auth_len         5791 source3/include/proto.h 				uint32 call_id, int data_len, int auth_len);
auth_len         5825 source3/include/proto.h bool smb_io_rpc_auth_schannel_chk(const char *desc, int auth_len, 
auth_len          172 source3/include/rpc_dce.h 	uint16 auth_len; /* 0 - authentication length  */
auth_len          554 source3/rpc_client/cli_pipe.c 	uint32 auth_len = prhdr->auth_len;
auth_len          573 source3/rpc_client/cli_pipe.c 	if ((auth_len > RPC_MAX_SIGN_SIZE) ||
auth_len          574 source3/rpc_client/cli_pipe.c 			(RPC_HEADER_LEN + RPC_HDR_RESP_LEN + RPC_HDR_AUTH_LEN + auth_len > prhdr->frag_len)) {
auth_len          576 source3/rpc_client/cli_pipe.c 			(unsigned int)auth_len ));
auth_len          588 source3/rpc_client/cli_pipe.c 	data_len = (size_t)(prhdr->frag_len - RPC_HEADER_LEN - RPC_HDR_RESP_LEN - RPC_HDR_AUTH_LEN - auth_len);
auth_len          591 source3/rpc_client/cli_pipe.c 	full_packet_data_len = prhdr->frag_len - auth_len;
auth_len          606 source3/rpc_client/cli_pipe.c 	auth_blob.length = auth_len;
auth_len          675 source3/rpc_client/cli_pipe.c 	uint32 auth_len = prhdr->auth_len;
auth_len          686 source3/rpc_client/cli_pipe.c 	if (auth_len < RPC_AUTH_SCHANNEL_SIGN_OR_SEAL_CHK_LEN) {
auth_len          687 source3/rpc_client/cli_pipe.c 		DEBUG(0,("cli_pipe_verify_schannel: auth_len %u.\n", (unsigned int)auth_len ));
auth_len          696 source3/rpc_client/cli_pipe.c 	if ((auth_len > RPC_MAX_SIGN_SIZE) ||
auth_len          697 source3/rpc_client/cli_pipe.c 			(RPC_HEADER_LEN + RPC_HDR_RESP_LEN + RPC_HDR_AUTH_LEN + auth_len > prhdr->frag_len)) {
auth_len          699 source3/rpc_client/cli_pipe.c 			(unsigned int)auth_len ));
auth_len          703 source3/rpc_client/cli_pipe.c 	data_len = prhdr->frag_len - RPC_HEADER_LEN - RPC_HDR_RESP_LEN - RPC_HDR_AUTH_LEN - auth_len;
auth_len          774 source3/rpc_client/cli_pipe.c 	if (prhdr->auth_len) {
auth_len          775 source3/rpc_client/cli_pipe.c 		if (prhdr->auth_len > prhdr->frag_len) {
auth_len          779 source3/rpc_client/cli_pipe.c 		if (prhdr->auth_len + (unsigned int)RPC_HDR_AUTH_LEN < prhdr->auth_len ||
auth_len          780 source3/rpc_client/cli_pipe.c 				prhdr->auth_len + (unsigned int)RPC_HDR_AUTH_LEN < (unsigned int)RPC_HDR_AUTH_LEN) {
auth_len          792 source3/rpc_client/cli_pipe.c 			if (prhdr->auth_len) {
auth_len          797 source3/rpc_client/cli_pipe.c 					(unsigned int)prhdr->auth_len ));
auth_len          894 source3/rpc_client/cli_pipe.c 			if (prhdr->auth_len) {
auth_len          897 source3/rpc_client/cli_pipe.c 				if (*pdata_len < RPC_HDR_AUTH_LEN + prhdr->auth_len) {
auth_len          900 source3/rpc_client/cli_pipe.c 				*pdata_len -= (RPC_HDR_AUTH_LEN + prhdr->auth_len);
auth_len         1671 source3/rpc_client/cli_pipe.c 	uint16 auth_len = prs_offset(pauth_info);
auth_len         1685 source3/rpc_client/cli_pipe.c 	if (auth_len) {
auth_len         1691 source3/rpc_client/cli_pipe.c 		frag_len += RPC_HDR_AUTH_LEN + auth_len + ss_padding_len;
auth_len         1695 source3/rpc_client/cli_pipe.c 	init_rpc_hdr(&hdr, pkt_type, RPC_FLG_FIRST|RPC_FLG_LAST, rpc_call_id, frag_len, auth_len);
auth_len         1713 source3/rpc_client/cli_pipe.c 	if(auth_len != 0) {
