/kernel/linux/linux-5.10/drivers/staging/greybus/ |
D | authentication.c | 141 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument 161 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate() 246 authenticate->challenge, in cap_ioctl()
|
D | greybus_authentication.h | 62 __u8 challenge[32]; member
|
/kernel/linux/linux-5.10/drivers/target/iscsi/ |
D | iscsi_target_auth.c | 51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge() 53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge() 57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge() 347 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash() 431 !memcmp(initiatorchg_binhex, chap->challenge, in chap_server_compute_hash()
|
D | iscsi_target_auth.h | 37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
|
/kernel/linux/linux-5.10/net/rxrpc/ |
D | rxkad.c | 643 struct rxkad_challenge challenge; in rxkad_issue_challenge() local 659 challenge.version = htonl(2); in rxkad_issue_challenge() 660 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge() 661 challenge.min_level = htonl(0); in rxkad_issue_challenge() 662 challenge.__padding = 0; in rxkad_issue_challenge() 683 iov[1].iov_base = &challenge; in rxkad_issue_challenge() 684 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge() 813 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local 835 &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge() 838 version = ntohl(challenge.version); in rxkad_respond_to_challenge() [all …]
|
/kernel/linux/linux-5.10/Documentation/devicetree/bindings/i2c/ |
D | i2c-arb-gpio-challenge.txt | 3 This uses GPIO lines and a challenge & response mechanism to arbitrate who is 43 - compatible: i2c-arb-gpio-challenge 64 compatible = "i2c-arb-gpio-challenge";
|
/kernel/linux/linux-5.10/drivers/thunderbolt/ |
D | tb_msgs.h | 250 u32 challenge[8]; member 259 u32 challenge[8]; member 411 u32 challenge[8]; member 441 u32 challenge[8]; member
|
D | domain.c | 673 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 689 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key() 690 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key() 712 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
|
D | icm.c | 515 const u8 *challenge, u8 *response) in icm_fr_challenge_switch_key() argument 526 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); in icm_fr_challenge_switch_key() 1070 const u8 *challenge, u8 *response) in icm_tr_challenge_switch_key() argument 1082 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); in icm_tr_challenge_switch_key()
|
/kernel/linux/linux-5.10/drivers/i2c/muxes/ |
D | Makefile | 5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
|
D | Kconfig | 15 I2C multimaster arbitration scheme using GPIOs and a challenge & 20 will be called i2c-arb-gpio-challenge.
|
/kernel/linux/linux-5.10/drivers/staging/greybus/Documentation/firmware/ |
D | authenticate.c | 26 .challenge = {0},
|
D | firmware-management | 267 __u8 challenge[32]; 300 an Interface. The user needs to fill the 'auth_type', 'uid', and 'challenge'
|
/kernel/linux/linux-5.10/drivers/staging/wlan-ng/ |
D | p80211mgmt.h | 291 u8 challenge[1]; member 481 struct wlan_ie_challenge *challenge; member
|
/kernel/linux/linux-5.10/drivers/net/wireless/intersil/hostap/ |
D | hostap_ap.c | 137 kfree(sta->u.sta.challenge); in ap_free_sta() 1290 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; in handle_authen() local 1362 challenge = (char *) (u + 2); in handle_authen() 1374 sta->u.sta.challenge = NULL; in handle_authen() 1386 sta->u.sta.challenge != NULL)))) { in handle_authen() 1424 if (sta->u.sta.challenge == NULL) { in handle_authen() 1425 sta->u.sta.challenge = in handle_authen() 1427 if (sta->u.sta.challenge == NULL) { in handle_authen() 1433 if (sta->u.sta.challenge == NULL || in handle_authen() 1434 challenge == NULL || in handle_authen() [all …]
|
D | hostap_ap.h | 87 char *challenge; /* shared key authentication member
|
/kernel/linux/linux-5.10/fs/cifs/ |
D | cifsencrypt.c | 610 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response() 632 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 635 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 638 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
|
/kernel/linux/linux-5.10/drivers/media/usb/hdpvr/ |
D | hdpvr-core.c | 69 static void challenge(u8 *bytes) in challenge() function 175 challenge(response); in device_authorization()
|
/kernel/linux/linux-5.10/drivers/staging/rtl8192u/ieee80211/ |
D | ieee80211_softmac.c | 1220 u8 *challenge, in ieee80211_auth_challenge() argument 1238 memcpy(c, challenge, chlen); in ieee80211_auth_challenge() 1248 kfree(challenge); in ieee80211_auth_challenge() 1464 static inline u16 auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) in auth_parse() argument 1472 *challenge = NULL; in auth_parse() 1479 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1480 if (!*challenge) in auth_parse() 1830 u8 *challenge; in ieee80211_check_auth_response() local 1834 errcode = auth_parse(skb, &challenge, &chlen); in ieee80211_check_auth_response() 1836 if (ieee->open_wep || !challenge) { in ieee80211_check_auth_response() [all …]
|
/kernel/linux/linux-5.10/Documentation/riscv/ |
D | patch-acceptance.rst | 13 challenge for RISC-V Linux maintenance. Linux maintainers disapprove
|
/kernel/linux/linux-5.10/drivers/staging/rtl8192e/ |
D | rtllib_softmac.c | 1453 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, in rtllib_auth_challenge() argument 1471 memcpy(c, challenge, chlen); in rtllib_auth_challenge() 1482 kfree(challenge); in rtllib_auth_challenge() 1770 u8 **challenge, int *chlen) in auth_parse() argument 1780 *challenge = NULL; in auth_parse() 1787 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1788 if (!*challenge) in auth_parse() 2284 u8 *challenge; in rtllib_rx_auth_resp() local 2288 errcode = auth_parse(ieee->dev, skb, &challenge, &chlen); in rtllib_rx_auth_resp() 2299 if (ieee->open_wep || !challenge) { in rtllib_rx_auth_resp() [all …]
|
/kernel/linux/linux-5.10/drivers/firmware/tegra/ |
D | bpmp.c | 538 response.reply = request->challenge << 1; in tegra_bpmp_mrq_handle_ping() 553 request.challenge = 1; in tegra_bpmp_ping() 573 request.challenge, response.reply, in tegra_bpmp_ping()
|
/kernel/linux/linux-5.10/Documentation/admin-guide/ |
D | thunderbolt.rst | 66 a challenge that should match the expected one based on a random key 141 Next time the device is plugged in the user can verify (challenge) the 147 If the challenge the device returns back matches the one we expect based 149 However, if the challenge fails no tunnels are created and error is
|
/kernel/linux/linux-5.10/Documentation/ABI/testing/ |
D | sysfs-bus-thunderbolt | 77 2 Send a challenge based on the 32 byte hex string. If the 78 challenge response from device is valid, the device is 81 EKEYREJECTED if the challenge response did not match.
|
/kernel/linux/linux-5.10/include/soc/tegra/ |
D | bpmp-abi.h | 236 uint32_t challenge; member 493 uint32_t challenge; member
|