Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 23 of 23) sorted by relevance

/linux-3.4.99/drivers/target/iscsi/
Discsi_target_auth.c89 chap_set_random(chap->challenge, CHAP_CHALLENGE_LENGTH); in chap_gen_challenge()
90 chap_binaryhex_to_asciihex(challenge_asciihex, chap->challenge, in chap_gen_challenge()
172 unsigned char identifier[10], *challenge = NULL; in chap_server_compute_md5() local
192 challenge = kzalloc(CHAP_CHALLENGE_STR_LEN, GFP_KERNEL); in chap_server_compute_md5()
193 if (!challenge) { in chap_server_compute_md5()
270 sg_init_one(&sg, chap->challenge, CHAP_CHALLENGE_LENGTH); in chap_server_compute_md5()
300 kfree(challenge); in chap_server_compute_md5()
328 challenge, &type) < 0) { in chap_server_compute_md5()
337 pr_debug("[server] Got CHAP_C=%s\n", challenge); in chap_server_compute_md5()
338 challenge_len = chap_string_to_hex(challenge_binhex, challenge, in chap_server_compute_md5()
[all …]
Discsi_target_auth.h26 unsigned char challenge[CHAP_CHALLENGE_LENGTH]; member
/linux-3.4.99/net/rxrpc/
Drxkad.c569 struct rxkad_challenge challenge; in rxkad_issue_challenge() local
584 challenge.version = htonl(2); in rxkad_issue_challenge()
585 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge()
586 challenge.min_level = htonl(0); in rxkad_issue_challenge()
587 challenge.__padding = 0; in rxkad_issue_challenge()
608 iov[1].iov_base = &challenge; in rxkad_issue_challenge()
609 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge()
743 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local
765 if (skb_copy_bits(skb, 0, &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge()
768 version = ntohl(challenge.version); in rxkad_respond_to_challenge()
[all …]
/linux-3.4.99/drivers/staging/wlan-ng/
Dp80211mgmt.h290 u8 challenge[1]; member
480 wlan_ie_challenge_t *challenge; member
/linux-3.4.99/drivers/net/wireless/hostap/
Dhostap_ap.c143 if (!sta->ap && sta->u.sta.challenge) in ap_free_sta()
144 kfree(sta->u.sta.challenge); in ap_free_sta()
1289 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; in handle_authen() local
1361 challenge = (char *) (u + 2); in handle_authen()
1373 sta->u.sta.challenge = NULL; in handle_authen()
1385 sta->u.sta.challenge != NULL)))) { in handle_authen()
1423 if (sta->u.sta.challenge == NULL) { in handle_authen()
1424 sta->u.sta.challenge = in handle_authen()
1426 if (sta->u.sta.challenge == NULL) { in handle_authen()
1432 if (sta->u.sta.challenge == NULL || in handle_authen()
[all …]
Dhostap_ap.h86 char *challenge; /* shared key authentication member
/linux-3.4.99/drivers/staging/rtl8187se/ieee80211/
Dieee80211_softmac.c1200 void ieee80211_rtl_auth_challenge(struct ieee80211_device *ieee, u8 *challenge, int chlen) in ieee80211_rtl_auth_challenge() argument
1217 memcpy(c, challenge, chlen); in ieee80211_rtl_auth_challenge()
1231 kfree(challenge); in ieee80211_rtl_auth_challenge()
1423 static inline u16 auth_parse(struct sk_buff *skb, u8** challenge, int *chlen) in auth_parse() argument
1431 *challenge = NULL; in auth_parse()
1438 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse()
1439 if (!*challenge) in auth_parse()
1777 u8* challenge=NULL; in ieee80211_rx_frame_softmac() local
1897 if (0 == (errcode=auth_parse(skb, &challenge, &chlen))){ in ieee80211_rx_frame_softmac()
1898 if(ieee->open_wep || !challenge){ in ieee80211_rx_frame_softmac()
[all …]
/linux-3.4.99/drivers/media/video/hdpvr/
