Home
last modified time | relevance | path

Searched full:challenge (Results 1 – 25 of 229) sorted by relevance

12345678910

/kernel/linux/linux-6.6/drivers/nvme/target/
Dauth.c271 u8 *challenge = req->sq->dhchap_c1, *host_response; in nvmet_auth_host_hash() local
307 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_host_hash()
308 if (!challenge) { in nvmet_auth_host_hash()
316 challenge, shash_len); in nvmet_auth_host_hash()
335 ret = crypto_shash_update(shash, challenge, shash_len); in nvmet_auth_host_hash()
367 if (challenge != req->sq->dhchap_c1) in nvmet_auth_host_hash()
368 kfree(challenge); in nvmet_auth_host_hash()
383 u8 *challenge = req->sq->dhchap_c2, *ctrl_response; in nvmet_auth_ctrl_hash() local
420 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_ctrl_hash()
421 if (!challenge) { in nvmet_auth_ctrl_hash()
[all …]
/kernel/linux/linux-6.6/drivers/target/iscsi/
Discsi_target_auth.c51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge()
53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge()
57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge()
60 * Set CHAP_C, and copy the generated challenge into c_str. in chap_gen_challenge()
182 /* Tie the challenge length to the digest size */ in chap_server_open()
198 * Generate Challenge. in chap_server_open()
293 pr_err("Unable to allocate challenge buffer\n"); in chap_server_compute_hash()
390 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash()
393 pr_err("crypto_shash_finup() failed for challenge\n"); in chap_server_compute_hash()
460 pr_err("Unable to convert incoming challenge\n"); in chap_server_compute_hash()
[all …]
/kernel/linux/linux-5.10/drivers/target/iscsi/
Discsi_target_auth.c51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge()
53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge()
57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge()
60 * Set CHAP_C, and copy the generated challenge into c_str. in chap_gen_challenge()
182 /* Tie the challenge length to the digest size */ in chap_server_open()
198 * Generate Challenge. in chap_server_open()
261 pr_err("Unable to allocate challenge buffer\n"); in chap_server_compute_hash()
347 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash()
350 pr_err("crypto_shash_finup() failed for challenge\n"); in chap_server_compute_hash()
413 pr_err("Unable to convert incoming challenge\n"); in chap_server_compute_hash()
[all …]
/kernel/linux/linux-6.6/Documentation/devicetree/bindings/i2c/
Di2c-arb-gpio-challenge.yaml4 $id: http://devicetree.org/schemas/i2c/i2c-arb-gpio-challenge.yaml#
7 title: GPIO-based I2C Arbitration Using a Challenge & Response Mechanism
14 This uses GPIO lines and a challenge & response mechanism to arbitrate who is
51 const: i2c-arb-gpio-challenge
106 compatible = "i2c-arb-gpio-challenge";
/kernel/linux/linux-6.6/drivers/nvme/host/
Dauth.c320 dev_dbg(ctrl->device, "%s: qid %d ctrl challenge %*ph\n", in nvme_auth_set_dhchap_reply_data()
425 u8 buf[4], *challenge = chap->c1; in nvme_auth_dhchap_setup_host_response() local
453 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_host_response()
454 if (!challenge) { in nvme_auth_dhchap_setup_host_response()
461 chap->c1, challenge, in nvme_auth_dhchap_setup_host_response()
471 ret = crypto_shash_update(shash, challenge, chap->hash_len); in nvme_auth_dhchap_setup_host_response()
502 if (challenge != chap->c1) in nvme_auth_dhchap_setup_host_response()
503 kfree(challenge); in nvme_auth_dhchap_setup_host_response()
512 u8 buf[4], *challenge = chap->c2; in nvme_auth_dhchap_setup_ctrl_response() local
531 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_ctrl_response()
[all …]
/kernel/linux/linux-5.10/Documentation/devicetree/bindings/i2c/
Di2c-arb-gpio-challenge.txt1 GPIO-based I2C Arbitration Using a Challenge & Response Mechanism
3 This uses GPIO lines and a challenge & response mechanism to arbitrate who is
43 - compatible: i2c-arb-gpio-challenge
64 compatible = "i2c-arb-gpio-challenge";
/kernel/linux/linux-5.10/net/rxrpc/
Drxkad.c639 * issue a challenge
643 struct rxkad_challenge challenge; in rxkad_issue_challenge() local
659 challenge.version = htonl(2); in rxkad_issue_challenge()
660 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge()
661 challenge.min_level = htonl(0); in rxkad_issue_challenge()
662 challenge.__padding = 0; in rxkad_issue_challenge()
683 iov[1].iov_base = &challenge; in rxkad_issue_challenge()
684 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge()
690 _proto("Tx CHALLENGE %%%u", serial); in rxkad_issue_challenge()
806 * respond to a challenge packet
[all …]
Dprotocol.h42 #define RXRPC_PACKET_TYPE_CHALLENGE 6 /* connection security challenge (SRVR->CLNT) */
154 * Kerberos security type-2 challenge packet
157 __be32 version; /* version of this challenge type */
178 __be32 inc_nonce; /* challenge nonce + 1 */
/kernel/linux/linux-6.6/net/rxrpc/
Drxkad.c622 * issue a challenge
626 struct rxkad_challenge challenge; in rxkad_issue_challenge() local
638 challenge.version = htonl(2); in rxkad_issue_challenge()
639 challenge.nonce = htonl(conn->rxkad.nonce); in rxkad_issue_challenge()
640 challenge.min_level = htonl(0); in rxkad_issue_challenge()
641 challenge.__padding = 0; in rxkad_issue_challenge()
662 iov[1].iov_base = &challenge; in rxkad_issue_challenge()
