/linux-6.12.1/drivers/nvme/target/ |
D | auth.c | 281 u8 *challenge = req->sq->dhchap_c1; in nvmet_auth_host_hash() local 319 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_host_hash() 320 if (!challenge) { in nvmet_auth_host_hash() 328 challenge, shash_len); in nvmet_auth_host_hash() 347 ret = crypto_shash_update(shash, challenge, shash_len); in nvmet_auth_host_hash() 379 if (challenge != req->sq->dhchap_c1) in nvmet_auth_host_hash() 380 kfree(challenge); in nvmet_auth_host_hash() 395 u8 *challenge = req->sq->dhchap_c2; in nvmet_auth_ctrl_hash() local 433 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_ctrl_hash() 434 if (!challenge) { in nvmet_auth_ctrl_hash() [all …]
|
/linux-6.12.1/drivers/nvme/host/ |
D | auth.c | 422 u8 buf[4], *challenge = chap->c1; in nvme_auth_dhchap_setup_host_response() local 450 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_host_response() 451 if (!challenge) { in nvme_auth_dhchap_setup_host_response() 458 chap->c1, challenge, in nvme_auth_dhchap_setup_host_response() 468 ret = crypto_shash_update(shash, challenge, chap->hash_len); in nvme_auth_dhchap_setup_host_response() 499 if (challenge != chap->c1) in nvme_auth_dhchap_setup_host_response() 500 kfree(challenge); in nvme_auth_dhchap_setup_host_response() 509 u8 buf[4], *challenge = chap->c2; in nvme_auth_dhchap_setup_ctrl_response() local 528 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_ctrl_response() 529 if (!challenge) { in nvme_auth_dhchap_setup_ctrl_response() [all …]
|
/linux-6.12.1/drivers/staging/greybus/ |
D | authentication.c | 144 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument 164 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate() 249 authenticate->challenge, in cap_ioctl()
|
D | greybus_authentication.h | 61 __u8 challenge[32]; member
|
/linux-6.12.1/net/rxrpc/ |
D | rxkad.c | 628 struct rxkad_challenge challenge; in rxkad_issue_challenge() local 640 challenge.version = htonl(2); in rxkad_issue_challenge() 641 challenge.nonce = htonl(conn->rxkad.nonce); in rxkad_issue_challenge() 642 challenge.min_level = htonl(0); in rxkad_issue_challenge() 643 challenge.__padding = 0; in rxkad_issue_challenge() 664 iov[1].iov_base = &challenge; in rxkad_issue_challenge() 665 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge() 792 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local 810 &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge() 814 version = ntohl(challenge.version); in rxkad_respond_to_challenge() [all …]
|
/linux-6.12.1/drivers/target/iscsi/ |
D | iscsi_target_auth.c | 51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge() 53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge() 57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge() 390 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash() 503 !memcmp(initiatorchg_binhex, chap->challenge, in chap_server_compute_hash()
|
D | iscsi_target_auth.h | 37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
|
/linux-6.12.1/tools/testing/selftests/net/netfilter/packetdrill/ |
D | conntrack_syn_challenge_ack.pkt | 2 // a challenge-ACK. 3 // Check that conntrack lets all packets pass, including the challenge ack,
|
D | conntrack_synack_reuse.pkt | 25 // Won't expect this: challenge ack.
|
/linux-6.12.1/drivers/thunderbolt/ |
D | tb_msgs.h | 255 u32 challenge[8]; member 264 u32 challenge[8]; member 418 u32 challenge[8]; member 448 u32 challenge[8]; member
|
D | domain.c | 707 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 723 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key() 724 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key() 746 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
|
/linux-6.12.1/drivers/i2c/muxes/ |
D | Makefile | 5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
|
D | Kconfig | 15 I2C multimaster arbitration scheme using GPIOs and a challenge & 20 will be called i2c-arb-gpio-challenge.
|
/linux-6.12.1/drivers/staging/greybus/Documentation/firmware/ |
D | authenticate.c | 26 .challenge = {0},
|
/linux-6.12.1/fs/smb/client/ |
D | cifsencrypt.c | 513 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response() 528 memcpy(ntlmv2->challenge.key, ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response() 530 memcpy(ntlmv2->challenge.key, ses->server->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response() 532 rc = crypto_shash_update(hmacmd5, ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
|
/linux-6.12.1/include/linux/ |
D | nvme-auth.h | 36 u8 *challenge, u8 *aug, size_t hlen);
|
/linux-6.12.1/drivers/staging/rtl8192e/ |
D | rtllib_softmac.c | 990 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, in rtllib_auth_challenge() argument 1008 memcpy(c, challenge, chlen); in rtllib_auth_challenge() 1019 kfree(challenge); in rtllib_auth_challenge() 1269 u8 **challenge, int *chlen) in auth_parse() argument 1279 *challenge = NULL; in auth_parse() 1286 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1287 if (!*challenge) in auth_parse() 1647 u8 *challenge; in rtllib_rx_auth_resp() local 1651 errcode = auth_parse(ieee->dev, skb, &challenge, &chlen); in rtllib_rx_auth_resp() 1661 if (ieee->open_wep || !challenge) { in rtllib_rx_auth_resp() [all …]
|
/linux-6.12.1/drivers/gpu/drm/ttm/tests/ |
D | TODO | 24 a challenge, but is worth trying. Look at selftests like
|
/linux-6.12.1/net/ceph/ |
D | auth_x.c | 793 void *challenge, int challenge_len, in decrypt_authorizer_challenge() argument 800 ret = __ceph_x_decrypt(secret, challenge, challenge_len); in decrypt_authorizer_challenge() 805 dp = challenge + sizeof(struct ceph_x_encrypt_header); in decrypt_authorizer_challenge() 819 void *challenge, int challenge_len) in ceph_x_add_authorizer_challenge() argument 825 ret = decrypt_authorizer_challenge(&au->session_key, challenge, in ceph_x_add_authorizer_challenge()
|
/linux-6.12.1/drivers/nvme/common/ |
D | auth.c | 341 u8 *challenge, u8 *aug, size_t hlen) in nvme_auth_augmented_challenge() argument 375 ret = crypto_shash_tfm_digest(tfm, challenge, hlen, aug); in nvme_auth_augmented_challenge()
|
/linux-6.12.1/drivers/media/usb/hdpvr/ |
D | hdpvr-core.c | 69 static void challenge(u8 *bytes) in challenge() function 175 challenge(response); in device_authorization()
|
/linux-6.12.1/drivers/firmware/tegra/ |
D | bpmp.c | 545 response.reply = request.challenge << 1; in tegra_bpmp_mrq_handle_ping() 560 request.challenge = 1; in tegra_bpmp_ping() 580 request.challenge, response.reply, in tegra_bpmp_ping()
|
/linux-6.12.1/Documentation/admin-guide/ |
D | thunderbolt.rst | 69 a challenge that should match the expected one based on a random key 148 Next time the device is plugged in the user can verify (challenge) the 154 If the challenge the device returns back matches the one we expect based 156 However, if the challenge fails no tunnels are created and error is
|
/linux-6.12.1/Documentation/arch/riscv/ |
D | patch-acceptance.rst | 13 challenge for RISC-V Linux maintenance. Linux maintainers disapprove
|
/linux-6.12.1/Documentation/ABI/testing/ |
D | sysfs-bus-thunderbolt | 91 2 Send a challenge based on the 32 byte hex string. If the 92 challenge response from device is valid, the device is 95 EKEYREJECTED if the challenge response did not match.
|