 	if (resp->data.auth.krb5ccname) {
resp              275 nsswitch/libwbclient/wbc_pam.c 					     (uint8_t *)resp->data.auth.krb5ccname,
resp              276 nsswitch/libwbclient/wbc_pam.c 					     strlen(resp->data.auth.krb5ccname)+1);
resp              280 nsswitch/libwbclient/wbc_pam.c 	if (resp->data.auth.unix_username) {
resp              285 nsswitch/libwbclient/wbc_pam.c 					     (uint8_t *)resp->data.auth.unix_username,
resp              286 nsswitch/libwbclient/wbc_pam.c 					     strlen(resp->data.auth.unix_username)+1);
resp              516 nsswitch/libwbclient/wbc_util.c 						   const struct winbindd_response *resp,
resp              526 nsswitch/libwbclient/wbc_util.c 	i->dc_unc = talloc_strdup(i, resp->data.dsgetdcname.dc_unc);
resp              529 nsswitch/libwbclient/wbc_util.c 	i->dc_address = talloc_strdup(i, resp->data.dsgetdcname.dc_address);
resp              532 nsswitch/libwbclient/wbc_util.c 	i->dc_address_type = resp->data.dsgetdcname.dc_address_type;
resp              534 nsswitch/libwbclient/wbc_util.c 	wbc_status = wbcStringToGuid(resp->data.dsgetdcname.domain_guid, &guid);
resp              544 nsswitch/libwbclient/wbc_util.c 	i->domain_name = talloc_strdup(i, resp->data.dsgetdcname.domain_name);
resp              547 nsswitch/libwbclient/wbc_util.c 	if (resp->data.dsgetdcname.forest_name[0] != '\0') {
resp              549 nsswitch/libwbclient/wbc_util.c 			resp->data.dsgetdcname.forest_name);
resp              555 nsswitch/libwbclient/wbc_util.c 	i->dc_flags = resp->data.dsgetdcname.dc_flags;
resp              557 nsswitch/libwbclient/wbc_util.c 	if (resp->data.dsgetdcname.dc_site_name[0] != '\0') {
resp              559 nsswitch/libwbclient/wbc_util.c 			resp->data.dsgetdcname.dc_site_name);
resp              565 nsswitch/libwbclient/wbc_util.c 	if (resp->data.dsgetdcname.client_site_name[0] != '\0') {
resp              567 nsswitch/libwbclient/wbc_util.c 			resp->data.dsgetdcname.client_site_name);
resp              662 nsswitch/pam_winbind.c 	struct pam_response *resp;
resp              672 nsswitch/pam_winbind.c 	resp = NULL;
resp              673 nsswitch/pam_winbind.c 	retval = converse(ctx->pamh, 1, pmsg, &resp);
resp              675 nsswitch/pam_winbind.c 	if (resp) {
resp              676 nsswitch/pam_winbind.c 		_pam_drop_reply(resp, 1);
resp              810 nsswitch/pam_winbind.c 	struct pam_response *resp = NULL;
resp              818 nsswitch/pam_winbind.c 	ret = converse(ctx->pamh, 1, &pmsg, &resp);
resp              819 nsswitch/pam_winbind.c 	if (resp == NULL) {
resp              828 nsswitch/pam_winbind.c 	_pam_log(ctx, LOG_CRIT, "Received [%s] reply from application.\n", resp->resp);
resp              830 nsswitch/pam_winbind.c 	if (strcasecmp(resp->resp, "yes") == 0) {
resp              834 nsswitch/pam_winbind.c 	_pam_drop_reply(resp, 1);
resp             2158 nsswitch/pam_winbind.c 		struct pam_response *resp;
resp             2184 nsswitch/pam_winbind.c 		resp = NULL;
resp             2185 nsswitch/pam_winbind.c 		retval = converse(ctx->pamh, i, pmsg, &resp);
resp             2186 nsswitch/pam_winbind.c 		if (resp == NULL) {
resp             2193 nsswitch/pam_winbind.c 			_pam_drop_reply(resp, i);
resp             2199 nsswitch/pam_winbind.c 		token = x_strdup(resp[i - replies].resp);
resp             2210 nsswitch/pam_winbind.c 			if (!resp[i - 1].resp ||
resp             2211 nsswitch/pam_winbind.c 			    strcmp(token, resp[i - 1].resp)) {
