/kernel/linux/linux-6.6/drivers/nvme/target/ |
H A D | auth.c | 270 u8 *challenge = req->sq->dhchap_c1, *host_response; in nvmet_auth_host_hash() local 306 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_host_hash() 307 if (!challenge) { in nvmet_auth_host_hash() 315 challenge, shash_len); in nvmet_auth_host_hash() 334 ret = crypto_shash_update(shash, challenge, shash_len); in nvmet_auth_host_hash() 364 if (challenge != req->sq->dhchap_c1) in nvmet_auth_host_hash() 365 kfree(challenge); in nvmet_auth_host_hash() 381 u8 *challenge = req->sq->dhchap_c2, *ctrl_response; in nvmet_auth_ctrl_hash() local 418 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_ctrl_hash() 419 if (!challenge) { in nvmet_auth_ctrl_hash() [all...] |
/kernel/linux/linux-5.10/drivers/staging/greybus/ |
H A D | authentication.c | 141 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() 161 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate() 246 authenticate->challenge, in cap_ioctl() 140 cap_authenticate(struct gb_cap *cap, u32 auth_type, u8 *uid, u8 *challenge, u8 *result, u8 *auth_response, u32 *signature_size, u8 *signature) cap_authenticate() argument
|
H A D | greybus_authentication.h | 62 __u8 challenge[32]; member
|
/kernel/linux/linux-6.6/drivers/staging/greybus/ |
H A D | authentication.c | 141 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() 161 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate() 246 authenticate->challenge, in cap_ioctl() 140 cap_authenticate(struct gb_cap *cap, u32 auth_type, u8 *uid, u8 *challenge, u8 *result, u8 *auth_response, u32 *signature_size, u8 *signature) cap_authenticate() argument
|
H A D | greybus_authentication.h | 61 __u8 challenge[32]; member
|
/kernel/linux/linux-6.6/drivers/nvme/host/ |
H A D | auth.c | 320 dev_dbg(ctrl->device, "%s: qid %d ctrl challenge %*ph\n", in nvme_auth_set_dhchap_reply_data() 425 u8 buf[4], *challenge = chap->c1; in nvme_auth_dhchap_setup_host_response() local 453 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_host_response() 454 if (!challenge) { in nvme_auth_dhchap_setup_host_response() 461 chap->c1, challenge, in nvme_auth_dhchap_setup_host_response() 471 ret = crypto_shash_update(shash, challenge, chap->hash_len); in nvme_auth_dhchap_setup_host_response() 502 if (challenge != chap->c1) in nvme_auth_dhchap_setup_host_response() 503 kfree(challenge); in nvme_auth_dhchap_setup_host_response() 512 u8 buf[4], *challenge = chap->c2; in nvme_auth_dhchap_setup_ctrl_response() local 531 challenge in nvme_auth_dhchap_setup_ctrl_response() [all...] |
/kernel/linux/linux-5.10/net/rxrpc/ |
H A D | rxkad.c | 639 * issue a challenge 643 struct rxkad_challenge challenge; in rxkad_issue_challenge() local 659 challenge.version = htonl(2); in rxkad_issue_challenge() 660 challenge.nonce = htonl(conn->security_nonce); in rxkad_issue_challenge() 661 challenge.min_level = htonl(0); in rxkad_issue_challenge() 662 challenge.__padding = 0; in rxkad_issue_challenge() 683 iov[1].iov_base = &challenge; in rxkad_issue_challenge() 684 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge() 806 * respond to a challenge packet 813 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local [all...] |
/kernel/linux/linux-6.6/net/rxrpc/ |
H A D | rxkad.c | 622 * issue a challenge 626 struct rxkad_challenge challenge; in rxkad_issue_challenge() local 638 challenge.version = htonl(2); in rxkad_issue_challenge() 639 challenge.nonce = htonl(conn->rxkad.nonce); in rxkad_issue_challenge() 640 challenge.min_level = htonl(0); in rxkad_issue_challenge() 641 challenge.__padding = 0; in rxkad_issue_challenge() 662 iov[1].iov_base = &challenge; in rxkad_issue_challenge() 663 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge() 785 * respond to a challenge packet 791 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local [all...] |
/kernel/linux/linux-5.10/drivers/target/iscsi/ |
H A D | iscsi_target_auth.c | 51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge() 53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge() 57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge() 60 * Set CHAP_C, and copy the generated challenge into c_str. in chap_gen_challenge() 182 /* Tie the challenge length to the digest size */ in chap_server_open() 261 pr_err("Unable to allocate challenge buffer\n"); in chap_server_compute_hash() 347 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash() 350 pr_err("crypto_shash_finup() failed for challenge\n"); in chap_server_compute_hash() 413 pr_err("Unable to convert incoming challenge\n"); in chap_server_compute_hash() 431 !memcmp(initiatorchg_binhex, chap->challenge, in chap_server_compute_hash() [all...] |
H A D | iscsi_target_auth.h | 37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
|
/kernel/linux/linux-6.6/drivers/target/iscsi/ |
H A D | iscsi_target_auth.c | 51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge() 53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge() 57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge() 60 * Set CHAP_C, and copy the generated challenge into c_str. in chap_gen_challenge() 182 /* Tie the challenge length to the digest size */ in chap_server_open() 293 pr_err("Unable to allocate challenge buffer\n"); in chap_server_compute_hash() 390 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash() 393 pr_err("crypto_shash_finup() failed for challenge\n"); in chap_server_compute_hash() 460 pr_err("Unable to convert incoming challenge\n"); in chap_server_compute_hash() 483 pr_err("Unable to convert incoming challenge\ in chap_server_compute_hash() [all...] |
