type2 243 source3/include/rpc_dce.h uint32 type2; /* Types 0x3 and 0x13 seen. Check AcquireSecurityContext() docs.... */
type2 579 source3/rpc_parse/parse_rpc.c neg->type2 = 0x3;
type2 602 source3/rpc_parse/parse_rpc.c if(!prs_uint32("type2", ps, depth, &neg->type2))
type2 549 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_decode_type2(const struct ntlm_buf *buf, struct ntlm_type2 *type2)
type2 558 source4/heimdal/lib/ntlm/ntlm.c memset(type2, 0, sizeof(*type2));
type2 573 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_ret_uint32(in, &type2->flags), 0);
type2 574 source4/heimdal/lib/ntlm/ntlm.c if (type2->flags & NTLM_NEG_UNICODE)
type2 576 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_storage_read(in, type2->challange, sizeof(type2->challange)),
type2 577 source4/heimdal/lib/ntlm/ntlm.c sizeof(type2->challange));
type2 583 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_ret_uint32(in, &type2->os[0]), 0);
type2 584 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_ret_uint32(in, &type2->os[1]), 0);
type2 587 source4/heimdal/lib/ntlm/ntlm.c CHECK(ret_string(in, ucs2, &targetname, &type2->targetname), 0);
type2 588 source4/heimdal/lib/ntlm/ntlm.c CHECK(ret_buf(in, &targetinfo, &type2->targetinfo), 0);
type2 594 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_free_type2(type2);
type2 613 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_encode_type2(const struct ntlm_type2 *type2, struct ntlm_buf *data)
type2 621 source4/heimdal/lib/ntlm/ntlm.c if (type2->os[0])
type2 626 source4/heimdal/lib/ntlm/ntlm.c if (type2->flags & NTLM_NEG_UNICODE)
type2 630 source4/heimdal/lib/ntlm/ntlm.c targetname.length = len_string(ucs2, type2->targetname);
type2 634 source4/heimdal/lib/ntlm/ntlm.c targetinfo.length = type2->targetinfo.length;
type2 635 source4/heimdal/lib/ntlm/ntlm.c targetinfo.allocated = type2->targetinfo.length;
type2 646 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_store_uint32(out, type2->flags), 0);
type2 647 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_storage_write(out, type2->challange, sizeof(type2->challange)),
type2 648 source4/heimdal/lib/ntlm/ntlm.c sizeof(type2->challange));
type2 653 source4/heimdal/lib/ntlm/ntlm.c if (type2->os[0]) {
type2 654 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_store_uint32(out, type2->os[0]), 0);
type2 655 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_store_uint32(out, type2->os[1]), 0);
type2 657 source4/heimdal/lib/ntlm/ntlm.c CHECK(put_string(out, ucs2, type2->targetname), 0);
type2 658 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_storage_write(out, type2->targetinfo.data,
type2 659 source4/heimdal/lib/ntlm/ntlm.c type2->targetinfo.length),
type2 660 source4/heimdal/lib/ntlm/ntlm.c type2->targetinfo.length);
type2 177 source4/lib/registry/patchfile.c uint32_t type1, type2;
type2 191 source4/lib/registry/patchfile.c name, &type2,
type2 206 source4/lib/registry/patchfile.c && (type1 == type2))