/linux-6.3-rc2/drivers/nvme/target/ |
A D | auth.c | 270 u8 *challenge = req->sq->dhchap_c1, *host_response; in nvmet_auth_host_hash() local 306 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_host_hash() 307 if (!challenge) { in nvmet_auth_host_hash() 315 challenge, shash_len); in nvmet_auth_host_hash() 364 if (challenge != req->sq->dhchap_c1) in nvmet_auth_host_hash() 365 kfree(challenge); in nvmet_auth_host_hash() 418 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_ctrl_hash() 419 if (!challenge) { in nvmet_auth_ctrl_hash() 427 challenge, shash_len); in nvmet_auth_ctrl_hash() 473 if (challenge != req->sq->dhchap_c2) in nvmet_auth_ctrl_hash() [all …]
|
/linux-6.3-rc2/drivers/nvme/host/ |
A D | auth.c | 425 u8 buf[4], *challenge = chap->c1; in nvme_auth_dhchap_setup_host_response() local 453 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_host_response() 454 if (!challenge) { in nvme_auth_dhchap_setup_host_response() 461 chap->c1, challenge, in nvme_auth_dhchap_setup_host_response() 502 if (challenge != chap->c1) in nvme_auth_dhchap_setup_host_response() 503 kfree(challenge); in nvme_auth_dhchap_setup_host_response() 512 u8 buf[4], *challenge = chap->c2; in nvme_auth_dhchap_setup_ctrl_response() local 532 if (!challenge) { in nvme_auth_dhchap_setup_ctrl_response() 539 chap->c2, challenge, in nvme_auth_dhchap_setup_ctrl_response() 587 if (challenge != chap->c2) in nvme_auth_dhchap_setup_ctrl_response() [all …]
|
/linux-6.3-rc2/drivers/staging/greybus/ |
A D | authentication.c | 141 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument 161 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate() 246 authenticate->challenge, in cap_ioctl()
|
A D | greybus_authentication.h | 62 __u8 challenge[32]; member
|
/linux-6.3-rc2/net/rxrpc/ |
A D | rxkad.c | 626 struct rxkad_challenge challenge; in rxkad_issue_challenge() local 638 challenge.version = htonl(2); in rxkad_issue_challenge() 640 challenge.min_level = htonl(0); in rxkad_issue_challenge() 641 challenge.__padding = 0; in rxkad_issue_challenge() 662 iov[1].iov_base = &challenge; in rxkad_issue_challenge() 663 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge() 789 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local 807 &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge() 811 version = ntohl(challenge.version); in rxkad_respond_to_challenge() 812 nonce = ntohl(challenge.nonce); in rxkad_respond_to_challenge() [all …]
|
/linux-6.3-rc2/drivers/target/iscsi/ |
A D | iscsi_target_auth.c | 51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge() 53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge() 57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge() 390 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash() 503 !memcmp(initiatorchg_binhex, chap->challenge, in chap_server_compute_hash()
|
A D | iscsi_target_auth.h | 37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
|
/linux-6.3-rc2/Documentation/devicetree/bindings/i2c/ |
A D | i2c-arb-gpio-challenge.txt | 3 This uses GPIO lines and a challenge & response mechanism to arbitrate who is 43 - compatible: i2c-arb-gpio-challenge 64 compatible = "i2c-arb-gpio-challenge";
|
/linux-6.3-rc2/drivers/thunderbolt/ |
A D | tb_msgs.h | 254 u32 challenge[8]; member 263 u32 challenge[8]; member 417 u32 challenge[8]; member 447 u32 challenge[8]; member
|
A D | domain.c | 702 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 718 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key() 719 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key() 741 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
|
/linux-6.3-rc2/drivers/i2c/muxes/ |
A D | Makefile | 5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
|
A D | Kconfig | 15 I2C multimaster arbitration scheme using GPIOs and a challenge & 20 will be called i2c-arb-gpio-challenge.
