Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 61) sorted by relevance

123

/Linux-v6.1/drivers/nvme/target/
Dauth.c270 u8 *challenge = req->sq->dhchap_c1, *host_response; in nvmet_auth_host_hash() local
306 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_host_hash()
307 if (!challenge) { in nvmet_auth_host_hash()
315 challenge, shash_len); in nvmet_auth_host_hash()
334 ret = crypto_shash_update(shash, challenge, shash_len); in nvmet_auth_host_hash()
364 if (challenge != req->sq->dhchap_c1) in nvmet_auth_host_hash()
365 kfree(challenge); in nvmet_auth_host_hash()
381 u8 *challenge = req->sq->dhchap_c2, *ctrl_response; in nvmet_auth_ctrl_hash() local
418 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_ctrl_hash()
419 if (!challenge) { in nvmet_auth_ctrl_hash()
[all …]
/Linux-v6.1/drivers/nvme/host/
Dauth.c428 u8 buf[4], *challenge = chap->c1; in nvme_auth_dhchap_setup_host_response() local
456 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_host_response()
457 if (!challenge) { in nvme_auth_dhchap_setup_host_response()
464 chap->c1, challenge, in nvme_auth_dhchap_setup_host_response()
474 ret = crypto_shash_update(shash, challenge, chap->hash_len); in nvme_auth_dhchap_setup_host_response()
505 if (challenge != chap->c1) in nvme_auth_dhchap_setup_host_response()
506 kfree(challenge); in nvme_auth_dhchap_setup_host_response()
515 u8 buf[4], *challenge = chap->c2; in nvme_auth_dhchap_setup_ctrl_response() local
533 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_ctrl_response()
534 if (!challenge) { in nvme_auth_dhchap_setup_ctrl_response()
[all …]
/Linux-v6.1/drivers/staging/greybus/
Dauthentication.c141 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument
161 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate()
246 authenticate->challenge, in cap_ioctl()
Dgreybus_authentication.h62 __u8 challenge[32]; member
/Linux-v6.1/drivers/target/iscsi/
Discsi_target_auth.c51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge()
53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge()
57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge()
390 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash()
503 !memcmp(initiatorchg_binhex, chap->challenge, in chap_server_compute_hash()
Discsi_target_auth.h37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
/Linux-v6.1/net/rxrpc/
Drxkad.c731 struct rxkad_challenge challenge; in rxkad_issue_challenge() local
743 challenge.version = htonl(2); in rxkad_issue_challenge()
744 challenge.nonce = htonl(conn->rxkad.nonce); in rxkad_issue_challenge()
745 challenge.min_level = htonl(0); in rxkad_issue_challenge()
746 challenge.__padding = 0; in rxkad_issue_challenge()
767 iov[1].iov_base = &challenge; in rxkad_issue_challenge()
768 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge()
897 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local
919 &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge()
922 version = ntohl(challenge.version); in rxkad_respond_to_challenge()
[all …]
/Linux-v6.1/Documentation/devicetree/bindings/i2c/
Di2c-arb-gpio-challenge.txt3 This uses GPIO lines and a challenge & response mechanism to arbitrate who is
43 - compatible: i2c-arb-gpio-challenge
64 compatible = "i2c-arb-gpio-challenge";
/Linux-v6.1/drivers/thunderbolt/
Dtb_msgs.h251 u32 challenge[8]; member
260 u32 challenge[8]; member
414 u32 challenge[8]; member
444 u32 challenge[8]; member
Ddomain.c702 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local
718 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key()
719 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key()
741 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
/Linux-v6.1/drivers/i2c/muxes/
DMakefile5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
DKconfig15 I2C multimaster arbitration scheme using GPIOs and a challenge &
20 will be called i2c-arb-gpio-challenge.
