Lines Matching +full:0 +full:x6e

60   {0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
61 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
62 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
63 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00};
66 {0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2,
67 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2,
68 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2,
69 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2, 0xF2};
89 return word & 0xFE; in Get7Bits()
97 des_key[0] = Get7Bits(key, 0); in MakeKey()
125 memset(ZPasswordHash, '\0', sizeof ZPasswordHash); in ChallengeResponse()
128 DesEncrypt(challenge, ZPasswordHash + 0, response + 0); in ChallengeResponse()
202 return 0; in SHA1_End()
204 for (i = 0; i < LENGTH; i++) { in SHA1_End()
206 buf[i+i+1] = hex[digest[i] & 0x0f]; in SHA1_End()
208 buf[i+i] = '\0'; in SHA1_End()
230 {0x4D, 0x61, 0x67, 0x69, 0x63, 0x20, 0x73, 0x65, 0x72, 0x76, in GenerateAuthenticatorResponse()
231 0x65, 0x72, 0x20, 0x74, 0x6F, 0x20, 0x63, 0x6C, 0x69, 0x65, in GenerateAuthenticatorResponse()
232 0x6E, 0x74, 0x20, 0x73, 0x69, 0x67, 0x6E, 0x69, 0x6E, 0x67, in GenerateAuthenticatorResponse()
233 0x20, 0x63, 0x6F, 0x6E, 0x73, 0x74, 0x61, 0x6E, 0x74}; in GenerateAuthenticatorResponse()
237 {0x50, 0x61, 0x64, 0x20, 0x74, 0x6F, 0x20, 0x6D, 0x61, 0x6B, in GenerateAuthenticatorResponse()
238 0x65, 0x20, 0x69, 0x74, 0x20, 0x64, 0x6F, 0x20, 0x6D, 0x6F, in GenerateAuthenticatorResponse()
239 0x72, 0x65, 0x20, 0x74, 0x68, 0x61, 0x6E, 0x20, 0x6F, 0x6E, in GenerateAuthenticatorResponse()
240 0x65, 0x20, 0x69, 0x74, 0x65, 0x72, 0x61, 0x74, 0x69, 0x6F, in GenerateAuthenticatorResponse()
241 0x6E}; in GenerateAuthenticatorResponse()
269 AuthenticatorResponse[0] = 'S'; in GenerateAuthenticatorResponse()
283 {0x54, 0x68, 0x69, 0x73, 0x20, 0x69, 0x73, 0x20, 0x74, in GetMasterKey()
284 0x68, 0x65, 0x20, 0x4d, 0x50, 0x50, 0x45, 0x20, 0x4d, in GetMasterKey()
285 0x61, 0x73, 0x74, 0x65, 0x72, 0x20, 0x4b, 0x65, 0x79}; in GetMasterKey()
304 {0x4f, 0x6e, 0x20, 0x74, 0x68, 0x65, 0x20, 0x63, 0x6c, 0x69, in GetAsymetricStartKey()
305 0x65, 0x6e, 0x74, 0x20, 0x73, 0x69, 0x64, 0x65, 0x2c, 0x20, in GetAsymetricStartKey()
306 0x74, 0x68, 0x69, 0x73, 0x20, 0x69, 0x73, 0x20, 0x74, 0x68, in GetAsymetricStartKey()
307 0x65, 0x20, 0x73, 0x65, 0x6e, 0x64, 0x20, 0x6b, 0x65, 0x79, in GetAsymetricStartKey()
308 0x3b, 0x20, 0x6f, 0x6e, 0x20, 0x74, 0x68, 0x65, 0x20, 0x73, in GetAsymetricStartKey()
309 0x65, 0x72, 0x76, 0x65, 0x72, 0x20, 0x73, 0x69, 0x64, 0x65, in GetAsymetricStartKey()
310 0x2c, 0x20, 0x69, 0x74, 0x20, 0x69, 0x73, 0x20, 0x74, 0x68, in GetAsymetricStartKey()
311 0x65, 0x20, 0x72, 0x65, 0x63, 0x65, 0x69, 0x76, 0x65, 0x20, in GetAsymetricStartKey()
312 0x6b, 0x65, 0x79, 0x2e}; in GetAsymetricStartKey()
315 {0x4f, 0x6e, 0x20, 0x74, 0x68, 0x65, 0x20, 0x63, 0x6c, 0x69, in GetAsymetricStartKey()
316 0x65, 0x6e, 0x74, 0x20, 0x73, 0x69, 0x64, 0x65, 0x2c, 0x20, in GetAsymetricStartKey()
317 0x74, 0x68, 0x69, 0x73, 0x20, 0x69, 0x73, 0x20, 0x74, 0x68, in GetAsymetricStartKey()
318 0x65, 0x20, 0x72, 0x65, 0x63, 0x65, 0x69, 0x76, 0x65, 0x20, in GetAsymetricStartKey()
319 0x6b, 0x65, 0x79, 0x3b, 0x20, 0x6f, 0x6e, 0x20, 0x74, 0x68, in GetAsymetricStartKey()
320 0x65, 0x20, 0x73, 0x65, 0x72, 0x76, 0x65, 0x72, 0x20, 0x73, in GetAsymetricStartKey()
321 0x69, 0x64, 0x65, 0x2c, 0x20, 0x69, 0x74, 0x20, 0x69, 0x73, in GetAsymetricStartKey()
322 0x20, 0x74, 0x68, 0x65, 0x20, 0x73, 0x65, 0x6e, 0x64, 0x20, in GetAsymetricStartKey()
323 0x6b, 0x65, 0x79, 0x2e}; in GetAsymetricStartKey()
366 #if 0
409 memset(ptr, '\0', end - ptr); in mschap_LANMan()