| /Linux-v6.1/drivers/nvme/target/ |
| D | auth.c | 270 u8 *challenge = req->sq->dhchap_c1, *host_response; in nvmet_auth_host_hash() local 306 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_host_hash() 307 if (!challenge) { in nvmet_auth_host_hash() 315 challenge, shash_len); in nvmet_auth_host_hash() 334 ret = crypto_shash_update(shash, challenge, shash_len); in nvmet_auth_host_hash() 364 if (challenge != req->sq->dhchap_c1) in nvmet_auth_host_hash() 365 kfree(challenge); in nvmet_auth_host_hash() 381 u8 *challenge = req->sq->dhchap_c2, *ctrl_response; in nvmet_auth_ctrl_hash() local 418 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_ctrl_hash() 419 if (!challenge) { in nvmet_auth_ctrl_hash() [all …]
|
| /Linux-v6.1/drivers/nvme/host/ |
| D | auth.c | 428 u8 buf[4], *challenge = chap->c1; in nvme_auth_dhchap_setup_host_response() local 456 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_host_response() 457 if (!challenge) { in nvme_auth_dhchap_setup_host_response() 464 chap->c1, challenge, in nvme_auth_dhchap_setup_host_response() 474 ret = crypto_shash_update(shash, challenge, chap->hash_len); in nvme_auth_dhchap_setup_host_response() 505 if (challenge != chap->c1) in nvme_auth_dhchap_setup_host_response() 506 kfree(challenge); in nvme_auth_dhchap_setup_host_response() 515 u8 buf[4], *challenge = chap->c2; in nvme_auth_dhchap_setup_ctrl_response() local 533 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_ctrl_response() 534 if (!challenge) { in nvme_auth_dhchap_setup_ctrl_response() [all …]
|
| /Linux-v6.1/drivers/staging/greybus/ |
| D | authentication.c | 141 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument 161 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate() 246 authenticate->challenge, in cap_ioctl()
|
| D | greybus_authentication.h | 62 __u8 challenge[32]; member
|
| /Linux-v6.1/drivers/target/iscsi/ |
| D | iscsi_target_auth.c | 51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge() 53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge() 57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge() 390 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash() 503 !memcmp(initiatorchg_binhex, chap->challenge, in chap_server_compute_hash()
|
| D | iscsi_target_auth.h | 37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
|
| /Linux-v6.1/net/rxrpc/ |
| D | rxkad.c | 731 struct rxkad_challenge challenge; in rxkad_issue_challenge() local 743 challenge.version = htonl(2); in rxkad_issue_challenge() 744 challenge.nonce = htonl(conn->rxkad.nonce); in rxkad_issue_challenge() 745 challenge.min_level = htonl(0); in rxkad_issue_challenge() 746 challenge.__padding = 0; in rxkad_issue_challenge() 767 iov[1].iov_base = &challenge; in rxkad_issue_challenge() 768 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge() 897 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local 919 &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge() 922 version = ntohl(challenge.version); in rxkad_respond_to_challenge() [all …]
|
| /Linux-v6.1/Documentation/devicetree/bindings/i2c/ |
| D | i2c-arb-gpio-challenge.txt | 3 This uses GPIO lines and a challenge & response mechanism to arbitrate who is 43 - compatible: i2c-arb-gpio-challenge 64 compatible = "i2c-arb-gpio-challenge";
|
| /Linux-v6.1/drivers/thunderbolt/ |
| D | tb_msgs.h | 251 u32 challenge[8]; member 260 u32 challenge[8]; member 414 u32 challenge[8]; member 444 u32 challenge[8]; member
|
| D | domain.c | 702 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 718 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key() 719 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key() 741 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
|
| /Linux-v6.1/drivers/i2c/muxes/ |
| D | Makefile | 5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
|
| D | Kconfig | 15 I2C multimaster arbitration scheme using GPIOs and a challenge & 20 will be called i2c-arb-gpio-challenge.
