Searched refs:challenge (Results 1 - 52 of 52) sorted by relevance

/linux-4.4.14/drivers/target/iscsi/
H A Discsi_target_auth.c61 get_random_bytes(chap->challenge, CHAP_CHALLENGE_LENGTH); chap_gen_challenge()
62 chap_binaryhex_to_asciihex(challenge_asciihex, chap->challenge, chap_gen_challenge()
65 * Set CHAP_C, and copy the generated challenge into c_str. chap_gen_challenge()
181 unsigned char identifier[10], *challenge = NULL; chap_server_compute_md5() local
201 challenge = kzalloc(CHAP_CHALLENGE_STR_LEN, GFP_KERNEL); chap_server_compute_md5()
202 if (!challenge) { chap_server_compute_md5()
203 pr_err("Unable to allocate challenge buffer\n"); chap_server_compute_md5()
279 sg_init_one(&sg, chap->challenge, CHAP_CHALLENGE_LENGTH); chap_server_compute_md5()
282 pr_err("crypto_hash_update() failed for challenge\n"); chap_server_compute_md5()
309 kfree(challenge); chap_server_compute_md5()
342 challenge, &type) < 0) { chap_server_compute_md5()
351 pr_debug("[server] Got CHAP_C=%s\n", challenge); chap_server_compute_md5()
352 challenge_len = chap_string_to_hex(challenge_binhex, challenge, chap_server_compute_md5()
353 strlen(challenge)); chap_server_compute_md5()
355 pr_err("Unable to convert incoming challenge\n"); chap_server_compute_md5()
367 if (!memcmp(challenge_binhex, chap->challenge, CHAP_CHALLENGE_LENGTH)) { chap_server_compute_md5()
410 * Convert received challenge to binary hex. chap_server_compute_md5()
415 pr_err("crypto_hash_update() failed for ma challenge\n"); chap_server_compute_md5()
443 kfree(challenge); chap_server_compute_md5()
H A Discsi_target_auth.h27 unsigned char challenge[CHAP_CHALLENGE_LENGTH]; member in struct:iscsi_chap
/linux-4.4.14/include/uapi/linux/netfilter/
H A Dnf_conntrack_tcp.h45 /* Marks possibility for expected RFC5961 challenge ACK */
/linux-4.4.14/include/rxrpc/
H A Dpacket.h47 #define RXRPC_PACKET_TYPE_CHALLENGE 6 /* connection security challenge (SRVR->CLNT) */
138 * Kerberos security type-2 challenge packet
141 __be32 version; /* version of this challenge type */
162 __be32 inc_nonce; /* challenge nonce + 1 */
202 #define RXKADPACKETSHORT 19270401 /* packet too short for security challenge */
/linux-4.4.14/net/rxrpc/
H A Drxkad.c565 * issue a challenge
569 struct rxkad_challenge challenge; rxkad_issue_challenge() local
584 challenge.version = htonl(2); rxkad_issue_challenge()
585 challenge.nonce = htonl(conn->security_nonce); rxkad_issue_challenge()
586 challenge.min_level = htonl(0); rxkad_issue_challenge()
587 challenge.__padding = 0; rxkad_issue_challenge()
608 iov[1].iov_base = &challenge; rxkad_issue_challenge()
609 iov[1].iov_len = sizeof(challenge); rxkad_issue_challenge()
736 * respond to a challenge packet
743 struct rxkad_challenge challenge; rxkad_respond_to_challenge() local
765 if (skb_copy_bits(skb, 0, &challenge, sizeof(challenge)) < 0) rxkad_respond_to_challenge()
