/linux-4.4.14/drivers/target/iscsi/ |
D | iscsi_target_auth.c | 61 get_random_bytes(chap->challenge, CHAP_CHALLENGE_LENGTH); in chap_gen_challenge() 62 chap_binaryhex_to_asciihex(challenge_asciihex, chap->challenge, in chap_gen_challenge() 181 unsigned char identifier[10], *challenge = NULL; in chap_server_compute_md5() local 201 challenge = kzalloc(CHAP_CHALLENGE_STR_LEN, GFP_KERNEL); in chap_server_compute_md5() 202 if (!challenge) { in chap_server_compute_md5() 279 sg_init_one(&sg, chap->challenge, CHAP_CHALLENGE_LENGTH); in chap_server_compute_md5() 309 kfree(challenge); in chap_server_compute_md5() 342 challenge, &type) < 0) { in chap_server_compute_md5() 351 pr_debug("[server] Got CHAP_C=%s\n", challenge); in chap_server_compute_md5() 352 challenge_len = chap_string_to_hex(challenge_binhex, challenge, in chap_server_compute_md5() [all …]
|
D | iscsi_target_auth.h | 27 unsigned char challenge[CHAP_CHALLENGE_LENGTH]; member
|
/linux-4.4.14/net/rxrpc/ |
D | rxkad.c | 569 struct rxkad_challenge challenge; in rxkad_issue_challenge() local 584 challenge.version = htonl(2); in rxkad_issue_challenge() 585 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge() 586 challenge.min_level = htonl(0); in rxkad_issue_challenge() 587 challenge.__padding = 0; in rxkad_issue_challenge() 608 iov[1].iov_base = &challenge; in rxkad_issue_challenge() 609 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge() 743 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local 765 if (skb_copy_bits(skb, 0, &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge() 768 version = ntohl(challenge.version); in rxkad_respond_to_challenge() [all …]
|
/linux-4.4.14/Documentation/devicetree/bindings/i2c/ |
D | i2c-arb-gpio-challenge.txt | 3 This uses GPIO lines and a challenge & response mechanism to arbitrate who is 43 - compatible: i2c-arb-gpio-challenge 65 compatible = "i2c-arb-gpio-challenge";
|
/linux-4.4.14/drivers/i2c/muxes/ |
D | Makefile | 4 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
|
D | Kconfig | 14 I2C multimaster arbitration scheme using GPIOs and a challenge & 19 will be called i2c-arb-gpio-challenge.
|
/linux-4.4.14/drivers/staging/wlan-ng/ |
D | p80211mgmt.h | 290 u8 challenge[1]; member 480 struct wlan_ie_challenge *challenge; member
|
/linux-4.4.14/drivers/net/wireless/hostap/ |
D | hostap_ap.c | 149 kfree(sta->u.sta.challenge); in ap_free_sta() 1352 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; in handle_authen() local 1424 challenge = (char *) (u + 2); in handle_authen() 1436 sta->u.sta.challenge = NULL; in handle_authen() 1448 sta->u.sta.challenge != NULL)))) { in handle_authen() 1486 if (sta->u.sta.challenge == NULL) { in handle_authen() 1487 sta->u.sta.challenge = in handle_authen() 1489 if (sta->u.sta.challenge == NULL) { in handle_authen() 1495 if (sta->u.sta.challenge == NULL || in handle_authen() 1496 challenge == NULL || in handle_authen() [all …]
|
D | hostap_ap.h | 86 char *challenge; /* shared key authentication member
|
/linux-4.4.14/fs/cifs/ |
D | cifsencrypt.c | 603 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response() 625 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 628 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 631 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
|
D | cifspdu.h | 705 } __attribute__((packed)) challenge; member
|
/linux-4.4.14/drivers/media/usb/hdpvr/ |
D | hdpvr-core.c | 75 static void challenge(u8 *bytes) in challenge() function 181 challenge(response); in device_authorization()
|
/linux-4.4.14/drivers/staging/rtl8192u/ieee80211/ |
