Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 25 of 57) sorted by relevance

123

/Linux-v6.6/drivers/nvme/target/
Dauth.c270 u8 *challenge = req->sq->dhchap_c1, *host_response; in nvmet_auth_host_hash() local
306 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_host_hash()
307 if (!challenge) { in nvmet_auth_host_hash()
315 challenge, shash_len); in nvmet_auth_host_hash()
334 ret = crypto_shash_update(shash, challenge, shash_len); in nvmet_auth_host_hash()
364 if (challenge != req->sq->dhchap_c1) in nvmet_auth_host_hash()
365 kfree(challenge); in nvmet_auth_host_hash()
381 u8 *challenge = req->sq->dhchap_c2, *ctrl_response; in nvmet_auth_ctrl_hash() local
418 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_ctrl_hash()
419 if (!challenge) { in nvmet_auth_ctrl_hash()
[all …]
/Linux-v6.6/drivers/nvme/host/
Dauth.c425 u8 buf[4], *challenge = chap->c1; in nvme_auth_dhchap_setup_host_response() local
453 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_host_response()
454 if (!challenge) { in nvme_auth_dhchap_setup_host_response()
461 chap->c1, challenge, in nvme_auth_dhchap_setup_host_response()
471 ret = crypto_shash_update(shash, challenge, chap->hash_len); in nvme_auth_dhchap_setup_host_response()
502 if (challenge != chap->c1) in nvme_auth_dhchap_setup_host_response()
503 kfree(challenge); in nvme_auth_dhchap_setup_host_response()
512 u8 buf[4], *challenge = chap->c2; in nvme_auth_dhchap_setup_ctrl_response() local
531 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_ctrl_response()
532 if (!challenge) { in nvme_auth_dhchap_setup_ctrl_response()
[all …]
/Linux-v6.6/drivers/staging/greybus/
Dauthentication.c141 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument
161 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate()
246 authenticate->challenge, in cap_ioctl()
Dgreybus_authentication.h61 __u8 challenge[32]; member
/Linux-v6.6/net/rxrpc/
Drxkad.c626 struct rxkad_challenge challenge; in rxkad_issue_challenge() local
638 challenge.version = htonl(2); in rxkad_issue_challenge()
639 challenge.nonce = htonl(conn->rxkad.nonce); in rxkad_issue_challenge()
640 challenge.min_level = htonl(0); in rxkad_issue_challenge()
641 challenge.__padding = 0; in rxkad_issue_challenge()
662 iov[1].iov_base = &challenge; in rxkad_issue_challenge()
663 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge()
789 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local
807 &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge()
811 version = ntohl(challenge.version); in rxkad_respond_to_challenge()
[all …]
/Linux-v6.6/drivers/target/iscsi/
Discsi_target_auth.c51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge()
53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge()
57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge()
390 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash()
503 !memcmp(initiatorchg_binhex, chap->challenge, in chap_server_compute_hash()
Discsi_target_auth.h37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
/Linux-v6.6/drivers/thunderbolt/
Dtb_msgs.h261 u32 challenge[8]; member
270 u32 challenge[8]; member
424 u32 challenge[8]; member
454 u32 challenge[8]; member
Ddomain.c702 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local
718 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key()
719 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key()
741 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
/Linux-v6.6/drivers/i2c/muxes/
DMakefile5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
DKconfig15 I2C multimaster arbitration scheme using GPIOs and a challenge &
20 will be called i2c-arb-gpio-challenge.
/Linux-v6.6/drivers/staging/greybus/Documentation/firmware/
Dauthenticate.c26 .challenge = {0},
/Linux-v6.6/include/linux/
Dnvme-auth.h33 u8 *challenge, u8 *aug, size_t hlen);
/Linux-v6.6/drivers/net/wireless/intersil/hostap/
Dhostap_ap.c137 kfree(sta->u.sta.challenge); in ap_free_sta()
1290 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; in handle_authen() local