768 version = ntohl(challenge.version); rxkad_respond_to_challenge()
769 nonce = ntohl(challenge.nonce); rxkad_respond_to_challenge()
770 min_level = ntohl(challenge.min_level); rxkad_respond_to_challenge()
H A Dar-connevent.c212 * set up security and issue a challenge
H A Dar-internal.h129 /* issue a challenge */
132 /* respond to a challenge */
258 #define RXRPC_CONN_CHALLENGE 0 /* send challenge packet */
/linux-4.4.14/drivers/i2c/muxes/
H A Di2c-arb-gpio-challenge.c230 { .compatible = "i2c-arb-gpio-challenge", },
239 .name = "i2c-arb-gpio-challenge",
249 MODULE_ALIAS("platform:i2c-arb-gpio-challenge");
/linux-4.4.14/drivers/net/wireless/hostap/
H A Dhostap_ap.c149 kfree(sta->u.sta.challenge); ap_free_sta()
1294 /* Generate challenge data for shared key authentication. IEEE 802.11 specifies
1295 * that WEP algorithm is used for generating challenge. This should be unique,
1297 * with pseudo random key and then use increasing IV to get unique challenge
1315 PDEBUG(DEBUG_AP, "AP: kmalloc failed for challenge\n"); ap_auth_make_challenge()
1352 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; handle_authen() local
1415 txt = "invalid challenge len"; handle_authen()
1420 txt = "challenge underflow"; handle_authen()
1424 challenge = (char *) (u + 2); handle_authen()
1436 sta->u.sta.challenge = NULL; handle_authen()
1448 sta->u.sta.challenge != NULL)))) { handle_authen()
1486 if (sta->u.sta.challenge == NULL) { handle_authen()
1487 sta->u.sta.challenge = handle_authen()
1489 if (sta->u.sta.challenge == NULL) { handle_authen()
1495 if (sta->u.sta.challenge == NULL || handle_authen()
1496 challenge == NULL || handle_authen()
1497 memcmp(sta->u.sta.challenge, challenge, handle_authen()
1500 txt = "challenge response incorrect"; handle_authen()
1505 txt = "challenge OK - authOK"; handle_authen()
1512 kfree(sta->u.sta.challenge); handle_authen()
1513 sta->u.sta.challenge = NULL; handle_authen()
1529 sta->u.sta.challenge != NULL && handle_authen()
1535 memcpy(pos, sta->u.sta.challenge, WLAN_AUTH_CHALLENGE_LEN); handle_authen()
H A Dhostap_ap.h86 char *challenge; /* shared key authentication member in struct:sta_info::__anon8321::__anon8322
87 * challenge */
/linux-4.4.14/drivers/media/usb/hdpvr/
H A Dhdpvr-core.c75 static void challenge(u8 *bytes) challenge() function
178 v4l2_dbg(MSG_INFO, hdpvr_debug, &dev->v4l2_dev, "challenge: %8ph\n", device_authorization()
181 challenge(response); device_authorization()
/linux-4.4.14/drivers/staging/wlan-ng/
H A Dp80211mgmt.h117 /*-- values 17-31 reserved for challenge text extension --*/
290 u8 challenge[1]; member in struct:wlan_ie_challenge
480 struct wlan_ie_challenge *challenge; member in struct:wlan_fr_authen
/linux-4.4.14/drivers/net/wireless/ath/ath6kl/
H A Drecovery.c91 ath6kl_warn("Failed to send hb challenge request, err:%d\n", ath6kl_recovery_hb_timer()
H A Dcore.h135 * challenge messages.
