type2 243 source3/include/rpc_dce.h uint32 type2; /* Types 0x3 and 0x13 seen. Check AcquireSecurityContext() docs.... */ type2 579 source3/rpc_parse/parse_rpc.c neg->type2 = 0x3; type2 602 source3/rpc_parse/parse_rpc.c if(!prs_uint32("type2", ps, depth, &neg->type2)) type2 549 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_decode_type2(const struct ntlm_buf *buf, struct ntlm_type2 *type2) type2 558 source4/heimdal/lib/ntlm/ntlm.c memset(type2, 0, sizeof(*type2)); type2 573 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_ret_uint32(in, &type2->flags), 0); type2 574 source4/heimdal/lib/ntlm/ntlm.c if (type2->flags & NTLM_NEG_UNICODE) type2 576 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_storage_read(in, type2->challange, sizeof(type2->challange)), type2 577 source4/heimdal/lib/ntlm/ntlm.c sizeof(type2->challange)); type2 583 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_ret_uint32(in, &type2->os[0]), 0); type2 584 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_ret_uint32(in, &type2->os[1]), 0); type2 587 source4/heimdal/lib/ntlm/ntlm.c CHECK(ret_string(in, ucs2, &targetname, &type2->targetname), 0); type2 588 source4/heimdal/lib/ntlm/ntlm.c CHECK(ret_buf(in, &targetinfo, &type2->targetinfo), 0); type2 594 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_free_type2(type2); type2 613 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_encode_type2(const struct ntlm_type2 *type2, struct ntlm_buf *data) type2 621 source4/heimdal/lib/ntlm/ntlm.c if (type2->os[0]) type2 626 source4/heimdal/lib/ntlm/ntlm.c if (type2->flags & NTLM_NEG_UNICODE) type2 630 source4/heimdal/lib/ntlm/ntlm.c targetname.length = len_string(ucs2, type2->targetname); type2 634 source4/heimdal/lib/ntlm/ntlm.c targetinfo.length = type2->targetinfo.length; type2 635 source4/heimdal/lib/ntlm/ntlm.c targetinfo.allocated = type2->targetinfo.length; type2 646 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_store_uint32(out, type2->flags), 0); type2 647 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_storage_write(out, type2->challange, sizeof(type2->challange)), type2 648 source4/heimdal/lib/ntlm/ntlm.c sizeof(type2->challange)); type2 653 source4/heimdal/lib/ntlm/ntlm.c if (type2->os[0]) { type2 654 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_store_uint32(out, type2->os[0]), 0); type2 655 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_store_uint32(out, type2->os[1]), 0); type2 657 source4/heimdal/lib/ntlm/ntlm.c CHECK(put_string(out, ucs2, type2->targetname), 0); type2 658 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_storage_write(out, type2->targetinfo.data, type2 659 source4/heimdal/lib/ntlm/ntlm.c type2->targetinfo.length), type2 660 source4/heimdal/lib/ntlm/ntlm.c type2->targetinfo.length); type2 177 source4/lib/registry/patchfile.c uint32_t type1, type2; type2 191 source4/lib/registry/patchfile.c name, &type2, type2 206 source4/lib/registry/patchfile.c && (type1 == type2))