trusted_domain_name 3073 librpc/gen_ndr/cli_lsa.c 						    struct lsa_String *trusted_domain_name /* [in] [ref] */,
trusted_domain_name 3082 librpc/gen_ndr/cli_lsa.c 	r.in.trusted_domain_name = trusted_domain_name;
trusted_domain_name  353 librpc/gen_ndr/cli_lsa.h 						    struct lsa_String *trusted_domain_name /* [in] [ref] */,
trusted_domain_name 2148 librpc/gen_ndr/cli_netlogon.c 						  const char *trusted_domain_name /* [in] [unique,charset(UTF16)] */,
trusted_domain_name 2158 librpc/gen_ndr/cli_netlogon.c 	r.in.trusted_domain_name = trusted_domain_name;
trusted_domain_name 2197 librpc/gen_ndr/cli_netlogon.c 					       const char *trusted_domain_name /* [in] [ref,charset(UTF16)] */,
trusted_domain_name 2209 librpc/gen_ndr/cli_netlogon.c 	r.in.trusted_domain_name = trusted_domain_name;
trusted_domain_name  339 librpc/gen_ndr/cli_netlogon.h 						  const char *trusted_domain_name /* [in] [unique,charset(UTF16)] */,
trusted_domain_name  346 librpc/gen_ndr/cli_netlogon.h 					       const char *trusted_domain_name /* [in] [ref,charset(UTF16)] */,
trusted_domain_name 1715 librpc/gen_ndr/lsa.h 		struct lsa_String *trusted_domain_name;/* [ref] */
trusted_domain_name 11891 librpc/gen_ndr/ndr_lsa.c 		if (r->in.trusted_domain_name == NULL) {
trusted_domain_name 11894 librpc/gen_ndr/ndr_lsa.c 		NDR_CHECK(ndr_push_lsa_String(ndr, NDR_SCALARS|NDR_BUFFERS, r->in.trusted_domain_name));
trusted_domain_name 11928 librpc/gen_ndr/ndr_lsa.c 			NDR_PULL_ALLOC(ndr, r->in.trusted_domain_name);
trusted_domain_name 11931 librpc/gen_ndr/ndr_lsa.c 		NDR_PULL_SET_MEM_CTX(ndr, r->in.trusted_domain_name, LIBNDR_FLAG_REF_ALLOC);
trusted_domain_name 11932 librpc/gen_ndr/ndr_lsa.c 		NDR_CHECK(ndr_pull_lsa_String(ndr, NDR_SCALARS|NDR_BUFFERS, r->in.trusted_domain_name));
trusted_domain_name 11976 librpc/gen_ndr/ndr_lsa.c 		ndr_print_ptr(ndr, "trusted_domain_name", r->in.trusted_domain_name);
trusted_domain_name 11978 librpc/gen_ndr/ndr_lsa.c 		ndr_print_lsa_String(ndr, "trusted_domain_name", r->in.trusted_domain_name);
trusted_domain_name 5762 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->trusted_domain_name));
trusted_domain_name 5771 librpc/gen_ndr/ndr_netlogon.c 		if (r->trusted_domain_name) {
trusted_domain_name 5772 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->trusted_domain_name, CH_UTF16)));
trusted_domain_name 5774 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->trusted_domain_name, CH_UTF16)));
trusted_domain_name 5775 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->trusted_domain_name, ndr_charset_length(r->trusted_domain_name, CH_UTF16), sizeof(uint16_t), CH_UTF16));
trusted_domain_name 5797 librpc/gen_ndr/ndr_netlogon.c 			NDR_PULL_ALLOC(ndr, r->trusted_domain_name);
trusted_domain_name 5799 librpc/gen_ndr/ndr_netlogon.c 			r->trusted_domain_name = NULL;
trusted_domain_name 5815 librpc/gen_ndr/ndr_netlogon.c 		if (r->trusted_domain_name) {
trusted_domain_name 5817 librpc/gen_ndr/ndr_netlogon.c 			NDR_PULL_SET_MEM_CTX(ndr, r->trusted_domain_name, 0);
trusted_domain_name 5818 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->trusted_domain_name));
trusted_domain_name 5819 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->trusted_domain_name));
trusted_domain_name 5820 librpc/gen_ndr/ndr_netlogon.c 			if (ndr_get_array_length(ndr, &r->trusted_domain_name) > ndr_get_array_size(ndr, &r->trusted_domain_name)) {
trusted_domain_name 5821 librpc/gen_ndr/ndr_netlogon.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->trusted_domain_name), ndr_get_array_length(ndr, &r->trusted_domain_name));
trusted_domain_name 5823 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->trusted_domain_name), sizeof(uint16_t)));
trusted_domain_name 5824 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->trusted_domain_name, ndr_get_array_length(ndr, &r->trusted_domain_name), sizeof(uint16_t), CH_UTF16));
trusted_domain_name 5841 librpc/gen_ndr/ndr_netlogon.c 	ndr_print_ptr(ndr, "trusted_domain_name", r->trusted_domain_name);
trusted_domain_name 5843 librpc/gen_ndr/ndr_netlogon.c 	if (r->trusted_domain_name) {
trusted_domain_name 5844 librpc/gen_ndr/ndr_netlogon.c 		ndr_print_string(ndr, "trusted_domain_name", r->trusted_domain_name);
trusted_domain_name 15362 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.trusted_domain_name));
trusted_domain_name 15363 librpc/gen_ndr/ndr_netlogon.c 		if (r->in.trusted_domain_name) {
trusted_domain_name 15364 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.trusted_domain_name, CH_UTF16)));
trusted_domain_name 15366 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.trusted_domain_name, CH_UTF16)));
trusted_domain_name 15367 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.trusted_domain_name, ndr_charset_length(r->in.trusted_domain_name, CH_UTF16), sizeof(uint16_t), CH_UTF16));
