| /linux/drivers/nvme/target/ |
| H A D | auth.c | 299 u8 *challenge = req->sq->dhchap_c1; in nvmet_auth_host_hash() local 337 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_host_hash() 338 if (!challenge) { in nvmet_auth_host_hash() 346 challenge, shash_len); in nvmet_auth_host_hash() 359 ret = crypto_shash_update(shash, challenge, shash_len); in nvmet_auth_host_hash() 390 if (challenge != req->sq->dhchap_c1) in nvmet_auth_host_hash() 391 kfree(challenge); in nvmet_auth_host_hash() 406 u8 *challenge = req->sq->dhchap_c2; in nvmet_auth_ctrl_hash() local 444 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_ctrl_hash() 445 if (!challenge) { in nvmet_auth_ctrl_hash() [all …]
|
| /linux/drivers/virt/coco/arm-cca-guest/ |
| H A D | arm-cca-guest.c | 26 void *challenge; member 39 info->result = rsi_attestation_token_init(info->challenge, in arm_cca_attestation_init() 113 info.challenge = desc->inblob; in arm_cca_report_new()
|
| /linux/net/rxrpc/ |
| H A D | rxgk.c | 734 u32 rxgk_kernel_query_challenge(struct sk_buff *challenge) in rxgk_kernel_query_challenge() argument 736 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxgk_kernel_query_challenge() 747 struct sk_buff *challenge, in rxgk_challenge_to_recvmsg() argument 830 struct sk_buff *challenge, in rxgk_construct_authenticator() argument 848 ret = skb_copy_bits(challenge, sizeof(struct rxrpc_wire_header), in rxgk_construct_authenticator() 916 struct sk_buff *challenge, in rxgk_construct_response() argument 958 ret = rxgk_construct_authenticator(conn, challenge, appdata, response, in rxgk_construct_response() 986 csp = rxrpc_skb(challenge); in rxgk_construct_response() 1005 struct sk_buff *challenge, in rxgk_respond_to_challenge() argument 1014 return rxgk_construct_response(conn, challenge, appdata); in rxgk_respond_to_challenge() [all …]
|
| H A D | rxkad.c | 640 * issue a challenge in rxkad_issue_challenge() 644 struct rxkad_challenge challenge; in rxkad_issue_challenge() 656 challenge.version = htonl(2); in rxkad_issue_challenge() 657 challenge.nonce = htonl(conn->rxkad.nonce); in rxkad_issue_challenge() 658 challenge.min_level = htonl(0); in rxkad_issue_challenge() 659 challenge.__padding = 0; in rxkad_issue_challenge() 680 iov[1].iov_base = &challenge; in rxkad_issue_challenge() 681 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge() 755 * Validate a challenge packet. 760 struct rxkad_challenge challenge; in rxkad_calc_response_checksum() 642 struct rxkad_challenge challenge; rxkad_issue_challenge() local 806 struct rxkad_challenge challenge; rxkad_respond_to_challenge() local [all...] |
| H A D | insecure.c | 53 static int none_sendmsg_respond_to_challenge(struct sk_buff *challenge, in none_sendmsg_respond_to_challenge() argument
|
| H A D | recvmsg.c | 187 struct sk_buff *challenge, unsigned int flags) in rxrpc_recvmsg_challenge() argument 189 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxrpc_recvmsg_challenge() 192 return conn->security->challenge_to_recvmsg(conn, challenge, msg); in rxrpc_recvmsg_challenge()
|
| /linux/drivers/nvme/host/ |
| H A D | auth.c | 438 u8 buf[4], *challenge = chap->c1; in nvme_auth_dhchap_setup_host_response() local 466 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_host_response() 467 if (!challenge) { in nvme_auth_dhchap_setup_host_response() 474 chap->c1, challenge, in nvme_auth_dhchap_setup_host_response() 484 ret = crypto_shash_update(shash, challenge, chap->hash_len); in nvme_auth_dhchap_setup_host_response() 516 if (challenge != chap->c1) in nvme_auth_dhchap_setup_host_response() 517 kfree(challenge); in nvme_auth_dhchap_setup_host_response() 526 u8 buf[4], *challenge = chap->c2; in nvme_auth_dhchap_setup_ctrl_response() local 545 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_ctrl_response() 546 if (!challenge) { in nvme_auth_dhchap_setup_ctrl_response() [all …]
