/Linux-v4.19/drivers/target/iscsi/ |
D | iscsi_target_auth.c | 41 ret = get_random_bytes_wait(chap->challenge, CHAP_CHALLENGE_LENGTH); in chap_gen_challenge() 44 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge() 168 unsigned char identifier[10], *challenge = NULL; in chap_server_compute_md5() local 187 challenge = kzalloc(CHAP_CHALLENGE_STR_LEN, GFP_KERNEL); in chap_server_compute_md5() 188 if (!challenge) { in chap_server_compute_md5() 276 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_md5() 329 challenge, &type) < 0) { in chap_server_compute_md5() 338 challenge_len = DIV_ROUND_UP(strlen(challenge), 2); in chap_server_compute_md5() 347 if (hex2bin(challenge_binhex, challenge, challenge_len) < 0) { in chap_server_compute_md5() 351 pr_debug("[server] Got CHAP_C=%s\n", challenge); in chap_server_compute_md5() [all …]
|
D | iscsi_target_auth.h | 33 unsigned char challenge[CHAP_CHALLENGE_LENGTH]; member
|
/Linux-v4.19/drivers/staging/greybus/ |
D | authentication.c | 142 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument 162 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate() 247 authenticate->challenge, in cap_ioctl()
|
D | greybus_authentication.h | 108 __u8 challenge[32]; member
|
/Linux-v4.19/net/rxrpc/ |
D | rxkad.c | 617 struct rxkad_challenge challenge; in rxkad_issue_challenge() local 633 challenge.version = htonl(2); in rxkad_issue_challenge() 634 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge() 635 challenge.min_level = htonl(0); in rxkad_issue_challenge() 636 challenge.__padding = 0; in rxkad_issue_challenge() 657 iov[1].iov_base = &challenge; in rxkad_issue_challenge() 658 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge() 782 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local 804 &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge() 807 version = ntohl(challenge.version); in rxkad_respond_to_challenge() [all …]
|
/Linux-v4.19/drivers/thunderbolt/ |
D | tb_msgs.h | 245 u32 challenge[8]; member 254 u32 challenge[8]; member 406 u32 challenge[8]; member 436 u32 challenge[8]; member
|
D | domain.c | 630 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 646 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key() 647 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key() 670 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
|
D | icm.c | 389 const u8 *challenge, u8 *response) in icm_fr_challenge_switch_key() argument 400 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); in icm_fr_challenge_switch_key() 917 const u8 *challenge, u8 *response) in icm_tr_challenge_switch_key() argument 929 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); in icm_tr_challenge_switch_key()
|
D | tb.h | 233 const u8 *challenge, u8 *response);
|
/Linux-v4.19/Documentation/devicetree/bindings/i2c/ |
D | i2c-arb-gpio-challenge.txt | 3 This uses GPIO lines and a challenge & response mechanism to arbitrate who is 43 - compatible: i2c-arb-gpio-challenge 64 compatible = "i2c-arb-gpio-challenge";
|
/Linux-v4.19/drivers/i2c/muxes/ |
D | Makefile | 5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
|
D | Kconfig | 14 I2C multimaster arbitration scheme using GPIOs and a challenge & 19 will be called i2c-arb-gpio-challenge.
|
/Linux-v4.19/drivers/staging/greybus/Documentation/firmware/ |
D | authenticate.c | 72 .challenge = {0},
|
D | firmware-management | 267 __u8 challenge[32]; 300 an Interface. The user needs to fill the 'auth_type', 'uid', and 'challenge'
|
/Linux-v4.19/drivers/staging/wlan-ng/ |
D | p80211mgmt.h | 291 u8 challenge[1]; member 481 struct wlan_ie_challenge *challenge; member
|
/Linux-v4.19/drivers/net/wireless/intersil/hostap/ |
D | hostap_ap.c | 137 kfree(sta->u.sta.challenge); in ap_free_sta() 1290 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; in handle_authen() local 1362 challenge = (char *) (u + 2); in handle_authen() 1374 sta->u.sta.challenge = NULL; in handle_authen() 1386 sta->u.sta.challenge != NULL)))) { in handle_authen() 1424 if (sta->u.sta.challenge == NULL) { in handle_authen() 1425 sta->u.sta.challenge = in handle_authen() 1427 if (sta->u.sta.challenge == NULL) { in handle_authen() 1433 if (sta->u.sta.challenge == NULL || in handle_authen() 1434 challenge == NULL || in handle_authen() [all …]
|
D | hostap_ap.h | 87 char *challenge; /* shared key authentication member
|
/Linux-v4.19/Documentation/ABI/testing/ |
D | sysfs-bus-thunderbolt | 61 2: Send a challenge based on the 32 byte hex string. If the 62 challenge response from device is valid, the device is 65 EKEYREJECTED if the challenge response did not match.
|
/Linux-v4.19/fs/cifs/ |
D | cifsencrypt.c | 604 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response() 626 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 629 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 632 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
|
/Linux-v4.19/drivers/media/usb/hdpvr/ |
D | hdpvr-core.c | 73 static void challenge(u8 *bytes) in challenge() function 178 challenge(response); in device_authorization()
|
/Linux-v4.19/include/soc/tegra/ |
D | bpmp-abi.h | 225 uint32_t challenge; member 448 uint32_t challenge; member
|
/Linux-v4.19/drivers/staging/rtl8192u/ieee80211/ |
D | ieee80211_softmac.c | 1222 u8 *challenge, in ieee80211_auth_challenge() argument 1240 memcpy(c, challenge, chlen); in ieee80211_auth_challenge() 1250 kfree(challenge); in ieee80211_auth_challenge() 1462 static inline u16 auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) in auth_parse() argument 1470 *challenge = NULL; in auth_parse() 1477 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1478 if (!*challenge) in auth_parse() 1827 u8 *challenge; in ieee80211_check_auth_response() local 1831 errcode = auth_parse(skb, &challenge, &chlen); in ieee80211_check_auth_response() 1833 if (ieee->open_wep || !challenge) { in ieee80211_check_auth_response() [all …]
|
/Linux-v4.19/Documentation/admin-guide/ |
D | thunderbolt.rst | 46 a challenge that should match the expected one based on a random key 121 Next time the device is plugged in the user can verify (challenge) the 127 If the challenge the device returns back matches the one we expect based 129 However, if the challenge fails no tunnels are created and error is
|
/Linux-v4.19/drivers/staging/rtl8192e/ |
D | rtllib_softmac.c | 1461 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, in rtllib_auth_challenge() argument 1479 memcpy(c, challenge, chlen); in rtllib_auth_challenge() 1490 kfree(challenge); in rtllib_auth_challenge() 1778 u8 **challenge, int *chlen) in auth_parse() argument 1788 *challenge = NULL; in auth_parse() 1795 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1796 if (!*challenge) in auth_parse() 2296 u8 *challenge; in rtllib_rx_auth_resp() local 2300 errcode = auth_parse(ieee->dev, skb, &challenge, &chlen); in rtllib_rx_auth_resp() 2311 if (ieee->open_wep || !challenge) { in rtllib_rx_auth_resp() [all …]
|
/Linux-v4.19/drivers/firmware/tegra/ |
D | bpmp.c | 482 response.reply = request->challenge << 1; in tegra_bpmp_mrq_handle_ping() 497 request.challenge = 1; in tegra_bpmp_ping() 517 request.challenge, response.reply, in tegra_bpmp_ping()
|