Searched refs:challenge (Results 1 - 25 of 27) sorted by relevance

12

/linux-master/drivers/target/iscsi/
H A Discsi_target_auth.h37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member in struct:iscsi_chap
H A Discsi_target_auth.c51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN);
53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len);
57 bin2hex(challenge_asciihex, chap->challenge,
60 * Set CHAP_C, and copy the generated challenge into c_str.
182 /* Tie the challenge length to the digest size */
293 pr_err("Unable to allocate challenge buffer\n");
390 ret = crypto_shash_finup(desc, chap->challenge,
393 pr_err("crypto_shash_finup() failed for challenge\n");
460 pr_err("Unable to convert incoming challenge\n");
483 pr_err("Unable to convert incoming challenge\
[all...]
/linux-master/drivers/i2c/muxes/
H A DMakefile5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
/linux-master/drivers/nvme/target/
H A Dauth.c270 u8 *challenge = req->sq->dhchap_c1; local
308 challenge = kmalloc(shash_len, GFP_KERNEL);
309 if (!challenge) {
317 challenge, shash_len);
336 ret = crypto_shash_update(shash, challenge, shash_len);
366 if (challenge != req->sq->dhchap_c1)
367 kfree(challenge);
383 u8 *challenge = req->sq->dhchap_c2; local
421 challenge = kmalloc(shash_len, GFP_KERNEL);
422 if (!challenge) {
[all...]
/linux-master/drivers/staging/greybus/Documentation/firmware/
H A Dauthenticate.c26 .challenge = {0},
/linux-master/include/linux/
H A Dnvme-auth.h36 u8 *challenge, u8 *aug, size_t hlen);
/linux-master/drivers/staging/greybus/
H A Dgreybus_authentication.h61 __u8 challenge[32]; member in struct:cap_ioc_authenticate
H A Dauthentication.c144 u8 *challenge, u8 *result, u8 *auth_response,
164 memcpy(request->challenge, challenge, sizeof(request->challenge));
249 authenticate->challenge,
143 cap_authenticate(struct gb_cap *cap, u32 auth_type, u8 *uid, u8 *challenge, u8 *result, u8 *auth_response, u32 *signature_size, u8 *signature) argument
/linux-master/drivers/nvme/host/
H A Dauth.c320 dev_dbg(ctrl->device, "%s: qid %d ctrl challenge %*ph\n",
422 u8 buf[4], *challenge = chap->c1; local
450 challenge = kmalloc(chap->hash_len, GFP_KERNEL);
451 if (!challenge) {
458 chap->c1, challenge,
468 ret = crypto_shash_update(shash, challenge, chap->hash_len);
499 if (challenge != chap->c1)
500 kfree(challenge);
509 u8 buf[4], *challenge = chap->c2; local
528 challenge
[all...]
/linux-master/net/rxrpc/
H A Drxkad.c624 * issue a challenge
628 struct rxkad_challenge challenge; local
640 challenge.version = htonl(2);
641 challenge.nonce = htonl(conn->rxkad.nonce);
642 challenge.min_level = htonl(0);
643 challenge.__padding = 0;
664 iov[1].iov_base = &challenge;
665 iov[1].iov_len = sizeof(challenge);
786 * respond to a challenge packet
792 struct rxkad_challenge challenge; local
[all...]
/linux-master/drivers/thunderbolt/
H A Dtb_msgs.h261 u32 challenge[8]; member in struct:icm_fr_pkg_challenge_device
270 u32 challenge[8]; member in struct:icm_fr_pkg_challenge_device_response
424 u32 challenge[8]; member in struct:icm_tr_pkg_challenge_device
454 u32 challenge[8]; member in struct:icm_tr_pkg_challenge_device_response
H A Ddomain.c699 * random challenge and sends it to the switch. The switch responds to
700 * this and if the response matches our random challenge, the switch is
707 u8 challenge[TB_SWITCH_KEY_SIZE]; local
723 get_random_bytes(challenge, sizeof(challenge));
724 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response);
746 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac);
H A Dicm.c531 const u8 *challenge, u8 *response)
542 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE);
