Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 52) sorted by relevance

123

/Linux-v4.19/drivers/target/iscsi/
Discsi_target_auth.c41 ret = get_random_bytes_wait(chap->challenge, CHAP_CHALLENGE_LENGTH); in chap_gen_challenge()
44 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge()
168 unsigned char identifier[10], *challenge = NULL; in chap_server_compute_md5() local
187 challenge = kzalloc(CHAP_CHALLENGE_STR_LEN, GFP_KERNEL); in chap_server_compute_md5()
188 if (!challenge) { in chap_server_compute_md5()
276 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_md5()
329 challenge, &type) < 0) { in chap_server_compute_md5()
338 challenge_len = DIV_ROUND_UP(strlen(challenge), 2); in chap_server_compute_md5()
347 if (hex2bin(challenge_binhex, challenge, challenge_len) < 0) { in chap_server_compute_md5()
351 pr_debug("[server] Got CHAP_C=%s\n", challenge); in chap_server_compute_md5()
[all …]
Discsi_target_auth.h33 unsigned char challenge[CHAP_CHALLENGE_LENGTH]; member
/Linux-v4.19/drivers/staging/greybus/
Dauthentication.c142 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument
162 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate()
247 authenticate->challenge, in cap_ioctl()
Dgreybus_authentication.h108 __u8 challenge[32]; member
/Linux-v4.19/net/rxrpc/
Drxkad.c617 struct rxkad_challenge challenge; in rxkad_issue_challenge() local
633 challenge.version = htonl(2); in rxkad_issue_challenge()
634 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge()
635 challenge.min_level = htonl(0); in rxkad_issue_challenge()
636 challenge.__padding = 0; in rxkad_issue_challenge()
657 iov[1].iov_base = &challenge; in rxkad_issue_challenge()
658 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge()
782 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local
804 &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge()
807 version = ntohl(challenge.version); in rxkad_respond_to_challenge()
[all …]
/Linux-v4.19/drivers/thunderbolt/
Dtb_msgs.h245 u32 challenge[8]; member
254 u32 challenge[8]; member
406 u32 challenge[8]; member
436 u32 challenge[8]; member
Ddomain.c630 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local
646 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key()
647 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key()
670 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
Dicm.c389 const u8 *challenge, u8 *response) in icm_fr_challenge_switch_key() argument
400 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); in icm_fr_challenge_switch_key()
917 const u8 *challenge, u8 *response) in icm_tr_challenge_switch_key() argument
929 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); in icm_tr_challenge_switch_key()
Dtb.h233 const u8 *challenge, u8 *response);
/Linux-v4.19/Documentation/devicetree/bindings/i2c/
Di2c-arb-gpio-challenge.txt3 This uses GPIO lines and a challenge & response mechanism to arbitrate who is
43 - compatible: i2c-arb-gpio-challenge
64 compatible = "i2c-arb-gpio-challenge";
/Linux-v4.19/drivers/i2c/muxes/
DMakefile5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
DKconfig14 I2C multimaster arbitration scheme using GPIOs and a challenge &
19 will be called i2c-arb-gpio-challenge.
/Linux-v4.19/drivers/staging/greybus/Documentation/firmware/
Dauthenticate.c72 .challenge = {0},
Dfirmware-management267 __u8 challenge[32];
300 an Interface. The user needs to fill the 'auth_type', 'uid', and 'challenge'
/Linux-v4.19/drivers/staging/wlan-ng/
Dp80211mgmt.h291 u8 challenge[1]; member
481 struct wlan_ie_challenge *challenge; member
/Linux-v4.19/drivers/net/wireless/intersil/hostap/
Dhostap_ap.c137 kfree(sta->u.sta.challenge); in ap_free_sta()
1290 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; in handle_authen() local
1362 challenge = (char *) (u + 2); in handle_authen()
1374 sta->u.sta.challenge = NULL; in handle_authen()
1386 sta->u.sta.challenge != NULL)))) { in handle_authen()
1424 if (sta->u.sta.challenge == NULL) { in handle_authen()
1425 sta->u.sta.challenge = in handle_authen()
1427 if (sta->u.sta.challenge == NULL) { in handle_authen()
1433 if (sta->u.sta.challenge == NULL || in handle_authen()
1434 challenge == NULL || in handle_authen()
[all …]
Dhostap_ap.h87 char *challenge; /* shared key authentication member
/Linux-v4.19/Documentation/ABI/testing/
Dsysfs-bus-thunderbolt61 2: Send a challenge based on the 32 byte hex string. If the
62 challenge response from device is valid, the device is
65 EKEYREJECTED if the challenge response did not match.
/Linux-v4.19/fs/cifs/
Dcifsencrypt.c604 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response()
626 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response()
629 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response()
632 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
/Linux-v4.19/drivers/media/usb/hdpvr/
Dhdpvr-core.c73 static void challenge(u8 *bytes) in challenge() function
178 challenge(response); in device_authorization()
/Linux-v4.19/include/soc/tegra/
Dbpmp-abi.h225 uint32_t challenge; member
448 uint32_t challenge; member
/Linux-v4.19/drivers/staging/rtl8192u/ieee80211/
Dieee80211_softmac.c1222 u8 *challenge, in ieee80211_auth_challenge() argument
1240 memcpy(c, challenge, chlen); in ieee80211_auth_challenge()
1250 kfree(challenge); in ieee80211_auth_challenge()
1462 static inline u16 auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) in auth_parse() argument
1470 *challenge = NULL; in auth_parse()
1477 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse()
1478 if (!*challenge) in auth_parse()
1827 u8 *challenge; in ieee80211_check_auth_response() local
1831 errcode = auth_parse(skb, &challenge, &chlen); in ieee80211_check_auth_response()
1833 if (ieee->open_wep || !challenge) { in ieee80211_check_auth_response()
[all …]
/Linux-v4.19/Documentation/admin-guide/
Dthunderbolt.rst46 a challenge that should match the expected one based on a random key
121 Next time the device is plugged in the user can verify (challenge) the
127 If the challenge the device returns back matches the one we expect based
129 However, if the challenge fails no tunnels are created and error is
/Linux-v4.19/drivers/staging/rtl8192e/
Drtllib_softmac.c1461 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, in rtllib_auth_challenge() argument
1479 memcpy(c, challenge, chlen); in rtllib_auth_challenge()
1490 kfree(challenge); in rtllib_auth_challenge()
1778 u8 **challenge, int *chlen) in auth_parse() argument
1788 *challenge = NULL; in auth_parse()
1795 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse()
1796 if (!*challenge) in auth_parse()
2296 u8 *challenge; in rtllib_rx_auth_resp() local
2300 errcode = auth_parse(ieee->dev, skb, &challenge, &chlen); in rtllib_rx_auth_resp()
2311 if (ieee->open_wep || !challenge) { in rtllib_rx_auth_resp()
[all …]
/Linux-v4.19/drivers/firmware/tegra/
Dbpmp.c482 response.reply = request->challenge << 1; in tegra_bpmp_mrq_handle_ping()
497 request.challenge = 1; in tegra_bpmp_ping()
517 request.challenge, response.reply, in tegra_bpmp_ping()

123