Searched defs:challenge (Results 1 - 10 of 10) sorted by relevance

/drivers/target/iscsi/
H A Discsi_target_auth.h26 unsigned char challenge[CHAP_CHALLENGE_LENGTH]; member in struct:iscsi_chap
H A Discsi_target_auth.c89 chap_set_random(chap->challenge, CHAP_CHALLENGE_LENGTH);
90 chap_binaryhex_to_asciihex(challenge_asciihex, chap->challenge,
93 * Set CHAP_C, and copy the generated challenge into c_str.
171 unsigned char identifier[10], *challenge = NULL; local
190 challenge = kzalloc(CHAP_CHALLENGE_STR_LEN, GFP_KERNEL);
191 if (!challenge) {
192 pr_err("Unable to allocate challenge buffer\n");
266 sg_init_one(&sg, chap->challenge, CHAP_CHALLENGE_LENGTH);
269 pr_err("crypto_hash_update() failed for challenge\n");
296 kfree(challenge);
[all...]
/drivers/media/video/hdpvr/
H A Dhdpvr-core.c79 static void challenge(u8 *bytes) function
191 v4l2_dbg(MSG_INFO, hdpvr_debug, &dev->v4l2_dev, "challenge: %s\n",
194 challenge(response);
/drivers/net/wireless/hostap/
H A Dhostap_ap.h86 char *challenge; /* shared key authentication member in struct:sta_info::__anon3460::__anon3461
87 * challenge */
H A Dhostap_ap.c143 if (!sta->ap && sta->u.sta.challenge)
144 kfree(sta->u.sta.challenge);
1231 /* Generate challenge data for shared key authentication. IEEE 802.11 specifies
1232 * that WEP algorithm is used for generating challenge. This should be unique,
1234 * with pseudo random key and then use increasing IV to get unique challenge
1252 PDEBUG(DEBUG_AP, "AP: kmalloc failed for challenge\n");
1289 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; local
1352 txt = "invalid challenge len";
1357 txt = "challenge underflow";
1361 challenge
[all...]
/drivers/staging/wlan-ng/
H A Dp80211mgmt.h117 /*-- values 17-31 reserved for challenge text extension --*/
290 u8 challenge[1]; member in struct:wlan_ie_challenge
480 wlan_ie_challenge_t *challenge; member in struct:wlan_fr_authen
/drivers/staging/rtl8187se/ieee80211/
H A Dieee80211_softmac.c1200 void ieee80211_rtl_auth_challenge(struct ieee80211_device *ieee, u8 *challenge, int chlen) argument
1217 memcpy(c, challenge, chlen);
1219 IEEE80211_DEBUG_MGMT("Sending authentication challenge response\n");
1231 kfree(challenge);
1423 static inline u16 auth_parse(struct sk_buff *skb, u8** challenge, int *chlen) argument
1431 *challenge = NULL;
1438 *challenge = kmemdup(t, *chlen, GFP_ATOMIC);
1439 if (!*challenge)
1777 u8* challenge=NULL; local
1897 if (0 == (errcode=auth_parse(skb, &challenge,
[all...]
/drivers/staging/rtl8192u/ieee80211/
H A Dieee80211_softmac.c1283 void ieee80211_auth_challenge(struct ieee80211_device *ieee, u8 *challenge, int chlen) argument
1300 memcpy(c, challenge, chlen);
1302 IEEE80211_DEBUG_MGMT("Sending authentication challenge response\n");
1310 kfree(challenge);
1537 static inline u16 auth_parse(struct sk_buff *skb, u8** challenge, int *chlen) argument
1545 *challenge = NULL;
1552 *challenge = kmemdup(t, *chlen, GFP_ATOMIC);
1553 if (!*challenge)
1927 u8* challenge; local
2018 if (0 == (errcode=auth_parse(skb, &challenge,
[all...]
/drivers/staging/rtl8192e/
H A Drtllib_softmac.c1477 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, int chlen) argument
1494 memcpy(c, challenge, chlen);
1496 RTLLIB_DEBUG_MGMT("Sending authentication challenge "
1505 kfree(challenge);
1787 static inline u16 auth_parse(struct sk_buff *skb, u8** challenge, int *chlen) argument
1796 *challenge = NULL;
1803 *challenge = kmalloc(*chlen, GFP_ATOMIC);
1804 memcpy(*challenge, t, *chlen); /*TODO - check here*/
2301 u8 *challenge; local
2310 errcode = auth_parse(skb, &challenge,
[all...]
/drivers/net/wireless/
H A Datmel.c2885 u8 *challenge, int challenge_len)
2911 memcpy(auth.chall_text, challenge, challenge_len);
2884 send_authentication_request(struct atmel_private *priv, u16 system, u8 *challenge, int challenge_len) argument

Completed in 2614 milliseconds