use_tcp           142 source3/libads/krb5_setpw.c 					   bool use_tcp,
use_tcp           187 source3/libads/krb5_setpw.c 	packet->data = (char *)SMB_MALLOC(ap_req->length + cipherpw.length + (use_tcp ? 10 : 6 ));
use_tcp           195 source3/libads/krb5_setpw.c 	msg_start = p = ((char *)packet->data) + (use_tcp ? 4 : 0);
use_tcp           208 source3/libads/krb5_setpw.c 	if (use_tcp) {
use_tcp           273 source3/libads/krb5_setpw.c 					 bool use_tcp,
use_tcp           287 source3/libads/krb5_setpw.c 	if (packet->length < (use_tcp ? 8 : 4)) {
use_tcp           305 source3/libads/krb5_setpw.c 	if (use_tcp) {
use_tcp           410 source3/libads/krb5_setpw.c 	bool use_tcp = False;
use_tcp           425 source3/libads/krb5_setpw.c 		if (!use_tcp) {
use_tcp           487 source3/libads/krb5_setpw.c 					  princ, newpw, use_tcp, &chpw_req);
use_tcp           543 source3/libads/krb5_setpw.c 		ret = parse_setpw_reply(context, use_tcp, auth_context, &chpw_rep);
use_tcp           548 source3/libads/krb5_setpw.c 			if (ret == KRB5KRB_ERR_RESPONSE_TOO_BIG && !use_tcp) {
use_tcp           550 source3/libads/krb5_setpw.c 				use_tcp = True;