Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 58) sorted by relevance

123

/linux/drivers/nvme/target/
H A Dauth.c299 u8 *challenge = req->sq->dhchap_c1; in nvmet_auth_host_hash() local
337 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_host_hash()
338 if (!challenge) { in nvmet_auth_host_hash()
346 challenge, shash_len); in nvmet_auth_host_hash()
359 ret = crypto_shash_update(shash, challenge, shash_len); in nvmet_auth_host_hash()
389 if (challenge != req->sq->dhchap_c1) in nvmet_auth_host_hash()
390 kfree(challenge); in nvmet_auth_host_hash()
405 u8 *challenge = req->sq->dhchap_c2; in nvmet_auth_ctrl_hash() local
443 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_ctrl_hash()
444 if (!challenge) { in nvmet_auth_ctrl_hash()
[all …]
/linux/drivers/virt/coco/arm-cca-guest/
H A Darm-cca-guest.c26 void *challenge; member
39 info->result = rsi_attestation_token_init(info->challenge, in arm_cca_attestation_init()
113 info.challenge = desc->inblob; in arm_cca_report_new()
/linux/net/rxrpc/
H A Drxgk.c734 u32 rxgk_kernel_query_challenge(struct sk_buff *challenge) in rxgk_kernel_query_challenge() argument
736 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxgk_kernel_query_challenge()
747 struct sk_buff *challenge, in rxgk_challenge_to_recvmsg() argument
830 struct sk_buff *challenge, in rxgk_construct_authenticator() argument
848 ret = skb_copy_bits(challenge, sizeof(struct rxrpc_wire_header), in rxgk_construct_authenticator()
916 struct sk_buff *challenge, in rxgk_construct_response() argument
958 ret = rxgk_construct_authenticator(conn, challenge, appdata, response, in rxgk_construct_response()
986 csp = rxrpc_skb(challenge); in rxgk_construct_response()
1005 struct sk_buff *challenge, in rxgk_respond_to_challenge() argument
1014 return rxgk_construct_response(conn, challenge, appdata); in rxgk_respond_to_challenge()
[all …]
H A Drxkad.c640 * issue a challenge in rxkad_issue_challenge()
644 struct rxkad_challenge challenge; in rxkad_issue_challenge()
656 challenge.version = htonl(2); in rxkad_issue_challenge()
657 challenge.nonce = htonl(conn->rxkad.nonce); in rxkad_issue_challenge()
658 challenge.min_level = htonl(0); in rxkad_issue_challenge()
659 challenge.__padding = 0; in rxkad_issue_challenge()
680 iov[1].iov_base = &challenge; in rxkad_issue_challenge()
681 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge()
755 * Validate a challenge packet.
760 struct rxkad_challenge challenge; in rxkad_calc_response_checksum()
642 struct rxkad_challenge challenge; rxkad_issue_challenge() local
806 struct rxkad_challenge challenge; rxkad_respond_to_challenge() local
[all...]
H A Dinsecure.c53 static int none_sendmsg_respond_to_challenge(struct sk_buff *challenge, in none_sendmsg_respond_to_challenge() argument
H A Drecvmsg.c187 struct sk_buff *challenge, unsigned int flags) in rxrpc_recvmsg_challenge() argument
189 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxrpc_recvmsg_challenge()
192 return conn->security->challenge_to_recvmsg(conn, challenge, msg); in rxrpc_recvmsg_challenge()
/linux/drivers/nvme/host/
H A Dauth.c434 u8 buf[4], *challenge = chap->c1; in nvme_auth_dhchap_setup_host_response() local
462 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_host_response()
463 if (!challenge) { in nvme_auth_dhchap_setup_host_response()
470 chap->c1, challenge, in nvme_auth_dhchap_setup_host_response()
480 ret = crypto_shash_update(shash, challenge, chap->hash_len); in nvme_auth_dhchap_setup_host_response()
511 if (challenge != chap->c1) in nvme_auth_dhchap_setup_host_response()
512 kfree(challenge); in nvme_auth_dhchap_setup_host_response()
521 u8 buf[4], *challenge = chap->c2; in nvme_auth_dhchap_setup_ctrl_response() local
540 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_ctrl_response()
541 if (!challenge) { in nvme_auth_dhchap_setup_ctrl_response()
[all …]
/linux/drivers/staging/greybus/
H A Dauthentication.c144 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument
164 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate()
249 authenticate->challenge, in cap_ioctl()
H A Dgreybus_authentication.h61 __u8 challenge[32]; member
/linux/drivers/target/iscsi/
H A Discsi_target_auth.c51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge()
53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge()
57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge()
390 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash()
503 !memcmp(initiatorchg_binhex, chap->challenge, in chap_server_compute_hash()
H A Discsi_target_auth.h37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
/linux/tools/testing/selftests/net/netfilter/packetdrill/
H A Dconntrack_syn_challenge_ack.pkt2 // a challenge-ACK.
3 // Check that conntrack lets all packets pass, including the challenge ack,
H A Dconntrack_synack_reuse.pkt25 // Won't expect this: challenge ack.
/linux/drivers/thunderbolt/
H A Dtb_msgs.h256 u32 challenge[8]; member
265 u32 challenge[8]; member
419 u32 challenge[8]; member
449 u32 challenge[8]; member
H A Ddomain.c707 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local
723 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key()
724 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key()
746 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
/linux/drivers/i2c/muxes/
H A DMakefile5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
H A DKconfig15 I2C multimaster arbitration scheme using GPIOs and a challenge &
20 will be called i2c-arb-gpio-challenge.
/linux/drivers/staging/greybus/Documentation/firmware/
H A Dauthenticate.c26 .challenge = {0},
/linux/fs/smb/client/
H A Dcifsencrypt.c502 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response()
517 memcpy(ntlmv2->challenge.key, ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response()
519 memcpy(ntlmv2->challenge.key, ses->server->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response()
521 rc = crypto_shash_update(hmacmd5, ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
/linux/include/linux/
H A Dnvme-auth.h36 u8 *challenge, u8 *aug, size_t hlen);
/linux/net/ceph/
H A Dauth_x.c793 void *challenge, int challenge_len, in decrypt_authorizer_challenge() argument
800 ret = __ceph_x_decrypt(secret, challenge, challenge_len); in decrypt_authorizer_challenge()
805 dp = challenge + sizeof(struct ceph_x_encrypt_header); in decrypt_authorizer_challenge()
819 void *challenge, int challenge_len) in ceph_x_add_authorizer_challenge() argument
825 ret = decrypt_authorizer_challenge(&au->session_key, challenge, in ceph_x_add_authorizer_challenge()
/linux/drivers/gpu/drm/ttm/tests/
H A DTODO24 a challenge, but is worth trying. Look at selftests like
/linux/drivers/media/usb/hdpvr/
H A Dhdpvr-core.c69 static void challenge(u8 *bytes) in challenge() function
175 challenge(response); in device_authorization()
/linux/drivers/firmware/tegra/
H A Dbpmp.c549 response.reply = request.challenge << 1; in tegra_bpmp_mrq_handle_ping()
564 request.challenge = 1; in tegra_bpmp_ping()
584 request.challenge, response.reply, in tegra_bpmp_ping()
/linux/Documentation/admin-guide/
H A Dthunderbolt.rst69 a challenge that should match the expected one based on a random key
148 Next time the device is plugged in the user can verify (challenge) the
154 If the challenge the device returns back matches the one we expect based
156 However, if the challenge fails no tunnels are created and error is

123