trusted_dc_name 5646 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->trusted_dc_name)); trusted_dc_name 5650 librpc/gen_ndr/ndr_netlogon.c if (r->trusted_dc_name) { trusted_dc_name 5651 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->trusted_dc_name, CH_UTF16))); trusted_dc_name 5653 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->trusted_dc_name, CH_UTF16))); trusted_dc_name 5654 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->trusted_dc_name, ndr_charset_length(r->trusted_dc_name, CH_UTF16), sizeof(uint16_t), CH_UTF16)); trusted_dc_name 5670 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->trusted_dc_name); trusted_dc_name 5672 librpc/gen_ndr/ndr_netlogon.c r->trusted_dc_name = NULL; trusted_dc_name 5677 librpc/gen_ndr/ndr_netlogon.c if (r->trusted_dc_name) { trusted_dc_name 5679 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->trusted_dc_name, 0); trusted_dc_name 5680 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_array_size(ndr, &r->trusted_dc_name)); trusted_dc_name 5681 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_array_length(ndr, &r->trusted_dc_name)); trusted_dc_name 5682 librpc/gen_ndr/ndr_netlogon.c if (ndr_get_array_length(ndr, &r->trusted_dc_name) > ndr_get_array_size(ndr, &r->trusted_dc_name)) { trusted_dc_name 5683 librpc/gen_ndr/ndr_netlogon.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->trusted_dc_name), ndr_get_array_length(ndr, &r->trusted_dc_name)); trusted_dc_name 5685 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->trusted_dc_name), sizeof(uint16_t))); trusted_dc_name 5686 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->trusted_dc_name, ndr_get_array_length(ndr, &r->trusted_dc_name), sizeof(uint16_t), CH_UTF16)); trusted_dc_name 5699 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "trusted_dc_name", r->trusted_dc_name); trusted_dc_name 5701 librpc/gen_ndr/ndr_netlogon.c if (r->trusted_dc_name) { trusted_dc_name 5702 librpc/gen_ndr/ndr_netlogon.c ndr_print_string(ndr, "trusted_dc_name", r->trusted_dc_name); trusted_dc_name 5761 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->trusted_dc_name)); trusted_dc_name 5765 librpc/gen_ndr/ndr_netlogon.c if (r->trusted_dc_name) { trusted_dc_name 5766 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->trusted_dc_name, CH_UTF16))); trusted_dc_name 5768 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->trusted_dc_name, CH_UTF16))); trusted_dc_name 5769 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->trusted_dc_name, ndr_charset_length(r->trusted_dc_name, CH_UTF16), sizeof(uint16_t), CH_UTF16)); trusted_dc_name 5791 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->trusted_dc_name); trusted_dc_name 5793 librpc/gen_ndr/ndr_netlogon.c r->trusted_dc_name = NULL; trusted_dc_name 5803 librpc/gen_ndr/ndr_netlogon.c if (r->trusted_dc_name) { trusted_dc_name 5805 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->trusted_dc_name, 0); trusted_dc_name 5806 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_array_size(ndr, &r->trusted_dc_name)); trusted_dc_name 5807 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_array_length(ndr, &r->trusted_dc_name)); trusted_dc_name 5808 librpc/gen_ndr/ndr_netlogon.c if (ndr_get_array_length(ndr, &r->trusted_dc_name) > ndr_get_array_size(ndr, &r->trusted_dc_name)) { trusted_dc_name 5809 librpc/gen_ndr/ndr_netlogon.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->trusted_dc_name), ndr_get_array_length(ndr, &r->trusted_dc_name)); trusted_dc_name 5811 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->trusted_dc_name), sizeof(uint16_t))); trusted_dc_name 5812 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->trusted_dc_name, ndr_get_array_length(ndr, &r->trusted_dc_name), sizeof(uint16_t), CH_UTF16)); trusted_dc_name 5835 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "trusted_dc_name", r->trusted_dc_name); trusted_dc_name 5837 librpc/gen_ndr/ndr_netlogon.c if (r->trusted_dc_name) { trusted_dc_name 5838 librpc/gen_ndr/ndr_netlogon.c ndr_print_string(ndr, "trusted_dc_name", r->trusted_dc_name); trusted_dc_name 647 librpc/gen_ndr/netlogon.h const char *trusted_dc_name;/* [unique,charset(UTF16)] */ trusted_dc_name 662 librpc/gen_ndr/netlogon.h const char *trusted_dc_name;/* [unique,charset(UTF16)] */ trusted_dc_name 65 source3/rpc_server/srv_netlog_nt.c const char *trusted_dc_name, trusted_dc_name 70 source3/rpc_server/srv_netlog_nt.c r->trusted_dc_name = trusted_dc_name;