Searched refs:dns_servername (Results 1 - 12 of 12) sorted by relevance

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/librpc/gen_ndr/
H A Ddfs.h404 const char *dns_servername;/* [charset(UTF16)] */ member in struct:dfs_AddFtRoot::__anon7780
425 const char *dns_servername;/* [charset(UTF16)] */ member in struct:dfs_RemoveFtRoot::__anon7782
H A Dcli_dfs.h156 const char *dns_servername /* [in] [charset(UTF16)] */,
180 const char *dns_servername /* [in] [charset(UTF16)] */,
H A Dndr_dfs.c4337 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->in.dns_servername, CH_UTF16)));
4339 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->in.dns_servername, CH_UTF16)));
4340 NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.dns_servername, ndr_charset_length(r->in.dns_servername, CH_UTF16), sizeof(uint16_t), CH_UTF16));
4395 NDR_CHECK(ndr_pull_array_size(ndr, &r->in.dns_servername));
4396 NDR_CHECK(ndr_pull_array_length(ndr, &r->in.dns_servername));
4397 if (ndr_get_array_length(ndr, &r->in.dns_servername) > ndr_get_array_size(ndr, &r->in.dns_servername)) {
4398 return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.dns_servername), ndr_get_array_length(ndr, &r->in.dns_servername));
[all...]
H A Dcli_dfs.c1506 state->orig.in.dns_servername = _dns_servername;
1603 const char *dns_servername /* [in] [charset(UTF16)] */,
1618 r.in.dns_servername = dns_servername;
1687 state->orig.in.dns_servername = _dns_servername;
1781 const char *dns_servername /* [in] [charset(UTF16)] */,
1793 r.in.dns_servername = dns_servername;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/librpc/gen_ndr/
H A Ddfs.h404 const char *dns_servername;/* [charset(UTF16)] */ member in struct:dfs_AddFtRoot::__anon6875
425 const char *dns_servername;/* [charset(UTF16)] */ member in struct:dfs_RemoveFtRoot::__anon6877
H A Dcli_dfs.h156 const char *dns_servername /* [in] [charset(UTF16)] */,
180 const char *dns_servername /* [in] [charset(UTF16)] */,
H A Dndr_dfs.c4337 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->in.dns_servername, CH_UTF16)));
4339 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->in.dns_servername, CH_UTF16)));
4340 NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.dns_servername, ndr_charset_length(r->in.dns_servername, CH_UTF16), sizeof(uint16_t), CH_UTF16));
4395 NDR_CHECK(ndr_pull_array_size(ndr, &r->in.dns_servername));
4396 NDR_CHECK(ndr_pull_array_length(ndr, &r->in.dns_servername));
4397 if (ndr_get_array_length(ndr, &r->in.dns_servername) > ndr_get_array_size(ndr, &r->in.dns_servername)) {
4398 return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.dns_servername), ndr_get_array_length(ndr, &r->in.dns_servername));
[all...]
H A Dcli_dfs.c1506 state->orig.in.dns_servername = _dns_servername;
1603 const char *dns_servername /* [in] [charset(UTF16)] */,
1618 r.in.dns_servername = dns_servername;
1687 state->orig.in.dns_servername = _dns_servername;
1781 const char *dns_servername /* [in] [charset(UTF16)] */,
1793 r.in.dns_servername = dns_servername;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/librpc/gen_ndr/
H A Ddfs.h404 const char *dns_servername;/* [charset(UTF16)] */ member in struct:dfs_AddFtRoot::__anon41805
425 const char *dns_servername;/* [charset(UTF16)] */ member in struct:dfs_RemoveFtRoot::__anon41807
H A Dcli_dfs.h156 const char *dns_servername /* [in] [charset(UTF16)] */,
180 const char *dns_servername /* [in] [charset(UTF16)] */,
H A Dndr_dfs.c4337 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->in.dns_servername, CH_UTF16)));
4339 NDR_CHECK(ndr_push_uint3264(ndr, NDR_SCALARS, ndr_charset_length(r->in.dns_servername, CH_UTF16)));
4340 NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.dns_servername, ndr_charset_length(r->in.dns_servername, CH_UTF16), sizeof(uint16_t), CH_UTF16));
4395 NDR_CHECK(ndr_pull_array_size(ndr, &r->in.dns_servername));
4396 NDR_CHECK(ndr_pull_array_length(ndr, &r->in.dns_servername));
4397 if (ndr_get_array_length(ndr, &r->in.dns_servername) > ndr_get_array_size(ndr, &r->in.dns_servername)) {
4398 return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.dns_servername), ndr_get_array_length(ndr, &r->in.dns_servername));
[all...]
H A Dcli_dfs.c1506 state->orig.in.dns_servername = _dns_servername;
1603 const char *dns_servername /* [in] [charset(UTF16)] */,
1618 r.in.dns_servername = dns_servername;
1687 state->orig.in.dns_servername = _dns_servername;
1781 const char *dns_servername /* [in] [charset(UTF16)] */,
1793 r.in.dns_servername = dns_servername;

Completed in 243 milliseconds