/drivers/target/iscsi/ |
H A D | iscsi_target_auth.h | 26 unsigned char challenge[CHAP_CHALLENGE_LENGTH]; member in struct:iscsi_chap
|
H A D | iscsi_target_auth.c | 89 chap_set_random(chap->challenge, CHAP_CHALLENGE_LENGTH); 90 chap_binaryhex_to_asciihex(challenge_asciihex, chap->challenge, 93 * Set CHAP_C, and copy the generated challenge into c_str. 171 unsigned char identifier[10], *challenge = NULL; local 190 challenge = kzalloc(CHAP_CHALLENGE_STR_LEN, GFP_KERNEL); 191 if (!challenge) { 192 pr_err("Unable to allocate challenge buffer\n"); 266 sg_init_one(&sg, chap->challenge, CHAP_CHALLENGE_LENGTH); 269 pr_err("crypto_hash_update() failed for challenge\n"); 296 kfree(challenge); [all...] |
/drivers/media/video/hdpvr/ |
H A D | hdpvr-core.c | 79 static void challenge(u8 *bytes) function 191 v4l2_dbg(MSG_INFO, hdpvr_debug, &dev->v4l2_dev, "challenge: %s\n", 194 challenge(response);
|
/drivers/net/wireless/hostap/ |
H A D | hostap_ap.h | 86 char *challenge; /* shared key authentication member in struct:sta_info::__anon3460::__anon3461 87 * challenge */
|
H A D | hostap_ap.c | 143 if (!sta->ap && sta->u.sta.challenge) 144 kfree(sta->u.sta.challenge); 1231 /* Generate challenge data for shared key authentication. IEEE 802.11 specifies 1232 * that WEP algorithm is used for generating challenge. This should be unique, 1234 * with pseudo random key and then use increasing IV to get unique challenge 1252 PDEBUG(DEBUG_AP, "AP: kmalloc failed for challenge\n"); 1289 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; local 1352 txt = "invalid challenge len"; 1357 txt = "challenge underflow"; 1361 challenge [all...] |
/drivers/staging/wlan-ng/ |
H A D | p80211mgmt.h | 117 /*-- values 17-31 reserved for challenge text extension --*/ 290 u8 challenge[1]; member in struct:wlan_ie_challenge 480 wlan_ie_challenge_t *challenge; member in struct:wlan_fr_authen
|
/drivers/staging/rtl8187se/ieee80211/ |
H A D | ieee80211_softmac.c | 1200 void ieee80211_rtl_auth_challenge(struct ieee80211_device *ieee, u8 *challenge, int chlen) argument 1217 memcpy(c, challenge, chlen); 1219 IEEE80211_DEBUG_MGMT("Sending authentication challenge response\n"); 1231 kfree(challenge); 1423 static inline u16 auth_parse(struct sk_buff *skb, u8** challenge, int *chlen) argument 1431 *challenge = NULL; 1438 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); 1439 if (!*challenge) 1777 u8* challenge=NULL; local 1897 if (0 == (errcode=auth_parse(skb, &challenge, [all...] |
/drivers/staging/rtl8192u/ieee80211/ |
H A D | ieee80211_softmac.c | 1283 void ieee80211_auth_challenge(struct ieee80211_device *ieee, u8 *challenge, int chlen) argument 1300 memcpy(c, challenge, chlen); 1302 IEEE80211_DEBUG_MGMT("Sending authentication challenge response\n"); 1310 kfree(challenge); 1537 static inline u16 auth_parse(struct sk_buff *skb, u8** challenge, int *chlen) argument 1545 *challenge = NULL; 1552 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); 1553 if (!*challenge) 1927 u8* challenge; local 2018 if (0 == (errcode=auth_parse(skb, &challenge, [all...] |
/drivers/staging/rtl8192e/ |
H A D | rtllib_softmac.c | 1477 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, int chlen) argument 1494 memcpy(c, challenge, chlen); 1496 RTLLIB_DEBUG_MGMT("Sending authentication challenge " 1505 kfree(challenge); 1787 static inline u16 auth_parse(struct sk_buff *skb, u8** challenge, int *chlen) argument 1796 *challenge = NULL; 1803 *challenge = kmalloc(*chlen, GFP_ATOMIC); 1804 memcpy(*challenge, t, *chlen); /*TODO - check here*/ 2301 u8 *challenge; local 2310 errcode = auth_parse(skb, &challenge, [all...] |
/drivers/net/wireless/ |
H A D | atmel.c | 2885 u8 *challenge, int challenge_len) 2911 memcpy(auth.chall_text, challenge, challenge_len); 2884 send_authentication_request(struct atmel_private *priv, u16 system, u8 *challenge, int challenge_len) argument
|