Searched refs:challenge (Results 1 – 9 of 9) sorted by relevance
| /net/rxrpc/ |
| A D | rxkad.c | 644 struct rxkad_challenge challenge; in rxkad_issue_challenge() local 656 challenge.version = htonl(2); in rxkad_issue_challenge() 658 challenge.min_level = htonl(0); in rxkad_issue_challenge() 659 challenge.__padding = 0; in rxkad_issue_challenge() 680 iov[1].iov_base = &challenge; in rxkad_issue_challenge() 681 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge() 760 struct rxkad_challenge challenge; in rxkad_validate_challenge() local 781 &challenge, sizeof(challenge)) < 0) { in rxkad_validate_challenge() 787 version = ntohl(challenge.version); in rxkad_validate_challenge() 814 struct sk_buff *challenge, in rxkad_insert_response_header() argument [all …]
|
| A D | rxgk.c | 732 u32 rxgk_kernel_query_challenge(struct sk_buff *challenge) in rxgk_kernel_query_challenge() argument 734 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxgk_kernel_query_challenge() 745 struct sk_buff *challenge, in rxgk_challenge_to_recvmsg() argument 828 struct sk_buff *challenge, in rxgk_construct_authenticator() argument 914 struct sk_buff *challenge, in rxgk_construct_response() argument 984 csp = rxrpc_skb(challenge); in rxgk_construct_response() 1003 struct sk_buff *challenge, in rxgk_respond_to_challenge() argument 1012 return rxgk_construct_response(conn, challenge, appdata); in rxgk_respond_to_challenge() 1016 struct sk_buff *challenge) in rxgk_respond_to_challenge_no_appdata() argument 1020 return rxgk_respond_to_challenge(conn, challenge, &appdata); in rxgk_respond_to_challenge_no_appdata() [all …]
|
| A D | oob.c | 342 void rxrpc_kernel_query_challenge(struct sk_buff *challenge, in rxrpc_kernel_query_challenge() argument 347 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxrpc_kernel_query_challenge() 369 int rxrpc_kernel_reject_challenge(struct sk_buff *challenge, u32 abort_code, in rxrpc_kernel_reject_challenge() argument 372 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxrpc_kernel_reject_challenge()
|
| A D | insecure.c | 53 static int none_sendmsg_respond_to_challenge(struct sk_buff *challenge, in none_sendmsg_respond_to_challenge() argument
|
| A D | recvmsg.c | 187 struct sk_buff *challenge, unsigned int flags) in rxrpc_recvmsg_challenge() argument 189 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxrpc_recvmsg_challenge() 192 return conn->security->challenge_to_recvmsg(conn, challenge, msg); in rxrpc_recvmsg_challenge()
|
| A D | ar-internal.h | 300 struct sk_buff *challenge, 304 int (*sendmsg_respond_to_challenge)(struct sk_buff *challenge, 309 struct sk_buff *challenge);
|
| /net/ceph/ |
| A D | auth_x.c | 793 void *challenge, int challenge_len, in decrypt_authorizer_challenge() argument 800 ret = __ceph_x_decrypt(secret, challenge, challenge_len); in decrypt_authorizer_challenge() 805 dp = challenge + sizeof(struct ceph_x_encrypt_header); in decrypt_authorizer_challenge() 819 void *challenge, int challenge_len) in ceph_x_add_authorizer_challenge() argument 825 ret = decrypt_authorizer_challenge(&au->session_key, challenge, in ceph_x_add_authorizer_challenge()
|
| /net/mac80211/ |
| A D | mlme.c | 4750 const struct element *challenge; in ieee80211_auth_challenge() local 4759 challenge = cfg80211_find_elem(WLAN_EID_CHALLENGE, pos, in ieee80211_auth_challenge() 4761 if (!challenge) in ieee80211_auth_challenge() 4769 (void *)challenge, in ieee80211_auth_challenge() 4770 challenge->datalen + sizeof(*challenge), in ieee80211_auth_challenge()
|
| /net/ipv4/ |
| A D | Kconfig | 278 say Y here, the TCP/IP stack will use a cryptographic challenge
|
Completed in 37 milliseconds