H A Dwmi.c3860 ath6kl_dbg(ATH6KL_DBG_WMI, "wmi event hb challenge resp\n"); ath6kl_wmi_control_rx_xtnd()
/linux-4.4.14/fs/cifs/
H A Dcifsencrypt.c391 /* Server has provided av pairs/target info in the type 2 challenge
447 /* Server has provided av pairs/target info in the type 2 challenge
603 offsetof(struct ntlmv2_resp, challenge.key[0])); CalcNTLMv2_response()
625 memcpy(ntlmv2->challenge.key, CalcNTLMv2_response()
628 memcpy(ntlmv2->challenge.key, CalcNTLMv2_response()
631 ntlmv2->challenge.key, hash_len); CalcNTLMv2_response()
H A Dsess.c283 unsigned int tioffset; /* challenge message target info area */ decode_ntlmssp_challenge()
284 unsigned int tilen; /* challenge message target info area length */ decode_ntlmssp_challenge()
289 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); decode_ntlmssp_challenge()
688 * to use challenge/response method (i.e. Password bit is 1). sess_auth_lanman()
1219 cifs_dbg(FYI, "rawntlmssp session setup challenge phase\n"); sess_auth_rawntlmssp_negotiate()
1304 * (challenge) sess_auth_rawntlmssp_authenticate()
H A Dcifsglob.h806 struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */
1593 with more secure ntlmssp2 challenge/resp */
H A Dsmb2pdu.c782 /* NTLMSSP Negotiate sent now processing challenge (response) */ SMB2_sess_setup()
783 phase = NtLmChallenge; /* process ntlmssp challenge */ SMB2_sess_setup()
H A Dcifspdu.h705 } __attribute__((packed)) challenge; member in union:ntlmv2_resp::__anon11409
/linux-4.4.14/drivers/staging/rtl8192e/
H A Drtllib_softmac.c1466 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, rtllib_auth_challenge() argument
1484 memcpy(c, challenge, chlen); rtllib_auth_challenge()
1487 "Sending authentication challenge response\n"); rtllib_auth_challenge()
1495 kfree(challenge); rtllib_auth_challenge()
1781 u8 **challenge, int *chlen) auth_parse()
1791 *challenge = NULL; auth_parse()
1798 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); auth_parse()
1799 if (!*challenge) auth_parse()
2298 u8 *challenge; rtllib_rx_auth_resp() local
2302 errcode = auth_parse(ieee->dev, skb, &challenge, &chlen); rtllib_rx_auth_resp()
2312 if (ieee->open_wep || !challenge) { rtllib_rx_auth_resp()
2344 rtllib_auth_challenge(ieee, challenge, chlen); rtllib_rx_auth_resp()
1780 auth_parse(struct net_device *dev, struct sk_buff *skb, u8 **challenge, int *chlen) auth_parse() argument
H A Drtllib.h860 /*challenge*/
/linux-4.4.14/drivers/staging/rtl8192u/ieee80211/
H A Dieee80211_softmac.c1281 u8 *challenge, ieee80211_auth_challenge()
1299 memcpy(c, challenge, chlen); ieee80211_auth_challenge()
1301 IEEE80211_DEBUG_MGMT("Sending authentication challenge response\n"); ieee80211_auth_challenge()
1309 kfree(challenge); ieee80211_auth_challenge()
1532 static inline u16 auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) auth_parse() argument
1540 *challenge = NULL; auth_parse()
1547 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); auth_parse()
1548 if (!*challenge) auth_parse()
1920 u8 *challenge; ieee80211_check_auth_response() local
1924 errcode = auth_parse(skb, &challenge, &chlen); ieee80211_check_auth_response()
1926 if (ieee->open_wep || !challenge) { ieee80211_check_auth_response()
1964 ieee80211_auth_challenge(ieee, challenge, chlen); ieee80211_check_auth_response()
1280 ieee80211_auth_challenge(struct ieee80211_device *ieee, u8 *challenge, int chlen) ieee80211_auth_challenge() argument
H A Dieee80211.h967 /*challenge*/
/linux-4.4.14/drivers/media/usb/gspca/
H A Dtouptek.c466 * Next does some sort of 2 packet challenge / response configure()
471 * 16 bytes out challenge, requestType: 0x40 configure()
/linux-4.4.14/drivers/net/wireless/
H A Dwl3501.h225 /* 17-31 Reserved for challenge text extension */
H A Datmel.c2867 u8 *challenge, int challenge_len) send_authentication_request()
2893 memcpy(auth.chall_text, challenge, challenge_len); send_authentication_request()
2866 send_authentication_request(struct atmel_private *priv, u16 system, u8 *challenge, int challenge_len) send_authentication_request() argument
/linux-4.4.14/net/netfilter/
H A Dnf_conntrack_proto_tcp.c928 * responds with a challenge ACK if implementing RFC5961. tcp_packet()
945 /* Mark the potential for RFC5961 challenge ACK, tcp_packet()
984 /* RFC5961 compliance cause stack to send "challenge-ACK" tcp_packet()
993 /* Detected RFC5961 challenge ACK */ tcp_packet()
998 "nf_ct_tcp: challenge-ACK ignored "); tcp_packet()
H A Dnf_conntrack_h323_types.c1146 {FNAME("challenge") OCTSTR, 7, 8, 0, SKIP | OPT, 0, NULL},
/linux-4.4.14/drivers/char/pcmcia/
H A Dcm4000_cs.c504 /* write challenge to the buffer */ set_protocol()
505 DEBUGP(5, dev, "Write challenge to buffer: "); set_protocol()
1345 /* T=1: read offset=zero, T=0: read offset=after challenge */
/linux-4.4.14/arch/ia64/lib/
H A Ddo_csum.S293 // someone else can challenge.