1362 challenge = (char *) (u + 2); in handle_authen()
1374 sta->u.sta.challenge = NULL; in handle_authen()
1386 sta->u.sta.challenge != NULL)))) { in handle_authen()
1424 if (sta->u.sta.challenge == NULL) { in handle_authen()
1425 sta->u.sta.challenge = in handle_authen()
1427 if (sta->u.sta.challenge == NULL) { in handle_authen()
1433 if (sta->u.sta.challenge == NULL || in handle_authen()
1434 challenge == NULL || in handle_authen()
[all …]
Dhostap_ap.h87 char *challenge; /* shared key authentication member
/Linux-v6.6/fs/smb/client/
Dcifsencrypt.c646 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response()
668 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response()
671 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response()
674 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
/Linux-v6.6/net/ceph/
Dauth_x.c793 void *challenge, int challenge_len, in decrypt_authorizer_challenge() argument
800 ret = __ceph_x_decrypt(secret, challenge, challenge_len); in decrypt_authorizer_challenge()
805 dp = challenge + sizeof(struct ceph_x_encrypt_header); in decrypt_authorizer_challenge()
819 void *challenge, int challenge_len) in ceph_x_add_authorizer_challenge() argument
825 ret = decrypt_authorizer_challenge(&au->session_key, challenge, in ceph_x_add_authorizer_challenge()
/Linux-v6.6/drivers/staging/rtl8192e/
Drtllib_softmac.c1290 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, in rtllib_auth_challenge() argument
1308 memcpy(c, challenge, chlen); in rtllib_auth_challenge()
1319 kfree(challenge); in rtllib_auth_challenge()
1585 u8 **challenge, int *chlen) in auth_parse() argument
1595 *challenge = NULL; in auth_parse()
1602 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse()
1603 if (!*challenge) in auth_parse()
2034 u8 *challenge; in rtllib_rx_auth_resp() local
2038 errcode = auth_parse(ieee->dev, skb, &challenge, &chlen); in rtllib_rx_auth_resp()
2048 if (ieee->open_wep || !challenge) { in rtllib_rx_auth_resp()
[all …]
/Linux-v6.6/drivers/staging/rtl8192u/ieee80211/
Dieee80211_softmac.c1220 u8 *challenge, in ieee80211_auth_challenge() argument
1238 memcpy(c, challenge, chlen); in ieee80211_auth_challenge()
1248 kfree(challenge); in ieee80211_auth_challenge()
1464 static inline int auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) in auth_parse() argument
1472 *challenge = NULL; in auth_parse()
1479 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse()
1480 if (!*challenge) in auth_parse()
1836 u8 *challenge; in ieee80211_check_auth_response() local
1840 errcode = auth_parse(skb, &challenge, &chlen); in ieee80211_check_auth_response()
1842 if (ieee->open_wep || !challenge) { in ieee80211_check_auth_response()
[all …]
/Linux-v6.6/drivers/nvme/common/
Dauth.c331 u8 *challenge, u8 *aug, size_t hlen) in nvme_auth_augmented_challenge() argument
378 ret = crypto_shash_update(desc, challenge, hlen); in nvme_auth_augmented_challenge()
/Linux-v6.6/drivers/media/usb/hdpvr/
Dhdpvr-core.c69 static void challenge(u8 *bytes) in challenge() function
175 challenge(response); in device_authorization()
/Linux-v6.6/drivers/firmware/tegra/
Dbpmp.c537 response.reply = request.challenge << 1; in tegra_bpmp_mrq_handle_ping()
552 request.challenge = 1; in tegra_bpmp_ping()
572 request.challenge, response.reply, in tegra_bpmp_ping()
/Linux-v6.6/Documentation/admin-guide/
Dthunderbolt.rst69 a challenge that should match the expected one based on a random key
148 Next time the device is plugged in the user can verify (challenge) the
154 If the challenge the device returns back matches the one we expect based
156 However, if the challenge fails no tunnels are created and error is
/Linux-v6.6/Documentation/riscv/
Dpatch-acceptance.rst13 challenge for RISC-V Linux maintenance. Linux maintainers disapprove
/Linux-v6.6/Documentation/ABI/testing/
Dsysfs-bus-thunderbolt91 2 Send a challenge based on the 32 byte hex string. If the
92 challenge response from device is valid, the device is
95 EKEYREJECTED if the challenge response did not match.

123