resp             2223 nsswitch/pam_winbind.c 		_pam_drop_reply(resp, i);
resp               70 nsswitch/pam_winbind.h         if (reply[reply_i].resp) {                \
resp               71 nsswitch/pam_winbind.h             _pam_overwrite(reply[reply_i].resp);  \
resp               72 nsswitch/pam_winbind.h             free(reply[reply_i].resp);            \
resp              115 source3/auth/pampass.c 		    struct pam_response **resp,
resp              122 source3/auth/pampass.c 	*resp = NULL;
resp              147 source3/auth/pampass.c 				reply[replies].resp = COPY_STRING(udp->PAM_username);
resp              153 source3/auth/pampass.c 				reply[replies].resp = COPY_STRING(udp->PAM_password);
resp              163 source3/auth/pampass.c 				reply[replies].resp = NULL;
resp              173 source3/auth/pampass.c 		*resp = reply;
resp              271 source3/auth/pampass.c 				struct pam_response **resp,
resp              282 source3/auth/pampass.c 	*resp = NULL;
resp              331 source3/auth/pampass.c 					reply[replies].resp = COPY_FSTRING(current_reply);
resp              359 source3/auth/pampass.c 					reply[replies].resp = COPY_FSTRING(current_reply);
resp              383 source3/auth/pampass.c 			reply[replies].resp = NULL;
resp              396 source3/auth/pampass.c 		*resp = reply;
resp              102 source3/lib/ldb/modules/sort.c 	struct ldb_sort_resp_control *resp;
resp              126 source3/lib/ldb/modules/sort.c 	resp = talloc(controls[i], struct ldb_sort_resp_control);
resp              127 source3/lib/ldb/modules/sort.c 	if (! resp )
resp              130 source3/lib/ldb/modules/sort.c 	resp->result = result;
resp              131 source3/lib/ldb/modules/sort.c 	resp->attr_desc = talloc_strdup(resp, desc);
resp              133 source3/lib/ldb/modules/sort.c 	if (! resp->attr_desc )
resp              136 source3/lib/ldb/modules/sort.c 	controls[i]->data = resp;
resp              275 source3/lib/wb_reqtrans.c 	struct winbindd_response *resp = (struct winbindd_response *)buf;
resp              278 source3/lib/wb_reqtrans.c 		if (resp->length < sizeof(struct winbindd_response)) {
resp              281 source3/lib/wb_reqtrans.c 				  (int)resp->length,
resp              286 source3/lib/wb_reqtrans.c 	return resp->length - buflen;
resp              478 source3/libaddns/dns.h 			  struct dns_request **resp);
resp              162 source3/libaddns/dnsgss.c 			struct dns_request *resp;
resp              169 source3/libaddns/dnsgss.c 			err = dns_unmarshall_request(buf, buf, &resp);
resp              176 source3/libaddns/dnsgss.c 			if ((resp->num_additionals != 1) ||
resp              177 source3/libaddns/dnsgss.c 			    (resp->num_answers == 0) ||
resp              178 source3/libaddns/dnsgss.c 			    (resp->answers[0]->type != QTYPE_TKEY)) {
resp              184 source3/libaddns/dnsgss.c 				mem_ctx, resp->answers[0], &tkey);
resp              340 source3/libaddns/dnssock.c 			  struct dns_request **resp)
resp              355 source3/libaddns/dnssock.c 	err = dns_unmarshall_request(mem_ctx, buf, resp);
resp              367 source3/libaddns/dnssock.c 	struct dns_request *resp;
resp              371 source3/libaddns/dnssock.c 			      &resp);
resp              375 source3/libaddns/dnssock.c 	*up_resp = dns_request2update(resp);
resp               64 source3/pam_smbpass/support.c 	if (reply[reply_i].resp) {                \
resp               65 source3/pam_smbpass/support.c 	    _pam_overwrite(reply[reply_i].resp);  \
