/linux-4.4.14/drivers/target/iscsi/ |
H A D | iscsi_target_auth.c | 61 get_random_bytes(chap->challenge, CHAP_CHALLENGE_LENGTH); chap_gen_challenge() 62 chap_binaryhex_to_asciihex(challenge_asciihex, chap->challenge, chap_gen_challenge() 65 * Set CHAP_C, and copy the generated challenge into c_str. chap_gen_challenge() 181 unsigned char identifier[10], *challenge = NULL; chap_server_compute_md5() local 201 challenge = kzalloc(CHAP_CHALLENGE_STR_LEN, GFP_KERNEL); chap_server_compute_md5() 202 if (!challenge) { chap_server_compute_md5() 203 pr_err("Unable to allocate challenge buffer\n"); chap_server_compute_md5() 279 sg_init_one(&sg, chap->challenge, CHAP_CHALLENGE_LENGTH); chap_server_compute_md5() 282 pr_err("crypto_hash_update() failed for challenge\n"); chap_server_compute_md5() 309 kfree(challenge); chap_server_compute_md5() 342 challenge, &type) < 0) { chap_server_compute_md5() 351 pr_debug("[server] Got CHAP_C=%s\n", challenge); chap_server_compute_md5() 352 challenge_len = chap_string_to_hex(challenge_binhex, challenge, chap_server_compute_md5() 353 strlen(challenge)); chap_server_compute_md5() 355 pr_err("Unable to convert incoming challenge\n"); chap_server_compute_md5() 367 if (!memcmp(challenge_binhex, chap->challenge, CHAP_CHALLENGE_LENGTH)) { chap_server_compute_md5() 410 * Convert received challenge to binary hex. chap_server_compute_md5() 415 pr_err("crypto_hash_update() failed for ma challenge\n"); chap_server_compute_md5() 443 kfree(challenge); chap_server_compute_md5()
|
H A D | iscsi_target_auth.h | 27 unsigned char challenge[CHAP_CHALLENGE_LENGTH]; member in struct:iscsi_chap
|
/linux-4.4.14/include/uapi/linux/netfilter/ |
H A D | nf_conntrack_tcp.h | 45 /* Marks possibility for expected RFC5961 challenge ACK */
|
/linux-4.4.14/include/rxrpc/ |
H A D | packet.h | 47 #define RXRPC_PACKET_TYPE_CHALLENGE 6 /* connection security challenge (SRVR->CLNT) */ 138 * Kerberos security type-2 challenge packet 141 __be32 version; /* version of this challenge type */ 162 __be32 inc_nonce; /* challenge nonce + 1 */ 202 #define RXKADPACKETSHORT 19270401 /* packet too short for security challenge */
|
/linux-4.4.14/net/rxrpc/ |
H A D | rxkad.c | 565 * issue a challenge 569 struct rxkad_challenge challenge; rxkad_issue_challenge() local 584 challenge.version = htonl(2); rxkad_issue_challenge() 585 challenge.nonce = htonl(conn->security_nonce); rxkad_issue_challenge() 586 challenge.min_level = htonl(0); rxkad_issue_challenge() 587 challenge.__padding = 0; rxkad_issue_challenge() 608 iov[1].iov_base = &challenge; rxkad_issue_challenge() 609 iov[1].iov_len = sizeof(challenge); rxkad_issue_challenge() 736 * respond to a challenge packet 743 struct rxkad_challenge challenge; rxkad_respond_to_challenge() local 765 if (skb_copy_bits(skb, 0, &challenge, sizeof(challenge)) < 0) rxkad_respond_to_challenge() 768 version = ntohl(challenge.version); rxkad_respond_to_challenge() 769 nonce = ntohl(challenge.nonce); rxkad_respond_to_challenge() 770 min_level = ntohl(challenge.min_level); rxkad_respond_to_challenge()
|
H A D | ar-connevent.c | 212 * set up security and issue a challenge
|
H A D | ar-internal.h | 129 /* issue a challenge */ 132 /* respond to a challenge */ 258 #define RXRPC_CONN_CHALLENGE 0 /* send challenge packet */
|
/linux-4.4.14/drivers/i2c/muxes/ |
H A D | i2c-arb-gpio-challenge.c | 230 { .compatible = "i2c-arb-gpio-challenge", }, 239 .name = "i2c-arb-gpio-challenge", 249 MODULE_ALIAS("platform:i2c-arb-gpio-challenge");
|
/linux-4.4.14/drivers/net/wireless/hostap/ |
