Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 9 of 9) sorted by relevance

/net/rxrpc/
A Drxkad.c644 struct rxkad_challenge challenge; in rxkad_issue_challenge() local
656 challenge.version = htonl(2); in rxkad_issue_challenge()
658 challenge.min_level = htonl(0); in rxkad_issue_challenge()
659 challenge.__padding = 0; in rxkad_issue_challenge()
680 iov[1].iov_base = &challenge; in rxkad_issue_challenge()
681 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge()
760 struct rxkad_challenge challenge; in rxkad_validate_challenge() local
781 &challenge, sizeof(challenge)) < 0) { in rxkad_validate_challenge()
787 version = ntohl(challenge.version); in rxkad_validate_challenge()
814 struct sk_buff *challenge, in rxkad_insert_response_header() argument
[all …]
A Drxgk.c732 u32 rxgk_kernel_query_challenge(struct sk_buff *challenge) in rxgk_kernel_query_challenge() argument
734 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxgk_kernel_query_challenge()
745 struct sk_buff *challenge, in rxgk_challenge_to_recvmsg() argument
828 struct sk_buff *challenge, in rxgk_construct_authenticator() argument
914 struct sk_buff *challenge, in rxgk_construct_response() argument
984 csp = rxrpc_skb(challenge); in rxgk_construct_response()
1003 struct sk_buff *challenge, in rxgk_respond_to_challenge() argument
1012 return rxgk_construct_response(conn, challenge, appdata); in rxgk_respond_to_challenge()
1016 struct sk_buff *challenge) in rxgk_respond_to_challenge_no_appdata() argument
1020 return rxgk_respond_to_challenge(conn, challenge, &appdata); in rxgk_respond_to_challenge_no_appdata()
[all …]
A Doob.c342 void rxrpc_kernel_query_challenge(struct sk_buff *challenge, in rxrpc_kernel_query_challenge() argument
347 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxrpc_kernel_query_challenge()
369 int rxrpc_kernel_reject_challenge(struct sk_buff *challenge, u32 abort_code, in rxrpc_kernel_reject_challenge() argument
372 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxrpc_kernel_reject_challenge()
A Dinsecure.c53 static int none_sendmsg_respond_to_challenge(struct sk_buff *challenge, in none_sendmsg_respond_to_challenge() argument
A Drecvmsg.c187 struct sk_buff *challenge, unsigned int flags) in rxrpc_recvmsg_challenge() argument
189 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxrpc_recvmsg_challenge()
192 return conn->security->challenge_to_recvmsg(conn, challenge, msg); in rxrpc_recvmsg_challenge()
A Dar-internal.h300 struct sk_buff *challenge,
304 int (*sendmsg_respond_to_challenge)(struct sk_buff *challenge,
309 struct sk_buff *challenge);
/net/ceph/
A Dauth_x.c793 void *challenge, int challenge_len, in decrypt_authorizer_challenge() argument
800 ret = __ceph_x_decrypt(secret, challenge, challenge_len); in decrypt_authorizer_challenge()
805 dp = challenge + sizeof(struct ceph_x_encrypt_header); in decrypt_authorizer_challenge()
819 void *challenge, int challenge_len) in ceph_x_add_authorizer_challenge() argument
825 ret = decrypt_authorizer_challenge(&au->session_key, challenge, in ceph_x_add_authorizer_challenge()
/net/mac80211/
A Dmlme.c4750 const struct element *challenge; in ieee80211_auth_challenge() local
4759 challenge = cfg80211_find_elem(WLAN_EID_CHALLENGE, pos, in ieee80211_auth_challenge()
4761 if (!challenge) in ieee80211_auth_challenge()
4769 (void *)challenge, in ieee80211_auth_challenge()
4770 challenge->datalen + sizeof(*challenge), in ieee80211_auth_challenge()
/net/ipv4/
A DKconfig278 say Y here, the TCP/IP stack will use a cryptographic challenge

Completed in 37 milliseconds