use_tcp 142 source3/libads/krb5_setpw.c bool use_tcp, use_tcp 187 source3/libads/krb5_setpw.c packet->data = (char *)SMB_MALLOC(ap_req->length + cipherpw.length + (use_tcp ? 10 : 6 )); use_tcp 195 source3/libads/krb5_setpw.c msg_start = p = ((char *)packet->data) + (use_tcp ? 4 : 0); use_tcp 208 source3/libads/krb5_setpw.c if (use_tcp) { use_tcp 273 source3/libads/krb5_setpw.c bool use_tcp, use_tcp 287 source3/libads/krb5_setpw.c if (packet->length < (use_tcp ? 8 : 4)) { use_tcp 305 source3/libads/krb5_setpw.c if (use_tcp) { use_tcp 410 source3/libads/krb5_setpw.c bool use_tcp = False; use_tcp 425 source3/libads/krb5_setpw.c if (!use_tcp) { use_tcp 487 source3/libads/krb5_setpw.c princ, newpw, use_tcp, &chpw_req); use_tcp 543 source3/libads/krb5_setpw.c ret = parse_setpw_reply(context, use_tcp, auth_context, &chpw_rep); use_tcp 548 source3/libads/krb5_setpw.c if (ret == KRB5KRB_ERR_RESPONSE_TOO_BIG && !use_tcp) { use_tcp 550 source3/libads/krb5_setpw.c use_tcp = True;