Home
last modified time | relevance | path

Searched full:handshake (Results 1 – 25 of 523) sorted by relevance

12345678910>>...21

/openbmc/linux/drivers/net/wireguard/
H A Dnoise.c46 /* Must hold peer->handshake.static_identity->lock */
49 down_write(&peer->handshake.lock); in wg_noise_precompute_static_static()
50 if (!peer->handshake.static_identity->has_identity || in wg_noise_precompute_static_static()
51 !curve25519(peer->handshake.precomputed_static_static, in wg_noise_precompute_static_static()
52 peer->handshake.static_identity->static_private, in wg_noise_precompute_static_static()
53 peer->handshake.remote_static)) in wg_noise_precompute_static_static()
54 memset(peer->handshake.precomputed_static_static, 0, in wg_noise_precompute_static_static()
56 up_write(&peer->handshake.lock); in wg_noise_precompute_static_static()
59 void wg_noise_handshake_init(struct noise_handshake *handshake, in wg_noise_handshake_init() argument
65 memset(handshake, 0, sizeof(*handshake)); in wg_noise_handshake_init()
[all …]
H A Dtimers.c13 * - Timer for retransmitting the handshake if we don't hear back after
19 * - Timer for initiating new handshake if we have sent a packet but after have
47 pr_debug("%s: Handshake for peer %llu (%pISpfsc) did not complete after %d attempts, giving up\n", in wg_expired_retransmit_handshake()
53 * if we try unsuccessfully for too long to make a handshake. in wg_expired_retransmit_handshake()
65 …pr_debug("%s: Handshake for peer %llu (%pISpfsc) did not complete after %d seconds, retrying (try … in wg_expired_retransmit_handshake()
95 …pr_debug("%s: Retrying handshake with peer %llu (%pISpfsc) because we stopped hearing back after %… in wg_expired_new_handshake()
130 wg_noise_handshake_clear(&peer->handshake); in wg_queued_expired_zero_key_material()
166 * keepalive, data, or handshake.
174 * keepalive, data, or handshake.
181 /* Should be called after a handshake initiation message is sent. */
[all …]
H A Dnoise.h95 void wg_noise_handshake_init(struct noise_handshake *handshake,
100 void wg_noise_handshake_clear(struct noise_handshake *handshake);
121 struct noise_handshake *handshake);
127 struct noise_handshake *handshake);
132 bool wg_noise_handshake_begin_session(struct noise_handshake *handshake,
H A Dsend.c30 net_dbg_ratelimited("%s: Sending handshake initiation to peer %llu (%pISpfsc)\n", in wg_packet_send_handshake_initiation()
34 if (wg_noise_handshake_create_initiation(&packet, &peer->handshake)) { in wg_packet_send_handshake_initiation()
90 net_dbg_ratelimited("%s: Sending handshake response to peer %llu (%pISpfsc)\n", in wg_packet_send_handshake_response()
94 if (wg_noise_handshake_create_response(&packet, &peer->handshake)) { in wg_packet_send_handshake_response()
96 if (wg_noise_handshake_begin_session(&peer->handshake, in wg_packet_send_handshake_response()
116 net_dbg_skb_ratelimited("%s: Sending cookie response for denied handshake message for %pISpfsc\n", in wg_packet_send_handshake_cookie()
372 * handshake. in wg_packet_send_staged_packets()
396 /* We orphan the packets if we're waiting on a handshake, so that they in wg_packet_send_staged_packets()
411 * means we should initiate a new handshake. in wg_packet_send_staged_packets()
/openbmc/linux/Documentation/networking/
H A Dtls-handshake.rst4 In-Kernel TLS Handshake
15 does not handle the TLS handshake subprotocol which is used to establish
19 There are several possible ways to provide a handshake service in the
22 aware of how the handshake gets done.