|
| /linux/drivers/staging/greybus/ |
| H A D | authentication.c | 144 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument 164 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate() 249 authenticate->challenge, in cap_ioctl()
|
| H A D | greybus_authentication.h | 61 __u8 challenge[32]; member
|
| /linux/drivers/target/iscsi/ |
| H A D | iscsi_target_auth.c | 51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge() 53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge() 57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge() 390 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash() 503 !memcmp(initiatorchg_binhex, chap->challenge, in chap_server_compute_hash()
|
| H A D | iscsi_target_auth.h | 37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
|
| /linux/tools/testing/selftests/net/netfilter/packetdrill/ |
| H A D | conntrack_syn_challenge_ack.pkt | 2 // a challenge-ACK. 3 // Check that conntrack lets all packets pass, including the challenge ack,
|
| H A D | conntrack_synack_reuse.pkt | 25 // Won't expect this: challenge ack.
|
| /linux/drivers/thunderbolt/ |
| H A D | domain.c | 714 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 728 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key() 729 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key() 735 challenge, sizeof(challenge), hmac); in tb_domain_challenge_switch_key()
|
| H A D | tb_msgs.h | 256 u32 challenge[8]; member 265 u32 challenge[8]; member 419 u32 challenge[8]; member 449 u32 challenge[8]; member
|
| /linux/fs/smb/client/ |
| H A D | cifsencrypt.c | 450 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response() 453 memcpy(ntlmv2->challenge.key, ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response() 455 memcpy(ntlmv2->challenge.key, ses->server->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response() 459 ntlmv2->challenge.key, hash_len, in CalcNTLMv2_response()
|
| /linux/drivers/i2c/muxes/ |
| H A D | Makefile | 5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
|
| H A D | Kconfig | 15 I2C multimaster arbitration scheme using GPIOs and a challenge & 20 will be called i2c-arb-gpio-challenge.
|
| /linux/drivers/staging/greybus/Documentation/firmware/ |
| H A D | authenticate.c | 26 .challenge = {0},
|
| /linux/include/linux/ |
| H A D | nvme-auth.h | 36 u8 *challenge, u8 *aug, size_t hlen);
|
| /linux/net/ceph/ |
| H A D | auth_x.c | 795 void *challenge, int challenge_len, in decrypt_authorizer_challenge() argument 802 ret = __ceph_x_decrypt(secret, challenge, challenge_len); in decrypt_authorizer_challenge() 807 dp = challenge + sizeof(struct ceph_x_encrypt_header); in decrypt_authorizer_challenge() 821 void *challenge, int challenge_len) in ceph_x_add_authorizer_challenge() argument 827 ret = decrypt_authorizer_challenge(&au->session_key, challenge, in ceph_x_add_authorizer_challenge()
|
| /linux/drivers/gpu/drm/ttm/tests/ |
| H A D | TODO | 24 a challenge, but is worth trying. Look at selftests like
|
| /linux/drivers/media/usb/hdpvr/ |
| H A D | hdpvr-core.c | 69 static void challenge(u8 *bytes) in challenge() function 175 challenge(response); in device_authorization()
|
| /linux/drivers/firmware/tegra/ |
| H A D | bpmp.c | 549 response.reply = request.challenge << 1; in tegra_bpmp_mrq_handle_ping() 564 request.challenge = 1; in tegra_bpmp_ping() 584 request.challenge, response.reply, in tegra_bpmp_ping()
|
| /linux/Documentation/admin-guide/ |
| H A D | thunderbolt.rst | 69 a challenge that should match the expected one based on a random key 148 Next time the device is plugged in the user can verify (challenge) the 154 If the challenge the device returns back matches the one we expect based 156 However, if the challenge fails no tunnels are created and error is
|