| /linux/drivers/virt/coco/arm-cca-guest/ | 
| H A D | arm-cca-guest.c | 19  * @challenge:		Pointer to the challenge data20  * @challenge_size:	Size of the challenge data
 26 	void           *challenge;  member
 39 	info->result = rsi_attestation_token_init(info->challenge,  in arm_cca_attestation_init()
 75  * Initialise the attestation token generation using the challenge data
 80  * The challenge data must be at least 32 bytes and no more than 64 bytes. If
 113 	info.challenge = desc->inblob;  in arm_cca_report_new()
 
 | 
| /linux/net/rxrpc/ | 
| H A D | rxgk.c | 615  * Allocate memory to hold a challenge or a response packet.  We're not running630  * Issue a challenge.
 697  * Validate a challenge packet.
 729  * rxgk_kernel_query_challenge - Query RxGK-specific challenge parameters
 730  * @challenge: The challenge packet to query
 734 u32 rxgk_kernel_query_challenge(struct sk_buff *challenge)  in rxgk_kernel_query_challenge()  argument
 736 	struct rxrpc_skb_priv *sp = rxrpc_skb(challenge);  in rxgk_kernel_query_challenge()
 744  * challenge.
 747 				     struct sk_buff *challenge,  in rxgk_challenge_to_recvmsg()  argument
 830 					    struct sk_buff *challenge,  in rxgk_construct_authenticator()  argument
 [all …]
 
 | 
| H A D | rxkad.c | 640  * issue a challenge in rxkad_issue_challenge() 644 	struct rxkad_challenge challenge; in rxkad_issue_challenge()
 656 	challenge.version	= htonl(2); in rxkad_issue_challenge()
 657 	challenge.nonce		= htonl(conn->rxkad.nonce); in rxkad_issue_challenge()
 658 	challenge.min_level	= htonl(0); in rxkad_issue_challenge()
 659 	challenge.__padding	= 0; in rxkad_issue_challenge()
 680 	iov[1].iov_base	= &challenge; in rxkad_issue_challenge()
 681 	iov[1].iov_len	= sizeof(challenge); in rxkad_issue_challenge()
 755  * Validate a challenge packet.
 760 	struct rxkad_challenge challenge; in rxkad_calc_response_checksum()
 642 struct rxkad_challenge challenge; rxkad_issue_challenge()  local
 806 struct rxkad_challenge challenge; rxkad_respond_to_challenge()  local
 [all...]
 | 
| H A D | recvmsg.c | 184  * Deal with a CHALLENGE packet.187 				   struct sk_buff *challenge, unsigned int flags)  in rxrpc_recvmsg_challenge()  argument
 189 	struct rxrpc_skb_priv *sp = rxrpc_skb(challenge);  in rxrpc_recvmsg_challenge()
 192 	return conn->security->challenge_to_recvmsg(conn, challenge, msg);  in rxrpc_recvmsg_challenge()
 
 | 
| H A D | ar-internal.h | 43 	RXRPC_SKB_MARK_CHALLENGE,	/* Challenge notification */289 	/* issue a challenge */
 292 	/* Validate a challenge packet */
 296 	/* Fill out the cmsg for recvmsg() to pass on a challenge to userspace.
 300 				    struct sk_buff *challenge,
 303 	/* Parse sendmsg() control message and respond to challenge. */
 304 	int (*sendmsg_respond_to_challenge)(struct sk_buff *challenge,
 307 	/* respond to a challenge */
 309 				    struct sk_buff *challenge);
 475 	RXRPC_CONN_EV_CHALLENGE,	/* Send challenge packet */
 