663 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge()
785 * respond to a challenge packet
791 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local
[all …]
Dprotocol.h42 #define RXRPC_PACKET_TYPE_CHALLENGE 6 /* connection security challenge (SRVR->CLNT) */
147 * Kerberos security type-2 challenge packet
150 __be32 version; /* version of this challenge type */
171 __be32 inc_nonce; /* challenge nonce + 1 */
/kernel/linux/linux-6.6/drivers/i2c/muxes/
Di2c-arb-gpio-challenge.c3 * GPIO-based I2C Arbitration Using a Challenge & Response Mechanism
186 { .compatible = "i2c-arb-gpio-challenge", },
195 .name = "i2c-arb-gpio-challenge",
205 MODULE_ALIAS("platform:i2c-arb-gpio-challenge");
DKconfig15 I2C multimaster arbitration scheme using GPIOs and a challenge &
20 will be called i2c-arb-gpio-challenge.
/kernel/linux/linux-5.10/drivers/i2c/muxes/
Di2c-arb-gpio-challenge.c3 * GPIO-based I2C Arbitration Using a Challenge & Response Mechanism
187 { .compatible = "i2c-arb-gpio-challenge", },
196 .name = "i2c-arb-gpio-challenge",
206 MODULE_ALIAS("platform:i2c-arb-gpio-challenge");
DKconfig15 I2C multimaster arbitration scheme using GPIOs and a challenge &
20 will be called i2c-arb-gpio-challenge.
/kernel/linux/linux-5.10/drivers/staging/greybus/
Dauthentication.c141 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument
161 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate()
246 authenticate->challenge, in cap_ioctl()
/kernel/linux/linux-6.6/drivers/staging/greybus/
Dauthentication.c141 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument
161 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate()
246 authenticate->challenge, in cap_ioctl()
/kernel/linux/linux-5.10/drivers/thunderbolt/
Dtb_msgs.h250 u32 challenge[8]; member
259 u32 challenge[8]; member
411 u32 challenge[8]; member
441 u32 challenge[8]; member
Ddomain.c660 * tb_domain_challenge_switch_key() - Challenge and approve switch
665 * random challenge and sends it to the switch. The switch responds to
666 * this and if the response matches our random challenge, the switch is
673 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local
689 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key()
690 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key()
712 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
/kernel/linux/linux-6.6/drivers/thunderbolt/
Dtb_msgs.h261 u32 challenge[8]; member
270 u32 challenge[8]; member
424 u32 challenge[8]; member
454 u32 challenge[8]; member
Ddomain.c690 * tb_domain_challenge_switch_key() - Challenge and approve switch
695 * random challenge and sends it to the switch. The switch responds to
696 * this and if the response matches our random challenge, the switch is
703 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local
719 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key()
720 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key()
742 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
/kernel/linux/linux-6.6/drivers/staging/rts5208/
Drtsx_scsi.h94 #define KF_CHG_HOST 0x33 /* Challenge (host) */
95 #define KF_RSP_CHG 0x34 /* Response and Challenge (device) */
/kernel/linux/linux-5.10/drivers/staging/rts5208/
Drtsx_scsi.h94 #define KF_CHG_HOST 0x33 /* Challenge (host) */
95 #define KF_RSP_CHG 0x34 /* Response and Challenge (device) */
/kernel/linux/linux-5.10/Documentation/admin-guide/
Dthunderbolt.rst66 a challenge that should match the expected one based on a random key
141 Next time the device is plugged in the user can verify (challenge) the
147 If the challenge the device returns back matches the one we expect based
149 However, if the challenge fails no tunnels are created and error is
/kernel/linux/linux-6.6/net/ceph/
Dauth_x.c685 dout("handle_reply got server challenge %llx\n", in ceph_x_handle_reply()
793 void *challenge, int challenge_len, in decrypt_authorizer_challenge() argument
800 ret = __ceph_x_decrypt(secret, challenge, challenge_len); in decrypt_authorizer_challenge()
805 dp = challenge + sizeof(struct ceph_x_encrypt_header); in decrypt_authorizer_challenge()
819 void *challenge, int challenge_len) in ceph_x_add_authorizer_challenge() argument
825 ret = decrypt_authorizer_challenge(&au->session_key, challenge, in ceph_x_add_authorizer_challenge()
828 pr_err("failed to decrypt authorize challenge: %d", ret); in ceph_x_add_authorizer_challenge()
834 pr_err("failed to encrypt authorizer w/ challenge: %d", ret); in ceph_x_add_authorizer_challenge()
/kernel/linux/linux-6.6/drivers/net/wireless/intersil/hostap/
Dhostap_ap.c137 kfree(sta->u.sta.challenge); in ap_free_sta()
1233 /* Generate challenge data for shared key authentication. IEEE 802.11 specifies
1234 * that WEP algorithm is used for generating challenge. This should be unique,
1236 * with pseudo random key and then use increasing IV to get unique challenge
1254 PDEBUG(DEBUG_AP, "AP: kmalloc failed for challenge\n"); in ap_auth_make_challenge()
1290 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; in handle_authen() local
1353 txt = "invalid challenge len"; in handle_authen()
1358 txt = "challenge underflow"; in handle_authen()
1362 challenge = (char *) (u + 2); in handle_authen()
1374 sta->u.sta.challenge = NULL; in handle_authen()
[all …]

12345678910