type2             243 source3/include/rpc_dce.h 	uint32 type2;	/* Types 0x3 and 0x13 seen. Check AcquireSecurityContext() docs.... */
type2             579 source3/rpc_parse/parse_rpc.c 	neg->type2 = 0x3;
type2             602 source3/rpc_parse/parse_rpc.c 	if(!prs_uint32("type2", ps, depth, &neg->type2))
type2             549 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_decode_type2(const struct ntlm_buf *buf, struct ntlm_type2 *type2)
type2             558 source4/heimdal/lib/ntlm/ntlm.c     memset(type2, 0, sizeof(*type2));
type2             573 source4/heimdal/lib/ntlm/ntlm.c     CHECK(krb5_ret_uint32(in, &type2->flags), 0);
type2             574 source4/heimdal/lib/ntlm/ntlm.c     if (type2->flags & NTLM_NEG_UNICODE)
type2             576 source4/heimdal/lib/ntlm/ntlm.c     CHECK(krb5_storage_read(in, type2->challange, sizeof(type2->challange)),
type2             577 source4/heimdal/lib/ntlm/ntlm.c 	  sizeof(type2->challange));
type2             583 source4/heimdal/lib/ntlm/ntlm.c     CHECK(krb5_ret_uint32(in, &type2->os[0]), 0);
type2             584 source4/heimdal/lib/ntlm/ntlm.c     CHECK(krb5_ret_uint32(in, &type2->os[1]), 0);
type2             587 source4/heimdal/lib/ntlm/ntlm.c     CHECK(ret_string(in, ucs2, &targetname, &type2->targetname), 0);
type2             588 source4/heimdal/lib/ntlm/ntlm.c     CHECK(ret_buf(in, &targetinfo, &type2->targetinfo), 0);
type2             594 source4/heimdal/lib/ntlm/ntlm.c 	heim_ntlm_free_type2(type2);
type2             613 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_encode_type2(const struct ntlm_type2 *type2, struct ntlm_buf *data)
type2             621 source4/heimdal/lib/ntlm/ntlm.c     if (type2->os[0])
type2             626 source4/heimdal/lib/ntlm/ntlm.c     if (type2->flags & NTLM_NEG_UNICODE)
type2             630 source4/heimdal/lib/ntlm/ntlm.c     targetname.length = len_string(ucs2, type2->targetname);
type2             634 source4/heimdal/lib/ntlm/ntlm.c     targetinfo.length = type2->targetinfo.length;
type2             635 source4/heimdal/lib/ntlm/ntlm.c     targetinfo.allocated = type2->targetinfo.length;
type2             646 source4/heimdal/lib/ntlm/ntlm.c     CHECK(krb5_store_uint32(out, type2->flags), 0);
type2             647 source4/heimdal/lib/ntlm/ntlm.c     CHECK(krb5_storage_write(out, type2->challange, sizeof(type2->challange)),
type2             648 source4/heimdal/lib/ntlm/ntlm.c 	  sizeof(type2->challange));
type2             653 source4/heimdal/lib/ntlm/ntlm.c     if (type2->os[0]) {
type2             654 source4/heimdal/lib/ntlm/ntlm.c 	CHECK(krb5_store_uint32(out, type2->os[0]), 0);
type2             655 source4/heimdal/lib/ntlm/ntlm.c 	CHECK(krb5_store_uint32(out, type2->os[1]), 0);
type2             657 source4/heimdal/lib/ntlm/ntlm.c     CHECK(put_string(out, ucs2, type2->targetname), 0);
type2             658 source4/heimdal/lib/ntlm/ntlm.c     CHECK(krb5_storage_write(out, type2->targetinfo.data,
type2             659 source4/heimdal/lib/ntlm/ntlm.c 			     type2->targetinfo.length),
type2             660 source4/heimdal/lib/ntlm/ntlm.c 	  type2->targetinfo.length);
type2             177 source4/lib/registry/patchfile.c 		uint32_t type1, type2;
type2             191 source4/lib/registry/patchfile.c 							   name, &type2,
type2             206 source4/lib/registry/patchfile.c 			&& (type1 == type2))