repl
char *pat = NULL, *repl = NULL;
((repl = strchr(*argptr, '=')) != NULL)) {
*repl++ = '\0';
fc_replace(he.str, pat, repl) : he.str;
krb5_ap_rep_enc_part *repl;
kret = krb5_rd_rep(context, ctx->auth_context, &inbuf, &repl);
krb5_free_ap_rep_enc_part(context, repl);
krb5_ap_rep_enc_part *repl;
&repl);
&repl);
repl);
krb5_ap_rep_enc_part *repl;
ret = krb5_rd_rep(context, ac, &rep.apRep, &repl);
krb5_free_ap_rep_enc_part(context, repl);
*((*repl)->seq_number));
if ((*repl)->subkey)
krb5_auth_con_setremotesubkey(context, auth_context, (*repl)->subkey);
krb5_ap_rep_enc_part **repl)
*repl = malloc(sizeof(**repl));
if (*repl == NULL) {
ret = decode_EncAPRepPart(data.data, data.length, *repl, &len);
if ((*repl)->ctime != auth_context->authenticator->ctime ||
(*repl)->cusec != auth_context->authenticator->cusec)
krb5_free_ap_rep_enc_part(context, *repl);
*repl = NULL;
if ((*repl)->seq_number)
repl = 1;
krb5_net_write (context, p_fd, &repl, 1);
repl = 2;
krb5_net_write (context, p_fd, &repl, 1);
repl = 2;
krb5_net_write (context, p_fd, &repl, 1);
repl = 0;
if (krb5_net_write (context, p_fd, &repl, 1) != 1) {
u_char repl;
sret = krb5_net_read (context, p_fd, &repl, sizeof(repl));
} else if (sret != sizeof(repl)) {
if (repl != 0) {
u_char repl;
repl.subkey = &auth_context->send_subkey->keyblock;
repl.subkey = auth_context->authentp->subkey;
repl.seq_number = auth_context->remote_seq_number;
repl.seq_number = auth_context->local_seq_number;
TRACE_MK_REP(context, repl.ctime, repl.cusec, repl.subkey,
repl.seq_number);
if ((retval = encode_krb5_ap_rep_enc_part(&repl, &scratch)))
krb5_ap_rep_enc_part repl;
krb5_us_timeofday(context, &repl.ctime, &repl.cusec);
repl.ctime = auth_context->authentp->ctime;
repl.cusec = auth_context->authentp->cusec;
repl.subkey = NULL;
*repl = enc;
krb5_ap_rep_enc_part *repl = NULL;
retval = decode_krb5_ap_rep_enc_part(&scratch, &repl);
*nonce = repl->seq_number;
if (repl->subkey != NULL) {
TRACE_RD_REP_DCE(context, repl->ctime, repl->cusec, repl->seq_number);
if (repl != NULL)
krb5_free_ap_rep_enc_part(context, repl);
const krb5_data *inbuf, krb5_ap_rep_enc_part **repl)
*repl = NULL;
krb5_ap_rep_enc_part *repl = 0;
&repl))) {
if (repl)
krb5_free_ap_rep_enc_part(context, repl);
*rep_result = repl;
krb5_free_ap_rep_enc_part(context, repl);
do_replacement(const char *regstr, const char *repl, krb5_boolean doall,
k5_buf_add(&buf, repl);
char *newstr, *rule = NULL, *repl = NULL, *current = NULL;
free(repl);
repl = k5memdup0(ep + 1, tp - (ep + 1), &ret);
if (repl == NULL)
ret = do_replacement(rule, repl, doglobal, current, &newstr);
free(repl);
const char *repl;
keys[num_keys].repl = va_arg(ap, char *);
if (keys[num_keys].repl == NULL) {
if ((r = sshbuf_put(buf, keys[i].repl,
strlen(keys[i].repl))) != 0)
expand_label_str(char *label, size_t len, const char *srch, const char *repl)
(strlcat(tmp, repl, len) >= len))
} *repl;
args, send_tail - (char*)args, (void **)&repl, &pkt);
rpc_fromaddr(repl, &bp_server_addr, &bp_server_port);
bp_server_port = repl->port;
x = ntohl(repl->encap_len);
recv_head = (char*) repl->capsule;
} *repl;
args, len, (void **)&repl, &pkt);
if (repl->errno != 0) {
return (ntohl(repl->errno));
*fhlenp = ntohl(repl->fhsize);
bcopy(repl->fh, fhp, *fhlenp);
} *repl;
args, len, (void **)&repl, &pkt);
if (repl->errno != 0) {
return (ntohl(repl->errno));
newfd->fhsize = ntohl(repl->fhsize);
bcopy(repl->fhplusattr, &newfd->fh, newfd->fhsize);
if (repl->fhplusattr[pos++] == 0) {
bcopy(&repl->fhplusattr[pos], &newfd->fa, sizeof(newfd->fa));
} *repl;
(void **)&repl, &pkt);
if (repl->errno != 0) {
rc = ntohl(repl->errno);
if (repl->ok == 0) {
repl->len = ntohl(repl->len);
if (repl->len > NFS_MAXPATHLEN) {
bcopy(repl->path, buf, repl->len);
buf[repl->len] = 0;
} *repl;
hlen = offsetof(struct repl, data[0]);
(void **)&repl, &pkt);
if (repl->errno != 0) {
errno = ntohl(repl->errno);
x = ntohl(repl->count);
bcopy(repl->data, addr, x);
struct nfsv3_readdir_repl *repl;
repl = (struct nfsv3_readdir_repl *)buf;
if (repl->errno != 0) {
rc = ntohl(repl->errno);
fp->cookie = ((uint64_t)ntohl(repl->cookiev0) << 32) |
ntohl(repl->cookiev1);
char repl[sizeof(buf)];
ATF_REQUIRE(recv(a, &repl, sizeof(repl), 0) == sizeof(buf));
ATF_REQUIRE(strcmp(buf, repl) == 0);
char repl[sizeof(buf)];
ATF_REQUIRE(recv(a, &repl, sizeof(repl), 0) == sizeof(buf));
ATF_REQUIRE(strcmp(buf, repl) == 0);