|
/linux-6.3-rc2/drivers/staging/greybus/Documentation/firmware/ |
A D | authenticate.c | 26 .challenge = {0},
|
/linux-6.3-rc2/include/linux/ |
A D | nvme-auth.h | 33 u8 *challenge, u8 *aug, size_t hlen);
|
/linux-6.3-rc2/drivers/net/wireless/intersil/hostap/ |
A D | hostap_ap.c | 137 kfree(sta->u.sta.challenge); in ap_free_sta() 1362 challenge = (char *) (u + 2); in handle_authen() 1374 sta->u.sta.challenge = NULL; in handle_authen() 1424 if (sta->u.sta.challenge == NULL) { in handle_authen() 1425 sta->u.sta.challenge = in handle_authen() 1433 if (sta->u.sta.challenge == NULL || in handle_authen() 1434 challenge == NULL || in handle_authen() 1435 memcmp(sta->u.sta.challenge, challenge, in handle_authen() 1450 kfree(sta->u.sta.challenge); in handle_authen() 1451 sta->u.sta.challenge = NULL; in handle_authen() [all …]
|
A D | hostap_ap.h | 87 char *challenge; /* shared key authentication member
|
/linux-6.3-rc2/fs/cifs/ |
A D | cifsencrypt.c | 646 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response() 668 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 671 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 674 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
|
/linux-6.3-rc2/net/ceph/ |
A D | auth_x.c | 793 void *challenge, int challenge_len, in decrypt_authorizer_challenge() argument 800 ret = __ceph_x_decrypt(secret, challenge, challenge_len); in decrypt_authorizer_challenge() 805 dp = challenge + sizeof(struct ceph_x_encrypt_header); in decrypt_authorizer_challenge() 819 void *challenge, int challenge_len) in ceph_x_add_authorizer_challenge() argument 825 ret = decrypt_authorizer_challenge(&au->session_key, challenge, in ceph_x_add_authorizer_challenge()
|
/linux-6.3-rc2/drivers/staging/rtl8192u/ieee80211/ |
A D | ieee80211_softmac.c | 1220 u8 *challenge, in ieee80211_auth_challenge() argument 1238 memcpy(c, challenge, chlen); in ieee80211_auth_challenge() 1248 kfree(challenge); in ieee80211_auth_challenge() 1464 static inline int auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) in auth_parse() argument 1472 *challenge = NULL; in auth_parse() 1479 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1480 if (!*challenge) in auth_parse() 1836 u8 *challenge; in ieee80211_check_auth_response() local 1840 errcode = auth_parse(skb, &challenge, &chlen); in ieee80211_check_auth_response() 1842 if (ieee->open_wep || !challenge) { in ieee80211_check_auth_response() [all …]
|
/linux-6.3-rc2/drivers/nvme/common/ |
A D | auth.c | 331 u8 *challenge, u8 *aug, size_t hlen) in nvme_auth_augmented_challenge() argument 378 ret = crypto_shash_update(desc, challenge, hlen); in nvme_auth_augmented_challenge()
|
/linux-6.3-rc2/drivers/media/usb/hdpvr/ |
A D | hdpvr-core.c | 69 static void challenge(u8 *bytes) in challenge() function 175 challenge(response); in device_authorization()
|
/linux-6.3-rc2/drivers/staging/rtl8192e/ |
A D | rtllib_softmac.c | 1450 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, in rtllib_auth_challenge() argument 1468 memcpy(c, challenge, chlen); in rtllib_auth_challenge() 1479 kfree(challenge); in rtllib_auth_challenge() 1762 u8 **challenge, int *chlen) in auth_parse() argument 1772 *challenge = NULL; in auth_parse() 1779 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1780 if (!*challenge) in auth_parse() 2281 u8 *challenge; in rtllib_rx_auth_resp() local 2285 errcode = auth_parse(ieee->dev, skb, &challenge, &chlen); in rtllib_rx_auth_resp() 2295 if (ieee->open_wep || !challenge) { in rtllib_rx_auth_resp() [all …]
|
/linux-6.3-rc2/Documentation/riscv/ |
A D | patch-acceptance.rst | 13 challenge for RISC-V Linux maintenance. Linux maintainers disapprove
|
/linux-6.3-rc2/drivers/firmware/tegra/ |
A D | bpmp.c | 538 response.reply = request.challenge << 1; in tegra_bpmp_mrq_handle_ping() 553 request.challenge = 1; in tegra_bpmp_ping() 573 request.challenge, response.reply, in tegra_bpmp_ping()
|
/linux-6.3-rc2/Documentation/admin-guide/ |
A D | thunderbolt.rst | 69 a challenge that should match the expected one based on a random key 148 Next time the device is plugged in the user can verify (challenge) the 154 If the challenge the device returns back matches the one we expect based 156 However, if the challenge fails no tunnels are created and error is
|