auth_len         2133 source3/rpc_client/cli_pipe.c 	uint16_t auth_len;
auth_len         2144 source3/rpc_client/cli_pipe.c 		state->cli, data_left, &frag_len, &auth_len, &ss_padding);
auth_len         2160 source3/rpc_client/cli_pipe.c 		     auth_len);
auth_len         2712 source3/rpc_client/cli_pipe.c 	if ((phdr->auth_len == 0)
auth_len         2713 source3/rpc_client/cli_pipe.c 	    || (phdr->frag_len < phdr->auth_len + RPC_HDR_AUTH_LEN)) {
auth_len         2719 source3/rpc_client/cli_pipe.c 		    phdr->frag_len - phdr->auth_len - RPC_HDR_AUTH_LEN)) {
auth_len         2729 source3/rpc_client/cli_pipe.c 	server_response = data_blob_talloc(talloc_tos(), NULL, phdr->auth_len);
auth_len         2731 source3/rpc_client/cli_pipe.c 			  phdr->auth_len);
auth_len         2793 source3/rpc_client/cli_pipe.c 	if ((phdr->auth_len == 0)
auth_len         2794 source3/rpc_client/cli_pipe.c 	    || (phdr->frag_len < phdr->auth_len + RPC_HDR_AUTH_LEN)) {
auth_len         2801 source3/rpc_client/cli_pipe.c 		    phdr->frag_len - phdr->auth_len - RPC_HDR_AUTH_LEN)) {
auth_len         2809 source3/rpc_client/cli_pipe.c 	server_spnego_response = data_blob(NULL, phdr->auth_len);
auth_len         2811 source3/rpc_client/cli_pipe.c 			  reply_pdu, phdr->auth_len);
auth_len         2903 source3/rpc_client/cli_pipe.c 		    hdr.frag_len - hdr.auth_len - RPC_HDR_AUTH_LEN)) {
auth_len         2913 source3/rpc_client/cli_pipe.c 	server_spnego_response = data_blob(NULL, hdr.auth_len);
auth_len         2915 source3/rpc_client/cli_pipe.c 			  hdr.auth_len);
auth_len           33 source3/rpc_parse/parse_rpc.c 				uint32 call_id, int data_len, int auth_len)
auth_len           44 source3/rpc_parse/parse_rpc.c 	hdr->auth_len     = auth_len;        /* authentication length */
auth_len           95 source3/rpc_parse/parse_rpc.c 	if(!prs_uint16("auth_len  ", ps, depth, &rpc->auth_len))
auth_len          616 source3/rpc_parse/parse_rpc.c bool smb_io_rpc_auth_schannel_chk(const char *desc, int auth_len, 
auth_len          635 source3/rpc_parse/parse_rpc.c 	if ( auth_len == RPC_AUTH_SCHANNEL_SIGN_OR_SEAL_CHK_LEN ) {
auth_len          144 source3/rpc_server/srv_pipe.c 	p->hdr.auth_len = NTLMSSP_SIG_SIZE;
auth_len          357 source3/rpc_server/srv_pipe.c 	p->hdr.auth_len = RPC_AUTH_SCHANNEL_SIGN_OR_SEAL_CHK_LEN;
auth_len          528 source3/rpc_server/srv_pipe.c 	p->hdr.auth_len = 0;
auth_len          717 source3/rpc_server/srv_pipe.c 	if (p->hdr.auth_len == 0) {
auth_len          743 source3/rpc_server/srv_pipe.c 	blob = data_blob(NULL,p->hdr.auth_len);
auth_len          745 source3/rpc_server/srv_pipe.c 	if (!prs_copy_data_out((char *)blob.data, rpc_in_p, p->hdr.auth_len)) {
auth_len          747 source3/rpc_server/srv_pipe.c 			(unsigned int)p->hdr.auth_len ));
auth_len         1115 source3/rpc_server/srv_pipe.c 	blob = data_blob(NULL,p->hdr.auth_len);
auth_len         1117 source3/rpc_server/srv_pipe.c 	if (!prs_copy_data_out((char *)blob.data, rpc_in_p, p->hdr.auth_len)) {
auth_len         1119 source3/rpc_server/srv_pipe.c 			(unsigned int)p->hdr.auth_len ));
auth_len         1253 source3/rpc_server/srv_pipe.c 	spnego_blob = data_blob(NULL,p->hdr.auth_len);
