| /linux/fs/afs/ |
| H A D | cm_security.c | 22 static int afs_create_yfs_cm_token(struct sk_buff *challenge, 29 static int afs_respond_to_challenge(struct sk_buff *challenge) in afs_respond_to_challenge() argument 40 rxrpc_kernel_query_challenge(challenge, &peer, &peer_data, in afs_respond_to_challenge() 57 return rxrpc_kernel_reject_challenge(challenge, RX_USER_ABORT, -EPROTO, in afs_respond_to_challenge() 64 return rxkad_kernel_respond_to_challenge(challenge); in afs_respond_to_challenge() 69 return rxgk_kernel_respond_to_challenge(challenge, &appdata); in afs_respond_to_challenge() 79 afs_create_yfs_cm_token(challenge, server); in afs_respond_to_challenge() 86 return rxgk_kernel_respond_to_challenge(challenge, &appdata); in afs_respond_to_challenge() 90 return rxrpc_kernel_reject_challenge(challenge, RX_USER_ABORT, -EPROTO, in afs_respond_to_challenge() 179 static int afs_create_yfs_cm_token(struct sk_buff *challenge, in afs_create_yfs_cm_token() argument [all …]
|
| /linux/drivers/nvme/target/ |
| H A D | auth.c | 299 u8 *challenge = req->sq->dhchap_c1; in nvmet_auth_host_hash() local 337 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_host_hash() 338 if (!challenge) { in nvmet_auth_host_hash() 346 challenge, shash_len); in nvmet_auth_host_hash() 359 ret = crypto_shash_update(shash, challenge, shash_len); in nvmet_auth_host_hash() 390 if (challenge != req->sq->dhchap_c1) in nvmet_auth_host_hash() 391 kfree(challenge); in nvmet_auth_host_hash() 406 u8 *challenge = req->sq->dhchap_c2; in nvmet_auth_ctrl_hash() local 444 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_ctrl_hash() 445 if (!challenge) { in nvmet_auth_ctrl_hash() [all …]
|
| /linux/include/net/ |
| H A D | af_rxrpc.h | 102 void rxrpc_kernel_query_challenge(struct sk_buff *challenge, 106 int rxrpc_kernel_reject_challenge(struct sk_buff *challenge, u32 abort_code, 108 int rxkad_kernel_respond_to_challenge(struct sk_buff *challenge); 109 u32 rxgk_kernel_query_challenge(struct sk_buff *challenge); 110 int rxgk_kernel_respond_to_challenge(struct sk_buff *challenge,
|
| /linux/net/rxrpc/ |
| H A D | rxkad.c | 644 struct rxkad_challenge challenge; in rxkad_issue_challenge() local 656 challenge.version = htonl(2); in rxkad_issue_challenge() 657 challenge.nonce = htonl(conn->rxkad.nonce); in rxkad_issue_challenge() 658 challenge.min_level = htonl(0); in rxkad_issue_challenge() 659 challenge.__padding = 0; in rxkad_issue_challenge() 680 iov[1].iov_base = &challenge; in rxkad_issue_challenge() 681 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge() 760 struct rxkad_challenge challenge; in rxkad_validate_challenge() local 781 &challenge, sizeof(challenge)) < 0) { in rxkad_validate_challenge() 787 version = ntohl(challenge.version); in rxkad_validate_challenge() [all …]
|
| H A D | rxgk.c | 734 u32 rxgk_kernel_query_challenge(struct sk_buff *challenge) in rxgk_kernel_query_challenge() argument 736 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxgk_kernel_query_challenge() 747 struct sk_buff *challenge, in rxgk_challenge_to_recvmsg() argument 830 struct sk_buff *challenge, in rxgk_construct_authenticator() argument 848 ret = skb_copy_bits(challenge, sizeof(struct rxrpc_wire_header), in rxgk_construct_authenticator() 916 struct sk_buff *challenge, in rxgk_construct_response() argument 958 ret = rxgk_construct_authenticator(conn, challenge, appdata, response, in rxgk_construct_response() 986 csp = rxrpc_skb(challenge); in rxgk_construct_response() 1005 struct sk_buff *challenge, in rxgk_respond_to_challenge() argument 1014 return rxgk_construct_response(conn, challenge, appdata); in rxgk_respond_to_challenge() [all …]
|
| H A D | oob.c | 342 void rxrpc_kernel_query_challenge(struct sk_buff *challenge, in rxrpc_kernel_query_challenge() argument 347 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxrpc_kernel_query_challenge() 369 int rxrpc_kernel_reject_challenge(struct sk_buff *challenge, u32 abort_code, in rxrpc_kernel_reject_challenge() argument 372 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxrpc_kernel_reject_challenge()
|
| H A D | insecure.c | 53 static int none_sendmsg_respond_to_challenge(struct sk_buff *challenge, in none_sendmsg_respond_to_challenge() argument