25 User handshake agent
28 As of this writing, there is no TLS handshake implementation in the
29 Linux kernel. To provide a handshake service, a handshake agent
31 kernel consumer might require a TLS handshake. Handshake agents listen
32 for events sent from the kernel that indicate a handshake request is
35 An open socket is passed to a handshake agent via a netlink operation,
[all …]
/openbmc/linux/net/handshake/
H A Drequest.c3 * Handshake request lifetime events
25 #include <uapi/linux/handshake.h>
26 #include "handshake.h"
28 #include <trace/events/handshake.h>
34 * To avoid adding another pointer field to struct sock, net/handshake
103 * handshake_req_alloc - Allocate a handshake request
134 * handshake_req_private - Get per-handshake private data
135 * @req: handshake arguments
201 * handshake_req_submit - Submit a handshake request
202 * @sock: open socket on which to perform the handshake
[all …]
H A Dtlshd.c19 #include <net/handshake.h>
24 #include <uapi/linux/handshake.h>
25 #include "handshake.h"
90 * @req: socket on which the handshake was performed
190 * @req: handshake parameters to return
271 * tls_client_hello_anon - request an anonymous TLS handshake on a socket
272 * @args: socket and handshake parameters for this request
276 * %0: Handshake request enqueue; ->done will be called when complete
297 * tls_client_hello_x509 - request an x.509-based TLS handshake on a socket
298 * @args: socket and handshake parameters for this request
[all …]
H A Dnetlink.c3 * Generic netlink handshake service
23 #include <uapi/linux/handshake.h>
24 #include "handshake.h"
27 #include <trace/events/handshake.h>
32 * @proto: handshake protocol
232 * handshake_pernet - Get the handshake private per-net structure
236 * handshake module, or NULL if handshake_init() failed.
251 pr_warn("handshake: hash initialization failed (%d)\n", ret); in handshake_init()
257 pr_warn("handshake: netlink registration failed (%d)\n", ret); in handshake_init()
267 * shunts the handshake consumer API to return ENOTSUPP in handshake_init()
[all …]
H A DMakefile3 # Makefile for the Generic HANDSHAKE service
10 obj-y += handshake.o
11 handshake-y := alert.o genl.o netlink.o request.o tlshd.o trace.o
13 obj-$(CONFIG_NET_HANDSHAKE_KUNIT_TEST) += handshake-test.o
H A Dgenl.c3 /* Documentation/netlink/specs/handshake.yaml */
11 #include <uapi/linux/handshake.h>
25 /* Ops table for handshake */
H A Dhandshake.h3 * Generic netlink handshake service
29 /* One handshake request */
49 /* Invariants for all handshake requests for one transport layer
/openbmc/openbmc/poky/meta/recipes-connectivity/openssl/openssl/
H A D0001-Added-handshake-history-reporting-when-test-fails.patch4 Subject: [PATCH] Added handshake history reporting when test fails
10 test/helpers/handshake.c | 137 +++++++++++++++++++++++++++++----------
11 test/helpers/handshake.h | 70 +++++++++++++++++++-
15 diff --git a/test/helpers/handshake.c b/test/helpers/handshake.c
17 --- a/test/helpers/handshake.c
18 +++ b/test/helpers/handshake.c
31 + {"Handshake", HANDSHAKE},
98 + * Create a new history entry for a handshake loop with statuses given in
113 + /* Evict the oldest handshake loop entry when the ring buffer is full. */
143 - HANDSHAKE,
[all …]
/openbmc/qemu/include/io/
H A Dchannel-tls.h57 * @creds: the credentials to use for TLS handshake
62 * a TLS session. The TLS session handshake will use the
72 * Once the handshake has completed, all I/O should be done
87 * @creds: the credentials to use for TLS handshake
92 * a TLS session. The TLS session handshake will use the
102 * Once the handshake has completed, all I/O should be done
120 * @context: the context that TLS handshake will run with. If %NULL,
123 * Perform the TLS session handshake. This method
124 * will return immediately and the handshake will
126 * loop is running. When the handshake is complete,
H A Dchannel-websock.h81 * Once the handshake has completed, all I/O should be done
97 * Perform the websocket handshake. This method
98 * will return immediately and the handshake will
100 * loop is running. When the handshake is complete,
/openbmc/qemu/io/
H A Dtrace-events42 qio_channel_tls_handshake_start(void *ioc) "TLS handshake start ioc=%p"
43 qio_channel_tls_handshake_pending(void *ioc, int status) "TLS handshake pending ioc=%p status=%d"
44 qio_channel_tls_handshake_fail(void *ioc) "TLS handshake fail ioc=%p"
45 qio_channel_tls_handshake_complete(void *ioc) "TLS handshake complete ioc=%p"
46 qio_channel_tls_handshake_cancel(void *ioc) "TLS handshake cancel ioc=%p"
52 qio_channel_websock_handshake_start(void *ioc) "Websock handshake start ioc=%p"
53 qio_channel_websock_handshake_pending(void *ioc, int status) "Websock handshake pending ioc=%p stat…
54 qio_channel_websock_handshake_reply(void *ioc) "Websock handshake reply ioc=%p"
55 qio_channel_websock_handshake_fail(void *ioc, const char *msg) "Websock handshake fail ioc=%p err=%…
56 qio_channel_websock_handshake_complete(void *ioc) "Websock handshake complete ioc=%p"
/openbmc/linux/arch/powerpc/kernel/
H A Dsmp-tbsync.c28 volatile int handshake; member
58 while (!tbsync->handshake) in smp_generic_take_timebase()
69 while (tbsync->handshake) in smp_generic_take_timebase()
94 tbsync->handshake = 1; in start_contest()
100 tbsync->handshake = 0; in start_contest()
164 tbsync->handshake = 1; in smp_generic_give_timebase()
167 tbsync->handshake = 0; in smp_generic_give_timebase()
/openbmc/linux/Documentation/netlink/specs/
H A Dhandshake.yaml8 name: handshake
12 doc: Netlink protocol to request a transport layer security handshake.