H A D | hostap_ap.c | 149 kfree(sta->u.sta.challenge); ap_free_sta() 1294 /* Generate challenge data for shared key authentication. IEEE 802.11 specifies 1295 * that WEP algorithm is used for generating challenge. This should be unique, 1297 * with pseudo random key and then use increasing IV to get unique challenge 1315 PDEBUG(DEBUG_AP, "AP: kmalloc failed for challenge\n"); ap_auth_make_challenge() 1352 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; handle_authen() local 1415 txt = "invalid challenge len"; handle_authen() 1420 txt = "challenge underflow"; handle_authen() 1424 challenge = (char *) (u + 2); handle_authen() 1436 sta->u.sta.challenge = NULL; handle_authen() 1448 sta->u.sta.challenge != NULL)))) { handle_authen() 1486 if (sta->u.sta.challenge == NULL) { handle_authen() 1487 sta->u.sta.challenge = handle_authen() 1489 if (sta->u.sta.challenge == NULL) { handle_authen() 1495 if (sta->u.sta.challenge == NULL || handle_authen() 1496 challenge == NULL || handle_authen() 1497 memcmp(sta->u.sta.challenge, challenge, handle_authen() 1500 txt = "challenge response incorrect"; handle_authen() 1505 txt = "challenge OK - authOK"; handle_authen() 1512 kfree(sta->u.sta.challenge); handle_authen() 1513 sta->u.sta.challenge = NULL; handle_authen() 1529 sta->u.sta.challenge != NULL && handle_authen() 1535 memcpy(pos, sta->u.sta.challenge, WLAN_AUTH_CHALLENGE_LEN); handle_authen()
|
H A D | hostap_ap.h | 86 char *challenge; /* shared key authentication member in struct:sta_info::__anon8321::__anon8322 87 * challenge */
|
/linux-4.4.14/drivers/media/usb/hdpvr/ |
H A D | hdpvr-core.c | 75 static void challenge(u8 *bytes) challenge() function 178 v4l2_dbg(MSG_INFO, hdpvr_debug, &dev->v4l2_dev, "challenge: %8ph\n", device_authorization() 181 challenge(response); device_authorization()
|
/linux-4.4.14/drivers/staging/wlan-ng/ |
H A D | p80211mgmt.h | 117 /*-- values 17-31 reserved for challenge text extension --*/ 290 u8 challenge[1]; member in struct:wlan_ie_challenge 480 struct wlan_ie_challenge *challenge; member in struct:wlan_fr_authen
|
/linux-4.4.14/drivers/net/wireless/ath/ath6kl/ |
H A D | recovery.c | 91 ath6kl_warn("Failed to send hb challenge request, err:%d\n", ath6kl_recovery_hb_timer()
|
H A D | core.h | 135 * challenge messages.
|
H A D | wmi.c | 3860 ath6kl_dbg(ATH6KL_DBG_WMI, "wmi event hb challenge resp\n"); ath6kl_wmi_control_rx_xtnd()
|
/linux-4.4.14/fs/cifs/ |
H A D | cifsencrypt.c | 391 /* Server has provided av pairs/target info in the type 2 challenge 447 /* Server has provided av pairs/target info in the type 2 challenge 603 offsetof(struct ntlmv2_resp, challenge.key[0])); CalcNTLMv2_response() 625 memcpy(ntlmv2->challenge.key, CalcNTLMv2_response() 628 memcpy(ntlmv2->challenge.key, CalcNTLMv2_response() 631 ntlmv2->challenge.key, hash_len); CalcNTLMv2_response()
|
H A D | sess.c | 283 unsigned int tioffset; /* challenge message target info area */ decode_ntlmssp_challenge() 284 unsigned int tilen; /* challenge message target info area length */ decode_ntlmssp_challenge() 289 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); decode_ntlmssp_challenge() 688 * to use challenge/response method (i.e. Password bit is 1). sess_auth_lanman() 1219 cifs_dbg(FYI, "rawntlmssp session setup challenge phase\n"); sess_auth_rawntlmssp_negotiate() 1304 * (challenge) sess_auth_rawntlmssp_authenticate()
|
H A D | cifsglob.h | 806 struct ntlmssp_auth *ntlmssp; /* ciphertext, flags, server challenge */ 1593 with more secure ntlmssp2 challenge/resp */
|
H A D | smb2pdu.c | 782 /* NTLMSSP Negotiate sent now processing challenge (response) */ SMB2_sess_setup() 783 phase = NtLmChallenge; /* process ntlmssp challenge */ SMB2_sess_setup()
