/linux/drivers/staging/greybus/ |
A D | authentication.c | 141 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument 161 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate() 246 authenticate->challenge, in cap_ioctl()
|
A D | greybus_authentication.h | 62 __u8 challenge[32]; member
|
/linux/drivers/target/iscsi/ |
A D | iscsi_target_auth.c | 51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge() 53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge() 57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge() 347 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash() 431 !memcmp(initiatorchg_binhex, chap->challenge, in chap_server_compute_hash()
|
A D | iscsi_target_auth.h | 37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
|
/linux/net/rxrpc/ |
A D | rxkad.c | 731 struct rxkad_challenge challenge; in rxkad_issue_challenge() local 743 challenge.version = htonl(2); in rxkad_issue_challenge() 745 challenge.min_level = htonl(0); in rxkad_issue_challenge() 746 challenge.__padding = 0; in rxkad_issue_challenge() 767 iov[1].iov_base = &challenge; in rxkad_issue_challenge() 768 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge() 897 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local 919 &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge() 922 version = ntohl(challenge.version); in rxkad_respond_to_challenge() 923 nonce = ntohl(challenge.nonce); in rxkad_respond_to_challenge() [all …]
|
/linux/drivers/thunderbolt/ |
A D | tb_msgs.h | 251 u32 challenge[8]; member 260 u32 challenge[8]; member 414 u32 challenge[8]; member 444 u32 challenge[8]; member
|
A D | domain.c | 710 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 726 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key() 727 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key() 749 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
|
A D | icm.c | 531 const u8 *challenge, u8 *response) in icm_fr_challenge_switch_key() argument 542 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); in icm_fr_challenge_switch_key() 1099 const u8 *challenge, u8 *response) in icm_tr_challenge_switch_key() argument 1111 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); in icm_tr_challenge_switch_key()
|
/linux/Documentation/devicetree/bindings/i2c/ |
A D | i2c-arb-gpio-challenge.txt | 3 This uses GPIO lines and a challenge & response mechanism to arbitrate who is 43 - compatible: i2c-arb-gpio-challenge 64 compatible = "i2c-arb-gpio-challenge";
|
/linux/drivers/i2c/muxes/ |
A D | Makefile | 5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
|
A D | Kconfig | 15 I2C multimaster arbitration scheme using GPIOs and a challenge & 20 will be called i2c-arb-gpio-challenge.
|
/linux/fs/cifs/ |
A D | cifsencrypt.c | 516 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response() 538 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 541 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 544 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
|
/linux/drivers/net/wireless/intersil/hostap/ |
A D | hostap_ap.c | 137 kfree(sta->u.sta.challenge); in ap_free_sta() 1362 challenge = (char *) (u + 2); in handle_authen() 1374 sta->u.sta.challenge = NULL; in handle_authen() 1424 if (sta->u.sta.challenge == NULL) { in handle_authen() 1425 sta->u.sta.challenge = in handle_authen() 1433 if (sta->u.sta.challenge == NULL || in handle_authen() 1434 challenge == NULL || in handle_authen() 1435 memcmp(sta->u.sta.challenge, challenge, in handle_authen() 1450 kfree(sta->u.sta.challenge); in handle_authen() 1451 sta->u.sta.challenge = NULL; in handle_authen() [all …]
|
A D | hostap_ap.h | 87 char *challenge; /* shared key authentication member
|
/linux/drivers/staging/greybus/Documentation/firmware/ |
A D | authenticate.c | 26 .challenge = {0},
|
/linux/drivers/staging/wlan-ng/ |
A D | p80211mgmt.h | 291 u8 challenge[1]; member 481 struct wlan_ie_challenge *challenge; member
|
/linux/net/ceph/ |
A D | auth_x.c | 793 void *challenge, int challenge_len, in decrypt_authorizer_challenge() argument 800 ret = __ceph_x_decrypt(secret, challenge, challenge_len); in decrypt_authorizer_challenge() 805 dp = challenge + sizeof(struct ceph_x_encrypt_header); in decrypt_authorizer_challenge() 819 void *challenge, int challenge_len) in ceph_x_add_authorizer_challenge() argument 825 ret = decrypt_authorizer_challenge(&au->session_key, challenge, in ceph_x_add_authorizer_challenge()
|
/linux/drivers/staging/rtl8192u/ieee80211/ |
A D | ieee80211_softmac.c | 1220 u8 *challenge, in ieee80211_auth_challenge() argument 1238 memcpy(c, challenge, chlen); in ieee80211_auth_challenge() 1248 kfree(challenge); in ieee80211_auth_challenge() 1464 static inline u16 auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) in auth_parse() argument 1472 *challenge = NULL; in auth_parse() 1479 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1480 if (!*challenge) in auth_parse() 1830 u8 *challenge; in ieee80211_check_auth_response() local 1834 errcode = auth_parse(skb, &challenge, &chlen); in ieee80211_check_auth_response() 1836 if (ieee->open_wep || !challenge) { in ieee80211_check_auth_response() [all …]
|
/linux/drivers/media/usb/hdpvr/ |
A D | hdpvr-core.c | 69 static void challenge(u8 *bytes) in challenge() function 175 challenge(response); in device_authorization()
|
/linux/drivers/staging/rtl8192e/ |
A D | rtllib_softmac.c | 1451 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, in rtllib_auth_challenge() argument 1469 memcpy(c, challenge, chlen); in rtllib_auth_challenge() 1480 kfree(challenge); in rtllib_auth_challenge() 1768 u8 **challenge, int *chlen) in auth_parse() argument 1778 *challenge = NULL; in auth_parse() 1785 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1786 if (!*challenge) in auth_parse() 2282 u8 *challenge; in rtllib_rx_auth_resp() local 2286 errcode = auth_parse(ieee->dev, skb, &challenge, &chlen); in rtllib_rx_auth_resp() 2297 if (ieee->open_wep || !challenge) { in rtllib_rx_auth_resp() [all …]
|
/linux/drivers/firmware/tegra/ |
A D | bpmp.c | 538 response.reply = request->challenge << 1; in tegra_bpmp_mrq_handle_ping() 553 request.challenge = 1; in tegra_bpmp_ping() 573 request.challenge, response.reply, in tegra_bpmp_ping()
|
/linux/Documentation/riscv/ |
A D | patch-acceptance.rst | 13 challenge for RISC-V Linux maintenance. Linux maintainers disapprove
|
/linux/Documentation/admin-guide/ |
A D | thunderbolt.rst | 69 a challenge that should match the expected one based on a random key 148 Next time the device is plugged in the user can verify (challenge) the 154 If the challenge the device returns back matches the one we expect based 156 However, if the challenge fails no tunnels are created and error is
|
/linux/include/soc/tegra/ |
A D | bpmp-abi.h | 236 uint32_t challenge; member 493 uint32_t challenge; member
|
/linux/Documentation/ABI/testing/ |
A D | sysfs-bus-thunderbolt | 91 2 Send a challenge based on the 32 byte hex string. If the 92 challenge response from device is valid, the device is 95 EKEYREJECTED if the challenge response did not match.
|