H A D | iscsi_target_auth.h | 37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
|
/kernel/linux/linux-5.10/drivers/thunderbolt/ |
H A D | domain.c | 665 * random challenge and sends it to the switch. The switch responds to 666 * this and if the response matches our random challenge, the switch is 673 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 689 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key() 690 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key() 712 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
|
H A D | tb_msgs.h | 250 u32 challenge[8]; member 259 u32 challenge[8]; member 411 u32 challenge[8]; member 441 u32 challenge[8]; member
|
/kernel/linux/linux-6.6/drivers/thunderbolt/ |
H A D | domain.c | 694 * random challenge and sends it to the switch. The switch responds to 695 * this and if the response matches our random challenge, the switch is 702 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 718 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key() 719 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key() 741 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
|
H A D | tb_msgs.h | 261 u32 challenge[8]; member 270 u32 challenge[8]; member 424 u32 challenge[8]; member 454 u32 challenge[8]; member
|
/kernel/linux/linux-5.10/drivers/staging/greybus/Documentation/firmware/ |
H A D | authenticate.c | 26 .challenge = {0},
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | nvme-auth.h | 33 u8 *challenge, u8 *aug, size_t hlen);
|
/kernel/linux/linux-6.6/drivers/staging/greybus/Documentation/firmware/ |
H A D | authenticate.c | 26 .challenge = {0},
|
/kernel/linux/linux-5.10/drivers/staging/wlan-ng/ |
H A D | p80211mgmt.h | 118 /*-- values 17-31 reserved for challenge text extension --*/ 291 u8 challenge[1]; member 481 struct wlan_ie_challenge *challenge; member
|
/kernel/linux/linux-5.10/drivers/staging/rtl8192u/ieee80211/ |
H A D | ieee80211_softmac.c | 1220 u8 *challenge, in ieee80211_auth_challenge() 1238 memcpy(c, challenge, chlen); in ieee80211_auth_challenge() 1240 IEEE80211_DEBUG_MGMT("Sending authentication challenge response\n"); in ieee80211_auth_challenge() 1248 kfree(challenge); in ieee80211_auth_challenge() 1464 static inline u16 auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) in auth_parse() argument 1472 *challenge = NULL; in auth_parse() 1479 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1480 if (!*challenge) in auth_parse() 1830 u8 *challenge; in ieee80211_check_auth_response() local 1834 errcode = auth_parse(skb, &challenge, in ieee80211_check_auth_response() 1219 ieee80211_auth_challenge(struct ieee80211_device *ieee, u8 *challenge, int chlen) ieee80211_auth_challenge() argument [all...] |
/kernel/linux/linux-6.6/drivers/staging/rtl8192e/ |
H A D | rtllib_softmac.c | 1290 static void rtllib_auth_challenge(struct rtllib_device *ieee, u8 *challenge, in rtllib_auth_challenge() argument 1308 memcpy(c, challenge, chlen); in rtllib_auth_challenge() 1311 "Sending authentication challenge response\n"); in rtllib_auth_challenge() 1319 kfree(challenge); in rtllib_auth_challenge() 1585 u8 **challenge, int *chlen) in auth_parse() 1595 *challenge = NULL; in auth_parse() 1602 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1603 if (!*challenge) in auth_parse() 2034 u8 *challenge; in rtllib_rx_auth_resp() local 2038 errcode = auth_parse(ieee->dev, skb, &challenge, in rtllib_rx_auth_resp() 1584 auth_parse(struct net_device *dev, struct sk_buff *skb, u8 **challenge, int *chlen) auth_parse() argument [all...] |
/kernel/linux/linux-6.6/drivers/staging/rtl8192u/ieee80211/ |
H A D | ieee80211_softmac.c | 1220 u8 *challenge, in ieee80211_auth_challenge() 1238 memcpy(c, challenge, chlen); in ieee80211_auth_challenge() 1240 IEEE80211_DEBUG_MGMT("Sending authentication challenge response\n"); in ieee80211_auth_challenge() 1248 kfree(challenge); in ieee80211_auth_challenge() 1464 static inline int auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen) in auth_parse() argument 1472 *challenge = NULL; in auth_parse() 1479 *challenge = kmemdup(t, *chlen, GFP_ATOMIC); in auth_parse() 1480 if (!*challenge) in auth_parse() 1836 u8 *challenge; in ieee80211_check_auth_response() local 1840 errcode = auth_parse(skb, &challenge, in ieee80211_check_auth_response() 1219 ieee80211_auth_challenge(struct ieee80211_device *ieee, u8 *challenge, int chlen) ieee80211_auth_challenge() argument [all...] |
/kernel/linux/linux-5.10/fs/cifs/ |
H A D | cifsencrypt.c | 396 /* Server has provided av pairs/target info in the type 2 challenge 452 /* Server has provided av pairs/target info in the type 2 challenge 610 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response() 632 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 635 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 638 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
|
/kernel/linux/linux-6.6/fs/smb/client/ |
H A D | cifsencrypt.c | 432 /* Server has provided av pairs/target info in the type 2 challenge 488 /* Server has provided av pairs/target info in the type 2 challenge 646 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response() 668 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 671 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 674 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
|