Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 47) sorted by relevance

12

/linux/drivers/nvme/target/
H A Dauth.c284 u8 *challenge = req->sq->dhchap_c1; in nvmet_auth_host_hash() local
307 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_host_hash()
308 if (!challenge) { in nvmet_auth_host_hash()
316 challenge, shash_len); in nvmet_auth_host_hash()
325 nvme_auth_hmac_update(&hmac, challenge, shash_len); in nvmet_auth_host_hash()
344 if (challenge != req->sq->dhchap_c1) in nvmet_auth_host_hash()
345 kfree(challenge); in nvmet_auth_host_hash()
357 u8 *challenge = req->sq->dhchap_c2; in nvmet_auth_ctrl_hash() local
380 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_ctrl_hash()
381 if (!challenge) { in nvmet_auth_ctrl_hash()
[all …]
/linux/net/rxrpc/
H A Drxkad.c662 struct rxkad_challenge challenge; in rxkad_issue_challenge() local
674 challenge.version = htonl(2); in rxkad_issue_challenge()
675 challenge.nonce = htonl(conn->rxkad.nonce); in rxkad_issue_challenge()
676 challenge.min_level = htonl(0); in rxkad_issue_challenge()
677 challenge.__padding = 0; in rxkad_issue_challenge()
698 iov[1].iov_base = &challenge; in rxkad_issue_challenge()
699 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge()
778 struct rxkad_challenge challenge; in rxkad_validate_challenge() local
799 &challenge, sizeof(challenge)) < 0) { in rxkad_validate_challenge()
805 version = ntohl(challenge.version); in rxkad_validate_challenge()
[all …]
H A Drxgk.c734 u32 rxgk_kernel_query_challenge(struct sk_buff *challenge) in rxgk_kernel_query_challenge() argument
736 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxgk_kernel_query_challenge()
747 struct sk_buff *challenge, in rxgk_challenge_to_recvmsg() argument
830 struct sk_buff *challenge, in rxgk_construct_authenticator() argument
848 ret = skb_copy_bits(challenge, sizeof(struct rxrpc_wire_header), in rxgk_construct_authenticator()
916 struct sk_buff *challenge, in rxgk_construct_response() argument
958 ret = rxgk_construct_authenticator(conn, challenge, appdata, response, in rxgk_construct_response()
986 csp = rxrpc_skb(challenge); in rxgk_construct_response()
1005 struct sk_buff *challenge, in rxgk_respond_to_challenge() argument
1014 return rxgk_construct_response(conn, challenge, appdata); in rxgk_respond_to_challenge()
[all …]
H A Dinsecure.c53 static int none_sendmsg_respond_to_challenge(struct sk_buff *challenge, in none_sendmsg_respond_to_challenge() argument
H A Drecvmsg.c187 struct sk_buff *challenge, unsigned int flags) in rxrpc_recvmsg_challenge() argument
189 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxrpc_recvmsg_challenge()
192 return conn->security->challenge_to_recvmsg(conn, challenge, msg); in rxrpc_recvmsg_challenge()
H A Dar-internal.h300 struct sk_buff *challenge,
304 int (*sendmsg_respond_to_challenge)(struct sk_buff *challenge,
309 struct sk_buff *challenge);
/linux/drivers/nvme/host/
H A Dauth.c418 u8 buf[4], *challenge = chap->c1; in nvme_auth_dhchap_setup_host_response() local
444 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_host_response()
445 if (!challenge) { in nvme_auth_dhchap_setup_host_response()
452 chap->c1, challenge, in nvme_auth_dhchap_setup_host_response()
458 nvme_auth_hmac_update(&hmac, challenge, chap->hash_len); in nvme_auth_dhchap_setup_host_response()
478 if (challenge != chap->c1) in nvme_auth_dhchap_setup_host_response()
479 kfree(challenge); in nvme_auth_dhchap_setup_host_response()
489 u8 buf[4], *challenge = chap->c2; in nvme_auth_dhchap_setup_ctrl_response() local
508 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_ctrl_response()
509 if (!challenge) { in nvme_auth_dhchap_setup_ctrl_response()
[all …]
/linux/drivers/staging/greybus/
H A Dauthentication.c144 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument
164 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate()
249 authenticate->challenge, in cap_ioctl()
H A Dgreybus_authentication.h61 __u8 challenge[32]; member
/linux/drivers/target/iscsi/
H A Discsi_target_auth.c52 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge()
54 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge()
58 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge()
391 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash()
504 !memcmp(initiatorchg_binhex, chap->challenge, in chap_server_compute_hash()
H A Discsi_target_auth.h37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
/linux/tools/testing/selftests/net/netfilter/packetdrill/
H A Dconntrack_syn_challenge_ack.pkt2 // a challenge-ACK.
3 // Check that conntrack lets all packets pass, including the challenge ack,
H A Dconntrack_synack_reuse.pkt25 // Won't expect this: challenge ack.
/linux/drivers/thunderbolt/
H A Ddomain.c714 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local
728 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key()
729 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key()
735 challenge, sizeof(challenge), hmac); in tb_domain_challenge_switch_key()
H A Dtb_msgs.h256 u32 challenge[8]; member
265 u32 challenge[8]; member
419 u32 challenge[8]; member
449 u32 challenge[8]; member
H A Dicm.c553 const u8 *challenge, u8 *response) in icm_fr_challenge_switch_key() argument
564 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); in icm_fr_challenge_switch_key()
1122 const u8 *challenge, u8 *response) in icm_tr_challenge_switch_key() argument
1134 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); in icm_tr_challenge_switch_key()
/linux/drivers/i2c/muxes/
H A DMakefile5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
H A DKconfig15 I2C multimaster arbitration scheme using GPIOs and a challenge &
20 will be called i2c-arb-gpio-challenge.
/linux/include/linux/
H A Dnvme-auth.h48 const u8 *challenge, u8 *aug, size_t hlen);
/linux/drivers/gpu/drm/ttm/tests/
H A DTODO24 a challenge, but is worth trying. Look at selftests like
/linux/drivers/media/usb/hdpvr/
H A Dhdpvr-core.c69 static void challenge(u8 *bytes) in challenge() function
175 challenge(response); in device_authorization()
/linux/net/ceph/
H A Dauth_x.c858 void *challenge, int challenge_len, in decrypt_authorizer_challenge() argument
867 challenge, challenge_len); in decrypt_authorizer_challenge()
872 dp = challenge + __ceph_x_encrypt_offset(secret); in decrypt_authorizer_challenge()
886 void *challenge, int challenge_len) in ceph_x_add_authorizer_challenge() argument
892 ret = decrypt_authorizer_challenge(&au->session_key, challenge, in ceph_x_add_authorizer_challenge()
/linux/drivers/nvme/common/
H A Dauth.c374 const u8 *challenge, u8 *aug, size_t hlen) in nvme_auth_augmented_challenge() argument
376 return nvme_auth_hmac(hmac_id, skey, skey_len, challenge, hlen, aug); in nvme_auth_augmented_challenge()
/linux/Documentation/arch/riscv/
H A Dpatch-acceptance.rst13 challenge for RISC-V Linux maintenance. Linux maintainers disapprove
/linux/Documentation/ABI/testing/
H A Dsysfs-bus-thunderbolt91 2 Send a challenge based on the 32 byte hex string. If the
92 challenge response from device is valid, the device is
95 EKEYREJECTED if the challenge response did not match.

12