auth_len         1255 source3/rpc_server/srv_pipe.c 	if (!prs_copy_data_out((char *)spnego_blob.data, rpc_in_p, p->hdr.auth_len)) {
auth_len         1257 source3/rpc_server/srv_pipe.c 			(unsigned int)p->hdr.auth_len ));
auth_len         1444 source3/rpc_server/srv_pipe.c 	blob = data_blob(NULL,p->hdr.auth_len);
auth_len         1446 source3/rpc_server/srv_pipe.c 	if (!prs_copy_data_out((char *)blob.data, rpc_in_p, p->hdr.auth_len)) {
auth_len         1448 source3/rpc_server/srv_pipe.c 			(unsigned int)p->hdr.auth_len ));
auth_len         1522 source3/rpc_server/srv_pipe.c 	int auth_len = 0;
auth_len         1634 source3/rpc_server/srv_pipe.c 	if (p->hdr.auth_len) {
auth_len         1745 source3/rpc_server/srv_pipe.c 		auth_len = prs_offset(&out_auth) - RPC_HDR_AUTH_LEN;
auth_len         1751 source3/rpc_server/srv_pipe.c 			auth_len);
auth_len         1771 source3/rpc_server/srv_pipe.c 	if (auth_len && !prs_append_prs_data( &p->out_data.frag, &out_auth)) {
auth_len         1810 source3/rpc_server/srv_pipe.c 	int auth_len = 0;
auth_len         1860 source3/rpc_server/srv_pipe.c 	if (p->hdr.auth_len != 0) {
auth_len         1935 source3/rpc_server/srv_pipe.c 		auth_len = prs_offset(&out_auth) - RPC_HDR_AUTH_LEN;
auth_len         1941 source3/rpc_server/srv_pipe.c 			auth_len);
auth_len         1961 source3/rpc_server/srv_pipe.c 	if (auth_len && !prs_append_prs_data(&p->out_data.frag, &out_auth)) {
auth_len         1994 source3/rpc_server/srv_pipe.c 	uint32 auth_len = p->hdr.auth_len;
auth_len         2015 source3/rpc_server/srv_pipe.c 	if ((auth_len > RPC_MAX_SIGN_SIZE) ||
auth_len         2016 source3/rpc_server/srv_pipe.c 			(RPC_HEADER_LEN + RPC_HDR_REQ_LEN + RPC_HDR_AUTH_LEN + auth_len > p->hdr.frag_len)) {
auth_len         2018 source3/rpc_server/srv_pipe.c 			(unsigned int)auth_len ));
auth_len         2031 source3/rpc_server/srv_pipe.c 	data_len = (size_t)(p->hdr.frag_len - RPC_HEADER_LEN - RPC_HDR_REQ_LEN - RPC_HDR_AUTH_LEN - auth_len);
auth_len         2034 source3/rpc_server/srv_pipe.c 	full_packet_data_len = p->hdr.frag_len - auth_len;
auth_len         2051 source3/rpc_server/srv_pipe.c 	auth_blob.length = auth_len;
auth_len         2109 source3/rpc_server/srv_pipe.c 	uint32 auth_len;
auth_len         2114 source3/rpc_server/srv_pipe.c 	auth_len = p->hdr.auth_len;
auth_len         2116 source3/rpc_server/srv_pipe.c 	if (auth_len < RPC_AUTH_SCHANNEL_SIGN_OR_SEAL_CHK_LEN ||
auth_len         2117 source3/rpc_server/srv_pipe.c 			auth_len > RPC_HEADER_LEN +
auth_len         2120 source3/rpc_server/srv_pipe.c 					auth_len) {
auth_len         2121 source3/rpc_server/srv_pipe.c 		DEBUG(0,("Incorrect auth_len %u.\n", (unsigned int)auth_len ));
auth_len         2131 source3/rpc_server/srv_pipe.c 	if (p->hdr.frag_len < RPC_HEADER_LEN + RPC_HDR_REQ_LEN + RPC_HDR_AUTH_LEN + auth_len) {
auth_len         2134 source3/rpc_server/srv_pipe.c 			(unsigned int)auth_len ));
auth_len         2139 source3/rpc_server/srv_pipe.c 		RPC_HDR_AUTH_LEN - auth_len;
auth_len         2141 source3/rpc_server/srv_pipe.c 	DEBUG(5,("data %d auth %d\n", data_len, auth_len));
auth_len          363 source3/rpc_server/srv_pipe_hnd.c 				(p->hdr.auth_len ? RPC_HDR_AUTH_LEN : 0) - p->hdr.auth_len;