trusted_domain_name 15416 librpc/gen_ndr/ndr_netlogon.c 			NDR_PULL_ALLOC(ndr, r->in.trusted_domain_name);
trusted_domain_name 15418 librpc/gen_ndr/ndr_netlogon.c 			r->in.trusted_domain_name = NULL;
trusted_domain_name 15420 librpc/gen_ndr/ndr_netlogon.c 		if (r->in.trusted_domain_name) {
trusted_domain_name 15422 librpc/gen_ndr/ndr_netlogon.c 			NDR_PULL_SET_MEM_CTX(ndr, r->in.trusted_domain_name, 0);
trusted_domain_name 15423 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->in.trusted_domain_name));
trusted_domain_name 15424 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->in.trusted_domain_name));
trusted_domain_name 15425 librpc/gen_ndr/ndr_netlogon.c 			if (ndr_get_array_length(ndr, &r->in.trusted_domain_name) > ndr_get_array_size(ndr, &r->in.trusted_domain_name)) {
trusted_domain_name 15426 librpc/gen_ndr/ndr_netlogon.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.trusted_domain_name), ndr_get_array_length(ndr, &r->in.trusted_domain_name));
trusted_domain_name 15428 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.trusted_domain_name), sizeof(uint16_t)));
trusted_domain_name 15429 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.trusted_domain_name, ndr_get_array_length(ndr, &r->in.trusted_domain_name), sizeof(uint16_t), CH_UTF16));
trusted_domain_name 15476 librpc/gen_ndr/ndr_netlogon.c 		ndr_print_ptr(ndr, "trusted_domain_name", r->in.trusted_domain_name);
trusted_domain_name 15478 librpc/gen_ndr/ndr_netlogon.c 		if (r->in.trusted_domain_name) {
trusted_domain_name 15479 librpc/gen_ndr/ndr_netlogon.c 			ndr_print_string(ndr, "trusted_domain_name", r->in.trusted_domain_name);
trusted_domain_name 15513 librpc/gen_ndr/ndr_netlogon.c 		if (r->in.trusted_domain_name == NULL) {
trusted_domain_name 15516 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.trusted_domain_name, CH_UTF16)));
trusted_domain_name 15518 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.trusted_domain_name, CH_UTF16)));
trusted_domain_name 15519 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.trusted_domain_name, ndr_charset_length(r->in.trusted_domain_name, CH_UTF16), sizeof(uint16_t), CH_UTF16));
trusted_domain_name 15573 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_pull_array_size(ndr, &r->in.trusted_domain_name));
trusted_domain_name 15574 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_pull_array_length(ndr, &r->in.trusted_domain_name));
trusted_domain_name 15575 librpc/gen_ndr/ndr_netlogon.c 		if (ndr_get_array_length(ndr, &r->in.trusted_domain_name) > ndr_get_array_size(ndr, &r->in.trusted_domain_name)) {
trusted_domain_name 15576 librpc/gen_ndr/ndr_netlogon.c 			return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.trusted_domain_name), ndr_get_array_length(ndr, &r->in.trusted_domain_name));
trusted_domain_name 15578 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.trusted_domain_name), sizeof(uint16_t)));
trusted_domain_name 15579 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.trusted_domain_name, ndr_get_array_length(ndr, &r->in.trusted_domain_name), sizeof(uint16_t), CH_UTF16));
trusted_domain_name 15640 librpc/gen_ndr/ndr_netlogon.c 		ndr_print_ptr(ndr, "trusted_domain_name", r->in.trusted_domain_name);
trusted_domain_name 15642 librpc/gen_ndr/ndr_netlogon.c 		ndr_print_string(ndr, "trusted_domain_name", r->in.trusted_domain_name);
trusted_domain_name  663 librpc/gen_ndr/netlogon.h 	const char *trusted_domain_name;/* [unique,charset(UTF16)] */
trusted_domain_name 1698 librpc/gen_ndr/netlogon.h 		const char *trusted_domain_name;/* [unique,charset(UTF16)] */
trusted_domain_name 1713 librpc/gen_ndr/netlogon.h 		const char *trusted_domain_name;/* [ref,charset(UTF16)] */
trusted_domain_name  899 source3/rpcclient/cmd_netlogon.c 	const char *trusted_domain_name = NULL;
trusted_domain_name  914 source3/rpcclient/cmd_netlogon.c 		trusted_domain_name = argv[2];
trusted_domain_name  923 source3/rpcclient/cmd_netlogon.c 							 trusted_domain_name,
trusted_domain_name 1761 source4/torture/rpc/lsa.c 					     const char *trusted_domain_name)
trusted_domain_name 1778 source4/torture/rpc/lsa.c 	if (trusted_domain_name) {
trusted_domain_name 1779 source4/torture/rpc/lsa.c 		init_lsa_String(&string, trusted_domain_name);
trusted_domain_name 1785 source4/torture/rpc/lsa.c 	r.in.trusted_domain_name = &string;
trusted_domain_name 1792 source4/torture/rpc/lsa.c 		printf("lsaRQueryForestTrustInformation of %s failed - %s\n", trusted_domain_name, nt_errstr(status));
trusted_domain_name 1761 source4/torture/rpc/netlogon.c 						   struct dcerpc_pipe *p, const char *trusted_domain_name) 
trusted_domain_name 1770 source4/torture/rpc/netlogon.c 	r.in.trusted_domain_name = trusted_domain_name;