ntlm2             180 source4/auth/ntlmssp/ntlmssp.h 		} ntlm2;
ntlm2             368 source4/auth/ntlmssp/ntlmssp_server.c 			memcpy(gensec_ntlmssp_state->crypt.ntlm2.session_nonce, gensec_ntlmssp_state->internal_chal.data, 8);
ntlm2             369 source4/auth/ntlmssp/ntlmssp_server.c 			memcpy(&gensec_ntlmssp_state->crypt.ntlm2.session_nonce[8], gensec_ntlmssp_state->lm_resp.data, 8);
ntlm2             372 source4/auth/ntlmssp/ntlmssp_server.c 			MD5Update(&md5_session_nonce_ctx, gensec_ntlmssp_state->crypt.ntlm2.session_nonce, 16);
ntlm2             423 source4/auth/ntlmssp/ntlmssp_server.c 			hmac_md5(user_session_key->data, gensec_ntlmssp_state->crypt.ntlm2.session_nonce, 
ntlm2             424 source4/auth/ntlmssp/ntlmssp_server.c 				 sizeof(gensec_ntlmssp_state->crypt.ntlm2.session_nonce), session_key.data);
ntlm2              83 source4/auth/ntlmssp/ntlmssp_sign.c 			SIVAL(seq_num, 0, gensec_ntlmssp_state->crypt.ntlm2.send_seq_num);
ntlm2              84 source4/auth/ntlmssp/ntlmssp_sign.c 			gensec_ntlmssp_state->crypt.ntlm2.send_seq_num++;
ntlm2              85 source4/auth/ntlmssp/ntlmssp_sign.c 			hmac_md5_init_limK_to_64(gensec_ntlmssp_state->crypt.ntlm2.send_sign_key.data, 
ntlm2              86 source4/auth/ntlmssp/ntlmssp_sign.c 						 gensec_ntlmssp_state->crypt.ntlm2.send_sign_key.length, &ctx);
ntlm2              89 source4/auth/ntlmssp/ntlmssp_sign.c 			SIVAL(seq_num, 0, gensec_ntlmssp_state->crypt.ntlm2.recv_seq_num);
ntlm2              90 source4/auth/ntlmssp/ntlmssp_sign.c 			gensec_ntlmssp_state->crypt.ntlm2.recv_seq_num++;
ntlm2              91 source4/auth/ntlmssp/ntlmssp_sign.c 			hmac_md5_init_limK_to_64(gensec_ntlmssp_state->crypt.ntlm2.recv_sign_key.data, 
ntlm2              92 source4/auth/ntlmssp/ntlmssp_sign.c 						 gensec_ntlmssp_state->crypt.ntlm2.recv_sign_key.length, &ctx);
ntlm2             102 source4/auth/ntlmssp/ntlmssp_sign.c 				arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state, digest, 8);
ntlm2             105 source4/auth/ntlmssp/ntlmssp_sign.c 				arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm2.recv_seal_arcfour_state, digest, 8);
ntlm2             241 source4/auth/ntlmssp/ntlmssp_sign.c 		arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state, data, length);
ntlm2             243 source4/auth/ntlmssp/ntlmssp_sign.c 			arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state, sig->data+4, 8);
ntlm2             294 source4/auth/ntlmssp/ntlmssp_sign.c 		arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm2.recv_seal_arcfour_state, data, length);
ntlm2             352 source4/auth/ntlmssp/ntlmssp_sign.c 		gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state = talloc(gensec_ntlmssp_state, struct arcfour_state);
ntlm2             353 source4/auth/ntlmssp/ntlmssp_sign.c 		NT_STATUS_HAVE_NO_MEMORY(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state);
ntlm2             354 source4/auth/ntlmssp/ntlmssp_sign.c 		gensec_ntlmssp_state->crypt.ntlm2.recv_seal_arcfour_state = talloc(gensec_ntlmssp_state, struct arcfour_state);
