/linux-master/drivers/i2c/muxes/ |
H A D | Makefile | 5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
|
/linux-master/drivers/firmware/tegra/ |
H A D | bpmp.c | 555 response.reply = request.challenge << 1; 570 request.challenge = 1; 589 "ping ok: challenge: %u, response: %u, time: %lld\n", 590 request.challenge, response.reply,
|
/linux-master/drivers/media/usb/hdpvr/ |
H A D | hdpvr-core.c | 69 static void challenge(u8 *bytes) function 172 v4l2_dbg(MSG_INFO, hdpvr_debug, &dev->v4l2_dev, "challenge: %8ph\n", 175 challenge(response);
|
/linux-master/drivers/nvme/common/ |
H A D | auth.c | 341 u8 *challenge, u8 *aug, size_t hlen) 375 ret = crypto_shash_tfm_digest(tfm, challenge, hlen, aug); 340 nvme_auth_augmented_challenge(u8 hmac_id, u8 *skey, size_t skey_len, u8 *challenge, u8 *aug, size_t hlen) argument
|
/linux-master/drivers/nvme/host/ |
H A D | auth.c | 320 dev_dbg(ctrl->device, "%s: qid %d ctrl challenge %*ph\n", 422 u8 buf[4], *challenge = chap->c1; local 450 challenge = kmalloc(chap->hash_len, GFP_KERNEL); 451 if (!challenge) { 458 chap->c1, challenge, 468 ret = crypto_shash_update(shash, challenge, chap->hash_len); 499 if (challenge != chap->c1) 500 kfree(challenge); 509 u8 buf[4], *challenge = chap->c2; local 528 challenge [all...] |
/linux-master/drivers/nvme/target/ |
H A D | auth.c | 270 u8 *challenge = req->sq->dhchap_c1; local 308 challenge = kmalloc(shash_len, GFP_KERNEL); 309 if (!challenge) { 317 challenge, shash_len); 336 ret = crypto_shash_update(shash, challenge, shash_len); 366 if (challenge != req->sq->dhchap_c1) 367 kfree(challenge); 383 u8 *challenge = req->sq->dhchap_c2; local 421 challenge = kmalloc(shash_len, GFP_KERNEL); 422 if (!challenge) { [all...] |
/linux-master/drivers/staging/greybus/Documentation/firmware/ |
H A D | authenticate.c | 26 .challenge = {0},
|
/linux-master/drivers/staging/greybus/ |
H A D | authentication.c | 144 u8 *challenge, u8 *result, u8 *auth_response, 164 memcpy(request->challenge, challenge, sizeof(request->challenge)); 249 authenticate->challenge, 143 cap_authenticate(struct gb_cap *cap, u32 auth_type, u8 *uid, u8 *challenge, u8 *result, u8 *auth_response, u32 *signature_size, u8 *signature) argument
|
H A D | greybus_authentication.h | 61 __u8 challenge[32]; member in struct:cap_ioc_authenticate
|
/linux-master/drivers/staging/rtl8192e/ |
H A D | rtllib_softmac.c | 990 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, argument 1008 memcpy(c, challenge, chlen); 1011 "Sending authentication challenge response\n"); 1019 kfree(challenge); 1269 u8 **challenge, int *chlen) 1279 *challenge = NULL; 1286 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); 1287 if (!*challenge) 1647 u8 *challenge; local 1651 errcode = auth_parse(ieee->dev, skb, &challenge, 1268 auth_parse(struct net_device *dev, struct sk_buff *skb, u8 **challenge, int *chlen) argument [all...] |
/linux-master/drivers/staging/rtl8723bs/core/ |
H A D | rtw_ieee80211.c | 893 elems->challenge = pos;
|
/linux-master/drivers/staging/rtl8723bs/include/ |
H A D | ieee80211.h | 687 u8 *challenge; member in struct:rtw_ieee802_11_elems
|
/linux-master/drivers/target/iscsi/ |
H A D | iscsi_target_auth.c | 51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); 53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); 57 bin2hex(challenge_asciihex, chap->challenge, 60 * Set CHAP_C, and copy the generated challenge into c_str. 182 /* Tie the challenge length to the digest size */ 293 pr_err("Unable to allocate challenge buffer\n"); 390 ret = crypto_shash_finup(desc, chap->challenge, 393 pr_err("crypto_shash_finup() failed for challenge\n"); 460 pr_err("Unable to convert incoming challenge\n"); 483 pr_err("Unable to convert incoming challenge\ [all...] |