1097 const u8 *challenge, u8 *response)
1109 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE);
530 icm_fr_challenge_switch_key(struct tb *tb, struct tb_switch *sw, const u8 *challenge, u8 *response) argument
1096 icm_tr_challenge_switch_key(struct tb *tb, struct tb_switch *sw, const u8 *challenge, u8 *response) argument
H A Dtb.h147 * @key: Contains the key used to challenge the device or %NULL if not
520 const u8 *challenge, u8 *response);
/linux-master/net/ceph/
H A Dauth_x.c685 dout("handle_reply got server challenge %llx\n",
793 void *challenge, int challenge_len,
800 ret = __ceph_x_decrypt(secret, challenge, challenge_len);
805 dp = challenge + sizeof(struct ceph_x_encrypt_header);
819 void *challenge, int challenge_len)
825 ret = decrypt_authorizer_challenge(&au->session_key, challenge,
828 pr_err("failed to decrypt authorize challenge: %d", ret);
834 pr_err("failed to encrypt authorizer w/ challenge: %d", ret);
792 decrypt_authorizer_challenge(struct ceph_crypto_key *secret, void *challenge, int challenge_len, u64 *server_challenge) argument
817 ceph_x_add_authorizer_challenge(struct ceph_auth_client *ac, struct ceph_authorizer *a, void *challenge, int challenge_len) argument
/linux-master/drivers/media/usb/hdpvr/
H A Dhdpvr-core.c69 static void challenge(u8 *bytes) function
172 v4l2_dbg(MSG_INFO, hdpvr_debug, &dev->v4l2_dev, "challenge: %8ph\n",
175 challenge(response);
/linux-master/drivers/nvme/common/
H A Dauth.c341 u8 *challenge, u8 *aug, size_t hlen)
375 ret = crypto_shash_tfm_digest(tfm, challenge, hlen, aug);
340 nvme_auth_augmented_challenge(u8 hmac_id, u8 *skey, size_t skey_len, u8 *challenge, u8 *aug, size_t hlen) argument
/linux-master/drivers/staging/rtl8192e/
H A Drtllib_softmac.c990 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, argument
1008 memcpy(c, challenge, chlen);
1011 "Sending authentication challenge response\n");
1019 kfree(challenge);
1269 u8 **challenge, int *chlen)
1279 *challenge = NULL;
1286 *challenge = kmemdup(t, *chlen, GFP_ATOMIC);
1287 if (!*challenge)
1647 u8 *challenge; local
1651 errcode = auth_parse(ieee->dev, skb, &challenge,
1268 auth_parse(struct net_device *dev, struct sk_buff *skb, u8 **challenge, int *chlen) argument
[all...]
/linux-master/fs/smb/client/
H A Dcifsencrypt.c432 /* Server has provided av pairs/target info in the type 2 challenge
488 /* Server has provided av pairs/target info in the type 2 challenge
646 offsetof(struct ntlmv2_resp, challenge.key[0]));
668 memcpy(ntlmv2->challenge.key,
671 memcpy(ntlmv2->challenge.key,
674 ntlmv2->challenge.key, hash_len);
/linux-master/drivers/firmware/tegra/
H A Dbpmp.c555 response.reply = request.challenge << 1;
570 request.challenge = 1;
589 "ping ok: challenge: %u, response: %u, time: %lld\n",
590 request.challenge, response.reply,
/linux-master/include/soc/tegra/
H A Dbpmp-abi.h445 * #challenge.
449 uint32_t challenge; member in struct:mrq_ping_request
457 * mrq_ping_request challenge left shifted by 1 with the carry-bit
522 uint32_t challenge; member in struct:mrq_threaded_ping_request
/linux-master/drivers/staging/rtl8723bs/include/
H A Dieee80211.h687 u8 *challenge; member in struct:rtw_ieee802_11_elems
/linux-master/drivers/staging/rtl8723bs/core/
H A Drtw_ieee80211.c893 elems->challenge = pos;
/linux-master/net/mac80211/
H A Dmlme.c3790 const struct element *challenge; local
3799 challenge = cfg80211_find_elem(WLAN_EID_CHALLENGE, pos,
3801 if (!challenge)
3809 (void *)challenge,
3810 challenge->datalen + sizeof(*challenge),
/linux-master/include/linux/greybus/
H A Dgreybus_protocols.h353 __u8 challenge[32]; member in struct:gb_cap_authenticate_request

Completed in 283 milliseconds

12