ntlm2 180 source4/auth/ntlmssp/ntlmssp.h } ntlm2; ntlm2 368 source4/auth/ntlmssp/ntlmssp_server.c memcpy(gensec_ntlmssp_state->crypt.ntlm2.session_nonce, gensec_ntlmssp_state->internal_chal.data, 8); ntlm2 369 source4/auth/ntlmssp/ntlmssp_server.c memcpy(&gensec_ntlmssp_state->crypt.ntlm2.session_nonce[8], gensec_ntlmssp_state->lm_resp.data, 8); ntlm2 372 source4/auth/ntlmssp/ntlmssp_server.c MD5Update(&md5_session_nonce_ctx, gensec_ntlmssp_state->crypt.ntlm2.session_nonce, 16); ntlm2 423 source4/auth/ntlmssp/ntlmssp_server.c hmac_md5(user_session_key->data, gensec_ntlmssp_state->crypt.ntlm2.session_nonce, ntlm2 424 source4/auth/ntlmssp/ntlmssp_server.c sizeof(gensec_ntlmssp_state->crypt.ntlm2.session_nonce), session_key.data); ntlm2 83 source4/auth/ntlmssp/ntlmssp_sign.c SIVAL(seq_num, 0, gensec_ntlmssp_state->crypt.ntlm2.send_seq_num); ntlm2 84 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.send_seq_num++; ntlm2 85 source4/auth/ntlmssp/ntlmssp_sign.c hmac_md5_init_limK_to_64(gensec_ntlmssp_state->crypt.ntlm2.send_sign_key.data, ntlm2 86 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.send_sign_key.length, &ctx); ntlm2 89 source4/auth/ntlmssp/ntlmssp_sign.c SIVAL(seq_num, 0, gensec_ntlmssp_state->crypt.ntlm2.recv_seq_num); ntlm2 90 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.recv_seq_num++; ntlm2 91 source4/auth/ntlmssp/ntlmssp_sign.c hmac_md5_init_limK_to_64(gensec_ntlmssp_state->crypt.ntlm2.recv_sign_key.data, ntlm2 92 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.recv_sign_key.length, &ctx); ntlm2 102 source4/auth/ntlmssp/ntlmssp_sign.c arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state, digest, 8); ntlm2 105 source4/auth/ntlmssp/ntlmssp_sign.c arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm2.recv_seal_arcfour_state, digest, 8); ntlm2 241 source4/auth/ntlmssp/ntlmssp_sign.c arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state, data, length); ntlm2 243 source4/auth/ntlmssp/ntlmssp_sign.c arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state, sig->data+4, 8); ntlm2 294 source4/auth/ntlmssp/ntlmssp_sign.c arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm2.recv_seal_arcfour_state, data, length); ntlm2 352 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state = talloc(gensec_ntlmssp_state, struct arcfour_state); ntlm2 353 source4/auth/ntlmssp/ntlmssp_sign.c NT_STATUS_HAVE_NO_MEMORY(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state); ntlm2 354 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.recv_seal_arcfour_state = talloc(gensec_ntlmssp_state, struct arcfour_state); ntlm2 355 source4/auth/ntlmssp/ntlmssp_sign.c NT_STATUS_HAVE_NO_MEMORY(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state); ntlm2 384 source4/auth/ntlmssp/ntlmssp_sign.c &gensec_ntlmssp_state->crypt.ntlm2.send_sign_key, ntlm2 387 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.send_sign_key.data, ntlm2 388 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.send_sign_key.length); ntlm2 397 source4/auth/ntlmssp/ntlmssp_sign.c arcfour_init(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state, ntlm2 400 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state->sbox, ntlm2 401 source4/auth/ntlmssp/ntlmssp_sign.c sizeof(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state->sbox)); ntlm2 405 source4/auth/ntlmssp/ntlmssp_sign.c &gensec_ntlmssp_state->crypt.ntlm2.recv_sign_key, ntlm2 408 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.recv_sign_key.data, ntlm2 409 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.recv_sign_key.length); ntlm2 418 source4/auth/ntlmssp/ntlmssp_sign.c arcfour_init(gensec_ntlmssp_state->crypt.ntlm2.recv_seal_arcfour_state, ntlm2 421 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.recv_seal_arcfour_state->sbox, ntlm2 422 source4/auth/ntlmssp/ntlmssp_sign.c sizeof(gensec_ntlmssp_state->crypt.ntlm2.recv_seal_arcfour_state->sbox)); ntlm2 424 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.send_seq_num = 0; ntlm2 425 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.recv_seq_num = 0; ntlm2 140 source4/torture/rpc/session_key.c bool ntlm2; ntlm2 153 source4/torture/rpc/session_key.c lp_set_cmdline(torture->lp_ctx, "ntlmssp_client:ntlm2", settings->ntlm2?"True":"False"); ntlm2 183 source4/torture/rpc/session_key.c bool keyexchange, bool ntlm2, bool lm_key) ntlm2 203 source4/torture/rpc/session_key.c name = talloc_asprintf_append_buffer(name, " ntlm2:%s", ntlm2?"yes":"no"); ntlm2 204 source4/torture/rpc/session_key.c settings->ntlm2 = ntlm2; ntlm2 219 source4/torture/rpc/session_key.c int keyexchange, ntlm2, lm_key; ntlm2 222 source4/torture/rpc/session_key.c for (ntlm2 = 0; ntlm2 < ARRAY_SIZE(bool_vals); ntlm2++) { ntlm2 224 source4/torture/rpc/session_key.c add_test(suite, DCERPC_PUSH_BIGENDIAN, bool_vals[keyexchange], bool_vals[ntlm2], ntlm2 226 source4/torture/rpc/session_key.c add_test(suite, DCERPC_SEAL, bool_vals[keyexchange], bool_vals[ntlm2], bool_vals[lm_key]); ntlm2 227 source4/torture/rpc/session_key.c add_test(suite, 0, bool_vals[keyexchange], bool_vals[ntlm2], bool_vals[lm_key]);