/openbmc/ipmitool/src/plugins/lan/ |
H A D | auth.c | 171 uint8_t challenge[16]; in ipmi_auth_special() local 174 memset(challenge, 0, 16); in ipmi_auth_special() 183 challenge[i] = s->challenge[i] ^ md[i]; in ipmi_auth_special() 189 MD5_Update(&ctx, (const uint8_t *)challenge, 16); in ipmi_auth_special() 197 uint8_t challenge[16]; in ipmi_auth_special() 199 memset(challenge, 0, 16); in ipmi_auth_special() 208 challenge[i] = s->challenge[i] ^ digest[i]; in ipmi_auth_special() 214 md5_append(&state, (const md5_byte_t *)challenge, 16); in ipmi_auth_special()
|
/openbmc/linux/drivers/target/iscsi/ |
H A D | iscsi_target_auth.c | 51 memset(chap->challenge, 0, MAX_CHAP_CHALLENGE_LEN); in chap_gen_challenge() 53 ret = get_random_bytes_wait(chap->challenge, chap->challenge_len); in chap_gen_challenge() 57 bin2hex(challenge_asciihex, chap->challenge, in chap_gen_challenge() 60 * Set CHAP_C, and copy the generated challenge into c_str. in chap_gen_challenge() 182 /* Tie the challenge length to the digest size */ in chap_server_open() 198 * Generate Challenge. in chap_server_open() 293 pr_err("Unable to allocate challenge buffer\n"); in chap_server_compute_hash() 390 ret = crypto_shash_finup(desc, chap->challenge, in chap_server_compute_hash() 393 pr_err("crypto_shash_finup() failed for challenge\n"); in chap_server_compute_hash() 460 pr_err("Unable to convert incoming challenge\n"); in chap_server_compute_hash() [all …]
|
H A D | iscsi_target_auth.h | 37 unsigned char challenge[MAX_CHAP_CHALLENGE_LEN]; member
|
/openbmc/linux/drivers/nvme/target/ |
H A D | auth.c | 271 u8 *challenge = req->sq->dhchap_c1, *host_response; in nvmet_auth_host_hash() local 307 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_host_hash() 308 if (!challenge) { in nvmet_auth_host_hash() 316 challenge, shash_len); in nvmet_auth_host_hash() 335 ret = crypto_shash_update(shash, challenge, shash_len); in nvmet_auth_host_hash() 367 if (challenge != req->sq->dhchap_c1) in nvmet_auth_host_hash() 368 kfree(challenge); in nvmet_auth_host_hash() 383 u8 *challenge = req->sq->dhchap_c2, *ctrl_response; in nvmet_auth_ctrl_hash() local 420 challenge = kmalloc(shash_len, GFP_KERNEL); in nvmet_auth_ctrl_hash() 421 if (!challenge) { in nvmet_auth_ctrl_hash() [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/com/ibm/Dump/Entry/ |
H A D | Resource.interface.yaml | 24 On some host implementations a user-challenge need to be provided by 31 Model (PLDM), is used. The host validates the provided user-challenge 32 against this ACL. If the user-challenge doesn't match any entry in the 70 User challenge provided is not valid
|
/openbmc/linux/Documentation/devicetree/bindings/i2c/ |
H A D | i2c-arb-gpio-challenge.yaml | 4 $id: http://devicetree.org/schemas/i2c/i2c-arb-gpio-challenge.yaml# 7 title: GPIO-based I2C Arbitration Using a Challenge & Response Mechanism 14 This uses GPIO lines and a challenge & response mechanism to arbitrate who is 51 const: i2c-arb-gpio-challenge 106 compatible = "i2c-arb-gpio-challenge";
|
/openbmc/linux/drivers/nvme/host/ |
