/linux/drivers/nvme/target/ |
H A D | auth.c | 299 u8 *challenge = req->sq->dhchap_c1; in nvmet_auth_host_hash() local 337 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_host_hash() 338 if (!challenge) { in nvmet_auth_host_hash() 346 challenge, shash_len); in nvmet_auth_host_hash() 359 ret = crypto_shash_update(shash, challenge, shash_len); in nvmet_auth_host_hash() 389 if (challenge != req->sq->dhchap_c1) in nvmet_auth_host_hash() 390 kfree(challenge); in nvmet_auth_host_hash() 405 u8 *challenge = req->sq->dhchap_c2; in nvmet_auth_ctrl_hash() local 443 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_ctrl_hash() 444 if (!challenge) { in nvmet_auth_ctrl_hash() [all …]
|
/linux/drivers/virt/coco/arm-cca-guest/ |
H A D | arm-cca-guest.c | 26 void *challenge; member 39 info->result = rsi_attestation_token_init(info->challenge, in arm_cca_attestation_init() 113 info.challenge = desc->inblob; in arm_cca_report_new()
|
/linux/net/rxrpc/ |
H A D | rxgk.c | 734 u32 rxgk_kernel_query_challenge(struct sk_buff *challenge) in rxgk_kernel_query_challenge() argument 736 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxgk_kernel_query_challenge() 747 struct sk_buff *challenge, in rxgk_challenge_to_recvmsg() argument 830 struct sk_buff *challenge, in rxgk_construct_authenticator() argument 848 ret = skb_copy_bits(challenge, sizeof(struct rxrpc_wire_header), in rxgk_construct_authenticator() 916 struct sk_buff *challenge, in rxgk_construct_response() argument 958 ret = rxgk_construct_authenticator(conn, challenge, appdata, response, in rxgk_construct_response() 986 csp = rxrpc_skb(challenge); in rxgk_construct_response() 1005 struct sk_buff *challenge, in rxgk_respond_to_challenge() argument 1014 return rxgk_construct_response(conn, challenge, appdata); in rxgk_respond_to_challenge() [all …]
|
H A D | rxkad.c | 640 * issue a challenge in rxkad_issue_challenge() 644 struct rxkad_challenge challenge; in rxkad_issue_challenge() 656 challenge.version = htonl(2); in rxkad_issue_challenge() 657 challenge.nonce = htonl(conn->rxkad.nonce); in rxkad_issue_challenge() 658 challenge.min_level = htonl(0); in rxkad_issue_challenge() 659 challenge.__padding = 0; in rxkad_issue_challenge() 680 iov[1].iov_base = &challenge; in rxkad_issue_challenge() 681 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge() 755 * Validate a challenge packet. 760 struct rxkad_challenge challenge; in rxkad_calc_response_checksum() 642 struct rxkad_challenge challenge; rxkad_issue_challenge() local 806 struct rxkad_challenge challenge; rxkad_respond_to_challenge() local [all...] |
H A D | insecure.c | 53 static int none_sendmsg_respond_to_challenge(struct sk_buff *challenge, in none_sendmsg_respond_to_challenge() argument
|
H A D | recvmsg.c | 187 struct sk_buff *challenge, unsigned int flags) in rxrpc_recvmsg_challenge() argument 189 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxrpc_recvmsg_challenge() 192 return conn->security->challenge_to_recvmsg(conn, challenge, msg); in rxrpc_recvmsg_challenge()
|
/linux/drivers/nvme/host/ |
H A D | auth.c | 434 u8 buf[4], *challenge = chap->c1; in nvme_auth_dhchap_setup_host_response() local 462 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_host_response() 463 if (!challenge) { in nvme_auth_dhchap_setup_host_response() 470 chap->c1, challenge, in nvme_auth_dhchap_setup_host_response() 480 ret = crypto_shash_update(shash, challenge, chap->hash_len); in nvme_auth_dhchap_setup_host_response() 511 if (challenge != chap->c1) in nvme_auth_dhchap_setup_host_response() 512 kfree(challenge); in nvme_auth_dhchap_setup_host_response() 521 u8 buf[4], *challenge = chap->c2; in nvme_auth_dhchap_setup_ctrl_response() local 540 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_ctrl_response() 541 if (!challenge) { in nvme_auth_dhchap_setup_ctrl_response() [all …]