ntlm2             355 source4/auth/ntlmssp/ntlmssp_sign.c 		NT_STATUS_HAVE_NO_MEMORY(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state);
ntlm2             384 source4/auth/ntlmssp/ntlmssp_sign.c 				&gensec_ntlmssp_state->crypt.ntlm2.send_sign_key, 
ntlm2             387 source4/auth/ntlmssp/ntlmssp_sign.c 			     gensec_ntlmssp_state->crypt.ntlm2.send_sign_key.data, 
ntlm2             388 source4/auth/ntlmssp/ntlmssp_sign.c 			     gensec_ntlmssp_state->crypt.ntlm2.send_sign_key.length);
ntlm2             397 source4/auth/ntlmssp/ntlmssp_sign.c 		arcfour_init(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state, 
ntlm2             400 source4/auth/ntlmssp/ntlmssp_sign.c 			     gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state->sbox, 
ntlm2             401 source4/auth/ntlmssp/ntlmssp_sign.c 			     sizeof(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state->sbox));
ntlm2             405 source4/auth/ntlmssp/ntlmssp_sign.c 				&gensec_ntlmssp_state->crypt.ntlm2.recv_sign_key, 
ntlm2             408 source4/auth/ntlmssp/ntlmssp_sign.c 			     gensec_ntlmssp_state->crypt.ntlm2.recv_sign_key.data, 
ntlm2             409 source4/auth/ntlmssp/ntlmssp_sign.c 			     gensec_ntlmssp_state->crypt.ntlm2.recv_sign_key.length);
ntlm2             418 source4/auth/ntlmssp/ntlmssp_sign.c 		arcfour_init(gensec_ntlmssp_state->crypt.ntlm2.recv_seal_arcfour_state, 
ntlm2             421 source4/auth/ntlmssp/ntlmssp_sign.c 			     gensec_ntlmssp_state->crypt.ntlm2.recv_seal_arcfour_state->sbox, 
ntlm2             422 source4/auth/ntlmssp/ntlmssp_sign.c 			     sizeof(gensec_ntlmssp_state->crypt.ntlm2.recv_seal_arcfour_state->sbox));
ntlm2             424 source4/auth/ntlmssp/ntlmssp_sign.c 		gensec_ntlmssp_state->crypt.ntlm2.send_seq_num = 0;
ntlm2             425 source4/auth/ntlmssp/ntlmssp_sign.c 		gensec_ntlmssp_state->crypt.ntlm2.recv_seq_num = 0;
ntlm2             140 source4/torture/rpc/session_key.c 	bool ntlm2;
ntlm2             153 source4/torture/rpc/session_key.c 	lp_set_cmdline(torture->lp_ctx, "ntlmssp_client:ntlm2", settings->ntlm2?"True":"False");
ntlm2             183 source4/torture/rpc/session_key.c 				     bool keyexchange, bool ntlm2, bool lm_key)
ntlm2             203 source4/torture/rpc/session_key.c 	name = talloc_asprintf_append_buffer(name, " ntlm2:%s", ntlm2?"yes":"no");
ntlm2             204 source4/torture/rpc/session_key.c 	settings->ntlm2 = ntlm2;
ntlm2             219 source4/torture/rpc/session_key.c 	int keyexchange, ntlm2, lm_key;
ntlm2             222 source4/torture/rpc/session_key.c 		for (ntlm2 = 0; ntlm2 < ARRAY_SIZE(bool_vals); ntlm2++) {
ntlm2             224 source4/torture/rpc/session_key.c 				add_test(suite, DCERPC_PUSH_BIGENDIAN, bool_vals[keyexchange], bool_vals[ntlm2], 
ntlm2             226 source4/torture/rpc/session_key.c 				add_test(suite, DCERPC_SEAL, bool_vals[keyexchange], bool_vals[ntlm2], bool_vals[lm_key]);
ntlm2             227 source4/torture/rpc/session_key.c 				add_test(suite, 0, bool_vals[keyexchange], bool_vals[ntlm2], bool_vals[lm_key]);