ntlm2 180 source4/auth/ntlmssp/ntlmssp.h } ntlm2;
ntlm2 368 source4/auth/ntlmssp/ntlmssp_server.c memcpy(gensec_ntlmssp_state->crypt.ntlm2.session_nonce, gensec_ntlmssp_state->internal_chal.data, 8);
ntlm2 369 source4/auth/ntlmssp/ntlmssp_server.c memcpy(&gensec_ntlmssp_state->crypt.ntlm2.session_nonce[8], gensec_ntlmssp_state->lm_resp.data, 8);
ntlm2 372 source4/auth/ntlmssp/ntlmssp_server.c MD5Update(&md5_session_nonce_ctx, gensec_ntlmssp_state->crypt.ntlm2.session_nonce, 16);
ntlm2 423 source4/auth/ntlmssp/ntlmssp_server.c hmac_md5(user_session_key->data, gensec_ntlmssp_state->crypt.ntlm2.session_nonce,
ntlm2 424 source4/auth/ntlmssp/ntlmssp_server.c sizeof(gensec_ntlmssp_state->crypt.ntlm2.session_nonce), session_key.data);
ntlm2 83 source4/auth/ntlmssp/ntlmssp_sign.c SIVAL(seq_num, 0, gensec_ntlmssp_state->crypt.ntlm2.send_seq_num);
ntlm2 84 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.send_seq_num++;
ntlm2 85 source4/auth/ntlmssp/ntlmssp_sign.c hmac_md5_init_limK_to_64(gensec_ntlmssp_state->crypt.ntlm2.send_sign_key.data,
ntlm2 86 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.send_sign_key.length, &ctx);
ntlm2 89 source4/auth/ntlmssp/ntlmssp_sign.c SIVAL(seq_num, 0, gensec_ntlmssp_state->crypt.ntlm2.recv_seq_num);
ntlm2 90 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.recv_seq_num++;
ntlm2 91 source4/auth/ntlmssp/ntlmssp_sign.c hmac_md5_init_limK_to_64(gensec_ntlmssp_state->crypt.ntlm2.recv_sign_key.data,
ntlm2 92 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.recv_sign_key.length, &ctx);
ntlm2 102 source4/auth/ntlmssp/ntlmssp_sign.c arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state, digest, 8);
ntlm2 105 source4/auth/ntlmssp/ntlmssp_sign.c arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm2.recv_seal_arcfour_state, digest, 8);
ntlm2 241 source4/auth/ntlmssp/ntlmssp_sign.c arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state, data, length);
ntlm2 243 source4/auth/ntlmssp/ntlmssp_sign.c arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state, sig->data+4, 8);
ntlm2 294 source4/auth/ntlmssp/ntlmssp_sign.c arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm2.recv_seal_arcfour_state, data, length);
ntlm2 352 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state = talloc(gensec_ntlmssp_state, struct arcfour_state);
ntlm2 353 source4/auth/ntlmssp/ntlmssp_sign.c NT_STATUS_HAVE_NO_MEMORY(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state);
ntlm2 354 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.recv_seal_arcfour_state = talloc(gensec_ntlmssp_state, struct arcfour_state);
ntlm2 355 source4/auth/ntlmssp/ntlmssp_sign.c NT_STATUS_HAVE_NO_MEMORY(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state);
ntlm2 384 source4/auth/ntlmssp/ntlmssp_sign.c &gensec_ntlmssp_state->crypt.ntlm2.send_sign_key,
ntlm2 387 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.send_sign_key.data,
ntlm2 388 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.send_sign_key.length);
ntlm2 397 source4/auth/ntlmssp/ntlmssp_sign.c arcfour_init(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state,
ntlm2 400 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state->sbox,
ntlm2 401 source4/auth/ntlmssp/ntlmssp_sign.c sizeof(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state->sbox));
ntlm2 405 source4/auth/ntlmssp/ntlmssp_sign.c &gensec_ntlmssp_state->crypt.ntlm2.recv_sign_key,
ntlm2 408 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.recv_sign_key.data,
ntlm2 409 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.recv_sign_key.length);
ntlm2 418 source4/auth/ntlmssp/ntlmssp_sign.c arcfour_init(gensec_ntlmssp_state->crypt.ntlm2.recv_seal_arcfour_state,
ntlm2 421 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.recv_seal_arcfour_state->sbox,
ntlm2 422 source4/auth/ntlmssp/ntlmssp_sign.c sizeof(gensec_ntlmssp_state->crypt.ntlm2.recv_seal_arcfour_state->sbox));
ntlm2 424 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.send_seq_num = 0;
ntlm2 425 source4/auth/ntlmssp/ntlmssp_sign.c gensec_ntlmssp_state->crypt.ntlm2.recv_seq_num = 0;
ntlm2 140 source4/torture/rpc/session_key.c bool ntlm2;
ntlm2 153 source4/torture/rpc/session_key.c lp_set_cmdline(torture->lp_ctx, "ntlmssp_client:ntlm2", settings->ntlm2?"True":"False");
ntlm2 183 source4/torture/rpc/session_key.c bool keyexchange, bool ntlm2, bool lm_key)
ntlm2 203 source4/torture/rpc/session_key.c name = talloc_asprintf_append_buffer(name, " ntlm2:%s", ntlm2?"yes":"no");
ntlm2 204 source4/torture/rpc/session_key.c settings->ntlm2 = ntlm2;
ntlm2 219 source4/torture/rpc/session_key.c int keyexchange, ntlm2, lm_key;
ntlm2 222 source4/torture/rpc/session_key.c for (ntlm2 = 0; ntlm2 < ARRAY_SIZE(bool_vals); ntlm2++) {
ntlm2 224 source4/torture/rpc/session_key.c add_test(suite, DCERPC_PUSH_BIGENDIAN, bool_vals[keyexchange], bool_vals[ntlm2],
ntlm2 226 source4/torture/rpc/session_key.c add_test(suite, DCERPC_SEAL, bool_vals[keyexchange], bool_vals[ntlm2], bool_vals[lm_key]);
ntlm2 227 source4/torture/rpc/session_key.c add_test(suite, 0, bool_vals[keyexchange], bool_vals[ntlm2], bool_vals[lm_key]);