Home
last modified time | relevance | path

Searched full:challenge (Results 1 – 25 of 98) sorted by relevance

1234

/linux/drivers/virt/coco/arm-cca-guest/
H A Darm-cca-guest.c19 * @challenge: Pointer to the challenge data
20 * @challenge_size: Size of the challenge data
26 void *challenge; member
39 info->result = rsi_attestation_token_init(info->challenge, in arm_cca_attestation_init()
75 * Initialise the attestation token generation using the challenge data
80 * The challenge data must be at least 32 bytes and no more than 64 bytes. If
113 info.challenge = desc->inblob; in arm_cca_report_new()
/linux/net/rxrpc/
H A Drxgk.c615 * Allocate memory to hold a challenge or a response packet. We're not running
630 * Issue a challenge.
697 * Validate a challenge packet.
729 * rxgk_kernel_query_challenge - Query RxGK-specific challenge parameters
730 * @challenge: The challenge packet to query
734 u32 rxgk_kernel_query_challenge(struct sk_buff *challenge) in rxgk_kernel_query_challenge() argument
736 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxgk_kernel_query_challenge()
744 * challenge.
747 struct sk_buff *challenge, in rxgk_challenge_to_recvmsg() argument
830 struct sk_buff *challenge, in rxgk_construct_authenticator() argument
[all …]
H A Drxkad.c640 * issue a challenge in rxkad_issue_challenge()
644 struct rxkad_challenge challenge; in rxkad_issue_challenge()
656 challenge.version = htonl(2); in rxkad_issue_challenge()
657 challenge.nonce = htonl(conn->rxkad.nonce); in rxkad_issue_challenge()
658 challenge.min_level = htonl(0); in rxkad_issue_challenge()
659 challenge.__padding = 0; in rxkad_issue_challenge()
680 iov[1].iov_base = &challenge; in rxkad_issue_challenge()
681 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge()
755 * Validate a challenge packet.
760 struct rxkad_challenge challenge; in rxkad_calc_response_checksum()
642 struct rxkad_challenge challenge; rxkad_issue_challenge() local
806 struct rxkad_challenge challenge; rxkad_respond_to_challenge() local
[all...]
H A Drecvmsg.c184 * Deal with a CHALLENGE packet.
187 struct sk_buff *challenge, unsigned int flags) in rxrpc_recvmsg_challenge() argument
189 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxrpc_recvmsg_challenge()
192 return conn->security->challenge_to_recvmsg(conn, challenge, msg); in rxrpc_recvmsg_challenge()
H A Dar-internal.h43 RXRPC_SKB_MARK_CHALLENGE, /* Challenge notification */
289 /* issue a challenge */
292 /* Validate a challenge packet */
296 /* Fill out the cmsg for recvmsg() to pass on a challenge to userspace.
300 struct sk_buff *challenge,
303 /* Parse sendmsg() control message and respond to challenge. */
304 int (*sendmsg_respond_to_challenge)(struct sk_buff *challenge,
307 /* respond to a challenge */
309 struct sk_buff *challenge);
475 RXRPC_CONN_EV_CHALLENGE, /* Send challenge packet */
/linux/drivers/target/iscsi/
H A Discsi_target_auth.c51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge()
53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge()
57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge()
60 * Set CHAP_C, and copy the generated challenge into c_str. in chap_gen_challenge()
182 /* Tie the challenge length to the digest size */ in chap_server_open()
198 * Generate Challenge. in chap_server_open()
293 pr_err("Unable to allocate challenge buffer\n"); in chap_server_compute_hash()
390 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash()
393 pr_err("crypto_shash_finup() failed for challenge\n"); in chap_server_compute_hash()
460 pr_err("Unable to convert incoming challenge\n"); in chap_server_compute_hash()
[all …]
H A Discsi_target_auth.h37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
/linux/drivers/nvme/target/
H A Dauth.c299 u8 *challenge = req->sq->dhchap_c1; in nvmet_auth_host_hash() local
337 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_host_hash()
338 if (!challenge) { in nvmet_auth_host_hash()
346 challenge, shash_len); in nvmet_auth_host_hash()
359 ret = crypto_shash_update(shash, challenge, shash_len); in nvmet_auth_host_hash()
389 if (challenge != req->sq->dhchap_c1) in nvmet_auth_host_hash()
390 kfree(challenge); in nvmet_auth_host_hash()
405 u8 *challenge = req->sq->dhchap_c2; in nvmet_auth_ctrl_hash() local
443 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_ctrl_hash()
