| /linux-6.15/drivers/nvme/target/ |
| H A D | auth.c | 296 u8 *challenge = req->sq->dhchap_c1; in nvmet_auth_host_hash() local 334 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_host_hash() 335 if (!challenge) { in nvmet_auth_host_hash() 343 challenge, shash_len); in nvmet_auth_host_hash() 394 if (challenge != req->sq->dhchap_c1) in nvmet_auth_host_hash() 395 kfree(challenge); in nvmet_auth_host_hash() 410 u8 *challenge = req->sq->dhchap_c2; in nvmet_auth_ctrl_hash() local 449 if (!challenge) { in nvmet_auth_ctrl_hash() 457 challenge, shash_len); in nvmet_auth_ctrl_hash() 505 if (challenge != req->sq->dhchap_c2) in nvmet_auth_ctrl_hash() [all …]
|
| /linux-6.15/arch/arm64/include/asm/ |
| H A D | rsi_cmds.h | 108 rsi_attestation_token_init(const u8 *challenge, unsigned long size) in rsi_attestation_token_init() argument 113 if (!challenge || size < 32 || size > 64) in rsi_attestation_token_init() 117 memcpy(®s.a1, challenge, size); in rsi_attestation_token_init()
|
| /linux-6.15/drivers/virt/coco/arm-cca-guest/ |
| H A D | arm-cca-guest.c | 26 void *challenge; member 39 info->result = rsi_attestation_token_init(info->challenge, in arm_cca_attestation_init() 113 info.challenge = desc->inblob; in arm_cca_report_new()
|
| /linux-6.15/drivers/nvme/host/ |
| H A D | auth.c | 433 u8 buf[4], *challenge = chap->c1; in nvme_auth_dhchap_setup_host_response() local 461 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_host_response() 462 if (!challenge) { in nvme_auth_dhchap_setup_host_response() 469 chap->c1, challenge, in nvme_auth_dhchap_setup_host_response() 510 if (challenge != chap->c1) in nvme_auth_dhchap_setup_host_response() 511 kfree(challenge); in nvme_auth_dhchap_setup_host_response() 520 u8 buf[4], *challenge = chap->c2; in nvme_auth_dhchap_setup_ctrl_response() local 540 if (!challenge) { in nvme_auth_dhchap_setup_ctrl_response() 547 chap->c2, challenge, in nvme_auth_dhchap_setup_ctrl_response() 595 if (challenge != chap->c2) in nvme_auth_dhchap_setup_ctrl_response() [all …]
|
| /linux-6.15/drivers/staging/greybus/ |
| H A D | authentication.c | 144 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument 164 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate() 249 authenticate->challenge, in cap_ioctl()
|
| H A D | greybus_authentication.h | 61 __u8 challenge[32]; member
|
| /linux-6.15/Documentation/devicetree/bindings/i2c/ |
| H A D | i2c-arb-gpio-challenge.yaml | 4 $id: http://devicetree.org/schemas/i2c/i2c-arb-gpio-challenge.yaml# 14 This uses GPIO lines and a challenge & response mechanism to arbitrate who is 51 const: i2c-arb-gpio-challenge 106 compatible = "i2c-arb-gpio-challenge";
|
| /linux-6.15/drivers/target/iscsi/ |
| H A D | iscsi_target_auth.c | 51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge() 53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge() 57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge() 390 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash() 503 !memcmp(initiatorchg_binhex, chap->challenge, in chap_server_compute_hash()
|
| H A D | iscsi_target_auth.h | 37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
|
| /linux-6.15/net/rxrpc/ |
| H A D | rxkad.c | 642 struct rxkad_challenge challenge; in rxkad_issue_challenge() local 654 challenge.version = htonl(2); in rxkad_issue_challenge() 656 challenge.min_level = htonl(0); in rxkad_issue_challenge() 657 challenge.__padding = 0; in rxkad_issue_challenge() 678 iov[1].iov_base = &challenge; in rxkad_issue_challenge() 679 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge() 806 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local 824 &challenge, sizeof(challenge)) < 0) in rxkad_respond_to_challenge() 828 version = ntohl(challenge.version); in rxkad_respond_to_challenge() 829 nonce = ntohl(challenge.nonce); in rxkad_respond_to_challenge() [all …]
|
| /linux-6.15/tools/testing/selftests/net/netfilter/packetdrill/ |
| H A D | conntrack_syn_challenge_ack.pkt | 2 // a challenge-ACK. 3 // Check that conntrack lets all packets pass, including the challenge ack,
|
| H A D | conntrack_synack_reuse.pkt | 25 // Won't expect this: challenge ack.