resp               66 source3/pam_smbpass/support.c 	    free(reply[reply_i].resp);            \
resp              150 source3/pam_smbpass/support.c 		struct pam_response *resp;
resp              155 source3/pam_smbpass/support.c 		resp = NULL;
resp              157 source3/pam_smbpass/support.c 		return converse(pamh, ctrl, 1, pmsg, &resp);
resp              513 source3/pam_smbpass/support.c     struct pam_response *resp;
resp              574 source3/pam_smbpass/support.c     resp = NULL;
resp              576 source3/pam_smbpass/support.c     retval = converse( pamh, ctrl, i, pmsg, &resp );
resp              578 source3/pam_smbpass/support.c     if (resp != NULL) {
resp              584 source3/pam_smbpass/support.c             token = smbpXstrDup(pamh, resp[j++].resp);
resp              588 source3/pam_smbpass/support.c                     if (!resp[j].resp || strcmp( token, resp[j].resp )) {
resp              602 source3/pam_smbpass/support.c         _pam_drop_reply( resp, expect );
resp               49 source3/utils/net_dns.c 	struct dns_update_request *req, *resp;
resp               72 source3/utils/net_dns.c 	err = dns_update_transaction(mem_ctx, conn, req, &resp);
resp               75 source3/utils/net_dns.c 	if (dns_response_code(resp->flags) == DNS_NO_ERROR) {
resp               88 source3/utils/net_dns.c 	err = dns_update_transaction(mem_ctx, conn, req, &resp);
resp               91 source3/utils/net_dns.c 	if (dns_response_code(resp->flags) == DNS_NO_ERROR) {
resp              129 source3/utils/net_dns.c 		err = dns_update_transaction(mem_ctx, conn, req, &resp);
resp              132 source3/utils/net_dns.c 		err = (dns_response_code(resp->flags) == DNS_NO_ERROR) ?
resp              192 source3/utils/net_dns.c 	struct dns_request *req, *resp;
resp              201 source3/utils/net_dns.c 	err = dns_transaction(conn, conn, req, &resp);
resp              603 source3/winbindd/winbindd_proto.h void set_auth_errors(struct winbindd_response *resp, NTSTATUS result);
resp             1689 source3/winbindd/winbindd_util.c void set_auth_errors(struct winbindd_response *resp, NTSTATUS result)
resp             1691 source3/winbindd/winbindd_util.c 	resp->data.auth.nt_status = NT_STATUS_V(result);
resp             1692 source3/winbindd/winbindd_util.c 	fstrcpy(resp->data.auth.nt_status_string, nt_errstr(result));
resp             1695 source3/winbindd/winbindd_util.c 	if (*resp->data.auth.error_string == '\0')
resp             1696 source3/winbindd/winbindd_util.c 		fstrcpy(resp->data.auth.error_string,
resp             1698 source3/winbindd/winbindd_util.c 	resp->data.auth.pam_error = nt_status_to_pam(result);
resp              190 source4/auth/ntlm/auth_unix.c 				(*reply)[num].resp = COPY_STRING(info->account_name);
resp              195 source4/auth/ntlm/auth_unix.c 				(*reply)[num].resp = COPY_STRING(info->plaintext_password);
resp              200 source4/auth/ntlm/auth_unix.c 				(*reply)[num].resp = NULL;
resp              206 source4/auth/ntlm/auth_unix.c 				(*reply)[num].resp = NULL;
resp              212 source4/auth/ntlm/auth_unix.c 					SAFE_FREE((*reply)[num-1].resp);
resp              395 source4/heimdal/lib/gssapi/spnego/init_sec_context.c     NegTokenResp resp;
resp              426 source4/heimdal/lib/gssapi/spnego/init_sec_context.c 			      len, &resp, NULL);
resp              432 source4/heimdal/lib/gssapi/spnego/init_sec_context.c     if (resp.negResult == NULL
