Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 58) sorted by relevance

123

/linux/drivers/nvme/target/
H A Dauth.c299 u8 *challenge = req->sq->dhchap_c1; in nvmet_auth_host_hash() local
337 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_host_hash()
338 if (!challenge) { in nvmet_auth_host_hash()
346 challenge, shash_len); in nvmet_auth_host_hash()
359 ret = crypto_shash_update(shash, challenge, shash_len); in nvmet_auth_host_hash()
390 if (challenge != req->sq->dhchap_c1) in nvmet_auth_host_hash()
391 kfree(challenge); in nvmet_auth_host_hash()
406 u8 *challenge = req->sq->dhchap_c2; in nvmet_auth_ctrl_hash() local
444 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_ctrl_hash()
445 if (!challenge) { in nvmet_auth_ctrl_hash()
[all …]
/linux/drivers/virt/coco/arm-cca-guest/
H A Darm-cca-guest.c26 void *challenge; member
39 info->result = rsi_attestation_token_init(info->challenge, in arm_cca_attestation_init()
113 info.challenge = desc->inblob; in arm_cca_report_new()
/linux/net/rxrpc/
H A Drxgk.c734 u32 rxgk_kernel_query_challenge(struct sk_buff *challenge) in rxgk_kernel_query_challenge() argument
736 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxgk_kernel_query_challenge()
747 struct sk_buff *challenge, in rxgk_challenge_to_recvmsg() argument
830 struct sk_buff *challenge, in rxgk_construct_authenticator() argument
848 ret = skb_copy_bits(challenge, sizeof(struct rxrpc_wire_header), in rxgk_construct_authenticator()
916 struct sk_buff *challenge, in rxgk_construct_response() argument
958 ret = rxgk_construct_authenticator(conn, challenge, appdata, response, in rxgk_construct_response()
986 csp = rxrpc_skb(challenge); in rxgk_construct_response()
1005 struct sk_buff *challenge, in rxgk_respond_to_challenge() argument
1014 return rxgk_construct_response(conn, challenge, appdata); in rxgk_respond_to_challenge()
[all …]
H A Drxkad.c640 * issue a challenge in rxkad_issue_challenge()
644 struct rxkad_challenge challenge; in rxkad_issue_challenge()
656 challenge.version = htonl(2); in rxkad_issue_challenge()
657 challenge.nonce = htonl(conn->rxkad.nonce); in rxkad_issue_challenge()
658 challenge.min_level = htonl(0); in rxkad_issue_challenge()
659 challenge.__padding = 0; in rxkad_issue_challenge()
680 iov[1].iov_base = &challenge; in rxkad_issue_challenge()
681 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge()
755 * Validate a challenge packet.
760 struct rxkad_challenge challenge; in rxkad_calc_response_checksum()
642 struct rxkad_challenge challenge; rxkad_issue_challenge() local
806 struct rxkad_challenge challenge; rxkad_respond_to_challenge() local
[all...]
H A Dinsecure.c53 static int none_sendmsg_respond_to_challenge(struct sk_buff *challenge, in none_sendmsg_respond_to_challenge() argument
H A Drecvmsg.c187 struct sk_buff *challenge, unsigned int flags) in rxrpc_recvmsg_challenge() argument
189 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxrpc_recvmsg_challenge()
192 return conn->security->challenge_to_recvmsg(conn, challenge, msg); in rxrpc_recvmsg_challenge()
/linux/drivers/nvme/host/
H A Dauth.c438 u8 buf[4], *challenge = chap->c1; in nvme_auth_dhchap_setup_host_response() local
466 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_host_response()
467 if (!challenge) { in nvme_auth_dhchap_setup_host_response()
474 chap->c1, challenge, in nvme_auth_dhchap_setup_host_response()
484 ret = crypto_shash_update(shash, challenge, chap->hash_len); in nvme_auth_dhchap_setup_host_response()
516 if (challenge != chap->c1) in nvme_auth_dhchap_setup_host_response()
517 kfree(challenge); in nvme_auth_dhchap_setup_host_response()
526 u8 buf[4], *challenge = chap->c2; in nvme_auth_dhchap_setup_ctrl_response() local
545 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_ctrl_response()
546 if (!challenge) { in nvme_auth_dhchap_setup_ctrl_response()
[all …]
/linux/drivers/staging/greybus/
H A Dauthentication.c144 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument
164 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate()
249 authenticate->challenge, in cap_ioctl()
H A Dgreybus_authentication.h61 __u8 challenge[32]; member
/linux/drivers/target/iscsi/
H A Discsi_target_auth.c51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge()
53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge()
57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge()
390 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash()
503 !memcmp(initiatorchg_binhex, chap->challenge, in chap_server_compute_hash()
H A Discsi_target_auth.h37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
/linux/tools/testing/selftests/net/netfilter/packetdrill/
H A Dconntrack_syn_challenge_ack.pkt2 // a challenge-ACK.
3 // Check that conntrack lets all packets pass, including the challenge ack,
H A Dconntrack_synack_reuse.pkt25 // Won't expect this: challenge ack.
/linux/drivers/thunderbolt/
H A Ddomain.c714 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local
728 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key()
729 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key()
735 challenge, sizeof(challenge), hmac); in tb_domain_challenge_switch_key()
H A Dtb_msgs.h256 u32 challenge[8]; member
265 u32 challenge[8]; member
419 u32 challenge[8]; member
449 u32 challenge[8]; member
/linux/fs/smb/client/
H A Dcifsencrypt.c450 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response()
453 memcpy(ntlmv2->challenge.key, ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response()
455 memcpy(ntlmv2->challenge.key, ses->server->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response()
459 ntlmv2->challenge.key, hash_len, in CalcNTLMv2_response()
/linux/drivers/i2c/muxes/
H A DMakefile5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
H A DKconfig15 I2C multimaster arbitration scheme using GPIOs and a challenge &
20 will be called i2c-arb-gpio-challenge.
/linux/drivers/staging/greybus/Documentation/firmware/
H A Dauthenticate.c26 .challenge = {0},
/linux/include/linux/
H A Dnvme-auth.h36 u8 *challenge, u8 *aug, size_t hlen);
/linux/net/ceph/
H A Dauth_x.c795 void *challenge, int challenge_len, in decrypt_authorizer_challenge() argument
802 ret = __ceph_x_decrypt(secret, challenge, challenge_len); in decrypt_authorizer_challenge()
807 dp = challenge + sizeof(struct ceph_x_encrypt_header); in decrypt_authorizer_challenge()
821 void *challenge, int challenge_len) in ceph_x_add_authorizer_challenge() argument
827 ret = decrypt_authorizer_challenge(&au->session_key, challenge, in ceph_x_add_authorizer_challenge()
/linux/drivers/gpu/drm/ttm/tests/
H A DTODO24 a challenge, but is worth trying. Look at selftests like
/linux/drivers/media/usb/hdpvr/
H A Dhdpvr-core.c69 static void challenge(u8 *bytes) in challenge() function
175 challenge(response); in device_authorization()
/linux/drivers/firmware/tegra/
H A Dbpmp.c549 response.reply = request.challenge << 1; in tegra_bpmp_mrq_handle_ping()
564 request.challenge = 1; in tegra_bpmp_ping()
584 request.challenge, response.reply, in tegra_bpmp_ping()
/linux/Documentation/admin-guide/
H A Dthunderbolt.rst69 a challenge that should match the expected one based on a random key
148 Next time the device is plugged in the user can verify (challenge) the
154 If the challenge the device returns back matches the one we expect based
156 However, if the challenge fails no tunnels are created and error is

123