H A D | iscsi_target_auth.h | 37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member in struct:iscsi_chap
|
/linux-master/drivers/thunderbolt/ |
H A D | domain.c | 699 * random challenge and sends it to the switch. The switch responds to 700 * this and if the response matches our random challenge, the switch is 707 u8 challenge[TB_SWITCH_KEY_SIZE]; local 723 get_random_bytes(challenge, sizeof(challenge)); 724 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); 746 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac);
|
H A D | icm.c | 531 const u8 *challenge, u8 *response) 542 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); 1097 const u8 *challenge, u8 *response) 1109 memcpy(request.challenge, challenge, TB_SWITCH_KEY_SIZE); 530 icm_fr_challenge_switch_key(struct tb *tb, struct tb_switch *sw, const u8 *challenge, u8 *response) argument 1096 icm_tr_challenge_switch_key(struct tb *tb, struct tb_switch *sw, const u8 *challenge, u8 *response) argument
|
H A D | tb.h | 147 * @key: Contains the key used to challenge the device or %NULL if not 520 const u8 *challenge, u8 *response);
|
H A D | tb_msgs.h | 261 u32 challenge[8]; member in struct:icm_fr_pkg_challenge_device 270 u32 challenge[8]; member in struct:icm_fr_pkg_challenge_device_response 424 u32 challenge[8]; member in struct:icm_tr_pkg_challenge_device 454 u32 challenge[8]; member in struct:icm_tr_pkg_challenge_device_response
|
/linux-master/fs/smb/client/ |
H A D | cifsencrypt.c | 432 /* Server has provided av pairs/target info in the type 2 challenge 488 /* Server has provided av pairs/target info in the type 2 challenge 646 offsetof(struct ntlmv2_resp, challenge.key[0])); 668 memcpy(ntlmv2->challenge.key, 671 memcpy(ntlmv2->challenge.key, 674 ntlmv2->challenge.key, hash_len);
|
H A D | cifspdu.h | 661 } __attribute__((packed)) challenge; member in union:ntlmv2_resp::__anon52
|
/linux-master/include/linux/greybus/ |
H A D | greybus_protocols.h | 353 __u8 challenge[32]; member in struct:gb_cap_authenticate_request
|
/linux-master/include/linux/ |
H A D | nvme-auth.h | 36 u8 *challenge, u8 *aug, size_t hlen);
|
/linux-master/include/soc/tegra/ |
H A D | bpmp-abi.h | 445 * #challenge. 449 uint32_t challenge; member in struct:mrq_ping_request 457 * mrq_ping_request challenge left shifted by 1 with the carry-bit 522 uint32_t challenge; member in struct:mrq_threaded_ping_request
|
/linux-master/net/ceph/ |
H A D | auth_x.c | 685 dout("handle_reply got server challenge %llx\n", 793 void *challenge, int challenge_len, 800 ret = __ceph_x_decrypt(secret, challenge, challenge_len); 805 dp = challenge + sizeof(struct ceph_x_encrypt_header); 819 void *challenge, int challenge_len) 825 ret = decrypt_authorizer_challenge(&au->session_key, challenge, 828 pr_err("failed to decrypt authorize challenge: %d", ret); 834 pr_err("failed to encrypt authorizer w/ challenge: %d", ret); 792 decrypt_authorizer_challenge(struct ceph_crypto_key *secret, void *challenge, int challenge_len, u64 *server_challenge) argument 817 ceph_x_add_authorizer_challenge(struct ceph_auth_client *ac, struct ceph_authorizer *a, void *challenge, int challenge_len) argument
|
/linux-master/net/mac80211/ |
H A D | mlme.c | 3813 const struct element *challenge; local 3822 challenge = cfg80211_find_elem(WLAN_EID_CHALLENGE, pos, 3824 if (!challenge) 3832 (void *)challenge, 3833 challenge->datalen + sizeof(*challenge),
|