|
H A D | cifspdu.h | 705 } __attribute__((packed)) challenge; member in union:ntlmv2_resp::__anon11409
|
/linux-4.4.14/drivers/staging/rtl8192e/ |
H A D | rtllib_softmac.c | 1466 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, rtllib_auth_challenge() argument 1484 memcpy(c, challenge, chlen); rtllib_auth_challenge() 1487 "Sending authentication challenge response\n"); rtllib_auth_challenge() 1495 kfree(challenge); rtllib_auth_challenge() 1781 u8 **challenge, int *chlen) auth_parse() 1791 *challenge = NULL; auth_parse() 1798 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); auth_parse() 1799 if (!*challenge) auth_parse() 2298 u8 *challenge; rtllib_rx_auth_resp() local 2302 errcode = auth_parse(ieee->dev, skb, &challenge, &chlen); rtllib_rx_auth_resp() 2312 if (ieee->open_wep || !challenge) { rtllib_rx_auth_resp() 2344 rtllib_auth_challenge(ieee, challenge, chlen); rtllib_rx_auth_resp() 1780 auth_parse(struct net_device *dev, struct sk_buff *skb, u8 **challenge, int *chlen) auth_parse() argument
|
H A D | rtllib.h | 860 /*challenge*/
|
/linux-4.4.14/drivers/staging/rtl8192u/ieee80211/ |
H A D | ieee80211_softmac.c | 1281 u8 *challenge, ieee80211_auth_challenge() 1299 memcpy(c, challenge, chlen); ieee80211_auth_challenge() 1301 IEEE80211_DEBUG_MGMT("Sending authentication challenge response\n"); ieee80211_auth_challenge() 1309 kfree(challenge); ieee80211_auth_challenge() 1532 static inline u16 auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) auth_parse() argument 1540 *challenge = NULL; auth_parse() 1547 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); auth_parse() 1548 if (!*challenge) auth_parse() 1920 u8 *challenge; ieee80211_check_auth_response() local 1924 errcode = auth_parse(skb, &challenge, &chlen); ieee80211_check_auth_response() 1926 if (ieee->open_wep || !challenge) { ieee80211_check_auth_response() 1964 ieee80211_auth_challenge(ieee, challenge, chlen); ieee80211_check_auth_response() 1280 ieee80211_auth_challenge(struct ieee80211_device *ieee, u8 *challenge, int chlen) ieee80211_auth_challenge() argument
|
H A D | ieee80211.h | 967 /*challenge*/
|
/linux-4.4.14/drivers/media/usb/gspca/ |
H A D | touptek.c | 466 * Next does some sort of 2 packet challenge / response configure() 471 * 16 bytes out challenge, requestType: 0x40 configure()
|
/linux-4.4.14/drivers/net/wireless/ |
H A D | wl3501.h | 225 /* 17-31 Reserved for challenge text extension */
|
H A D | atmel.c | 2867 u8 *challenge, int challenge_len) send_authentication_request() 2893 memcpy(auth.chall_text, challenge, challenge_len); send_authentication_request() 2866 send_authentication_request(struct atmel_private *priv, u16 system, u8 *challenge, int challenge_len) send_authentication_request() argument
|
/linux-4.4.14/net/netfilter/ |
H A D | nf_conntrack_proto_tcp.c | 928 * responds with a challenge ACK if implementing RFC5961. tcp_packet() 945 /* Mark the potential for RFC5961 challenge ACK, tcp_packet() 984 /* RFC5961 compliance cause stack to send "challenge-ACK" tcp_packet() 993 /* Detected RFC5961 challenge ACK */ tcp_packet() 998 "nf_ct_tcp: challenge-ACK ignored "); tcp_packet()
|
H A D | nf_conntrack_h323_types.c | 1146 {FNAME("challenge") OCTSTR, 7, 8, 0, SKIP | OPT, 0, NULL},
|
/linux-4.4.14/drivers/char/pcmcia/ |
H A D | cm4000_cs.c | 504 /* write challenge to the buffer */ set_protocol() 505 DEBUGP(5, dev, "Write challenge to buffer: "); set_protocol() 1345 /* T=1: read offset=zero, T=0: read offset=after challenge */
|
/linux-4.4.14/arch/ia64/lib/ |
H A D | do_csum.S | 293 // someone else can challenge.
