Lines Matching refs:u_char

70     u_char LANManResp[24];
71 u_char NTResp[24];
72 u_char UseNT; /* If 1, ignore the LANMan response field */
78 u_char PeerChallenge[16];
79 u_char MustBeZero[8];
80 u_char NTResp[24];
81 u_char Flags; /* Should be zero (Win98 sends 04) */
86 static void ChallengeResponse __P((u_char *, u_char *, u_char *));
87 static void DesEncrypt __P((u_char *, u_char *, u_char *));
88 static void MakeKey __P((u_char *, u_char *));
89 static u_char Get7Bits __P((u_char *, int));
91 static void ChapMS_NT __P((u_char *, char *, int, MS_ChapResponse *));
93 static void ChapMS_LANMan __P((u_char *, char *, int, MS_ChapResponse *));
97 static void ChapMSv2_NT __P((char *, u_char *, char *, int,
102 static void Expand __P((u_char *, char *));
103 static void Collapse __P((char *, u_char *));
118 u_char *challenge; /* IN 8 octets */ in ChallengeResponse()
119 u_char *pwHash; /* IN 16 octets */
120 u_char *response; /* OUT 24 octets */
122 u_char ZPasswordHash[21];
145 u_char *clear; /* IN 8 octets */ in DesEncrypt()
146 u_char *key; /* IN 7 octets */
147 u_char *cipher; /* OUT 8 octets */
149 u_char des_key[8];
175 u_char *clear; /* IN 8 octets */ in DesEncrypt()
176 u_char *key; /* IN 7 octets */
177 u_char *cipher; /* OUT 8 octets */
200 static u_char Get7Bits(input, startBit) in Get7Bits()
201 u_char *input; in Get7Bits()
221 u_char *in; in Expand()
239 u_char *out;
248 c |= *(u_char *)in << j;
255 u_char *key; /* IN 56 bit DES key missing parity bits */ in MakeKey()
256 u_char *des_key; /* OUT 64 bit DES key with parity bits added */
280 u_char *rchallenge; in ChapMS_NT()
293 u_char hash[MD4_SIGNATURE_SIZE];
294 u_char unicodePassword[MAX_NT_PASSWORD * 2];
300 unicodePassword[i * 2] = (u_char)secret[i];
311 static u_char *StdText = (u_char *)"KGS!@#$%"; /* key from rasapi32.dll */
315 u_char *rchallenge; in ChapMS_LANMan()
321 u_char UcasePassword[MAX_NT_PASSWORD]; /* max is actually 14 */
322 u_char PasswordHash[MD4_SIGNATURE_SIZE];
327 UcasePassword[i] = (u_char)(
338 u_char *rchallenge;
389 u_char *response;
420 u_char *peerchallenge, *authenticatorchallenge, *challenge; in ChallengeHash()
447 u_char *rchallenge;
460 u_char hash[MD4_SIGNATURE_SIZE];
461 u_char challenge[8];
462 u_char unicodePassword[MAX_NT_PASSWORD * 2];
468 if ((unicodePassword[i * 2] = (u_char)secret[i]) == '\0')
484 u_char *rchallenge;
490 u_char *ptr;
502 *ptr++ = (u_char) (drand48() * 0xff);
514 u_char *authchall;
518 static const u_char Magic1[39] = "Magic server to client signing constant";
519 static const u_char Magic2[41] =
527 u_char unicodePassword[MAX_NT_PASSWORD * 2];
529 u_char hash[MD4_SIGNATURE_SIZE];
530 u_char hashhash[MD4_SIGNATURE_SIZE];
533 u_char challenge[8];
542 if ((unicodePassword[i * 2] = (u_char)secret[i]) == '\0')
599 u_char *response;