resp              433 source4/heimdal/lib/gssapi/spnego/init_sec_context.c 	|| *(resp.negResult) == reject
resp              437 source4/heimdal/lib/gssapi/spnego/init_sec_context.c 	free_NegTokenResp(&resp);
resp              448 source4/heimdal/lib/gssapi/spnego/init_sec_context.c     if (resp.supportedMech) {
resp              451 source4/heimdal/lib/gssapi/spnego/init_sec_context.c 	    free_NegTokenResp(&resp);
resp              457 source4/heimdal/lib/gssapi/spnego/init_sec_context.c 			  resp.supportedMech,
resp              465 source4/heimdal/lib/gssapi/spnego/init_sec_context.c 	    free_NegTokenResp(&resp);
resp              481 source4/heimdal/lib/gssapi/spnego/init_sec_context.c 	free_NegTokenResp(&resp);
resp              487 source4/heimdal/lib/gssapi/spnego/init_sec_context.c     if ((resp.responseToken != NULL && resp.responseToken->length) ||
resp              491 source4/heimdal/lib/gssapi/spnego/init_sec_context.c 	if (resp.responseToken) {
resp              492 source4/heimdal/lib/gssapi/spnego/init_sec_context.c 	    mech_input_token.length = resp.responseToken->length;
resp              493 source4/heimdal/lib/gssapi/spnego/init_sec_context.c 	    mech_input_token.value  = resp.responseToken->data;
resp              521 source4/heimdal/lib/gssapi/spnego/init_sec_context.c 	    free_NegTokenResp(&resp);
resp              529 source4/heimdal/lib/gssapi/spnego/init_sec_context.c     } else if (*(resp.negResult) == accept_completed) {
resp              534 source4/heimdal/lib/gssapi/spnego/init_sec_context.c     if (*(resp.negResult) == request_mic) {
resp              543 source4/heimdal/lib/gssapi/spnego/init_sec_context.c 	if (resp.mechListMIC != NULL) {
resp              550 source4/heimdal/lib/gssapi/spnego/init_sec_context.c 		free_NegTokenResp(&resp);
resp              564 source4/heimdal/lib/gssapi/spnego/init_sec_context.c 	    free_NegTokenResp(&resp);
resp              572 source4/heimdal/lib/gssapi/spnego/init_sec_context.c 	if (resp.mechListMIC == NULL) {
resp              575 source4/heimdal/lib/gssapi/spnego/init_sec_context.c 	    free_NegTokenResp(&resp);
resp              579 source4/heimdal/lib/gssapi/spnego/init_sec_context.c 	mic_buf.length = resp.mechListMIC->length;
resp              580 source4/heimdal/lib/gssapi/spnego/init_sec_context.c 	mic_buf.value  = resp.mechListMIC->data;
resp              592 source4/heimdal/lib/gssapi/spnego/init_sec_context.c 		free_NegTokenResp(&resp);
resp              607 source4/heimdal/lib/gssapi/spnego/init_sec_context.c     free_NegTokenResp(&resp);
resp              270 source4/heimdal/lib/hx509/revoke.c     OCSPResponse resp;
resp              276 source4/heimdal/lib/hx509/revoke.c     ret = decode_OCSPResponse(data, length, &resp, &size);
resp              280 source4/heimdal/lib/hx509/revoke.c 	free_OCSPResponse(&resp);
resp              284 source4/heimdal/lib/hx509/revoke.c     switch (resp.responseStatus) {
resp              288 source4/heimdal/lib/hx509/revoke.c 	free_OCSPResponse(&resp);
resp              292 source4/heimdal/lib/hx509/revoke.c     if (resp.responseBytes == NULL) {
resp              293 source4/heimdal/lib/hx509/revoke.c 	free_OCSPResponse(&resp);
resp              297 source4/heimdal/lib/hx509/revoke.c     ret = der_heim_oid_cmp(&resp.responseBytes->responseType,
resp              300 source4/heimdal/lib/hx509/revoke.c 	free_OCSPResponse(&resp);
resp              304 source4/heimdal/lib/hx509/revoke.c     ret = decode_OCSPBasicOCSPResponse(resp.responseBytes->response.data,
