Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 55) sorted by relevance

123

/kernel/linux/linux-5.10/drivers/staging/greybus/
Dauthentication.c141 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument
161 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate()
246 authenticate->challenge, in cap_ioctl()
Dgreybus_authentication.h62 __u8 challenge[32]; member
/kernel/linux/linux-5.10/drivers/target/iscsi/
Discsi_target_auth.c51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge()
53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge()
57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge()
347 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash()
431 !memcmp(initiatorchg_binhex, chap->challenge, in chap_server_compute_hash()
Discsi_target_auth.h37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
/kernel/linux/linux-5.10/net/rxrpc/
Drxkad.c643 struct rxkad_challenge challenge; in rxkad_issue_challenge() local
659 challenge.version = htonl(2); in rxkad_issue_challenge()
660 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge()
661 challenge.min_level = htonl(0); in rxkad_issue_challenge()
662 challenge.__padding = 0; in rxkad_issue_challenge()
683 iov[1].iov_base = &challenge; in rxkad_issue_challenge()
684 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge()
813 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local
835 &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge()
838 version = ntohl(challenge.version); in rxkad_respond_to_challenge()
[all …]
/kernel/linux/linux-5.10/Documentation/devicetree/bindings/i2c/
Di2c-arb-gpio-challenge.txt3 This uses GPIO lines and a challenge & response mechanism to arbitrate who is
43 - compatible: i2c-arb-gpio-challenge
64 compatible = "i2c-arb-gpio-challenge";
/kernel/linux/linux-5.10/drivers/thunderbolt/
Dtb_msgs.h250 u32 challenge[8]; member
259 u32 challenge[8]; member
411 u32 challenge[8]; member
441 u32 challenge[8]; member
Ddomain.c673 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local
689 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key()
690 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key()
712 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
Dicm.c515 const u8 *challenge, u8 *response) in icm_fr_challenge_switch_key() argument
526 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); in icm_fr_challenge_switch_key()
1070 const u8 *challenge, u8 *response) in icm_tr_challenge_switch_key() argument
1082 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); in icm_tr_challenge_switch_key()
/kernel/linux/linux-5.10/drivers/i2c/muxes/
DMakefile5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
DKconfig15 I2C multimaster arbitration scheme using GPIOs and a challenge &
20 will be called i2c-arb-gpio-challenge.
/kernel/linux/linux-5.10/drivers/staging/greybus/Documentation/firmware/
Dauthenticate.c26 .challenge = {0},
Dfirmware-management267 __u8 challenge[32];
300 an Interface. The user needs to fill the 'auth_type', 'uid', and 'challenge'
/kernel/linux/linux-5.10/drivers/staging/wlan-ng/
Dp80211mgmt.h291 u8 challenge[1]; member
481 struct wlan_ie_challenge *challenge; member
/kernel/linux/linux-5.10/drivers/net/wireless/intersil/hostap/
Dhostap_ap.c137 kfree(sta->u.sta.challenge); in ap_free_sta()
1290 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; in handle_authen() local
1362 challenge = (char *) (u + 2); in handle_authen()
1374 sta->u.sta.challenge = NULL; in handle_authen()
1386 sta->u.sta.challenge != NULL)))) { in handle_authen()
1424 if (sta->u.sta.challenge == NULL) { in handle_authen()
1425 sta->u.sta.challenge = in handle_authen()
1427 if (sta->u.sta.challenge == NULL) { in handle_authen()
1433 if (sta->u.sta.challenge == NULL || in handle_authen()
1434 challenge == NULL || in handle_authen()
[all …]
Dhostap_ap.h87 char *challenge; /* shared key authentication member
/kernel/linux/linux-5.10/fs/cifs/
Dcifsencrypt.c610 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response()
632 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response()
635 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response()
638 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
/kernel/linux/linux-5.10/drivers/media/usb/hdpvr/
Dhdpvr-core.c69 static void challenge(u8 *bytes) in challenge() function
175 challenge(response); in device_authorization()
/kernel/linux/linux-5.10/drivers/staging/rtl8192u/ieee80211/
Dieee80211_softmac.c1220 u8 *challenge, in ieee80211_auth_challenge() argument
1238 memcpy(c, challenge, chlen); in ieee80211_auth_challenge()
1248 kfree(challenge); in ieee80211_auth_challenge()
1464 static inline u16 auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) in auth_parse() argument
1472 *challenge = NULL; in auth_parse()
1479 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse()
1480 if (!*challenge) in auth_parse()
1830 u8 *challenge; in ieee80211_check_auth_response() local
1834 errcode = auth_parse(skb, &challenge, &chlen); in ieee80211_check_auth_response()
1836 if (ieee->open_wep || !challenge) { in ieee80211_check_auth_response()
[all …]
/kernel/linux/linux-5.10/Documentation/riscv/
Dpatch-acceptance.rst13 challenge for RISC-V Linux maintenance. Linux maintainers disapprove
/kernel/linux/linux-5.10/drivers/staging/rtl8192e/
Drtllib_softmac.c1453 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, in rtllib_auth_challenge() argument
1471 memcpy(c, challenge, chlen); in rtllib_auth_challenge()
1482 kfree(challenge); in rtllib_auth_challenge()
1770 u8 **challenge, int *chlen) in auth_parse() argument
1780 *challenge = NULL; in auth_parse()
1787 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse()
1788 if (!*challenge) in auth_parse()
2284 u8 *challenge; in rtllib_rx_auth_resp() local
2288 errcode = auth_parse(ieee->dev, skb, &challenge, &chlen); in rtllib_rx_auth_resp()
2299 if (ieee->open_wep || !challenge) { in rtllib_rx_auth_resp()
[all …]
/kernel/linux/linux-5.10/drivers/firmware/tegra/
Dbpmp.c538 response.reply = request->challenge << 1; in tegra_bpmp_mrq_handle_ping()
553 request.challenge = 1; in tegra_bpmp_ping()
573 request.challenge, response.reply, in tegra_bpmp_ping()
/kernel/linux/linux-5.10/Documentation/admin-guide/
Dthunderbolt.rst66 a challenge that should match the expected one based on a random key
141 Next time the device is plugged in the user can verify (challenge) the
147 If the challenge the device returns back matches the one we expect based
149 However, if the challenge fails no tunnels are created and error is
/kernel/linux/linux-5.10/Documentation/ABI/testing/
Dsysfs-bus-thunderbolt77 2 Send a challenge based on the 32 byte hex string. If the
78 challenge response from device is valid, the device is
81 EKEYREJECTED if the challenge response did not match.
/kernel/linux/linux-5.10/include/soc/tegra/
Dbpmp-abi.h236 uint32_t challenge; member
493 uint32_t challenge; member

123