Lines Matching +full:0 +full:x6f
23 * Returns: 0 on success, -1 on failure
31 for (i = 0, j = 0; i < utf8_string_len; i++) { in utf8_to_ucs2()
37 if (c <= 0x7F) { in utf8_to_ucs2()
46 if ((c & 0xE0) == 0xC0) { in utf8_to_ucs2()
49 ((c & 0x1F) << 6) | (c2 & 0x3F)); in utf8_to_ucs2()
59 ((c & 0xF) << 12) | in utf8_to_ucs2()
60 ((c2 & 0x3F) << 6) | (c3 & 0x3F)); in utf8_to_ucs2()
68 return 0; in utf8_to_ucs2()
76 * @username: 0-to-256-char UserName (IN)
79 * Returns: 0 on success, -1 on failure
88 addr[0] = peer_challenge; in challenge_hash()
89 len[0] = 16; in challenge_hash()
98 return 0; in challenge_hash()
104 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
107 * Returns: 0 on success, -1 on failure
116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) in nt_password_hash()
129 * Returns: 0 on success, -1 on failure
143 * Returns: 0 on success, -1 on failure
150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response()
151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response()
153 zpwd[0] = password_hash[14]; in challenge_response()
155 os_memset(zpwd + 2, 0, 5); in challenge_response()
164 * @username: 0-to-256-char UserName (IN)
166 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
169 * Returns: 0 on success, -1 on failure
184 return 0; in generate_nt_response()
192 * @username: 0-to-256-char UserName (IN)
196 * Returns: 0 on success, -1 on failure
211 return 0; in generate_nt_response_pwhash()
221 * @username: 0-to-256-char UserName (IN)
225 * Returns: 0 on success, -1 on failure
234 0x4D, 0x61, 0x67, 0x69, 0x63, 0x20, 0x73, 0x65, 0x72, 0x76, in generate_authenticator_response_pwhash()
235 0x65, 0x72, 0x20, 0x74, 0x6F, 0x20, 0x63, 0x6C, 0x69, 0x65, in generate_authenticator_response_pwhash()
236 0x6E, 0x74, 0x20, 0x73, 0x69, 0x67, 0x6E, 0x69, 0x6E, 0x67, in generate_authenticator_response_pwhash()
237 0x20, 0x63, 0x6F, 0x6E, 0x73, 0x74, 0x61, 0x6E, 0x74 in generate_authenticator_response_pwhash()
240 0x50, 0x61, 0x64, 0x20, 0x74, 0x6F, 0x20, 0x6D, 0x61, 0x6B, in generate_authenticator_response_pwhash()
241 0x65, 0x20, 0x69, 0x74, 0x20, 0x64, 0x6F, 0x20, 0x6D, 0x6F, in generate_authenticator_response_pwhash()
242 0x72, 0x65, 0x20, 0x74, 0x68, 0x61, 0x6E, 0x20, 0x6F, 0x6E, in generate_authenticator_response_pwhash()
243 0x65, 0x20, 0x69, 0x74, 0x65, 0x72, 0x61, 0x74, 0x69, 0x6F, in generate_authenticator_response_pwhash()
244 0x6E in generate_authenticator_response_pwhash()
253 addr1[0] = password_hash_hash; in generate_authenticator_response_pwhash()
257 addr2[0] = response; in generate_authenticator_response_pwhash()
272 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
277 * @username: 0-to-256-char UserName (IN)
281 * Returns: 0 on success, -1 on failure
301 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
304 * Returns: 0 on success, -1 on failure
314 return 0; in nt_challenge_response()
323 * Returns: 0 on success, -1 on failure
329 0x54, 0x68, 0x69, 0x73, 0x20, 0x69, 0x73, 0x20, 0x74, in get_master_key()
330 0x68, 0x65, 0x20, 0x4d, 0x50, 0x50, 0x45, 0x20, 0x4d, in get_master_key()
331 0x61, 0x73, 0x74, 0x65, 0x72, 0x20, 0x4b, 0x65, 0x79 in get_master_key()
337 addr[0] = password_hash_hash; in get_master_key()
344 return 0; in get_master_key()
355 * Returns: 0 on success, -1 on failure
362 0x4f, 0x6e, 0x20, 0x74, 0x68, 0x65, 0x20, 0x63, 0x6c, 0x69, in get_asymetric_start_key()
363 0x65, 0x6e, 0x74, 0x20, 0x73, 0x69, 0x64, 0x65, 0x2c, 0x20, in get_asymetric_start_key()
364 0x74, 0x68, 0x69, 0x73, 0x20, 0x69, 0x73, 0x20, 0x74, 0x68, in get_asymetric_start_key()
