use_tcp 142 source3/libads/krb5_setpw.c bool use_tcp,
use_tcp 187 source3/libads/krb5_setpw.c packet->data = (char *)SMB_MALLOC(ap_req->length + cipherpw.length + (use_tcp ? 10 : 6 ));
use_tcp 195 source3/libads/krb5_setpw.c msg_start = p = ((char *)packet->data) + (use_tcp ? 4 : 0);
use_tcp 208 source3/libads/krb5_setpw.c if (use_tcp) {
use_tcp 273 source3/libads/krb5_setpw.c bool use_tcp,
use_tcp 287 source3/libads/krb5_setpw.c if (packet->length < (use_tcp ? 8 : 4)) {
use_tcp 305 source3/libads/krb5_setpw.c if (use_tcp) {
use_tcp 410 source3/libads/krb5_setpw.c bool use_tcp = False;
use_tcp 425 source3/libads/krb5_setpw.c if (!use_tcp) {
use_tcp 487 source3/libads/krb5_setpw.c princ, newpw, use_tcp, &chpw_req);
use_tcp 543 source3/libads/krb5_setpw.c ret = parse_setpw_reply(context, use_tcp, auth_context, &chpw_rep);
use_tcp 548 source3/libads/krb5_setpw.c if (ret == KRB5KRB_ERR_RESPONSE_TOO_BIG && !use_tcp) {
use_tcp 550 source3/libads/krb5_setpw.c use_tcp = True;