H A D | auth.c | 320 dev_dbg(ctrl->device, "%s: qid %d ctrl challenge %*ph\n", in nvme_auth_set_dhchap_reply_data() 425 u8 buf[4], *challenge = chap->c1; in nvme_auth_dhchap_setup_host_response() local 453 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_host_response() 454 if (!challenge) { in nvme_auth_dhchap_setup_host_response() 461 chap->c1, challenge, in nvme_auth_dhchap_setup_host_response() 471 ret = crypto_shash_update(shash, challenge, chap->hash_len); in nvme_auth_dhchap_setup_host_response() 502 if (challenge != chap->c1) in nvme_auth_dhchap_setup_host_response() 503 kfree(challenge); in nvme_auth_dhchap_setup_host_response() 512 u8 buf[4], *challenge = chap->c2; in nvme_auth_dhchap_setup_ctrl_response() local 531 challenge = kmalloc(chap->hash_len, GFP_KERNEL); in nvme_auth_dhchap_setup_ctrl_response() [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Dump/Entry/ |
H A D | System.interface.yaml | 41 On some host implementations a user-challenge need to be provided by 48 Model (PLDM), is used. The host validates the provided user-challenge 49 against this ACL. If the user-challenge doesn't match any entry in the 92 The user challenge provided is not valid
|
/openbmc/linux/net/rxrpc/ |
H A D | rxkad.c | 622 * issue a challenge 626 struct rxkad_challenge challenge; in rxkad_issue_challenge() local 638 challenge.version = htonl(2); in rxkad_issue_challenge() 639 challenge.nonce = htonl(conn->rxkad.nonce); in rxkad_issue_challenge() 640 challenge.min_level = htonl(0); in rxkad_issue_challenge() 641 challenge.__padding = 0; in rxkad_issue_challenge() 662 iov[1].iov_base = &challenge; in rxkad_issue_challenge() 663 iov[1].iov_len = sizeof(challenge); in rxkad_issue_challenge() 785 * respond to a challenge packet 791 struct rxkad_challenge challenge; in rxkad_respond_to_challenge() local [all …]
|
H A D | protocol.h | 42 #define RXRPC_PACKET_TYPE_CHALLENGE 6 /* connection security challenge (SRVR->CLNT) */ 147 * Kerberos security type-2 challenge packet 150 __be32 version; /* version of this challenge type */ 171 __be32 inc_nonce; /* challenge nonce + 1 */
|
/openbmc/linux/drivers/i2c/muxes/ |
H A D | i2c-arb-gpio-challenge.c | 3 * GPIO-based I2C Arbitration Using a Challenge & Response Mechanism 186 { .compatible = "i2c-arb-gpio-challenge", }, 195 .name = "i2c-arb-gpio-challenge", 205 MODULE_ALIAS("platform:i2c-arb-gpio-challenge");
|
H A D | Kconfig | 15 I2C multimaster arbitration scheme using GPIOs and a challenge & 20 will be called i2c-arb-gpio-challenge.
|
H A D | Makefile | 5 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
|
/openbmc/u-boot/arch/arm/mach-imx/mx7/ |
H A D | soc.c | 318 * FSL-wide unique, encoded LOT ID STD II/SJC CHALLENGE/ Unique ID 322 * The X-coordinate of the die location on the wafer/SJC CHALLENGE/ Unique ID 324 * The Y-coordinate of the die location on the wafer/SJC CHALLENGE/ Unique ID 327 * CHALLENGE/ Unique ID 329 * FSL-wide unique, encoded LOT ID STD II/SJC CHALLENGE/ Unique ID
|
/openbmc/linux/drivers/staging/greybus/ |
H A D | authentication.c | 141 u8 *challenge, u8 *result, u8 *auth_response, in cap_authenticate() argument 161 memcpy(request->challenge, challenge, sizeof(request->challenge)); in cap_authenticate() 246 authenticate->challenge, in cap_ioctl()
|
/openbmc/phosphor-net-ipmid/command/ |
H A D | rakp12.hpp | 56 * mutual challenges for a challenge/response. (Unlike IPMI v1.5, the v2.0/RMCP+ 57 * challenge/response is symmetric. I.e. the remote console and BMC both issues
|
/openbmc/linux/drivers/thunderbolt/ |
H A D | tb_msgs.h | 261 u32 challenge[8]; member 270 u32 challenge[8]; member 424 u32 challenge[8]; member 454 u32 challenge[8]; member
|