 | 
| /linux/drivers/target/iscsi/ | 
| H A D | iscsi_target_auth.c | 51 	memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN);  in chap_gen_challenge()53 	ret = get_random_bytes_wait(chap->challenge, chap->challenge_len);  in chap_gen_challenge()
 57 	bin2hex(challenge_asciihex, chap->challenge,  in chap_gen_challenge()
 60 	 * Set CHAP_C, and copy the generated challenge into c_str.  in chap_gen_challenge()
 182 	/* Tie the challenge length to the digest size */  in chap_server_open()
 198 	 * Generate Challenge.  in chap_server_open()
 293 		pr_err("Unable to allocate challenge buffer\n");  in chap_server_compute_hash()
 390 	ret = crypto_shash_finup(desc, chap->challenge,  in chap_server_compute_hash()
 393 		pr_err("crypto_shash_finup() failed for challenge\n");  in chap_server_compute_hash()
 460 			pr_err("Unable to convert incoming challenge\n");  in chap_server_compute_hash()
 [all …]
 
 | 
| H A D | iscsi_target_auth.h | 37 	unsigned char	challenge[MAX_CHAP_CHALLENGE_LEN];  member
 | 
| /linux/drivers/nvme/target/ | 
| H A D | auth.c | 299 	u8 *challenge = req->sq->dhchap_c1;  in nvmet_auth_host_hash()  local337 		challenge = kmalloc(shash_len, GFP_KERNEL);  in nvmet_auth_host_hash()
 338 		if (!challenge) {  in nvmet_auth_host_hash()
 346 						    challenge, shash_len);  in nvmet_auth_host_hash()
 359 	ret = crypto_shash_update(shash, challenge, shash_len);  in nvmet_auth_host_hash()
 389 	if (challenge != req->sq->dhchap_c1)  in nvmet_auth_host_hash()
 390 		kfree(challenge);  in nvmet_auth_host_hash()
 405 	u8 *challenge = req->sq->dhchap_c2;  in nvmet_auth_ctrl_hash()  local
 443 		challenge = kmalloc(shash_len, GFP_KERNEL);  in nvmet_auth_ctrl_hash()
 444 		if (!challenge) {  in nvmet_auth_ctrl_hash()
 [all …]
 
 | 
| H A D | fabrics-cmd-auth.c | 186 		pr_debug("%s: ctrl %d qid %d invalid challenge\n",  in nvmet_auth_reply()197 		pr_debug("%s: ctrl %d qid %d challenge %*ph\n",  in nvmet_auth_reply()
 205 	 * is not performed, but a challenge value C2 is carried in order to  in nvmet_auth_reply()
 537 			pr_warn("ctrl %d qid %d: challenge error (%d)\n",  in nvmet_execute_auth_receive()
 
 | 
| /linux/Documentation/devicetree/bindings/i2c/ | 
| H A D | i2c-arb-gpio-challenge.yaml | 4 $id: http://devicetree.org/schemas/i2c/i2c-arb-gpio-challenge.yaml#7 title: GPIO-based I2C Arbitration Using a Challenge & Response Mechanism
 14   This uses GPIO lines and a challenge & response mechanism to arbitrate who is
 51     const: i2c-arb-gpio-challenge
 106         compatible = "i2c-arb-gpio-challenge";
 
 | 
| /linux/tools/testing/selftests/net/netfilter/packetdrill/ | 
| H A D | conntrack_syn_challenge_ack.pkt | 2 // a challenge-ACK.3 // Check that conntrack lets all packets pass, including the challenge ack,
 24 // Challenge ACK, old incarnation.
 
 | 
| H A D | conntrack_synack_reuse.pkt | 2 // Challenge ACK is supposed to pass through, RST reply should clear conntrack25 // Won't expect this: challenge ack.
 
