/linux-3.4.99/drivers/target/iscsi/ |
D | iscsi_target_auth.c | 89 chap_set_random(chap->challenge, CHAP_CHALLENGE_LENGTH); in chap_gen_challenge() 90 chap_binaryhex_to_asciihex(challenge_asciihex, chap->challenge, in chap_gen_challenge() 172 unsigned char identifier[10], *challenge = NULL; in chap_server_compute_md5() local 192 challenge = kzalloc(CHAP_CHALLENGE_STR_LEN, GFP_KERNEL); in chap_server_compute_md5() 193 if (!challenge) { in chap_server_compute_md5() 270 sg_init_one(&sg, chap->challenge, CHAP_CHALLENGE_LENGTH); in chap_server_compute_md5() 300 kfree(challenge); in chap_server_compute_md5() 328 challenge, &type) < 0) { in chap_server_compute_md5() 337 pr_debug("[server] Got CHAP_C=%s\n", challenge); in chap_server_compute_md5() 338 challenge_len = chap_string_to_hex(challenge_binhex, challenge, in chap_server_compute_md5() [all …]
|
D | iscsi_target_auth.h | 26 unsigned char challenge[CHAP_CHALLENGE_LENGTH]; member
|
/linux-3.4.99/net/rxrpc/ |
D | rxkad.c | 569 struct rxkad_challenge challenge; in rxkad_issue_challenge() local 584 challenge.version = htonl(2); in rxkad_issue_challenge() 585 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge() 586 challenge.min_level = htonl(0); in rxkad_issue_challenge() 587 challenge.__padding = 0; in rxkad_issue_challenge() 608 iov[1].iov_base = &challenge; in rxkad_issue_challenge() 609 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge() 743 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local 765 if (skb_copy_bits(skb, 0, &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge() 768 version = ntohl(challenge.version); in rxkad_respond_to_challenge() [all …]
|
/linux-3.4.99/drivers/staging/wlan-ng/ |
D | p80211mgmt.h | 290 u8 challenge[1]; member 480 wlan_ie_challenge_t *challenge; member
|
/linux-3.4.99/drivers/net/wireless/hostap/ |
D | hostap_ap.c | 143 if (!sta->ap && sta->u.sta.challenge) in ap_free_sta() 144 kfree(sta->u.sta.challenge); in ap_free_sta() 1289 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; in handle_authen() local 1361 challenge = (char *) (u + 2); in handle_authen() 1373 sta->u.sta.challenge = NULL; in handle_authen() 1385 sta->u.sta.challenge != NULL)))) { in handle_authen() 1423 if (sta->u.sta.challenge == NULL) { in handle_authen() 1424 sta->u.sta.challenge = in handle_authen() 1426 if (sta->u.sta.challenge == NULL) { in handle_authen() 1432 if (sta->u.sta.challenge == NULL || in handle_authen() [all …]
|
D | hostap_ap.h | 86 char *challenge; /* shared key authentication member
|
/linux-3.4.99/drivers/staging/rtl8187se/ieee80211/ |
D | ieee80211_softmac.c | 1200 void ieee80211_rtl_auth_challenge(struct ieee80211_device *ieee, u8 *challenge, int chlen) in ieee80211_rtl_auth_challenge() argument 1217 memcpy(c, challenge, chlen); in ieee80211_rtl_auth_challenge() 1231 kfree(challenge); in ieee80211_rtl_auth_challenge() 1423 static inline u16 auth_parse(struct sk_buff *skb, u8** challenge, int *chlen) in auth_parse() argument 1431 *challenge = NULL; in auth_parse() 1438 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1439 if (!*challenge) in auth_parse() 1777 u8* challenge=NULL; in ieee80211_rx_frame_softmac() local 1897 if (0 == (errcode=auth_parse(skb, &challenge, &chlen))){ in ieee80211_rx_frame_softmac() 1898 if(ieee->open_wep || !challenge){ in ieee80211_rx_frame_softmac() [all …]
|
/linux-3.4.99/drivers/media/video/hdpvr/ |
D | hdpvr-core.c | 79 static void challenge(u8 *bytes) in challenge() function 194 challenge(response); in device_authorization()