|
| H A D | recvmsg.c | 187 struct sk_buff *challenge, unsigned int flags) in rxrpc_recvmsg_challenge() argument 189 struct rxrpc_skb_priv *sp = rxrpc_skb(challenge); in rxrpc_recvmsg_challenge() 192 return conn->security->challenge_to_recvmsg(conn, challenge, msg); in rxrpc_recvmsg_challenge()
|
| /linux/arch/arm64/include/asm/ |
| H A D | rsi_cmds.h | 110 rsi_attestation_token_init(const u8 *challenge, unsigned long size) in rsi_attestation_token_init() argument 115 if (!challenge || size < 32 || size > 64) in rsi_attestation_token_init() 119 memcpy(®s.a1, challenge, size); in rsi_attestation_token_init()
|
| /linux/drivers/nvme/host/ |
| H A D | auth.c | 438 u8 buf[4], *challenge = chap->c1; in nvme_auth_dhchap_setup_host_response() local 466 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_host_response() 467 if (!challenge) { in nvme_auth_dhchap_setup_host_response() 474 chap->c1, challenge, in nvme_auth_dhchap_setup_host_response() 484 ret = crypto_shash_update(shash, challenge, chap->hash_len); in nvme_auth_dhchap_setup_host_response() 516 if (challenge != chap->c1) in nvme_auth_dhchap_setup_host_response() 517 kfree(challenge); in nvme_auth_dhchap_setup_host_response() 526 u8 buf[4], *challenge = chap->c2; in nvme_auth_dhchap_setup_ctrl_response() local 545 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_ctrl_response() 546 if (!challenge) { in nvme_auth_dhchap_setup_ctrl_response() [all …]
|
| /linux/drivers/virt/coco/arm-cca-guest/ |
| H A D | arm-cca-guest.c | 26 void *challenge; member 39 info->result = rsi_attestation_token_init(info->challenge, in arm_cca_attestation_init() 113 info.challenge = desc->inblob; in arm_cca_report_new()
|
| /linux/drivers/staging/greybus/ |
| H A D | authentication.c | 144 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument 164 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate() 249 authenticate->challenge, in cap_ioctl()
|
| H A D | greybus_authentication.h | 61 __u8 challenge[32]; member
|
| /linux/drivers/target/iscsi/ |
| H A D | iscsi_target_auth.c | 52 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge() 54 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge() 58 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge() 391 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash() 504 !memcmp(initiatorchg_binhex, chap->challenge, in chap_server_compute_hash()
|
| H A D | iscsi_target_auth.h | 37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
|
| /linux/tools/testing/selftests/net/netfilter/packetdrill/ |
| H A D | conntrack_syn_challenge_ack.pkt | 2 // a challenge-ACK. 3 // Check that conntrack lets all packets pass, including the challenge ack,
|
| H A D | conntrack_synack_reuse.pkt | 25 // Won't expect this: challenge ack.
|
| /linux/drivers/thunderbolt/ |
| H A D | domain.c | 714 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 728 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key() 729 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key() 735 challenge, sizeof(challenge), hmac); in tb_domain_challenge_switch_key()
|
| H A D | tb_msgs.h | 256 u32 challenge[8]; member 265 u32 challenge[8]; member 419 u32 challenge[8]; member 449 u32 challenge[8]; member
|
| /linux/fs/smb/client/ |
| H A D | cifsencrypt.c | 326 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response() 329 memcpy(ntlmv2->challenge.key, ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response() 331 memcpy(ntlmv2->challenge.key, ses->server->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response() 335 ntlmv2->challenge.key, hash_len, in CalcNTLMv2_response()
|
| /linux/drivers/i2c/muxes/ |
| H A D | Makefile | 5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
|
| /linux/drivers/staging/greybus/Documentation/firmware/ |
| H A D | authenticate.c | 26 .challenge = {0},
|
| /linux/tools/testing/selftests/net/packetdrill/ |
| H A D | tcp_accecn_3rd_ack_after_synack_rxmt.pkt | 16 // Our code currently sends a challenge ACK
|
| H A D | tcp_accecn_no_ecn_after_accecn.pkt | 18 // Receive a non ECN SYN-ACK and send a challenge ACK with ACE feedback
|
| /linux/include/linux/ |
| H A D | nvme-auth.h | 36 u8 *challenge, u8 *aug, size_t hlen);
|