Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 34 of 34) sorted by relevance

/linux-4.1.27/drivers/target/iscsi/
Discsi_target_auth.c61 get_random_bytes(chap->challenge, CHAP_CHALLENGE_LENGTH); in chap_gen_challenge()
62 chap_binaryhex_to_asciihex(challenge_asciihex, chap->challenge, in chap_gen_challenge()
181 unsigned char identifier[10], *challenge = NULL; in chap_server_compute_md5() local
201 challenge = kzalloc(CHAP_CHALLENGE_STR_LEN, GFP_KERNEL); in chap_server_compute_md5()
202 if (!challenge) { in chap_server_compute_md5()
279 sg_init_one(&sg, chap->challenge, CHAP_CHALLENGE_LENGTH); in chap_server_compute_md5()
309 kfree(challenge); in chap_server_compute_md5()
342 challenge, &type) < 0) { in chap_server_compute_md5()
351 pr_debug("[server] Got CHAP_C=%s\n", challenge); in chap_server_compute_md5()
352 challenge_len = chap_string_to_hex(challenge_binhex, challenge, in chap_server_compute_md5()
[all …]
Discsi_target_auth.h27 unsigned char challenge[CHAP_CHALLENGE_LENGTH]; member
/linux-4.1.27/net/rxrpc/
Drxkad.c569 struct rxkad_challenge challenge; in rxkad_issue_challenge() local
584 challenge.version = htonl(2); in rxkad_issue_challenge()
585 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge()
586 challenge.min_level = htonl(0); in rxkad_issue_challenge()
587 challenge.__padding = 0; in rxkad_issue_challenge()
608 iov[1].iov_base = &challenge; in rxkad_issue_challenge()
609 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge()
743 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local
765 if (skb_copy_bits(skb, 0, &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge()
768 version = ntohl(challenge.version); in rxkad_respond_to_challenge()
[all …]
/linux-4.1.27/Documentation/devicetree/bindings/i2c/
Di2c-arb-gpio-challenge.txt3 This uses GPIO lines and a challenge & response mechanism to arbitrate who is
43 - compatible: i2c-arb-gpio-challenge
65 compatible = "i2c-arb-gpio-challenge";
/linux-4.1.27/drivers/i2c/muxes/
DMakefile4 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
DKconfig13 I2C multimaster arbitration scheme using GPIOs and a challenge &
18 will be called i2c-arb-gpio-challenge.
/linux-4.1.27/drivers/staging/wlan-ng/
Dp80211mgmt.h290 u8 challenge[1]; member
480 struct wlan_ie_challenge *challenge; member
/linux-4.1.27/drivers/net/wireless/hostap/
Dhostap_ap.c149 kfree(sta->u.sta.challenge); in ap_free_sta()
1352 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; in handle_authen() local
1424 challenge = (char *) (u + 2); in handle_authen()
1436 sta->u.sta.challenge = NULL; in handle_authen()
1448 sta->u.sta.challenge != NULL)))) { in handle_authen()
1486 if (sta->u.sta.challenge == NULL) { in handle_authen()
1487 sta->u.sta.challenge = in handle_authen()
1489 if (sta->u.sta.challenge == NULL) { in handle_authen()
1495 if (sta->u.sta.challenge == NULL || in handle_authen()
1496 challenge == NULL || in handle_authen()
[all …]
Dhostap_ap.h86 char *challenge; /* shared key authentication member
/linux-4.1.27/fs/cifs/
Dcifsencrypt.c603 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response()
625 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response()
628 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response()
631 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
Dcifspdu.h705 } __attribute__((packed)) challenge; member
/linux-4.1.27/drivers/media/usb/hdpvr/
Dhdpvr-core.c75 static void challenge(u8 *bytes) in challenge() function
181 challenge(response); in device_authorization()
/linux-4.1.27/drivers/staging/rtl8192u/ieee80211/
Dieee80211_softmac.c1285 u8 *challenge, in ieee80211_auth_challenge() argument
1303 memcpy(c, challenge, chlen); in ieee80211_auth_challenge()