|
| /linux-6.15/drivers/thunderbolt/ |
| H A D | tb_msgs.h | 255 u32 challenge[8]; member 264 u32 challenge[8]; member 418 u32 challenge[8]; member 448 u32 challenge[8]; member
|
| H A D | domain.c | 707 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 723 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key() 724 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key() 746 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
|
| /linux-6.15/drivers/i2c/muxes/ |
| H A D | Makefile | 5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
|
| H A D | Kconfig | 15 I2C multimaster arbitration scheme using GPIOs and a challenge & 20 will be called i2c-arb-gpio-challenge.
|
| /linux-6.15/drivers/staging/greybus/Documentation/firmware/ |
| H A D | authenticate.c | 26 .challenge = {0},
|
| /linux-6.15/fs/smb/client/ |
| H A D | cifsencrypt.c | 502 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response() 517 memcpy(ntlmv2->challenge.key, ses->ntlmssp->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response() 519 memcpy(ntlmv2->challenge.key, ses->server->cryptkey, CIFS_SERVER_CHALLENGE_SIZE); in CalcNTLMv2_response() 521 rc = crypto_shash_update(hmacmd5, ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
|
| /linux-6.15/include/linux/ |
| H A D | nvme-auth.h | 36 u8 *challenge, u8 *aug, size_t hlen);
|
| /linux-6.15/drivers/gpu/drm/ttm/tests/ |
| H A D | TODO | 24 a challenge, but is worth trying. Look at selftests like
|
| /linux-6.15/net/ceph/ |
| H A D | auth_x.c | 793 void *challenge, int challenge_len, in decrypt_authorizer_challenge() argument 800 ret = __ceph_x_decrypt(secret, challenge, challenge_len); in decrypt_authorizer_challenge() 805 dp = challenge + sizeof(struct ceph_x_encrypt_header); in decrypt_authorizer_challenge() 819 void *challenge, int challenge_len) in ceph_x_add_authorizer_challenge() argument 825 ret = decrypt_authorizer_challenge(&au->session_key, challenge, in ceph_x_add_authorizer_challenge()
|
| /linux-6.15/drivers/media/usb/hdpvr/ |
| H A D | hdpvr-core.c | 69 static void challenge(u8 *bytes) in challenge() function 175 challenge(response); in device_authorization()
|
| /linux-6.15/drivers/firmware/tegra/ |
| H A D | bpmp.c | 549 response.reply = request.challenge << 1; in tegra_bpmp_mrq_handle_ping() 564 request.challenge = 1; in tegra_bpmp_ping() 584 request.challenge, response.reply, in tegra_bpmp_ping()
|
| /linux-6.15/Documentation/admin-guide/ |
| H A D | thunderbolt.rst | 69 a challenge that should match the expected one based on a random key 148 Next time the device is plugged in the user can verify (challenge) the 154 If the challenge the device returns back matches the one we expect based 156 However, if the challenge fails no tunnels are created and error is
|
| /linux-6.15/Documentation/arch/riscv/ |
| H A D | patch-acceptance.rst | 13 challenge for RISC-V Linux maintenance. Linux maintainers disapprove
|