Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 56) sorted by relevance

123

/linux/drivers/staging/greybus/
A Dauthentication.c141 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument
161 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate()
246 authenticate->challenge, in cap_ioctl()
A Dgreybus_authentication.h62 __u8 challenge[32]; member
/linux/drivers/target/iscsi/
A Discsi_target_auth.c51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge()
53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge()
57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge()
347 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash()
431 !memcmp(initiatorchg_binhex, chap->challenge, in chap_server_compute_hash()
A Discsi_target_auth.h37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
/linux/net/rxrpc/
A Drxkad.c731 struct rxkad_challenge challenge; in rxkad_issue_challenge() local
743 challenge.version = htonl(2); in rxkad_issue_challenge()
745 challenge.min_level = htonl(0); in rxkad_issue_challenge()
746 challenge.__padding = 0; in rxkad_issue_challenge()
767 iov[1].iov_base = &challenge; in rxkad_issue_challenge()
768 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge()
897 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local
919 &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge()
922 version = ntohl(challenge.version); in rxkad_respond_to_challenge()
923 nonce = ntohl(challenge.nonce); in rxkad_respond_to_challenge()
[all …]
/linux/drivers/thunderbolt/
A Dtb_msgs.h251 u32 challenge[8]; member
260 u32 challenge[8]; member
414 u32 challenge[8]; member
444 u32 challenge[8]; member
A Ddomain.c710 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local
726 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key()
727 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key()
749 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
A Dicm.c531 const u8 *challenge, u8 *response) in icm_fr_challenge_switch_key() argument
542 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); in icm_fr_challenge_switch_key()
1099 const u8 *challenge, u8 *response) in icm_tr_challenge_switch_key() argument
1111 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); in icm_tr_challenge_switch_key()
/linux/Documentation/devicetree/bindings/i2c/
A Di2c-arb-gpio-challenge.txt3 This uses GPIO lines and a challenge & response mechanism to arbitrate who is
43 - compatible: i2c-arb-gpio-challenge
64 compatible = "i2c-arb-gpio-challenge";
/linux/drivers/i2c/muxes/
A DMakefile5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
A DKconfig15 I2C multimaster arbitration scheme using GPIOs and a challenge &
20 will be called i2c-arb-gpio-challenge.
/linux/fs/cifs/
A Dcifsencrypt.c516 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response()
538 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response()
541 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response()
544 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
/linux/drivers/net/wireless/intersil/hostap/
A Dhostap_ap.c137 kfree(sta->u.sta.challenge); in ap_free_sta()
1362 challenge = (char *) (u + 2); in handle_authen()
1374 sta->u.sta.challenge = NULL; in handle_authen()
1424 if (sta->u.sta.challenge == NULL) { in handle_authen()
1425 sta->u.sta.challenge = in handle_authen()
1433 if (sta->u.sta.challenge == NULL || in handle_authen()
1434 challenge == NULL || in handle_authen()
1435 memcmp(sta->u.sta.challenge, challenge, in handle_authen()
1450 kfree(sta->u.sta.challenge); in handle_authen()
1451 sta->u.sta.challenge = NULL; in handle_authen()
[all …]
A Dhostap_ap.h87 char *challenge; /* shared key authentication member
/linux/drivers/staging/greybus/Documentation/firmware/
A Dauthenticate.c26 .challenge = {0},
/linux/drivers/staging/wlan-ng/
A Dp80211mgmt.h291 u8 challenge[1]; member
481 struct wlan_ie_challenge *challenge; member
/linux/net/ceph/
A Dauth_x.c793 void *challenge, int challenge_len, in decrypt_authorizer_challenge() argument
800 ret = __ceph_x_decrypt(secret, challenge, challenge_len); in decrypt_authorizer_challenge()
805 dp = challenge + sizeof(struct ceph_x_encrypt_header); in decrypt_authorizer_challenge()
819 void *challenge, int challenge_len) in ceph_x_add_authorizer_challenge() argument
825 ret = decrypt_authorizer_challenge(&au->session_key, challenge, in ceph_x_add_authorizer_challenge()
/linux/drivers/staging/rtl8192u/ieee80211/
A Dieee80211_softmac.c1220 u8 *challenge, in ieee80211_auth_challenge() argument
1238 memcpy(c, challenge, chlen); in ieee80211_auth_challenge()
1248 kfree(challenge); in ieee80211_auth_challenge()
1464 static inline u16 auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) in auth_parse() argument
1472 *challenge = NULL; in auth_parse()
1479 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse()
1480 if (!*challenge) in auth_parse()
1830 u8 *challenge; in ieee80211_check_auth_response() local
1834 errcode = auth_parse(skb, &challenge, &chlen); in ieee80211_check_auth_response()
1836 if (ieee->open_wep || !challenge) { in ieee80211_check_auth_response()
[all …]
/linux/drivers/media/usb/hdpvr/
A Dhdpvr-core.c69 static void challenge(u8 *bytes) in challenge() function
175 challenge(response); in device_authorization()
/linux/drivers/staging/rtl8192e/
A Drtllib_softmac.c1451 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, in rtllib_auth_challenge() argument
1469 memcpy(c, challenge, chlen); in rtllib_auth_challenge()
1480 kfree(challenge); in rtllib_auth_challenge()
1768 u8 **challenge, int *chlen) in auth_parse() argument
1778 *challenge = NULL; in auth_parse()
1785 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse()
1786 if (!*challenge) in auth_parse()
2282 u8 *challenge; in rtllib_rx_auth_resp() local
2286 errcode = auth_parse(ieee->dev, skb, &challenge, &chlen); in rtllib_rx_auth_resp()
2297 if (ieee->open_wep || !challenge) { in rtllib_rx_auth_resp()
[all …]
/linux/drivers/firmware/tegra/
A Dbpmp.c538 response.reply = request->challenge << 1; in tegra_bpmp_mrq_handle_ping()
553 request.challenge = 1; in tegra_bpmp_ping()
573 request.challenge, response.reply, in tegra_bpmp_ping()
/linux/Documentation/riscv/
A Dpatch-acceptance.rst13 challenge for RISC-V Linux maintenance. Linux maintainers disapprove
/linux/Documentation/admin-guide/
A Dthunderbolt.rst69 a challenge that should match the expected one based on a random key
148 Next time the device is plugged in the user can verify (challenge) the
154 If the challenge the device returns back matches the one we expect based
156 However, if the challenge fails no tunnels are created and error is
/linux/include/soc/tegra/
A Dbpmp-abi.h236 uint32_t challenge; member
493 uint32_t challenge; member
/linux/Documentation/ABI/testing/
A Dsysfs-bus-thunderbolt91 2 Send a challenge based on the 32 byte hex string. If the
92 challenge response from device is valid, the device is
95 EKEYREJECTED if the challenge response did not match.

Completed in 67 milliseconds

123