resp              305 source4/heimdal/lib/hx509/revoke.c 				       resp.responseBytes->response.length,
resp              309 source4/heimdal/lib/hx509/revoke.c 	free_OCSPResponse(&resp);
resp              312 source4/heimdal/lib/hx509/revoke.c     if (size != resp.responseBytes->response.length) {
resp              313 source4/heimdal/lib/hx509/revoke.c 	free_OCSPResponse(&resp);
resp              317 source4/heimdal/lib/hx509/revoke.c     free_OCSPResponse(&resp);
resp              406 source4/heimdal/lib/krb5/get_cred.c     krb5_data resp;
resp              416 source4/heimdal/lib/krb5/get_cred.c     krb5_data_zero(&resp);
resp              521 source4/heimdal/lib/krb5/get_cred.c 				   &resp);
resp              528 source4/heimdal/lib/krb5/get_cred.c     if(decode_TGS_REP(resp.data, resp.length, &rep.kdc_rep, &len) == 0) {
resp              561 source4/heimdal/lib/krb5/get_cred.c     } else if(krb5_rd_error(context, &resp, &error) == 0) {
resp              564 source4/heimdal/lib/krb5/get_cred.c     } else if(resp.data && ((char*)resp.data)[0] == 4) {
resp              576 source4/heimdal/lib/krb5/get_cred.c     krb5_data_free(&resp);
resp              898 source4/heimdal/lib/krb5/get_in_tkt.c     krb5_data req, resp;
resp              943 source4/heimdal/lib/krb5/get_in_tkt.c 	ret = krb5_sendto_kdc (context, &req, &creds->client->realm, &resp);
resp              949 source4/heimdal/lib/krb5/get_in_tkt.c 	ret = decode_AS_REP(resp.data, resp.length, &rep.kdc_rep, &size);
resp              955 source4/heimdal/lib/krb5/get_in_tkt.c 	    ret2 = krb5_rd_error(context, &resp, &error);
resp              956 source4/heimdal/lib/krb5/get_in_tkt.c 	    if(ret2 && resp.data && ((char*)resp.data)[0] == 4)
resp              958 source4/heimdal/lib/krb5/get_in_tkt.c 	    krb5_data_free(&resp);
resp              983 source4/heimdal/lib/krb5/get_in_tkt.c 	krb5_data_free(&resp);
resp             1220 source4/heimdal/lib/krb5/init_creds_pw.c     krb5_data resp;
resp             1289 source4/heimdal/lib/krb5/init_creds_pw.c 				   creds->client->realm, &resp);
resp             1294 source4/heimdal/lib/krb5/init_creds_pw.c 	ret = decode_AS_REP(resp.data, resp.length, &rep.kdc_rep, &size);
resp             1296 source4/heimdal/lib/krb5/init_creds_pw.c 	    krb5_data_free(&resp);
resp             1303 source4/heimdal/lib/krb5/init_creds_pw.c 	    ret = krb5_rd_error(context, &resp, &error);
resp             1304 source4/heimdal/lib/krb5/init_creds_pw.c 	    if(ret && resp.data && ((char*)resp.data)[0] == 4)
resp             1306 source4/heimdal/lib/krb5/init_creds_pw.c 	    krb5_data_free(&resp);
resp             1341 source4/heimdal/lib/ntlm/ntlm.c     unsigned char res[21], *resp;
resp             1369 source4/heimdal/lib/ntlm/ntlm.c     resp = ntlm->data;
resp             1370 source4/heimdal/lib/ntlm/ntlm.c     splitandenc(&res[0], ntlm2_sess_hash, resp + 0);
resp             1371 source4/heimdal/lib/ntlm/ntlm.c     splitandenc(&res[7], ntlm2_sess_hash, resp + 8);
resp             1372 source4/heimdal/lib/ntlm/ntlm.c     splitandenc(&res[14], ntlm2_sess_hash, resp + 16);
resp               35 source4/ldap_server/ldap_bind.c 	struct ldap_BindResponse *resp;
resp               87 source4/ldap_server/ldap_bind.c 	resp = &reply->msg->r.BindResponse;
resp               88 source4/ldap_server/ldap_bind.c 	resp->response.resultcode = result;
