Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 123) sorted by relevance

12345

/OK3568_Linux_fs/kernel/drivers/staging/greybus/
H A Dauthentication.c141 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument
161 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate()
246 authenticate->challenge, in cap_ioctl()
H A Dgreybus_authentication.h62 __u8 challenge[32]; member
/OK3568_Linux_fs/kernel/drivers/target/iscsi/
H A Discsi_target_auth.c51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge()
53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge()
57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge()
347 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash()
431 !memcmp(initiatorchg_binhex, chap->challenge, in chap_server_compute_hash()
H A Discsi_target_auth.h37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
/OK3568_Linux_fs/kernel/net/rxrpc/
H A Drxkad.c643 struct rxkad_challenge challenge; in rxkad_issue_challenge() local
659 challenge.version = htonl(2); in rxkad_issue_challenge()
660 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge()
661 challenge.min_level = htonl(0); in rxkad_issue_challenge()
662 challenge.__padding = 0; in rxkad_issue_challenge()
683 iov[1].iov_base = &challenge; in rxkad_issue_challenge()
684 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge()
813 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local
835 &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge()
838 version = ntohl(challenge.version); in rxkad_respond_to_challenge()
[all …]
/OK3568_Linux_fs/kernel/drivers/thunderbolt/
H A Dtb_msgs.h250 u32 challenge[8]; member
259 u32 challenge[8]; member
411 u32 challenge[8]; member
441 u32 challenge[8]; member
H A Ddomain.c673 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local
689 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key()
690 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key()
712 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
/OK3568_Linux_fs/kernel/Documentation/devicetree/bindings/i2c/
H A Di2c-arb-gpio-challenge.txt3 This uses GPIO lines and a challenge & response mechanism to arbitrate who is
43 - compatible: i2c-arb-gpio-challenge
64 compatible = "i2c-arb-gpio-challenge";
/OK3568_Linux_fs/tools/linux/Linux_SecurityAVB/
H A Davb_user_tool.sh115 …python $SCRIPTS/avb-challenge-verify.py raw_unlock_challenge.bin $KEYS/product_id.bin # Generate u…
116 …ik_certificate.bin --unlock_key_certificate=$KEYS/puk_certificate.bin --challenge=unlock_challenge…
/OK3568_Linux_fs/u-boot/drivers/i2c/muxes/
H A DMakefile6 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
/OK3568_Linux_fs/external/rkwifibt/drivers/bcmdhd/include/
H A Deap.h98 unsigned char challenge[LEAP_CHALLENGE_LEN]; /* random */ member
/OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/rkwifi/bcmdhd/include/
H A Deap.h98 unsigned char challenge[LEAP_CHALLENGE_LEN]; /* random */ member
/OK3568_Linux_fs/kernel/drivers/i2c/muxes/
H A DMakefile5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
H A DKconfig15 I2C multimaster arbitration scheme using GPIOs and a challenge &
20 will be called i2c-arb-gpio-challenge.
/OK3568_Linux_fs/u-boot/include/android_avb/
H A Davb_atx_types.h83 uint8_t challenge[AVB_ATX_UNLOCK_CHALLENGE_SIZE]; member
/OK3568_Linux_fs/kernel/drivers/net/wireless/intersil/hostap/
H A Dhostap_ap.c137 kfree(sta->u.sta.challenge); in ap_free_sta()
1290 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; in handle_authen() local
1362 challenge = (char *) (u + 2); in handle_authen()
1374 sta->u.sta.challenge = NULL; in handle_authen()
1386 sta->u.sta.challenge != NULL)))) { in handle_authen()
1424 if (sta->u.sta.challenge == NULL) { in handle_authen()
1425 sta->u.sta.challenge = in handle_authen()
1427 if (sta->u.sta.challenge == NULL) { in handle_authen()
1433 if (sta->u.sta.challenge == NULL || in handle_authen()
1434 challenge == NULL || in handle_authen()
[all …]
/OK3568_Linux_fs/kernel/drivers/staging/greybus/Documentation/firmware/
H A Dauthenticate.c26 .challenge = {0},
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-connectivity/krb5/krb5/
H A DCVE-2021-36222.patch4 Subject: [PATCH] Fix KDC null deref on bad encrypted challenge
78 +# CVE-2021-36222 KDC null dereference on encrypted challenge preauth
/OK3568_Linux_fs/kernel/drivers/staging/wlan-ng/
H A Dp80211mgmt.h291 u8 challenge[1]; member
481 struct wlan_ie_challenge *challenge; member
/OK3568_Linux_fs/kernel/fs/cifs/
H A Dcifsencrypt.c610 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response()
632 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response()
635 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response()
638 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
/OK3568_Linux_fs/u-boot/arch/arm/include/asm/arch-tegra/
H A Dbpmp_abi.h209 uint32_t challenge; member
432 uint32_t challenge; member
/OK3568_Linux_fs/buildroot/package/uacme/
H A DConfig.in26 challenge responder.
/OK3568_Linux_fs/kernel/drivers/staging/rtl8192u/ieee80211/
H A Dieee80211_softmac.c1220 u8 *challenge, in ieee80211_auth_challenge() argument
1238 memcpy(c, challenge, chlen); in ieee80211_auth_challenge()
1248 kfree(challenge); in ieee80211_auth_challenge()
1464 static inline u16 auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) in auth_parse() argument
1472 *challenge = NULL; in auth_parse()
1479 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse()
1480 if (!*challenge) in auth_parse()
1830 u8 *challenge; in ieee80211_check_auth_response() local
1834 errcode = auth_parse(skb, &challenge, &chlen); in ieee80211_check_auth_response()
1836 if (ieee->open_wep || !challenge) { in ieee80211_check_auth_response()
[all …]
/OK3568_Linux_fs/buildroot/package/dehydrated/
H A DConfig.in24 (/var/www/dehydrated) as /.well-known/acme-challenge
/OK3568_Linux_fs/yocto/poky/meta/recipes-core/dropbear/dropbear/
H A D0005-dropbear-enable-pam.patch32 * PAM challenge/response.

12345