/linux-4.4.14/sound/soc/fsl/
H A Dimx-ssi.c26 * Reading and writing AC97 registers is another challenge. The core
H A Dfsl_ssi.c26 * Reading and writing AC97 registers is another challenge. The core
/linux-4.4.14/drivers/usb/wusbcore/
H A Dcbaf.c80 * handshake) challenge the device to demonstrate it has the CK secret
/linux-4.4.14/drivers/net/wireless/ipw2x00/
H A Dlibipw.h412 /* challenge */
H A Dipw2200.c4055 {0x0F, "Authentication rejected because of challenge failure"},
/linux-4.4.14/net/ceph/
H A Dauth_x.c518 dout("handle_reply got server challenge %llx\n", ceph_x_handle_reply()
/linux-4.4.14/drivers/staging/rtl8188eu/core/
H A Drtw_ieee80211.c1008 elems->challenge = pos; rtw_ieee802_11_parse_elems()
H A Drtw_mlme_ext.c2871 DBG_88E("auth rejected because challenge failure!(1)\n"); OnAuth()
2882 DBG_88E("auth rejected because challenge failure!\n"); OnAuth()
/linux-4.4.14/drivers/staging/rtl8188eu/include/
H A Dieee80211.h1051 u8 *challenge; member in struct:rtw_ieee802_11_elems
/linux-4.4.14/drivers/usb/host/
H A Dehci-q.c33 * an ongoing challenge. That's in "ehci-sched.c".
H A Dfotg210-hcd.c2008 * an ongoing challenge. That's in "ehci-sched.c".
/linux-4.4.14/drivers/staging/rtl8723au/core/
H A Drtw_mlme_ext.c1043 DBG_8723A("auth rejected because challenge " OnAuth23a()
1055 DBG_8723A("auth rejected because challenge " OnAuth23a()
1145 /* DBG_8723A("marc: no challenge text?\n"); */ OnAuth23aClient23a()
/linux-4.4.14/net/ipv4/
H A Dtcp_input.c91 /* rfc5961 challenge ack rate limiting */
5175 * Send a challenge ACK tcp_validate_incoming()
5187 * RFC 5961 4.2 : Send a challenge ack tcp_validate_incoming()
/linux-4.4.14/net/mac80211/
H A Dieee80211_i.h1400 const u8 *challenge; member in struct:ieee802_11_elems
H A Dmlme.c2559 if (!elems.challenge) ieee80211_auth_challenge()
2567 elems.challenge - 2, elems.challenge_len + 2, ieee80211_auth_challenge()
H A Dutil.c886 elems->challenge = pos; ieee802_11_parse_elems_crc()
/linux-4.4.14/include/linux/
H A Dieee80211.h1757 /* 17-31 reserved for challenge text extension */
/linux-4.4.14/tools/testing/ktest/
H A Dktest.pl381 POWER_CYCLE = wget --no-proxy -O /dev/null -q --auth-no-challenge 'http://admin:admin\@power/outlet?5=CCL'
/linux-4.4.14/drivers/block/drbd/
H A Ddrbd_receiver.c4910 /* FIXME: Put the challenge/response into the preallocated socket buffer. */ drbd_do_auth()
4979 drbd_err(connection, "Peer presented the same challenge!\n"); drbd_do_auth()
/linux-4.4.14/drivers/scsi/lpfc/
H A Dlpfc_init.c2475 * lpfc_challenge_key - Create challenge key based on WWPN of the HBA
2476 * @RandomChallenge: pointer to the entry of host challenge random number array.
2480 * from the challenge random numbers associated with the host, referred by
/linux-4.4.14/drivers/net/ethernet/sfc/
H A Dmcdi_pcol.h9305 /* validation challenge */

Completed in 2017 milliseconds