1313 kfree(challenge); in ieee80211_auth_challenge()
1540 static inline u16 auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) in auth_parse() argument
1548 *challenge = NULL; in auth_parse()
1555 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse()
1556 if (!*challenge) in auth_parse()
1930 u8 *challenge; in ieee80211_check_auth_response() local
1934 errcode = auth_parse(skb, &challenge, &chlen); in ieee80211_check_auth_response()
1936 if (ieee->open_wep || !challenge) { in ieee80211_check_auth_response()
[all …]
/linux-4.1.27/drivers/staging/rtl8192e/
Drtllib_softmac.c1484 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, int chlen) in rtllib_auth_challenge() argument
1501 memcpy(c, challenge, chlen); in rtllib_auth_challenge()
1511 kfree(challenge); in rtllib_auth_challenge()
1794 static inline u16 auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) in auth_parse() argument
1804 *challenge = NULL; in auth_parse()
1811 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse()
1812 if (!*challenge) in auth_parse()
2314 u8 *challenge; in rtllib_rx_auth_resp() local
2318 errcode = auth_parse(skb, &challenge, &chlen); in rtllib_rx_auth_resp()
2331 if (ieee->open_wep || !challenge) { in rtllib_rx_auth_resp()
[all …]
/linux-4.1.27/Documentation/scheduler/
Dsched-rt-group.txt177 the biggest challenge as the current linux PI infrastructure is geared towards
/linux-4.1.27/arch/arm/boot/dts/
Dexynos5250-snow.dts64 compatible = "i2c-arb-gpio-challenge";
/linux-4.1.27/drivers/staging/rtl8188eu/include/
Dieee80211.h1132 u8 *challenge; member
/linux-4.1.27/Documentation/sound/alsa/
Dcompress_offload.txt10 returned values in frames are the norm, making it a challenge to
/linux-4.1.27/Documentation/thermal/
Dintel_powerclamp.txt208 EOI for level triggered interrupts. But it is a challenge to be
/linux-4.1.27/Documentation/networking/
Drxrpc.txt139 requested, the server then issues a "challenge" and then the client
252 (*) Aborts, busy notifications and challenge packets are delivered by recvmsg,
275 in the keyring and then sends a challenge packet to the client and
Dtimestamping.txt211 timing of measurement are chosen correctly. This challenge is no
/linux-4.1.27/scripts/
Dspelling.txt190 challange||challenge
/linux-4.1.27/drivers/staging/rtl8188eu/core/
Drtw_ieee80211.c1006 elems->challenge = pos; in rtw_ieee802_11_parse_elems()
/linux-4.1.27/Documentation/filesystems/
Dseq_file.txt16 Creating those files correctly has always been a bit of a challenge,
/linux-4.1.27/net/mac80211/
Dieee80211_i.h1408 const u8 *challenge; member
Dmlme.c2509 if (!elems.challenge) in ieee80211_auth_challenge()
2517 elems.challenge - 2, elems.challenge_len + 2, in ieee80211_auth_challenge()
Dutil.c929 elems->challenge = pos; in ieee802_11_parse_elems_crc()
/linux-4.1.27/Documentation/
Dxillybus.txt48 The challenge with FPGAs is that everything is implemented at a very low
DCodingStyle700 Coming up with good debugging messages can be quite a challenge; and once
/linux-4.1.27/net/ipv4/
DKconfig272 say Y here, the TCP/IP stack will use a cryptographic challenge
/linux-4.1.27/Documentation/virtual/kvm/
Dmmu.txt70 The primary challenge is to encode between 1 and 3 translations into hardware
Dtimekeeping.txt529 Additionally, this lack of serialization from the TSC poses another challenge
/linux-4.1.27/drivers/net/wireless/
Datmel.c2867 u8 *challenge, int challenge_len) in send_authentication_request() argument
2893 memcpy(auth.chall_text, challenge, challenge_len); in send_authentication_request()
/linux-4.1.27/Documentation/RCU/
DwhatisRCU.txt15 getting there can sometimes be a challenge. Part of the problem is that