|
/linux-3.4.99/drivers/staging/rtl8192u/ieee80211/ |
D | ieee80211_softmac.c | 1283 void ieee80211_auth_challenge(struct ieee80211_device *ieee, u8 *challenge, int chlen) in ieee80211_auth_challenge() argument 1300 memcpy(c, challenge, chlen); in ieee80211_auth_challenge() 1310 kfree(challenge); in ieee80211_auth_challenge() 1537 static inline u16 auth_parse(struct sk_buff *skb, u8** challenge, int *chlen) in auth_parse() argument 1545 *challenge = NULL; in auth_parse() 1552 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1553 if (!*challenge) in auth_parse() 1927 u8* challenge; in ieee80211_rx_frame_softmac() local 2018 if (0 == (errcode=auth_parse(skb, &challenge, &chlen))){ in ieee80211_rx_frame_softmac() 2019 if(ieee->open_wep || !challenge){ in ieee80211_rx_frame_softmac() [all …]
|
/linux-3.4.99/drivers/staging/rtl8192e/ |
D | rtllib_softmac.c | 1477 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, int chlen) in rtllib_auth_challenge() argument 1494 memcpy(c, challenge, chlen); in rtllib_auth_challenge() 1505 kfree(challenge); in rtllib_auth_challenge() 1787 static inline u16 auth_parse(struct sk_buff *skb, u8** challenge, int *chlen) in auth_parse() argument 1796 *challenge = NULL; in auth_parse() 1803 *challenge = kmalloc(*chlen, GFP_ATOMIC); in auth_parse() 1804 memcpy(*challenge, t, *chlen); /*TODO - check here*/ in auth_parse() 2301 u8 *challenge; in rtllib_rx_auth() local 2310 errcode = auth_parse(skb, &challenge, &chlen); in rtllib_rx_auth() 2312 if (ieee->open_wep || !challenge) { in rtllib_rx_auth() [all …]
|
/linux-3.4.99/Documentation/scheduler/ |
D | sched-rt-group.txt | 177 the biggest challenge as the current linux PI infrastructure is geared towards
|
/linux-3.4.99/Documentation/sound/alsa/ |
D | compress_offload.txt | 10 returned values in frames are the norm, making it a challenge to
|
/linux-3.4.99/Documentation/networking/ |
D | rxrpc.txt | 137 requested, the server then issues a "challenge" and then the client 250 (*) Aborts, busy notifications and challenge packets are delivered by recvmsg, 273 in the keyring and then sends a challenge packet to the client and
|
/linux-3.4.99/net/mac80211/ |
D | ieee80211_i.h | 1115 u8 *challenge; member
|
D | util.c | 667 elems->challenge = pos; in ieee802_11_parse_elems_crc()
|
D | mlme.c | 1773 if (!elems.challenge) in ieee80211_auth_challenge() 1777 elems.challenge - 2, elems.challenge_len + 2, in ieee80211_auth_challenge()
|
/linux-3.4.99/Documentation/filesystems/ |
D | seq_file.txt | 16 Creating those files correctly has always been a bit of a challenge,
|
/linux-3.4.99/Documentation/virtual/kvm/ |
D | mmu.txt | 70 The primary challenge is to encode between 1 and 3 translations into hardware
|
D | timekeeping.txt | 529 Additionally, this lack of serialization from the TSC poses another challenge
|
/linux-3.4.99/net/ipv4/ |
D | Kconfig | 287 say Y here, the TCP/IP stack will use a cryptographic challenge
|
/linux-3.4.99/drivers/net/wireless/ |
D | atmel.c | 2885 u8 *challenge, int challenge_len) in send_authentication_request() argument 2911 memcpy(auth.chall_text, challenge, challenge_len); in send_authentication_request()
|
/linux-3.4.99/Documentation/ |
D | CodingStyle | 662 Coming up with good debugging messages can be quite a challenge; and once
|
/linux-3.4.99/Documentation/RCU/ |
D | whatisRCU.txt | 15 getting there can sometimes be a challenge. Part of the problem is that
|