444 if (!challenge) { in nvmet_auth_ctrl_hash()
[all …]
H A Dfabrics-cmd-auth.c186 pr_debug("%s: ctrl %d qid %d invalid challenge\n", in nvmet_auth_reply()
197 pr_debug("%s: ctrl %d qid %d challenge %*ph\n", in nvmet_auth_reply()
205 * is not performed, but a challenge value C2 is carried in order to in nvmet_auth_reply()
537 pr_warn("ctrl %d qid %d: challenge error (%d)\n", in nvmet_execute_auth_receive()
/linux/Documentation/devicetree/bindings/i2c/
H A Di2c-arb-gpio-challenge.yaml4 $id: http://devicetree.org/schemas/i2c/i2c-arb-gpio-challenge.yaml#
7 title: GPIO-based I2C Arbitration Using a Challenge & Response Mechanism
14 This uses GPIO lines and a challenge & response mechanism to arbitrate who is
51 const: i2c-arb-gpio-challenge
106 compatible = "i2c-arb-gpio-challenge";
/linux/tools/testing/selftests/net/netfilter/packetdrill/
H A Dconntrack_syn_challenge_ack.pkt2 // a challenge-ACK.
3 // Check that conntrack lets all packets pass, including the challenge ack,
24 // Challenge ACK, old incarnation.
H A Dconntrack_synack_reuse.pkt2 // Challenge ACK is supposed to pass through, RST reply should clear conntrack
25 // Won't expect this: challenge ack.
/linux/drivers/staging/greybus/
H A Dauthentication.c144 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument
164 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate()
249 authenticate->challenge, in cap_ioctl()
H A Dgreybus_authentication.h61 __u8 challenge[32]; member
/linux/drivers/thunderbolt/
H A Dtb_msgs.h256 u32 challenge[8]; member
265 u32 challenge[8]; member
419 u32 challenge[8]; member
449 u32 challenge[8]; member
/linux/fs/smb/client/
H A Dcifsencrypt.c407 /* Server has provided av pairs/target info in the type 2 challenge
495 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response()
498 memcpy(ntlmv2->challenge.key, ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response()
500 memcpy(ntlmv2->challenge.key, ses->server->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response()
502 /* Note that the HMAC-MD5 value overwrites ntlmv2->challenge.key */ in CalcNTLMv2_response()
504 ntlmv2->challenge.key, hash_len, in CalcNTLMv2_response()
/linux/net/ceph/
H A Dauth_x.c685 dout("handle_reply got server challenge %llx\n", in ceph_x_handle_reply()
793 void *challenge, int challenge_len, in decrypt_authorizer_challenge() argument
800 ret = __ceph_x_decrypt(secret, challenge, challenge_len); in decrypt_authorizer_challenge()
805 dp = challenge + sizeof(struct ceph_x_encrypt_header); in decrypt_authorizer_challenge()
819 void *challenge, int challenge_len) in ceph_x_add_authorizer_challenge() argument
825 ret = decrypt_authorizer_challenge(&au->session_key, challenge, in ceph_x_add_authorizer_challenge()
828 pr_err("failed to decrypt authorize challenge: %d", ret); in ceph_x_add_authorizer_challenge()
834 pr_err("failed to encrypt authorizer w/ challenge: %d", ret); in ceph_x_add_authorizer_challenge()
/linux/drivers/i2c/muxes/
H A DKconfig15 I2C multimaster arbitration scheme using GPIOs and a challenge &
20 will be called i2c-arb-gpio-challenge.
H A DMakefile5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
/linux/Documentation/admin-guide/
H A Dthunderbolt.rst69 a challenge that should match the expected one based on a random key
148 Next time the device is plugged in the user can verify (challenge) the
154 If the challenge the device returns back matches the one we expect based
156 However, if the challenge fails no tunnels are created and error is
/linux/include/uapi/linux/netfilter/
H A Dnf_conntrack_tcp.h46 /* Marks possibility for expected RFC5961 challenge ACK */
/linux/drivers/gpu/drm/ttm/tests/
H A DTODO24 a challenge, but is worth trying. Look at selftests like
/linux/drivers/media/usb/hdpvr/
H A Dhdpvr-core.c69 static void challenge(u8 *bytes) in challenge() function
172 v4l2_dbg(MSG_INFO, hdpvr_debug, &dev->v4l2_dev, "challenge: %8ph\n", in device_authorization()
175 challenge(response); in device_authorization()
/linux/include/linux/
H A Dnvme-auth.h36 u8 *challenge, u8 *aug, size_t hlen);
/linux/drivers/firmware/tegra/
H A Dbpmp.c549 response.reply = request.challenge << 1; in tegra_bpmp_mrq_handle_ping()
564 request.challenge = 1; in tegra_bpmp_ping()
583 "ping ok: challenge: %u, response: %u, time: %lld\n", in tegra_bpmp_ping()
584 request.challenge, response.reply, in tegra_bpmp_ping()

1234