dns_servername    469 librpc/gen_ndr/cli_dfs.c 			      const char *dns_servername /* [in] [charset(UTF16)] */,
dns_servername    484 librpc/gen_ndr/cli_dfs.c 	r.in.dns_servername = dns_servername;
dns_servername    531 librpc/gen_ndr/cli_dfs.c 				 const char *dns_servername /* [in] [charset(UTF16)] */,
dns_servername    543 librpc/gen_ndr/cli_dfs.c 	r.in.dns_servername = dns_servername;
dns_servername     59 librpc/gen_ndr/cli_dfs.h 			      const char *dns_servername /* [in] [charset(UTF16)] */,
dns_servername     71 librpc/gen_ndr/cli_dfs.h 				 const char *dns_servername /* [in] [charset(UTF16)] */,
dns_servername    404 librpc/gen_ndr/dfs.h 		const char *dns_servername;/* [charset(UTF16)] */
dns_servername    425 librpc/gen_ndr/dfs.h 		const char *dns_servername;/* [charset(UTF16)] */
dns_servername   4273 librpc/gen_ndr/ndr_dfs.c 		NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.dns_servername, CH_UTF16)));
dns_servername   4275 librpc/gen_ndr/ndr_dfs.c 		NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.dns_servername, CH_UTF16)));
dns_servername   4276 librpc/gen_ndr/ndr_dfs.c 		NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.dns_servername, ndr_charset_length(r->in.dns_servername, CH_UTF16), sizeof(uint16_t), CH_UTF16));
dns_servername   4331 librpc/gen_ndr/ndr_dfs.c 		NDR_CHECK(ndr_pull_array_size(ndr, &r->in.dns_servername));
dns_servername   4332 librpc/gen_ndr/ndr_dfs.c 		NDR_CHECK(ndr_pull_array_length(ndr, &r->in.dns_servername));
dns_servername   4333 librpc/gen_ndr/ndr_dfs.c 		if (ndr_get_array_length(ndr, &r->in.dns_servername) > ndr_get_array_size(ndr, &r->in.dns_servername)) {
dns_servername   4334 librpc/gen_ndr/ndr_dfs.c 			return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.dns_servername), ndr_get_array_length(ndr, &r->in.dns_servername));
dns_servername   4336 librpc/gen_ndr/ndr_dfs.c 		NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.dns_servername), sizeof(uint16_t)));
dns_servername   4337 librpc/gen_ndr/ndr_dfs.c 		NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.dns_servername, ndr_get_array_length(ndr, &r->in.dns_servername), sizeof(uint16_t), CH_UTF16));
dns_servername   4432 librpc/gen_ndr/ndr_dfs.c 		ndr_print_string(ndr, "dns_servername", r->in.dns_servername);
dns_servername   4479 librpc/gen_ndr/ndr_dfs.c 		NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.dns_servername, CH_UTF16)));
dns_servername   4481 librpc/gen_ndr/ndr_dfs.c 		NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.dns_servername, CH_UTF16)));
dns_servername   4482 librpc/gen_ndr/ndr_dfs.c 		NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.dns_servername, ndr_charset_length(r->in.dns_servername, CH_UTF16), sizeof(uint16_t), CH_UTF16));
dns_servername   4528 librpc/gen_ndr/ndr_dfs.c 		NDR_CHECK(ndr_pull_array_size(ndr, &r->in.dns_servername));
dns_servername   4529 librpc/gen_ndr/ndr_dfs.c 		NDR_CHECK(ndr_pull_array_length(ndr, &r->in.dns_servername));
dns_servername   4530 librpc/gen_ndr/ndr_dfs.c 		if (ndr_get_array_length(ndr, &r->in.dns_servername) > ndr_get_array_size(ndr, &r->in.dns_servername)) {
dns_servername   4531 librpc/gen_ndr/ndr_dfs.c 			return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.dns_servername), ndr_get_array_length(ndr, &r->in.dns_servername));
dns_servername   4533 librpc/gen_ndr/ndr_dfs.c 		NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.dns_servername), sizeof(uint16_t)));
dns_servername   4534 librpc/gen_ndr/ndr_dfs.c 		NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.dns_servername, ndr_get_array_length(ndr, &r->in.dns_servername), sizeof(uint16_t), CH_UTF16));
dns_servername   4614 librpc/gen_ndr/ndr_dfs.c 		ndr_print_string(ndr, "dns_servername", r->in.dns_servername);