Searched refs:cli_pipe_verify_schannel (Results 1 - 6 of 6) sorted by relevance
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/rpc_client/ |
H A D | cli_pipe.c | 338 static NTSTATUS cli_pipe_verify_schannel(struct rpc_pipe_client *cli, RPC_HDR *prhdr, function 354 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u.\n", (unsigned int)auth_len )); 365 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u is too large.\n", 373 DEBUG(0,("cli_pipe_verify_schannel: cannot move offset to %u.\n", 379 DEBUG(0,("cli_pipe_verify_schannel: failed to unmarshall RPC_HDR_AUTH.\n")); 384 DEBUG(0,("cli_pipe_verify_schannel: Invalid auth info %d on schannel\n", 391 DEBUG(0,("cli_pipe_verify_schannel: failed to unmarshal RPC_AUTH_SCHANNEL_CHK.\n")); 401 DEBUG(3,("cli_pipe_verify_schannel: failed to decode PDU " 482 ret = cli_pipe_verify_schannel(cli, prhdr, current_pdu, p_ss_padding_len);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/rpc_client/ |
H A D | cli_pipe.c | 338 static NTSTATUS cli_pipe_verify_schannel(struct rpc_pipe_client *cli, RPC_HDR *prhdr, function 354 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u.\n", (unsigned int)auth_len )); 365 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u is too large.\n", 373 DEBUG(0,("cli_pipe_verify_schannel: cannot move offset to %u.\n", 379 DEBUG(0,("cli_pipe_verify_schannel: failed to unmarshall RPC_HDR_AUTH.\n")); 384 DEBUG(0,("cli_pipe_verify_schannel: Invalid auth info %d on schannel\n", 391 DEBUG(0,("cli_pipe_verify_schannel: failed to unmarshal RPC_AUTH_SCHANNEL_CHK.\n")); 401 DEBUG(3,("cli_pipe_verify_schannel: failed to decode PDU " 482 ret = cli_pipe_verify_schannel(cli, prhdr, current_pdu, p_ss_padding_len);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/rpc_client/ |
H A D | cli_pipe.c | 338 static NTSTATUS cli_pipe_verify_schannel(struct rpc_pipe_client *cli, RPC_HDR *prhdr, function 354 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u.\n", (unsigned int)auth_len )); 365 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u is too large.\n", 373 DEBUG(0,("cli_pipe_verify_schannel: cannot move offset to %u.\n", 379 DEBUG(0,("cli_pipe_verify_schannel: failed to unmarshall RPC_HDR_AUTH.\n")); 384 DEBUG(0,("cli_pipe_verify_schannel: Invalid auth info %d on schannel\n", 391 DEBUG(0,("cli_pipe_verify_schannel: failed to unmarshal RPC_AUTH_SCHANNEL_CHK.\n")); 401 DEBUG(3,("cli_pipe_verify_schannel: failed to decode PDU " 482 ret = cli_pipe_verify_schannel(cli, prhdr, current_pdu, p_ss_padding_len);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/rpc_client/ |
H A D | cli_pipe.c | 748 static NTSTATUS cli_pipe_verify_schannel(struct rpc_pipe_client *cli, RPC_HDR *prhdr, function 768 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u.\n", (unsigned int)auth_len )); 779 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u is too large.\n", 787 DEBUG(0,("cli_pipe_verify_schannel: cannot move offset to %u.\n", 793 DEBUG(0,("cli_pipe_verify_schannel: failed to unmarshall RPC_HDR_AUTH.\n")); 798 DEBUG(0,("cli_pipe_verify_schannel: Invalid auth info %d on schannel\n", 834 DEBUG(3,("cli_pipe_verify_schannel: failed to decode PDU " 909 ret = cli_pipe_verify_schannel(cli, prhdr, current_pdu, p_ss_padding_len);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source3/rpc_client/ |
H A D | cli_pipe.c | 748 static NTSTATUS cli_pipe_verify_schannel(struct rpc_pipe_client *cli, RPC_HDR *prhdr, function 768 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u.\n", (unsigned int)auth_len )); 779 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u is too large.\n", 787 DEBUG(0,("cli_pipe_verify_schannel: cannot move offset to %u.\n", 793 DEBUG(0,("cli_pipe_verify_schannel: failed to unmarshall RPC_HDR_AUTH.\n")); 798 DEBUG(0,("cli_pipe_verify_schannel: Invalid auth info %d on schannel\n", 834 DEBUG(3,("cli_pipe_verify_schannel: failed to decode PDU " 909 ret = cli_pipe_verify_schannel(cli, prhdr, current_pdu, p_ss_padding_len);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source3/rpc_client/ |
H A D | cli_pipe.c | 748 static NTSTATUS cli_pipe_verify_schannel(struct rpc_pipe_client *cli, RPC_HDR *prhdr, function 768 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u.\n", (unsigned int)auth_len )); 779 DEBUG(0,("cli_pipe_verify_schannel: auth_len %u is too large.\n", 787 DEBUG(0,("cli_pipe_verify_schannel: cannot move offset to %u.\n", 793 DEBUG(0,("cli_pipe_verify_schannel: failed to unmarshall RPC_HDR_AUTH.\n")); 798 DEBUG(0,("cli_pipe_verify_schannel: Invalid auth info %d on schannel\n", 834 DEBUG(3,("cli_pipe_verify_schannel: failed to decode PDU " 909 ret = cli_pipe_verify_schannel(cli, prhdr, current_pdu, p_ss_padding_len);
|
Completed in 102 milliseconds