resp               89 source4/ldap_server/ldap_bind.c 	resp->response.errormessage = errstr;
resp               90 source4/ldap_server/ldap_bind.c 	resp->response.dn = NULL;
resp               91 source4/ldap_server/ldap_bind.c 	resp->response.referral = NULL;
resp               92 source4/ldap_server/ldap_bind.c 	resp->SASL.secblob = NULL;
resp              118 source4/ldap_server/ldap_bind.c 	struct ldap_BindResponse *resp;
resp              130 source4/ldap_server/ldap_bind.c 	resp = &reply->msg->r.BindResponse;
resp              185 source4/ldap_server/ldap_bind.c 		resp->SASL.secblob = talloc(reply, DATA_BLOB);
resp              186 source4/ldap_server/ldap_bind.c 		NT_STATUS_HAVE_NO_MEMORY(resp->SASL.secblob);
resp              187 source4/ldap_server/ldap_bind.c 		*resp->SASL.secblob = output;
resp              189 source4/ldap_server/ldap_bind.c 		resp->SASL.secblob = NULL;
resp              263 source4/ldap_server/ldap_bind.c 	resp->response.resultcode = result;
resp              264 source4/ldap_server/ldap_bind.c 	resp->response.dn = NULL;
resp              265 source4/ldap_server/ldap_bind.c 	resp->response.errormessage = errstr;
resp              266 source4/ldap_server/ldap_bind.c 	resp->response.referral = NULL;
resp              276 source4/ldap_server/ldap_bind.c 	struct ldap_BindResponse *resp;
resp              298 source4/ldap_server/ldap_bind.c 	resp = &reply->msg->r.BindResponse;
resp              299 source4/ldap_server/ldap_bind.c 	resp->response.resultcode = 7;
resp              300 source4/ldap_server/ldap_bind.c 	resp->response.dn = NULL;
resp              301 source4/ldap_server/ldap_bind.c 	resp->response.errormessage = talloc_asprintf(reply, "Bad AuthenticationChoice [%d]", req->mechanism);
resp              302 source4/ldap_server/ldap_bind.c 	resp->response.referral = NULL;
resp              303 source4/ldap_server/ldap_bind.c 	resp->SASL.secblob = NULL;
resp               64 source4/lib/ldb/modules/sort.c 	struct ldb_sort_resp_control *resp;
resp               88 source4/lib/ldb/modules/sort.c 	resp = talloc(controls[i], struct ldb_sort_resp_control);
resp               89 source4/lib/ldb/modules/sort.c 	if (! resp )
resp               92 source4/lib/ldb/modules/sort.c 	resp->result = result;
resp               93 source4/lib/ldb/modules/sort.c 	resp->attr_desc = talloc_strdup(resp, desc);
resp               95 source4/lib/ldb/modules/sort.c 	if (! resp->attr_desc )
resp               98 source4/lib/ldb/modules/sort.c 	controls[i]->data = resp;
resp               44 source4/winbind/wb_samba3_cmd.c 	struct winbindd_response *resp = &s3call->response;
resp               46 source4/winbind/wb_samba3_cmd.c 		resp->result = WINBINDD_ERROR;
resp               48 source4/winbind/wb_samba3_cmd.c 		resp->result = WINBINDD_OK;
resp               51 source4/winbind/wb_samba3_cmd.c 	WBSRV_SAMBA3_SET_STRING(resp->data.auth.nt_status_string,
resp               53 source4/winbind/wb_samba3_cmd.c 	WBSRV_SAMBA3_SET_STRING(resp->data.auth.error_string,
resp               56 source4/winbind/wb_samba3_cmd.c 	resp->data.auth.pam_error = nt_status_to_pam(status);
resp               57 source4/winbind/wb_samba3_cmd.c 	resp->data.auth.nt_status = NT_STATUS_V(status);
resp               69 source4/winbind/wb_samba3_cmd.c 	struct winbindd_response *resp = &s3call->response;
resp               71 source4/winbind/wb_samba3_cmd.c 		resp->result = WINBINDD_OK;
resp               73 source4/winbind/wb_samba3_cmd.c 		resp->result = WINBINDD_ERROR;