/Linux-v5.4/drivers/target/iscsi/ |
D | iscsi_target_auth.c | 33 ret = get_random_bytes_wait(chap->challenge, CHAP_CHALLENGE_LENGTH); in chap_gen_challenge() 36 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge() 160 unsigned char identifier[10], *challenge = NULL; in chap_server_compute_md5() local 179 challenge = kzalloc(CHAP_CHALLENGE_STR_LEN, GFP_KERNEL); in chap_server_compute_md5() 180 if (!challenge) { in chap_server_compute_md5() 267 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_md5() 320 challenge, &type) < 0) { in chap_server_compute_md5() 329 challenge_len = DIV_ROUND_UP(strlen(challenge), 2); in chap_server_compute_md5() 338 if (hex2bin(challenge_binhex, challenge, challenge_len) < 0) { in chap_server_compute_md5() 342 pr_debug("[server] Got CHAP_C=%s\n", challenge); in chap_server_compute_md5() [all …]
|
D | iscsi_target_auth.h | 33 unsigned char challenge[CHAP_CHALLENGE_LENGTH]; member
|
/Linux-v5.4/drivers/staging/greybus/ |
D | authentication.c | 141 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument 161 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate() 246 authenticate->challenge, in cap_ioctl()
|
D | greybus_authentication.h | 62 __u8 challenge[32]; member
|
/Linux-v5.4/net/rxrpc/ |
D | rxkad.c | 643 struct rxkad_challenge challenge; in rxkad_issue_challenge() local 659 challenge.version = htonl(2); in rxkad_issue_challenge() 660 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge() 661 challenge.min_level = htonl(0); in rxkad_issue_challenge() 662 challenge.__padding = 0; in rxkad_issue_challenge() 683 iov[1].iov_base = &challenge; in rxkad_issue_challenge() 684 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge() 813 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local 835 &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge() 838 version = ntohl(challenge.version); in rxkad_respond_to_challenge() [all …]
|
/Linux-v5.4/Documentation/devicetree/bindings/i2c/ |
D | i2c-arb-gpio-challenge.txt | 3 This uses GPIO lines and a challenge & response mechanism to arbitrate who is 43 - compatible: i2c-arb-gpio-challenge 64 compatible = "i2c-arb-gpio-challenge";
|
/Linux-v5.4/drivers/thunderbolt/ |
D | tb_msgs.h | 243 u32 challenge[8]; member 252 u32 challenge[8]; member 404 u32 challenge[8]; member 434 u32 challenge[8]; member
|
D | domain.c | 644 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 660 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key() 661 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key() 683 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
|
D | icm.c | 491 const u8 *challenge, u8 *response) in icm_fr_challenge_switch_key() argument 502 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); in icm_fr_challenge_switch_key() 1043 const u8 *challenge, u8 *response) in icm_tr_challenge_switch_key() argument 1055 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); in icm_tr_challenge_switch_key()
|
/Linux-v5.4/drivers/i2c/muxes/ |
D | Makefile | 5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
|
D | Kconfig | 15 I2C multimaster arbitration scheme using GPIOs and a challenge & 20 will be called i2c-arb-gpio-challenge.
|
/Linux-v5.4/drivers/staging/greybus/Documentation/firmware/ |
D | authenticate.c | 26 .challenge = {0},
|
D | firmware-management | 267 __u8 challenge[32]; 300 an Interface. The user needs to fill the 'auth_type', 'uid', and 'challenge'
|
/Linux-v5.4/drivers/staging/wlan-ng/ |
D | p80211mgmt.h | 291 u8 challenge[1]; member 481 struct wlan_ie_challenge *challenge; member
|
/Linux-v5.4/drivers/net/wireless/intersil/hostap/ |
D | hostap_ap.c | 137 kfree(sta->u.sta.challenge); in ap_free_sta() 1290 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; in handle_authen() local 1362 challenge = (char *) (u + 2); in handle_authen() 1374 sta->u.sta.challenge = NULL; in handle_authen() 1386 sta->u.sta.challenge != NULL)))) { in handle_authen() 1424 if (sta->u.sta.challenge == NULL) { in handle_authen() 1425 sta->u.sta.challenge = in handle_authen() 1427 if (sta->u.sta.challenge == NULL) { in handle_authen() 1433 if (sta->u.sta.challenge == NULL || in handle_authen() 1434 challenge == NULL || in handle_authen() [all …]
|
D | hostap_ap.h | 87 char *challenge; /* shared key authentication member
|
/Linux-v5.4/fs/cifs/ |
D | cifsencrypt.c | 610 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response() 632 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 635 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 638 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
|
/Linux-v5.4/Documentation/ABI/testing/ |
D | sysfs-bus-thunderbolt | 70 2: Send a challenge based on the 32 byte hex string. If the 71 challenge response from device is valid, the device is 74 EKEYREJECTED if the challenge response did not match.
|
/Linux-v5.4/drivers/media/usb/hdpvr/ |
D | hdpvr-core.c | 69 static void challenge(u8 *bytes) in challenge() function 175 challenge(response); in device_authorization()
|
/Linux-v5.4/drivers/staging/rtl8192u/ieee80211/ |
D | ieee80211_softmac.c | 1220 u8 *challenge, in ieee80211_auth_challenge() argument 1238 memcpy(c, challenge, chlen); in ieee80211_auth_challenge() 1248 kfree(challenge); in ieee80211_auth_challenge() 1460 static inline u16 auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) in auth_parse() argument 1468 *challenge = NULL; in auth_parse() 1475 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1476 if (!*challenge) in auth_parse() 1825 u8 *challenge; in ieee80211_check_auth_response() local 1829 errcode = auth_parse(skb, &challenge, &chlen); in ieee80211_check_auth_response() 1831 if (ieee->open_wep || !challenge) { in ieee80211_check_auth_response() [all …]
|
/Linux-v5.4/Documentation/admin-guide/ |
D | thunderbolt.rst | 46 a challenge that should match the expected one based on a random key 121 Next time the device is plugged in the user can verify (challenge) the 127 If the challenge the device returns back matches the one we expect based 129 However, if the challenge fails no tunnels are created and error is
|
/Linux-v5.4/drivers/staging/rtl8192e/ |
D | rtllib_softmac.c | 1453 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, in rtllib_auth_challenge() argument 1471 memcpy(c, challenge, chlen); in rtllib_auth_challenge() 1482 kfree(challenge); in rtllib_auth_challenge() 1770 u8 **challenge, int *chlen) in auth_parse() argument 1780 *challenge = NULL; in auth_parse() 1787 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1788 if (!*challenge) in auth_parse() 2283 u8 *challenge; in rtllib_rx_auth_resp() local 2287 errcode = auth_parse(ieee->dev, skb, &challenge, &chlen); in rtllib_rx_auth_resp() 2298 if (ieee->open_wep || !challenge) { in rtllib_rx_auth_resp() [all …]
|
/Linux-v5.4/drivers/firmware/tegra/ |
D | bpmp.c | 537 response.reply = request->challenge << 1; in tegra_bpmp_mrq_handle_ping() 552 request.challenge = 1; in tegra_bpmp_ping() 572 request.challenge, response.reply, in tegra_bpmp_ping()
|
/Linux-v5.4/include/soc/tegra/ |
D | bpmp-abi.h | 225 uint32_t challenge; member 478 uint32_t challenge; member
|
/Linux-v5.4/drivers/staging/comedi/drivers/ni_routing/ |
D | README | 30 One additional major challenge is that this information does not seem to be 35 runs on Windows platforms. A further challenge is that this information
|