365 0x65, 0x20, 0x73, 0x65, 0x6e, 0x64, 0x20, 0x6b, 0x65, 0x79, in get_asymetric_start_key()
366 0x3b, 0x20, 0x6f, 0x6e, 0x20, 0x74, 0x68, 0x65, 0x20, 0x73, in get_asymetric_start_key()
367 0x65, 0x72, 0x76, 0x65, 0x72, 0x20, 0x73, 0x69, 0x64, 0x65, in get_asymetric_start_key()
368 0x2c, 0x20, 0x69, 0x74, 0x20, 0x69, 0x73, 0x20, 0x74, 0x68, in get_asymetric_start_key()
369 0x65, 0x20, 0x72, 0x65, 0x63, 0x65, 0x69, 0x76, 0x65, 0x20, in get_asymetric_start_key()
370 0x6b, 0x65, 0x79, 0x2e in get_asymetric_start_key()
373 0x4f, 0x6e, 0x20, 0x74, 0x68, 0x65, 0x20, 0x63, 0x6c, 0x69, in get_asymetric_start_key()
374 0x65, 0x6e, 0x74, 0x20, 0x73, 0x69, 0x64, 0x65, 0x2c, 0x20, in get_asymetric_start_key()
375 0x74, 0x68, 0x69, 0x73, 0x20, 0x69, 0x73, 0x20, 0x74, 0x68, in get_asymetric_start_key()
376 0x65, 0x20, 0x72, 0x65, 0x63, 0x65, 0x69, 0x76, 0x65, 0x20, in get_asymetric_start_key()
377 0x6b, 0x65, 0x79, 0x3b, 0x20, 0x6f, 0x6e, 0x20, 0x74, 0x68, in get_asymetric_start_key()
378 0x65, 0x20, 0x73, 0x65, 0x72, 0x76, 0x65, 0x72, 0x20, 0x73, in get_asymetric_start_key()
379 0x69, 0x64, 0x65, 0x2c, 0x20, 0x69, 0x74, 0x20, 0x69, 0x73, in get_asymetric_start_key()
380 0x20, 0x74, 0x68, 0x65, 0x20, 0x73, 0x65, 0x6e, 0x64, 0x20, in get_asymetric_start_key()
381 0x6b, 0x65, 0x79, 0x2e in get_asymetric_start_key()
384 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, in get_asymetric_start_key()
385 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, in get_asymetric_start_key()
386 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, in get_asymetric_start_key()
387 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 in get_asymetric_start_key()
391 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, in get_asymetric_start_key()
392 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, in get_asymetric_start_key()
393 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, in get_asymetric_start_key()
394 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2 in get_asymetric_start_key()
400 addr[0] = master_key; in get_asymetric_start_key()
415 return 0; in get_asymetric_start_key()
425 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
429 * Returns: 0 on success, -1 on failure
438 os_memset(pw_block, 0, PWBLOCK_LEN); in encrypt_pw_block_with_password_hash()
440 if (utf8_to_ucs2(password, password_len, pw_block, 512, &ucs2_len) < 0 in encrypt_pw_block_with_password_hash()
445 if (offset != 0) { in encrypt_pw_block_with_password_hash()
447 if (os_get_random(pw_block, offset) < 0) in encrypt_pw_block_with_password_hash()
456 rc4_skip(password_hash, 16, 0, pw_block, PWBLOCK_LEN); in encrypt_pw_block_with_password_hash()
457 return 0; in encrypt_pw_block_with_password_hash()
463 * @new_password: 0-to-256-unicode-char NewPassword (IN; UTF-8)
465 * @old_password: 0-to-256-unicode-char OldPassword (IN; UTF-8)
468 * Returns: 0 on success, -1 on failure
483 return 0; in new_password_encrypted_with_old_nt_password_hash()
494 * Returns: 0 on success, -1 on failure
499 if (des_encrypt(password_hash, block, cypher) < 0 || in nt_password_hash_encrypted_with_block()
500 des_encrypt(password_hash + 8, block + 7, cypher + 8) < 0) in nt_password_hash_encrypted_with_block()
502 return 0; in nt_password_hash_encrypted_with_block()
508 * @new_password: 0-to-256-unicode-char NewPassword (IN; UTF-8)
510 * @old_password: 0-to-256-unicode-char OldPassword (IN; UTF-8)
513 * Returns: 0 on success, -1 on failure
530 return 0; in old_nt_password_hash_encrypted_with_new_nt_password_hash()