Dhdpvr-core.c79 static void challenge(u8 *bytes) in challenge() function
194 challenge(response); in device_authorization()
/linux-3.4.99/drivers/staging/rtl8192u/ieee80211/
Dieee80211_softmac.c1283 void ieee80211_auth_challenge(struct ieee80211_device *ieee, u8 *challenge, int chlen) in ieee80211_auth_challenge() argument
1300 memcpy(c, challenge, chlen); in ieee80211_auth_challenge()
1310 kfree(challenge); in ieee80211_auth_challenge()
1537 static inline u16 auth_parse(struct sk_buff *skb, u8** challenge, int *chlen) in auth_parse() argument
1545 *challenge = NULL; in auth_parse()
1552 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse()
1553 if (!*challenge) in auth_parse()
1927 u8* challenge; in ieee80211_rx_frame_softmac() local
2018 if (0 == (errcode=auth_parse(skb, &challenge, &chlen))){ in ieee80211_rx_frame_softmac()
2019 if(ieee->open_wep || !challenge){ in ieee80211_rx_frame_softmac()
[all …]
/linux-3.4.99/drivers/staging/rtl8192e/
Drtllib_softmac.c1477 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, int chlen) in rtllib_auth_challenge() argument
1494 memcpy(c, challenge, chlen); in rtllib_auth_challenge()
1505 kfree(challenge); in rtllib_auth_challenge()
1787 static inline u16 auth_parse(struct sk_buff *skb, u8** challenge, int *chlen) in auth_parse() argument
1796 *challenge = NULL; in auth_parse()
1803 *challenge = kmalloc(*chlen, GFP_ATOMIC); in auth_parse()
1804 memcpy(*challenge, t, *chlen); /*TODO - check here*/ in auth_parse()
2301 u8 *challenge; in rtllib_rx_auth() local
2310 errcode = auth_parse(skb, &challenge, &chlen); in rtllib_rx_auth()
2312 if (ieee->open_wep || !challenge) { in rtllib_rx_auth()
[all …]
/linux-3.4.99/Documentation/scheduler/
Dsched-rt-group.txt177 the biggest challenge as the current linux PI infrastructure is geared towards
/linux-3.4.99/Documentation/sound/alsa/
Dcompress_offload.txt10 returned values in frames are the norm, making it a challenge to
/linux-3.4.99/Documentation/networking/
Drxrpc.txt137 requested, the server then issues a "challenge" and then the client
250 (*) Aborts, busy notifications and challenge packets are delivered by recvmsg,
273 in the keyring and then sends a challenge packet to the client and
/linux-3.4.99/net/mac80211/
Dieee80211_i.h1115 u8 *challenge; member
Dutil.c667 elems->challenge = pos; in ieee802_11_parse_elems_crc()
Dmlme.c1773 if (!elems.challenge) in ieee80211_auth_challenge()
1777 elems.challenge - 2, elems.challenge_len + 2, in ieee80211_auth_challenge()
/linux-3.4.99/Documentation/filesystems/
Dseq_file.txt16 Creating those files correctly has always been a bit of a challenge,
/linux-3.4.99/Documentation/virtual/kvm/
Dmmu.txt70 The primary challenge is to encode between 1 and 3 translations into hardware
Dtimekeeping.txt529 Additionally, this lack of serialization from the TSC poses another challenge
/linux-3.4.99/net/ipv4/
DKconfig287 say Y here, the TCP/IP stack will use a cryptographic challenge
/linux-3.4.99/drivers/net/wireless/
Datmel.c2885 u8 *challenge, int challenge_len) in send_authentication_request() argument
2911 memcpy(auth.chall_text, challenge, challenge_len); in send_authentication_request()
/linux-3.4.99/Documentation/
DCodingStyle662 Coming up with good debugging messages can be quite a challenge; and once
/linux-3.4.99/Documentation/RCU/
DwhatisRCU.txt15 getting there can sometimes be a challenge. Part of the problem is that