trusted_dc_name  5646 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->trusted_dc_name));
trusted_dc_name  5650 librpc/gen_ndr/ndr_netlogon.c 		if (r->trusted_dc_name) {
trusted_dc_name  5651 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->trusted_dc_name, CH_UTF16)));
trusted_dc_name  5653 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->trusted_dc_name, CH_UTF16)));
trusted_dc_name  5654 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->trusted_dc_name, ndr_charset_length(r->trusted_dc_name, CH_UTF16), sizeof(uint16_t), CH_UTF16));
trusted_dc_name  5670 librpc/gen_ndr/ndr_netlogon.c 			NDR_PULL_ALLOC(ndr, r->trusted_dc_name);
trusted_dc_name  5672 librpc/gen_ndr/ndr_netlogon.c 			r->trusted_dc_name = NULL;
trusted_dc_name  5677 librpc/gen_ndr/ndr_netlogon.c 		if (r->trusted_dc_name) {
trusted_dc_name  5679 librpc/gen_ndr/ndr_netlogon.c 			NDR_PULL_SET_MEM_CTX(ndr, r->trusted_dc_name, 0);
trusted_dc_name  5680 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->trusted_dc_name));
trusted_dc_name  5681 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->trusted_dc_name));
trusted_dc_name  5682 librpc/gen_ndr/ndr_netlogon.c 			if (ndr_get_array_length(ndr, &r->trusted_dc_name) > ndr_get_array_size(ndr, &r->trusted_dc_name)) {
trusted_dc_name  5683 librpc/gen_ndr/ndr_netlogon.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->trusted_dc_name), ndr_get_array_length(ndr, &r->trusted_dc_name));
trusted_dc_name  5685 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->trusted_dc_name), sizeof(uint16_t)));
trusted_dc_name  5686 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->trusted_dc_name, ndr_get_array_length(ndr, &r->trusted_dc_name), sizeof(uint16_t), CH_UTF16));
trusted_dc_name  5699 librpc/gen_ndr/ndr_netlogon.c 	ndr_print_ptr(ndr, "trusted_dc_name", r->trusted_dc_name);
trusted_dc_name  5701 librpc/gen_ndr/ndr_netlogon.c 	if (r->trusted_dc_name) {
trusted_dc_name  5702 librpc/gen_ndr/ndr_netlogon.c 		ndr_print_string(ndr, "trusted_dc_name", r->trusted_dc_name);
trusted_dc_name  5761 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->trusted_dc_name));
trusted_dc_name  5765 librpc/gen_ndr/ndr_netlogon.c 		if (r->trusted_dc_name) {
trusted_dc_name  5766 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->trusted_dc_name, CH_UTF16)));
trusted_dc_name  5768 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->trusted_dc_name, CH_UTF16)));
trusted_dc_name  5769 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->trusted_dc_name, ndr_charset_length(r->trusted_dc_name, CH_UTF16), sizeof(uint16_t), CH_UTF16));
trusted_dc_name  5791 librpc/gen_ndr/ndr_netlogon.c 			NDR_PULL_ALLOC(ndr, r->trusted_dc_name);
trusted_dc_name  5793 librpc/gen_ndr/ndr_netlogon.c 			r->trusted_dc_name = NULL;
trusted_dc_name  5803 librpc/gen_ndr/ndr_netlogon.c 		if (r->trusted_dc_name) {
trusted_dc_name  5805 librpc/gen_ndr/ndr_netlogon.c 			NDR_PULL_SET_MEM_CTX(ndr, r->trusted_dc_name, 0);
trusted_dc_name  5806 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->trusted_dc_name));
trusted_dc_name  5807 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->trusted_dc_name));
trusted_dc_name  5808 librpc/gen_ndr/ndr_netlogon.c 			if (ndr_get_array_length(ndr, &r->trusted_dc_name) > ndr_get_array_size(ndr, &r->trusted_dc_name)) {
trusted_dc_name  5809 librpc/gen_ndr/ndr_netlogon.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->trusted_dc_name), ndr_get_array_length(ndr, &r->trusted_dc_name));
trusted_dc_name  5811 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->trusted_dc_name), sizeof(uint16_t)));
trusted_dc_name  5812 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->trusted_dc_name, ndr_get_array_length(ndr, &r->trusted_dc_name), sizeof(uint16_t), CH_UTF16));
trusted_dc_name  5835 librpc/gen_ndr/ndr_netlogon.c 	ndr_print_ptr(ndr, "trusted_dc_name", r->trusted_dc_name);
trusted_dc_name  5837 librpc/gen_ndr/ndr_netlogon.c 	if (r->trusted_dc_name) {
trusted_dc_name  5838 librpc/gen_ndr/ndr_netlogon.c 		ndr_print_string(ndr, "trusted_dc_name", r->trusted_dc_name);
trusted_dc_name   647 librpc/gen_ndr/netlogon.h 	const char *trusted_dc_name;/* [unique,charset(UTF16)] */
trusted_dc_name   662 librpc/gen_ndr/netlogon.h 	const char *trusted_dc_name;/* [unique,charset(UTF16)] */
trusted_dc_name    65 source3/rpc_server/srv_netlog_nt.c 				const char *trusted_dc_name,
trusted_dc_name    70 source3/rpc_server/srv_netlog_nt.c 	r->trusted_dc_name = trusted_dc_name;