|
/linux/drivers/staging/greybus/ |
H A D | authentication.c | 144 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument 164 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate() 249 authenticate->challenge, in cap_ioctl()
|
H A D | greybus_authentication.h | 61 __u8 challenge[32]; member
|
/linux/drivers/target/iscsi/ |
H A D | iscsi_target_auth.c | 51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge() 53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge() 57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge() 390 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash() 503 !memcmp(initiatorchg_binhex, chap->challenge, in chap_server_compute_hash()
|
H A D | iscsi_target_auth.h | 37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
|
/linux/tools/testing/selftests/net/netfilter/packetdrill/ |
H A D | conntrack_syn_challenge_ack.pkt | 2 // a challenge-ACK. 3 // Check that conntrack lets all packets pass, including the challenge ack,
|
H A D | conntrack_synack_reuse.pkt | 25 // Won't expect this: challenge ack.
|
/linux/drivers/thunderbolt/ |
H A D | tb_msgs.h | 256 u32 challenge[8]; member 265 u32 challenge[8]; member 419 u32 challenge[8]; member 449 u32 challenge[8]; member
|
H A D | domain.c | 707 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 723 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key() 724 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key() 746 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
|
/linux/drivers/i2c/muxes/ |
H A D | Makefile | 5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
|
H A D | Kconfig | 15 I2C multimaster arbitration scheme using GPIOs and a challenge & 20 will be called i2c-arb-gpio-challenge.
|
/linux/drivers/staging/greybus/Documentation/firmware/ |
H A D | authenticate.c | 26 .challenge = {0},
|
/linux/fs/smb/client/ |
H A D | cifsencrypt.c | 502 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response() 517 memcpy(ntlmv2->challenge.key, ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response() 519 memcpy(ntlmv2->challenge.key, ses->server->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response() 521 rc = crypto_shash_update(hmacmd5, ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
|
/linux/include/linux/ |
H A D | nvme-auth.h | 36 u8 *challenge, u8 *aug, size_t hlen);
|
/linux/net/ceph/ |
H A D | auth_x.c | 793 void *challenge, int challenge_len, in decrypt_authorizer_challenge() argument 800 ret = __ceph_x_decrypt(secret, challenge, challenge_len); in decrypt_authorizer_challenge() 805 dp = challenge + sizeof(struct ceph_x_encrypt_header); in decrypt_authorizer_challenge() 819 void *challenge, int challenge_len) in ceph_x_add_authorizer_challenge() argument 825 ret = decrypt_authorizer_challenge(&au->session_key, challenge, in ceph_x_add_authorizer_challenge()
|
/linux/drivers/gpu/drm/ttm/tests/ |
H A D | TODO | 24 a challenge, but is worth trying. Look at selftests like
|
/linux/drivers/media/usb/hdpvr/ |
H A D | hdpvr-core.c | 69 static void challenge(u8 *bytes) in challenge() function 175 challenge(response); in device_authorization()
|
/linux/drivers/firmware/tegra/ |
H A D | bpmp.c | 549 response.reply = request.challenge << 1; in tegra_bpmp_mrq_handle_ping() 564 request.challenge = 1; in tegra_bpmp_ping() 584 request.challenge, response.reply, in tegra_bpmp_ping()
|
/linux/Documentation/admin-guide/ |
H A D | thunderbolt.rst | 69 a challenge that should match the expected one based on a random key 148 Next time the device is plugged in the user can verify (challenge) the 154 If the challenge the device returns back matches the one we expect based 156 However, if the challenge fails no tunnels are created and error is
|