 | 
| /linux/drivers/staging/greybus/ | 
| H A D | authentication.c | 144 			    u8 *challenge, u8 *result, u8 *auth_response,  in cap_authenticate()  argument164 	memcpy(request->challenge, challenge, sizeof(request->challenge));  in cap_authenticate()
 249 				       authenticate->challenge,  in cap_ioctl()
 
 | 
| H A D | greybus_authentication.h | 61 	__u8			challenge[32];  member
 | 
| /linux/drivers/thunderbolt/ | 
| H A D | tb_msgs.h | 256 	u32 challenge[8];  member265 	u32 challenge[8];  member
 419 	u32 challenge[8];  member
 449 	u32 challenge[8];  member
 
 | 
| /linux/fs/smb/client/ | 
| H A D | cifsencrypt.c | 407 /* Server has provided av pairs/target info in the type 2 challenge495 		offsetof(struct ntlmv2_resp, challenge.key[0]));  in CalcNTLMv2_response()
 498 		memcpy(ntlmv2->challenge.key, ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE);  in CalcNTLMv2_response()
 500 		memcpy(ntlmv2->challenge.key, ses->server->cryptkey, CIFS_SERVER_CHALLENGE_SIZE);  in CalcNTLMv2_response()
 502 	/* Note that the HMAC-MD5 value overwrites ntlmv2->challenge.key */  in CalcNTLMv2_response()
 504 			     ntlmv2->challenge.key, hash_len,  in CalcNTLMv2_response()
 
 | 
| /linux/net/ceph/ | 
| H A D | auth_x.c | 685 		dout("handle_reply got server challenge %llx\n",  in ceph_x_handle_reply()793 					void *challenge, int challenge_len,  in decrypt_authorizer_challenge()  argument
 800 	ret = __ceph_x_decrypt(secret, challenge, challenge_len);  in decrypt_authorizer_challenge()
 805 	dp = challenge + sizeof(struct ceph_x_encrypt_header);  in decrypt_authorizer_challenge()
 819 					   void *challenge, int challenge_len)  in ceph_x_add_authorizer_challenge()  argument
 825 	ret = decrypt_authorizer_challenge(&au->session_key, challenge,  in ceph_x_add_authorizer_challenge()
 828 		pr_err("failed to decrypt authorize challenge: %d", ret);  in ceph_x_add_authorizer_challenge()
 834 		pr_err("failed to encrypt authorizer w/ challenge: %d", ret);  in ceph_x_add_authorizer_challenge()
 
 | 
| /linux/drivers/i2c/muxes/ | 
| H A D | Kconfig | 15 	  I2C multimaster arbitration scheme using GPIOs and a challenge &20 	  will be called i2c-arb-gpio-challenge.
 
 | 
| H A D | Makefile | 5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE)	+= i2c-arb-gpio-challenge.o
 | 
| /linux/Documentation/admin-guide/ | 
| H A D | thunderbolt.rst | 69     a challenge that should match the expected one based on a random key148 Next time the device is plugged in the user can verify (challenge) the
 154 If the challenge the device returns back matches the one we expect based
 156 However, if the challenge fails no tunnels are created and error is
 
 | 
| /linux/include/uapi/linux/netfilter/ | 
| H A D | nf_conntrack_tcp.h | 46 /* Marks possibility for expected RFC5961 challenge ACK */
 | 
| /linux/drivers/gpu/drm/ttm/tests/ | 
| H A D | TODO | 24   a challenge, but is worth trying. Look at selftests like
 | 
| /linux/drivers/media/usb/hdpvr/ | 
| H A D | hdpvr-core.c | 69 static void challenge(u8 *bytes)  in challenge()  function172 	v4l2_dbg(MSG_INFO, hdpvr_debug, &dev->v4l2_dev, "challenge: %8ph\n",  in device_authorization()
 175 	challenge(response);  in device_authorization()
 
 | 
| /linux/include/linux/ | 
| H A D | nvme-auth.h | 36 				  u8 *challenge, u8 *aug, size_t hlen);
 | 
| /linux/drivers/firmware/tegra/ | 
| H A D | bpmp.c | 549 	response.reply = request.challenge << 1;  in tegra_bpmp_mrq_handle_ping()564 	request.challenge = 1;  in tegra_bpmp_ping()
 583 			"ping ok: challenge: %u, response: %u, time: %lld\n",  in tegra_bpmp_ping()
 584 			request.challenge, response.reply,  in tegra_bpmp_ping()
 
 |