Searched refs:cli_pipe_verify_schannel (Results 1 - 6 of 6) sorted by relevance

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/rpc_client/
H A Dcli_pipe.c338 static NTSTATUS cli_pipe_verify_schannel(struct rpc_pipe_client *cli, RPC_HDR *prhdr, function
354 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u.\n", (unsigned int)auth_len ));
365 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u is too large.\n",
373 DEBUG(0,("cli_pipe_verify_schannel: cannot move offset to %u.\n",
379 DEBUG(0,("cli_pipe_verify_schannel: failed to unmarshall RPC_HDR_AUTH.\n"));
384 DEBUG(0,("cli_pipe_verify_schannel: Invalid auth info %d on schannel\n",
391 DEBUG(0,("cli_pipe_verify_schannel: failed to unmarshal RPC_AUTH_SCHANNEL_CHK.\n"));
401 DEBUG(3,("cli_pipe_verify_schannel: failed to decode PDU "
482 ret = cli_pipe_verify_schannel(cli, prhdr, current_pdu, p_ss_padding_len);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/rpc_client/
H A Dcli_pipe.c338 static NTSTATUS cli_pipe_verify_schannel(struct rpc_pipe_client *cli, RPC_HDR *prhdr, function
354 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u.\n", (unsigned int)auth_len ));
365 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u is too large.\n",
373 DEBUG(0,("cli_pipe_verify_schannel: cannot move offset to %u.\n",
379 DEBUG(0,("cli_pipe_verify_schannel: failed to unmarshall RPC_HDR_AUTH.\n"));
384 DEBUG(0,("cli_pipe_verify_schannel: Invalid auth info %d on schannel\n",
391 DEBUG(0,("cli_pipe_verify_schannel: failed to unmarshal RPC_AUTH_SCHANNEL_CHK.\n"));
401 DEBUG(3,("cli_pipe_verify_schannel: failed to decode PDU "
482 ret = cli_pipe_verify_schannel(cli, prhdr, current_pdu, p_ss_padding_len);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/rpc_client/
H A Dcli_pipe.c338 static NTSTATUS cli_pipe_verify_schannel(struct rpc_pipe_client *cli, RPC_HDR *prhdr, function
354 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u.\n", (unsigned int)auth_len ));
365 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u is too large.\n",
373 DEBUG(0,("cli_pipe_verify_schannel: cannot move offset to %u.\n",
379 DEBUG(0,("cli_pipe_verify_schannel: failed to unmarshall RPC_HDR_AUTH.\n"));
384 DEBUG(0,("cli_pipe_verify_schannel: Invalid auth info %d on schannel\n",
391 DEBUG(0,("cli_pipe_verify_schannel: failed to unmarshal RPC_AUTH_SCHANNEL_CHK.\n"));
401 DEBUG(3,("cli_pipe_verify_schannel: failed to decode PDU "
482 ret = cli_pipe_verify_schannel(cli, prhdr, current_pdu, p_ss_padding_len);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/rpc_client/
H A Dcli_pipe.c748 static NTSTATUS cli_pipe_verify_schannel(struct rpc_pipe_client *cli, RPC_HDR *prhdr, function
768 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u.\n", (unsigned int)auth_len ));
779 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u is too large.\n",
787 DEBUG(0,("cli_pipe_verify_schannel: cannot move offset to %u.\n",
793 DEBUG(0,("cli_pipe_verify_schannel: failed to unmarshall RPC_HDR_AUTH.\n"));
798 DEBUG(0,("cli_pipe_verify_schannel: Invalid auth info %d on schannel\n",
834 DEBUG(3,("cli_pipe_verify_schannel: failed to decode PDU "
909 ret = cli_pipe_verify_schannel(cli, prhdr, current_pdu, p_ss_padding_len);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source3/rpc_client/
H A Dcli_pipe.c748 static NTSTATUS cli_pipe_verify_schannel(struct rpc_pipe_client *cli, RPC_HDR *prhdr, function
768 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u.\n", (unsigned int)auth_len ));
779 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u is too large.\n",
787 DEBUG(0,("cli_pipe_verify_schannel: cannot move offset to %u.\n",
793 DEBUG(0,("cli_pipe_verify_schannel: failed to unmarshall RPC_HDR_AUTH.\n"));
798 DEBUG(0,("cli_pipe_verify_schannel: Invalid auth info %d on schannel\n",
834 DEBUG(3,("cli_pipe_verify_schannel: failed to decode PDU "
909 ret = cli_pipe_verify_schannel(cli, prhdr, current_pdu, p_ss_padding_len);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source3/rpc_client/
H A Dcli_pipe.c748 static NTSTATUS cli_pipe_verify_schannel(struct rpc_pipe_client *cli, RPC_HDR *prhdr, function
768 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u.\n", (unsigned int)auth_len ));
779 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u is too large.\n",
787 DEBUG(0,("cli_pipe_verify_schannel: cannot move offset to %u.\n",
793 DEBUG(0,("cli_pipe_verify_schannel: failed to unmarshall RPC_HDR_AUTH.\n"));
798 DEBUG(0,("cli_pipe_verify_schannel: Invalid auth info %d on schannel\n",
834 DEBUG(3,("cli_pipe_verify_schannel: failed to decode PDU "
909 ret = cli_pipe_verify_schannel(cli, prhdr, current_pdu, p_ss_padding_len);

Completed in 102 milliseconds