|
| /Linux-v6.1/drivers/staging/greybus/Documentation/firmware/ |
| D | authenticate.c | 26 .challenge = {0},
|
| /Linux-v6.1/include/linux/ |
| D | nvme-auth.h | 33 u8 *challenge, u8 *aug, size_t hlen);
|
| /Linux-v6.1/fs/cifs/ |
| D | cifsencrypt.c | 517 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response() 539 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 542 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 545 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
|
| /Linux-v6.1/drivers/staging/wlan-ng/ |
| D | p80211mgmt.h | 291 u8 challenge[1]; member 481 struct wlan_ie_challenge *challenge; member
|
| /Linux-v6.1/drivers/net/wireless/intersil/hostap/ |
| D | hostap_ap.c | 137 kfree(sta->u.sta.challenge); in ap_free_sta() 1290 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; in handle_authen() local 1362 challenge = (char *) (u + 2); in handle_authen() 1374 sta->u.sta.challenge = NULL; in handle_authen() 1386 sta->u.sta.challenge != NULL)))) { in handle_authen() 1424 if (sta->u.sta.challenge == NULL) { in handle_authen() 1425 sta->u.sta.challenge = in handle_authen() 1427 if (sta->u.sta.challenge == NULL) { in handle_authen() 1433 if (sta->u.sta.challenge == NULL || in handle_authen() 1434 challenge == NULL || in handle_authen() [all …]
|
| D | hostap_ap.h | 87 char *challenge; /* shared key authentication member
|
| /Linux-v6.1/net/ceph/ |
| D | auth_x.c | 793 void *challenge, int challenge_len, in decrypt_authorizer_challenge() argument 800 ret = __ceph_x_decrypt(secret, challenge, challenge_len); in decrypt_authorizer_challenge() 805 dp = challenge + sizeof(struct ceph_x_encrypt_header); in decrypt_authorizer_challenge() 819 void *challenge, int challenge_len) in ceph_x_add_authorizer_challenge() argument 825 ret = decrypt_authorizer_challenge(&au->session_key, challenge, in ceph_x_add_authorizer_challenge()
|
| /Linux-v6.1/drivers/staging/rtl8192u/ieee80211/ |
| D | ieee80211_softmac.c | 1220 u8 *challenge, in ieee80211_auth_challenge() argument 1238 memcpy(c, challenge, chlen); in ieee80211_auth_challenge() 1248 kfree(challenge); in ieee80211_auth_challenge() 1464 static inline int auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) in auth_parse() argument 1472 *challenge = NULL; in auth_parse() 1479 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1480 if (!*challenge) in auth_parse() 1836 u8 *challenge; in ieee80211_check_auth_response() local 1840 errcode = auth_parse(skb, &challenge, &chlen); in ieee80211_check_auth_response() 1842 if (ieee->open_wep || !challenge) { in ieee80211_check_auth_response() [all …]
|
| /Linux-v6.1/drivers/nvme/common/ |
| D | auth.c | 331 u8 *challenge, u8 *aug, size_t hlen) in nvme_auth_augmented_challenge() argument 378 ret = crypto_shash_update(desc, challenge, hlen); in nvme_auth_augmented_challenge()
|
| /Linux-v6.1/drivers/media/usb/hdpvr/ |
| D | hdpvr-core.c | 69 static void challenge(u8 *bytes) in challenge() function 175 challenge(response); in device_authorization()
|
| /Linux-v6.1/Documentation/riscv/ |
| D | patch-acceptance.rst | 13 challenge for RISC-V Linux maintenance. Linux maintainers disapprove
|
| /Linux-v6.1/drivers/staging/rtl8192e/ |
| D | rtllib_softmac.c | 1451 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, in rtllib_auth_challenge() argument 1469 memcpy(c, challenge, chlen); in rtllib_auth_challenge() 1480 kfree(challenge); in rtllib_auth_challenge() 1763 u8 **challenge, int *chlen) in auth_parse() argument 1773 *challenge = NULL; in auth_parse() 1780 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1781 if (!*challenge) in auth_parse() 2282 u8 *challenge; in rtllib_rx_auth_resp() local 2286 errcode = auth_parse(ieee->dev, skb, &challenge, &chlen); in rtllib_rx_auth_resp() 2296 if (ieee->open_wep || !challenge) { in rtllib_rx_auth_resp() [all …]
|
| /Linux-v6.1/drivers/firmware/tegra/ |
| D | bpmp.c | 538 response.reply = request->challenge << 1; in tegra_bpmp_mrq_handle_ping() 553 request.challenge = 1; in tegra_bpmp_ping() 573 request.challenge, response.reply, in tegra_bpmp_ping()
|