prhdr             367 source3/rpc_client/cli_pipe.c 				 struct rpc_hdr_info *prhdr,
prhdr             375 source3/rpc_client/cli_pipe.c 	if(!smb_io_rpc_hdr("rpc_hdr   ", prhdr, pdu, 0)) {
prhdr             380 source3/rpc_client/cli_pipe.c 	if (prhdr->frag_len > cli->max_recv_frag) {
prhdr             382 source3/rpc_client/cli_pipe.c 			  " we only allow %d\n", (int)prhdr->frag_len,
prhdr             398 source3/rpc_client/cli_pipe.c 	struct rpc_hdr_info *prhdr;
prhdr             408 source3/rpc_client/cli_pipe.c 					       struct rpc_hdr_info *prhdr,
prhdr             422 source3/rpc_client/cli_pipe.c 	state->prhdr = prhdr;
prhdr             445 source3/rpc_client/cli_pipe.c 	status = parse_rpc_header(cli, prhdr, pdu);
prhdr             453 source3/rpc_client/cli_pipe.c 	if (pdu_len < prhdr->frag_len) {
prhdr             454 source3/rpc_client/cli_pipe.c 		if (!rpc_grow_buffer(pdu, prhdr->frag_len)) {
prhdr             461 source3/rpc_client/cli_pipe.c 				       prhdr->frag_len - pdu_len);
prhdr             495 source3/rpc_client/cli_pipe.c 	status = parse_rpc_header(state->cli, state->prhdr, state->pdu);
prhdr             501 source3/rpc_client/cli_pipe.c 	if (!rpc_grow_buffer(state->pdu, state->prhdr->frag_len)) {
prhdr             514 source3/rpc_client/cli_pipe.c 		state->prhdr->frag_len - RPC_HEADER_LEN);
prhdr             548 source3/rpc_client/cli_pipe.c static NTSTATUS cli_pipe_verify_ntlmssp(struct rpc_pipe_client *cli, RPC_HDR *prhdr,
prhdr             554 source3/rpc_client/cli_pipe.c 	uint32 auth_len = prhdr->auth_len;
prhdr             574 source3/rpc_client/cli_pipe.c 			(RPC_HEADER_LEN + RPC_HDR_RESP_LEN + RPC_HDR_AUTH_LEN + auth_len > prhdr->frag_len)) {
prhdr             588 source3/rpc_client/cli_pipe.c 	data_len = (size_t)(prhdr->frag_len - RPC_HEADER_LEN - RPC_HDR_RESP_LEN - RPC_HDR_AUTH_LEN - auth_len);
prhdr             591 source3/rpc_client/cli_pipe.c 	full_packet_data_len = prhdr->frag_len - auth_len;
prhdr             669 source3/rpc_client/cli_pipe.c static NTSTATUS cli_pipe_verify_schannel(struct rpc_pipe_client *cli, RPC_HDR *prhdr,
prhdr             675 source3/rpc_client/cli_pipe.c 	uint32 auth_len = prhdr->auth_len;
prhdr             697 source3/rpc_client/cli_pipe.c 			(RPC_HEADER_LEN + RPC_HDR_RESP_LEN + RPC_HDR_AUTH_LEN + auth_len > prhdr->frag_len)) {
prhdr             703 source3/rpc_client/cli_pipe.c 	data_len = prhdr->frag_len - RPC_HEADER_LEN - RPC_HDR_RESP_LEN - RPC_HDR_AUTH_LEN - auth_len;
prhdr             767 source3/rpc_client/cli_pipe.c static NTSTATUS cli_pipe_validate_rpc_response(struct rpc_pipe_client *cli, RPC_HDR *prhdr,
prhdr             774 source3/rpc_client/cli_pipe.c 	if (prhdr->auth_len) {
prhdr             775 source3/rpc_client/cli_pipe.c 		if (prhdr->auth_len > prhdr->frag_len) {
prhdr             779 source3/rpc_client/cli_pipe.c 		if (prhdr->auth_len + (unsigned int)RPC_HDR_AUTH_LEN < prhdr->auth_len ||
prhdr             780 source3/rpc_client/cli_pipe.c 				prhdr->auth_len + (unsigned int)RPC_HDR_AUTH_LEN < (unsigned int)RPC_HDR_AUTH_LEN) {
prhdr             792 source3/rpc_client/cli_pipe.c 			if (prhdr->auth_len) {
prhdr             797 source3/rpc_client/cli_pipe.c 					(unsigned int)prhdr->auth_len ));
prhdr             804 source3/rpc_client/cli_pipe.c 			ret = cli_pipe_verify_ntlmssp(cli, prhdr, current_pdu, p_ss_padding_len);
prhdr             811 source3/rpc_client/cli_pipe.c 			ret = cli_pipe_verify_schannel(cli, prhdr, current_pdu, p_ss_padding_len);
prhdr             834 source3/rpc_client/cli_pipe.c static NTSTATUS cli_pipe_validate_current_pdu(struct rpc_pipe_client *cli, RPC_HDR *prhdr,
prhdr             845 source3/rpc_client/cli_pipe.c 	if (current_pdu_len != prhdr->frag_len) {
prhdr             847 source3/rpc_client/cli_pipe.c 			(unsigned int)current_pdu_len, (unsigned int)prhdr->frag_len ));
prhdr             859 source3/rpc_client/cli_pipe.c 	switch (prhdr->pkt_type) {
prhdr             878 source3/rpc_client/cli_pipe.c 			ret = cli_pipe_validate_rpc_response(cli, prhdr,
prhdr             894 source3/rpc_client/cli_pipe.c 			if (prhdr->auth_len) {
prhdr             897 source3/rpc_client/cli_pipe.c 				if (*pdata_len < RPC_HDR_AUTH_LEN + prhdr->auth_len) {
prhdr             900 source3/rpc_client/cli_pipe.c 				*pdata_len -= (RPC_HDR_AUTH_LEN + prhdr->auth_len);
prhdr             959 source3/rpc_client/cli_pipe.c 				(unsigned int)prhdr->pkt_type,
prhdr             964 source3/rpc_client/cli_pipe.c 	if (prhdr->pkt_type != expected_pkt_type) {
prhdr             968 source3/rpc_client/cli_pipe.c 			prhdr->pkt_type,
prhdr             977 source3/rpc_client/cli_pipe.c 	if ((prhdr->pkt_type == RPC_BINDACK) && !(prhdr->flags & RPC_FLG_LAST)) {
prhdr             980 source3/rpc_client/cli_pipe.c 		prhdr->flags |= RPC_FLG_FIRST|RPC_FLG_LAST;
prhdr             993 source3/rpc_client/cli_pipe.c static NTSTATUS cli_pipe_reset_current_pdu(struct rpc_pipe_client *cli, RPC_HDR *prhdr, prs_struct *current_pdu)
prhdr             997 source3/rpc_client/cli_pipe.c 	if (current_pdu_len < prhdr->frag_len) {
prhdr            1002 source3/rpc_client/cli_pipe.c 	if (current_pdu_len == (uint32)prhdr->frag_len) {
prhdr            1015 source3/rpc_client/cli_pipe.c 	memcpy(prs_data_p(current_pdu), prs_data_p(current_pdu) + prhdr->frag_len,
prhdr            1016 source3/rpc_client/cli_pipe.c 			current_pdu_len - prhdr->frag_len);
prhdr            1022 source3/rpc_client/cli_pipe.c 	if (!prs_set_buffer_size(current_pdu, current_pdu_len - prhdr->frag_len)) {