| /OK3568_Linux_fs/kernel/drivers/staging/greybus/ |
| H A D | authentication.c | 141 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument 161 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate() 246 authenticate->challenge, in cap_ioctl()
|
| H A D | greybus_authentication.h | 62 __u8 challenge[32]; member
|
| /OK3568_Linux_fs/kernel/drivers/target/iscsi/ |
| H A D | iscsi_target_auth.c | 51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge() 53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge() 57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge() 347 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash() 431 !memcmp(initiatorchg_binhex, chap->challenge, in chap_server_compute_hash()
|
| H A D | iscsi_target_auth.h | 37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
|
| /OK3568_Linux_fs/kernel/net/rxrpc/ |
| H A D | rxkad.c | 643 struct rxkad_challenge challenge; in rxkad_issue_challenge() local 659 challenge.version = htonl(2); in rxkad_issue_challenge() 660 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge() 661 challenge.min_level = htonl(0); in rxkad_issue_challenge() 662 challenge.__padding = 0; in rxkad_issue_challenge() 683 iov[1].iov_base = &challenge; in rxkad_issue_challenge() 684 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge() 813 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local 835 &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge() 838 version = ntohl(challenge.version); in rxkad_respond_to_challenge() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/thunderbolt/ |
| H A D | tb_msgs.h | 250 u32 challenge[8]; member 259 u32 challenge[8]; member 411 u32 challenge[8]; member 441 u32 challenge[8]; member
|
| H A D | domain.c | 673 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 689 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key() 690 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key() 712 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
|
| /OK3568_Linux_fs/kernel/Documentation/devicetree/bindings/i2c/ |
| H A D | i2c-arb-gpio-challenge.txt | 3 This uses GPIO lines and a challenge & response mechanism to arbitrate who is 43 - compatible: i2c-arb-gpio-challenge 64 compatible = "i2c-arb-gpio-challenge";
|
| /OK3568_Linux_fs/tools/linux/Linux_SecurityAVB/ |
| H A D | avb_user_tool.sh | 115 …python $SCRIPTS/avb-challenge-verify.py raw_unlock_challenge.bin $KEYS/product_id.bin # Generate u… 116 …ik_certificate.bin --unlock_key_certificate=$KEYS/puk_certificate.bin --challenge=unlock_challenge…
|
| /OK3568_Linux_fs/u-boot/drivers/i2c/muxes/ |
| H A D | Makefile | 6 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
|
| /OK3568_Linux_fs/external/rkwifibt/drivers/bcmdhd/include/ |
| H A D | eap.h | 98 unsigned char challenge[LEAP_CHALLENGE_LEN]; /* random */ member
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/rkwifi/bcmdhd/include/ |
| H A D | eap.h | 98 unsigned char challenge[LEAP_CHALLENGE_LEN]; /* random */ member
|
| /OK3568_Linux_fs/kernel/drivers/i2c/muxes/ |
| H A D | Makefile | 5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
|
| H A D | Kconfig | 15 I2C multimaster arbitration scheme using GPIOs and a challenge & 20 will be called i2c-arb-gpio-challenge.
|
| /OK3568_Linux_fs/u-boot/include/android_avb/ |
| H A D | avb_atx_types.h | 83 uint8_t challenge[AVB_ATX_UNLOCK_CHALLENGE_SIZE]; member
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/intersil/hostap/ |
| H A D | hostap_ap.c | 137 kfree(sta->u.sta.challenge); in ap_free_sta() 1290 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; in handle_authen() local 1362 challenge = (char *) (u + 2); in handle_authen() 1374 sta->u.sta.challenge = NULL; in handle_authen() 1386 sta->u.sta.challenge != NULL)))) { in handle_authen() 1424 if (sta->u.sta.challenge == NULL) { in handle_authen() 1425 sta->u.sta.challenge = in handle_authen() 1427 if (sta->u.sta.challenge == NULL) { in handle_authen() 1433 if (sta->u.sta.challenge == NULL || in handle_authen() 1434 challenge == NULL || in handle_authen() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/staging/greybus/Documentation/firmware/ |
| H A D | authenticate.c | 26 .challenge = {0},
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-connectivity/krb5/krb5/ |
| H A D | CVE-2021-36222.patch | 4 Subject: [PATCH] Fix KDC null deref on bad encrypted challenge 78 +# CVE-2021-36222 KDC null dereference on encrypted challenge preauth
|
| /OK3568_Linux_fs/kernel/drivers/staging/wlan-ng/ |
| H A D | p80211mgmt.h | 291 u8 challenge[1]; member 481 struct wlan_ie_challenge *challenge; member
|
| /OK3568_Linux_fs/kernel/fs/cifs/ |
| H A D | cifsencrypt.c | 610 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response() 632 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 635 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 638 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
|
| /OK3568_Linux_fs/u-boot/arch/arm/include/asm/arch-tegra/ |
| H A D | bpmp_abi.h | 209 uint32_t challenge; member 432 uint32_t challenge; member
|
| /OK3568_Linux_fs/buildroot/package/uacme/ |
| H A D | Config.in | 26 challenge responder.
|
| /OK3568_Linux_fs/kernel/drivers/staging/rtl8192u/ieee80211/ |
| H A D | ieee80211_softmac.c | 1220 u8 *challenge, in ieee80211_auth_challenge() argument 1238 memcpy(c, challenge, chlen); in ieee80211_auth_challenge() 1248 kfree(challenge); in ieee80211_auth_challenge() 1464 static inline u16 auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) in auth_parse() argument 1472 *challenge = NULL; in auth_parse() 1479 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1480 if (!*challenge) in auth_parse() 1830 u8 *challenge; in ieee80211_check_auth_response() local 1834 errcode = auth_parse(skb, &challenge, &chlen); in ieee80211_check_auth_response() 1836 if (ieee->open_wep || !challenge) { in ieee80211_check_auth_response() [all …]
|
| /OK3568_Linux_fs/buildroot/package/dehydrated/ |
| H A D | Config.in | 24 (/var/www/dehydrated) as /.well-known/acme-challenge
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/dropbear/dropbear/ |
| H A D | 0005-dropbear-enable-pam.patch | 32 * PAM challenge/response.
|