|
/linux-4.4.14/sound/soc/fsl/ |
H A D | imx-ssi.c | 26 * Reading and writing AC97 registers is another challenge. The core
|
H A D | fsl_ssi.c | 26 * Reading and writing AC97 registers is another challenge. The core
|
/linux-4.4.14/drivers/usb/wusbcore/ |
H A D | cbaf.c | 80 * handshake) challenge the device to demonstrate it has the CK secret
|
/linux-4.4.14/drivers/net/wireless/ipw2x00/ |
H A D | libipw.h | 412 /* challenge */
|
H A D | ipw2200.c | 4055 {0x0F, "Authentication rejected because of challenge failure"},
|
/linux-4.4.14/net/ceph/ |
H A D | auth_x.c | 518 dout("handle_reply got server challenge %llx\n", ceph_x_handle_reply()
|
/linux-4.4.14/drivers/staging/rtl8188eu/core/ |
H A D | rtw_ieee80211.c | 1008 elems->challenge = pos; rtw_ieee802_11_parse_elems()
|
H A D | rtw_mlme_ext.c | 2871 DBG_88E("auth rejected because challenge failure!(1)\n"); OnAuth() 2882 DBG_88E("auth rejected because challenge failure!\n"); OnAuth()
|
/linux-4.4.14/drivers/staging/rtl8188eu/include/ |
H A D | ieee80211.h | 1051 u8 *challenge; member in struct:rtw_ieee802_11_elems
|
/linux-4.4.14/drivers/usb/host/ |
H A D | ehci-q.c | 33 * an ongoing challenge. That's in "ehci-sched.c".
|
H A D | fotg210-hcd.c | 2008 * an ongoing challenge. That's in "ehci-sched.c".
|
/linux-4.4.14/drivers/staging/rtl8723au/core/ |
H A D | rtw_mlme_ext.c | 1043 DBG_8723A("auth rejected because challenge " OnAuth23a() 1055 DBG_8723A("auth rejected because challenge " OnAuth23a() 1145 /* DBG_8723A("marc: no challenge text?\n"); */ OnAuth23aClient23a()
|
/linux-4.4.14/net/ipv4/ |
H A D | tcp_input.c | 91 /* rfc5961 challenge ack rate limiting */ 5175 * Send a challenge ACK tcp_validate_incoming() 5187 * RFC 5961 4.2 : Send a challenge ack tcp_validate_incoming()
|
/linux-4.4.14/net/mac80211/ |
H A D | ieee80211_i.h | 1400 const u8 *challenge; member in struct:ieee802_11_elems
|
H A D | mlme.c | 2559 if (!elems.challenge) ieee80211_auth_challenge() 2567 elems.challenge - 2, elems.challenge_len + 2, ieee80211_auth_challenge()
|
H A D | util.c | 886 elems->challenge = pos; ieee802_11_parse_elems_crc()
|
/linux-4.4.14/include/linux/ |
H A D | ieee80211.h | 1757 /* 17-31 reserved for challenge text extension */
|
/linux-4.4.14/tools/testing/ktest/ |
H A D | ktest.pl | 381 POWER_CYCLE = wget --no-proxy -O /dev/null -q --auth-no-challenge 'http://admin:admin\@power/outlet?5=CCL'
|
/linux-4.4.14/drivers/block/drbd/ |
H A D | drbd_receiver.c | 4910 /* FIXME: Put the challenge/response into the preallocated socket buffer. */ drbd_do_auth() 4979 drbd_err(connection, "Peer presented the same challenge!\n"); drbd_do_auth()
|
/linux-4.4.14/drivers/scsi/lpfc/ |
H A D | lpfc_init.c | 2475 * lpfc_challenge_key - Create challenge key based on WWPN of the HBA 2476 * @RandomChallenge: pointer to the entry of host challenge random number array. 2480 * from the challenge random numbers associated with the host, referred by
|
/linux-4.4.14/drivers/net/ethernet/sfc/ |
H A D | mcdi_pcol.h | 9305 /* validation challenge */
|