/Linux-v6.1/drivers/staging/greybus/Documentation/firmware/
Dauthenticate.c26 .challenge = {0},
/Linux-v6.1/include/linux/
Dnvme-auth.h33 u8 *challenge, u8 *aug, size_t hlen);
/Linux-v6.1/fs/cifs/
Dcifsencrypt.c517 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response()
539 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response()
542 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response()
545 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
/Linux-v6.1/drivers/staging/wlan-ng/
Dp80211mgmt.h291 u8 challenge[1]; member
481 struct wlan_ie_challenge *challenge; member
/Linux-v6.1/drivers/net/wireless/intersil/hostap/
Dhostap_ap.c137 kfree(sta->u.sta.challenge); in ap_free_sta()
1290 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; in handle_authen() local
1362 challenge = (char *) (u + 2); in handle_authen()
1374 sta->u.sta.challenge = NULL; in handle_authen()
1386 sta->u.sta.challenge != NULL)))) { in handle_authen()
1424 if (sta->u.sta.challenge == NULL) { in handle_authen()
1425 sta->u.sta.challenge = in handle_authen()
1427 if (sta->u.sta.challenge == NULL) { in handle_authen()
1433 if (sta->u.sta.challenge == NULL || in handle_authen()
1434 challenge == NULL || in handle_authen()
[all …]
Dhostap_ap.h87 char *challenge; /* shared key authentication member
/Linux-v6.1/net/ceph/
Dauth_x.c793 void *challenge, int challenge_len, in decrypt_authorizer_challenge() argument
800 ret = __ceph_x_decrypt(secret, challenge, challenge_len); in decrypt_authorizer_challenge()
805 dp = challenge + sizeof(struct ceph_x_encrypt_header); in decrypt_authorizer_challenge()
819 void *challenge, int challenge_len) in ceph_x_add_authorizer_challenge() argument
825 ret = decrypt_authorizer_challenge(&au->session_key, challenge, in ceph_x_add_authorizer_challenge()
/Linux-v6.1/drivers/staging/rtl8192u/ieee80211/
Dieee80211_softmac.c1220 u8 *challenge, in ieee80211_auth_challenge() argument
1238 memcpy(c, challenge, chlen); in ieee80211_auth_challenge()
1248 kfree(challenge); in ieee80211_auth_challenge()
1464 static inline int auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) in auth_parse() argument
1472 *challenge = NULL; in auth_parse()
1479 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse()
1480 if (!*challenge) in auth_parse()
1836 u8 *challenge; in ieee80211_check_auth_response() local
1840 errcode = auth_parse(skb, &challenge, &chlen); in ieee80211_check_auth_response()
1842 if (ieee->open_wep || !challenge) { in ieee80211_check_auth_response()
[all …]
/Linux-v6.1/drivers/nvme/common/
Dauth.c331 u8 *challenge, u8 *aug, size_t hlen) in nvme_auth_augmented_challenge() argument
378 ret = crypto_shash_update(desc, challenge, hlen); in nvme_auth_augmented_challenge()
/Linux-v6.1/drivers/media/usb/hdpvr/
Dhdpvr-core.c69 static void challenge(u8 *bytes) in challenge() function
175 challenge(response); in device_authorization()
/Linux-v6.1/Documentation/riscv/
Dpatch-acceptance.rst13 challenge for RISC-V Linux maintenance. Linux maintainers disapprove
/Linux-v6.1/drivers/staging/rtl8192e/
Drtllib_softmac.c1451 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, in rtllib_auth_challenge() argument
1469 memcpy(c, challenge, chlen); in rtllib_auth_challenge()
1480 kfree(challenge); in rtllib_auth_challenge()
1763 u8 **challenge, int *chlen) in auth_parse() argument
1773 *challenge = NULL; in auth_parse()
1780 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse()
1781 if (!*challenge) in auth_parse()
2282 u8 *challenge; in rtllib_rx_auth_resp() local
2286 errcode = auth_parse(ieee->dev, skb, &challenge, &chlen); in rtllib_rx_auth_resp()
2296 if (ieee->open_wep || !challenge) { in rtllib_rx_auth_resp()
[all …]
/Linux-v6.1/drivers/firmware/tegra/
Dbpmp.c538 response.reply = request->challenge << 1; in tegra_bpmp_mrq_handle_ping()
553 request.challenge = 1; in tegra_bpmp_ping()
573 request.challenge, response.reply, in tegra_bpmp_ping()

123