H A D | domain.c | 690 * tb_domain_challenge_switch_key() - Challenge and approve switch 695 * random challenge and sends it to the switch. The switch responds to 696 * this and if the response matches our random challenge, the switch is 703 u8 challenge[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 719 get_random_bytes(challenge, sizeof(challenge)); in tb_domain_challenge_switch_key() 720 ret = tb->cm_ops->challenge_switch_key(tb, sw, challenge, response); in tb_domain_challenge_switch_key() 742 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
|
/openbmc/linux/drivers/staging/rts5208/ |
H A D | rtsx_scsi.h | 94 #define KF_CHG_HOST 0x33 /* Challenge (host) */ 95 #define KF_RSP_CHG 0x34 /* Response and Challenge (device) */
|
/openbmc/linux/net/ceph/ |
H A D | auth_x.c | 685 dout("handle_reply got server challenge %llx\n", in ceph_x_handle_reply() 793 void *challenge, int challenge_len, in decrypt_authorizer_challenge() argument 800 ret = __ceph_x_decrypt(secret, challenge, challenge_len); in decrypt_authorizer_challenge() 805 dp = challenge + sizeof(struct ceph_x_encrypt_header); in decrypt_authorizer_challenge() 819 void *challenge, int challenge_len) in ceph_x_add_authorizer_challenge() argument 825 ret = decrypt_authorizer_challenge(&au->session_key, challenge, in ceph_x_add_authorizer_challenge() 828 pr_err("failed to decrypt authorize challenge: %d", ret); in ceph_x_add_authorizer_challenge() 834 pr_err("failed to encrypt authorizer w/ challenge: %d", ret); in ceph_x_add_authorizer_challenge()
|
/openbmc/linux/drivers/net/wireless/intersil/hostap/ |
H A D | hostap_ap.c | 137 kfree(sta->u.sta.challenge); in ap_free_sta() 1233 /* Generate challenge data for shared key authentication. IEEE 802.11 specifies 1234 * that WEP algorithm is used for generating challenge. This should be unique, 1236 * with pseudo random key and then use increasing IV to get unique challenge 1254 PDEBUG(DEBUG_AP, "AP: kmalloc failed for challenge\n"); in ap_auth_make_challenge() 1290 char body[8 + WLAN_AUTH_CHALLENGE_LEN], *challenge = NULL; in handle_authen() local 1353 txt = "invalid challenge len"; in handle_authen() 1358 txt = "challenge underflow"; in handle_authen() 1362 challenge = (char *) (u + 2); in handle_authen() 1374 sta->u.sta.challenge = NULL; in handle_authen() [all …]
|
/openbmc/u-boot/drivers/i2c/muxes/ |
H A D | Makefile | 4 obj-$(CONFIG_I2C_ARB_GPIO_CHALLENGE) += i2c-arb-gpio-challenge.o
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | thunderbolt.rst | 69 a challenge that should match the expected one based on a random key 148 Next time the device is plugged in the user can verify (challenge) the 154 If the challenge the device returns back matches the one we expect based 156 However, if the challenge fails no tunnels are created and error is
|
/openbmc/linux/fs/smb/client/ |
H A D | cifsencrypt.c | 432 /* Server has provided av pairs/target info in the type 2 challenge 488 /* Server has provided av pairs/target info in the type 2 challenge 646 offsetof(struct ntlmv2_resp, challenge.key[0])); in CalcNTLMv2_response() 668 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 671 memcpy(ntlmv2->challenge.key, in CalcNTLMv2_response() 674 ntlmv2->challenge.key, hash_len); in CalcNTLMv2_response()
|
/openbmc/linux/include/uapi/linux/netfilter/ |
H A D | nf_conntrack_tcp.h | 46 /* Marks possibility for expected RFC5961 challenge ACK */
|