D | ieee80211_softmac.c | 1281 u8 *challenge, in ieee80211_auth_challenge() argument 1299 memcpy(c, challenge, chlen); in ieee80211_auth_challenge() 1309 kfree(challenge); in ieee80211_auth_challenge() 1532 static inline u16 auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) in auth_parse() argument 1540 *challenge = NULL; in auth_parse() 1547 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1548 if (!*challenge) in auth_parse() 1920 u8 *challenge; in ieee80211_check_auth_response() local 1924 errcode = auth_parse(skb, &challenge, &chlen); in ieee80211_check_auth_response() 1926 if (ieee->open_wep || !challenge) { in ieee80211_check_auth_response() [all …]
|
/linux-4.4.14/drivers/staging/rtl8192e/ |
D | rtllib_softmac.c | 1466 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, in rtllib_auth_challenge() argument 1484 memcpy(c, challenge, chlen); in rtllib_auth_challenge() 1495 kfree(challenge); in rtllib_auth_challenge() 1781 u8 **challenge, int *chlen) in auth_parse() argument 1791 *challenge = NULL; in auth_parse() 1798 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1799 if (!*challenge) in auth_parse() 2298 u8 *challenge; in rtllib_rx_auth_resp() local 2302 errcode = auth_parse(ieee->dev, skb, &challenge, &chlen); in rtllib_rx_auth_resp() 2312 if (ieee->open_wep || !challenge) { in rtllib_rx_auth_resp() [all …]
|
/linux-4.4.14/Documentation/scheduler/ |
D | sched-rt-group.txt | 177 the biggest challenge as the current linux PI infrastructure is geared towards
|
/linux-4.4.14/drivers/staging/rtl8188eu/include/ |
D | ieee80211.h | 1051 u8 *challenge; member
|
/linux-4.4.14/arch/arm/boot/dts/ |
D | exynos5250-snow-common.dtsi | 60 compatible = "i2c-arb-gpio-challenge";
|
/linux-4.4.14/Documentation/sound/alsa/ |
D | compress_offload.txt | 10 returned values in frames are the norm, making it a challenge to
|
/linux-4.4.14/Documentation/thermal/ |
D | intel_powerclamp.txt | 208 EOI for level triggered interrupts. But it is a challenge to be
|
/linux-4.4.14/Documentation/networking/ |
D | rxrpc.txt | 139 requested, the server then issues a "challenge" and then the client 252 (*) Aborts, busy notifications and challenge packets are delivered by recvmsg, 275 in the keyring and then sends a challenge packet to the client and
|
D | timestamping.txt | 211 timing of measurement are chosen correctly. This challenge is no
|
/linux-4.4.14/Documentation/filesystems/ |
D | seq_file.txt | 16 Creating those files correctly has always been a bit of a challenge,
|
/linux-4.4.14/drivers/staging/rtl8188eu/core/ |
D | rtw_ieee80211.c | 1008 elems->challenge = pos; in rtw_ieee802_11_parse_elems()
|
/linux-4.4.14/scripts/ |
D | spelling.txt | 197 challange||challenge
|
/linux-4.4.14/net/mac80211/ |
D | ieee80211_i.h | 1400 const u8 *challenge; member
|
D | mlme.c | 2559 if (!elems.challenge) in ieee80211_auth_challenge() 2567 elems.challenge - 2, elems.challenge_len + 2, in ieee80211_auth_challenge()
|
D | util.c | 886 elems->challenge = pos; in ieee802_11_parse_elems_crc()
|
/linux-4.4.14/Documentation/ |
D | xillybus.txt | 48 The challenge with FPGAs is that everything is implemented at a very low
|
D | CodingStyle | 700 Coming up with good debugging messages can be quite a challenge; and once
|
/linux-4.4.14/net/ipv4/ |
D | Kconfig | 272 say Y here, the TCP/IP stack will use a cryptographic challenge
|
/linux-4.4.14/Documentation/virtual/kvm/ |
D | mmu.txt | 70 The primary challenge is to encode between 1 and 3 translations into hardware
|
D | timekeeping.txt | 529 Additionally, this lack of serialization from the TSC poses another challenge
|
/linux-4.4.14/drivers/net/wireless/ |
D | atmel.c | 2867 u8 *challenge, int challenge_len) in send_authentication_request() argument 2893 memcpy(auth.chall_text, challenge, challenge_len); in send_authentication_request()
|
/linux-4.4.14/tools/perf/Documentation/ |
D | intel-pt.txt | 35 environments, or with self-modified code, a challenge. Also symbols need to be
|
/linux-4.4.14/Documentation/RCU/ |
D | whatisRCU.txt | 15 getting there can sometimes be a challenge. Part of the problem is that
|