Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 54) sorted by relevance

123

/Linux-v5.4/drivers/target/iscsi/
Discsi_target_auth.c33 ret = get_random_bytes_wait(chap->challenge, CHAP_CHALLENGE_LENGTH); in chap_gen_challenge()
36 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge()
160 unsigned char identifier[10], *challenge = NULL; in chap_server_compute_md5() local
179 challenge = kzalloc(CHAP_CHALLENGE_STR_LEN, GFP_KERNEL); in chap_server_compute_md5()
180 if (!challenge) { in chap_server_compute_md5()
267 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_md5()
320 challenge, &type) < 0) { in chap_server_compute_md5()
329 challenge_len = DIV_ROUND_UP(strlen(challenge), 2); in chap_server_compute_md5()
338 if (hex2bin(challenge_binhex, challenge, challenge_len) < 0) { in chap_server_compute_md5()
342 pr_debug("[server] Got CHAP_C=%s\n", challenge); in chap_server_compute_md5()
[all …]
Discsi_target_auth.h33 unsigned char challenge[CHAP_CHALLENGE_LENGTH]; member
/Linux-v5.4/drivers/staging/greybus/
Dauthentication.c141 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument
161 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate()
246 authenticate->challenge, in cap_ioctl()
Dgreybus_authentication.h62 __u8 challenge[32]; member
/Linux-v5.4/net/rxrpc/
Drxkad.c643 struct rxkad_challenge challenge; in rxkad_issue_challenge() local
659 challenge.version = htonl(2); in rxkad_issue_challenge()
660 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge()
661 challenge.min_level = htonl(0); in rxkad_issue_challenge()
662 challenge.__padding = 0; in rxkad_issue_challenge()
683 iov[1].iov_base = &challenge; in rxkad_issue_challenge()
684 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge()
813 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local
835 &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge()
838 version = ntohl(challenge.version); in rxkad_respond_to_challenge()
[all …]
/Linux-v5.4/Documentation/devicetree/bindings/i2c/
Di2c-arb-gpio-challenge.txt3 This uses GPIO lines and a challenge & response mechanism to arbitrate who is
43 - compatible: i2c-arb-gpio-challenge
64 compatible = "i2c-arb-gpio-challenge";
/Linux-v5.4/drivers/thunderbolt/
Dtb_msgs.h243 u32 challenge[8]; member
252 u32 challenge[8]; member
404 u32 challenge[8]; member
434 u32 challenge[8]; member
Ddomain.c644 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local
660 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key()
661 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key()
683 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
Dicm.c491 const u8 *challenge, u8 *response) in icm_fr_challenge_switch_key() argument
502 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); in icm_fr_challenge_switch_key()
1043 const u8 *challenge, u8 *response) in icm_tr_challenge_switch_key() argument
1055 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); in icm_tr_challenge_switch_key()
/Linux-v5.4/drivers/i2c/muxes/
DMakefile5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
DKconfig15 I2C multimaster arbitration scheme using GPIOs and a challenge &
20 will be called i2c-arb-gpio-challenge.
/Linux-v5.4/drivers/staging/greybus/Documentation/firmware/
Dauthenticate.c26 .challenge = {0},
Dfirmware-management267 __u8 challenge[32];
300 an Interface. The user needs to fill the 'auth_type', 'uid', and 'challenge'
/Linux-v5.4/drivers/staging/wlan-ng/
Dp80211mgmt.h291 u8 challenge[1]; member
481 struct wlan_ie_challenge *challenge; member
/Linux-v5.4/drivers/net/wireless/intersil/hostap/
Dhostap_ap.c137 kfree(sta->u.sta.challenge); in ap_free_sta()
1290 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; in handle_authen() local
1362 challenge = (char *) (u + 2); in handle_authen()
1374 sta->u.sta.challenge = NULL; in handle_authen()
1386 sta->u.sta.challenge != NULL)))) { in handle_authen()
1424 if (sta->u.sta.challenge == NULL) { in handle_authen()
1425 sta->u.sta.challenge = in handle_authen()
1427 if (sta->u.sta.challenge == NULL) { in handle_authen()
1433 if (sta->u.sta.challenge == NULL || in handle_authen()
1434 challenge == NULL || in handle_authen()
[all …]
Dhostap_ap.h87 char *challenge; /* shared key authentication member
/Linux-v5.4/fs/cifs/
Dcifsencrypt.c610 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response()
632 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response()
635 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response()
638 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
/Linux-v5.4/Documentation/ABI/testing/
Dsysfs-bus-thunderbolt70 2: Send a challenge based on the 32 byte hex string. If the
71 challenge response from device is valid, the device is
74 EKEYREJECTED if the challenge response did not match.
/Linux-v5.4/drivers/media/usb/hdpvr/
Dhdpvr-core.c69 static void challenge(u8 *bytes) in challenge() function
175 challenge(response); in device_authorization()
/Linux-v5.4/drivers/staging/rtl8192u/ieee80211/
Dieee80211_softmac.c1220 u8 *challenge, in ieee80211_auth_challenge() argument
1238 memcpy(c, challenge, chlen); in ieee80211_auth_challenge()
1248 kfree(challenge); in ieee80211_auth_challenge()
1460 static inline u16 auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) in auth_parse() argument
1468 *challenge = NULL; in auth_parse()
1475 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse()
1476 if (!*challenge) in auth_parse()
1825 u8 *challenge; in ieee80211_check_auth_response() local
1829 errcode = auth_parse(skb, &challenge, &chlen); in ieee80211_check_auth_response()
1831 if (ieee->open_wep || !challenge) { in ieee80211_check_auth_response()
[all …]
/Linux-v5.4/Documentation/admin-guide/
Dthunderbolt.rst46 a challenge that should match the expected one based on a random key
121 Next time the device is plugged in the user can verify (challenge) the
127 If the challenge the device returns back matches the one we expect based
129 However, if the challenge fails no tunnels are created and error is
/Linux-v5.4/drivers/staging/rtl8192e/
Drtllib_softmac.c1453 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, in rtllib_auth_challenge() argument
1471 memcpy(c, challenge, chlen); in rtllib_auth_challenge()
1482 kfree(challenge); in rtllib_auth_challenge()
1770 u8 **challenge, int *chlen) in auth_parse() argument
1780 *challenge = NULL; in auth_parse()
1787 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse()
1788 if (!*challenge) in auth_parse()
2283 u8 *challenge; in rtllib_rx_auth_resp() local
2287 errcode = auth_parse(ieee->dev, skb, &challenge, &chlen); in rtllib_rx_auth_resp()
2298 if (ieee->open_wep || !challenge) { in rtllib_rx_auth_resp()
[all …]
/Linux-v5.4/drivers/firmware/tegra/
Dbpmp.c537 response.reply = request->challenge << 1; in tegra_bpmp_mrq_handle_ping()
552 request.challenge = 1; in tegra_bpmp_ping()
572 request.challenge, response.reply, in tegra_bpmp_ping()
/Linux-v5.4/include/soc/tegra/
Dbpmp-abi.h225 uint32_t challenge; member
478 uint32_t challenge; member
/Linux-v5.4/drivers/staging/comedi/drivers/ni_routing/
DREADME30 One additional major challenge is that this information does not seem to be
35 runs on Windows platforms. A further challenge is that this information

123