92 doc: Notify handlers that a new handshake request is waiting
96 doc: Handler retrieves next queued handshake request
114 doc: Handler reports handshake completion
/openbmc/qemu/ui/
H A Dvnc-ws.c35 VNC_DEBUG("Handshake failed %s\n", error_get_pretty(err)); in vncws_tls_handshake_done()
39 VNC_DEBUG("TLS handshake complete, starting websocket handshake\n"); in vncws_tls_handshake_done()
104 VNC_DEBUG("Websock handshake failed %s\n", error_get_pretty(err)); in vncws_handshake_done()
108 VNC_DEBUG("Websock handshake complete, starting VNC protocol\n"); in vncws_handshake_done()
/openbmc/linux/tools/net/ynl/generated/
H A Dhandshake-user.h3 /* Documentation/netlink/specs/handshake.yaml */
12 #include <linux/handshake.h>
82 * Handler retrieves next queued handshake request
141 * Handler reports handshake completion
/openbmc/qemu/tests/unit/
H A Dtest-crypto-tlssession.c111 * We have an evil loop to do the handshake in a single in test_crypto_tls_session_psk()
139 /* For handshake to work, we need to set the I/O callbacks in test_crypto_tls_session_psk()
150 * Finally we loop around & around doing handshake on each in test_crypto_tls_session_psk()
151 * session until we get an error, or the handshake completes. in test_crypto_tls_session_psk()
153 * deadlocking ourselves upon handshake in test_crypto_tls_session_psk()
239 * active TLS session after handshake completes. To
265 * We have an evil loop to do the handshake in a single in test_crypto_tls_session_x509()
333 /* For handshake to work, we need to set the I/O callbacks in test_crypto_tls_session_x509()
344 * Finally we loop around & around doing handshake on each in test_crypto_tls_session_x509()
345 * session until we get an error, or the handshake completes. in test_crypto_tls_session_x509()
[all …]
/openbmc/qemu/include/crypto/
H A Dtlssession.h140 * method. A TLS handshake sequence must then be completed
172 * TLS handshake. It is an error to call this before
288 * Start, or continue, a TLS handshake sequence. If
290 * this method may return control before the handshake
293 * should be used to determine whether the handshake
313 * Check the status of the TLS handshake. This
315 * determine whether the handshake is waiting
/openbmc/linux/drivers/net/ipa/
H A Dipa_qmi.h47 * of QMI messages that perform a "handshake" between the AP and modem.
51 * IPA hardware until this handshake is complete.
53 * If the modem crashes (or shuts down) a new handshake begins when the
/openbmc/u-boot/arch/arm/include/asm/arch-aspeed/
H A Dplatform.h22 #define ASPEED_VGA_HANDSHAKE0 0x1e6e2040 /* VGA function handshake register */
37 #define ASPEED_VGA_HANDSHAKE0 0x1e6e2040 /* VGA function handshake register */
57 #define ASPEED_VGA_HANDSHAKE0 0x1e6e2100 /* VGA function handshake register */
/openbmc/u-boot/doc/
H A Dkwboot.121 UART for a brief period of time, sensing a handshake message which
36 Handshake; then upload file \fIimage\fP over \fITTY\fP.
44 This mode writes handshake status and upload progress indication to
/openbmc/linux/drivers/char/
H A Ddsp56k.c60 #define handshake(count, maxio, timeout, ENABLE, f) \ macro
203 handshake(count, dsp56k.maxio, dsp56k.timeout, DSP56K_RECEIVE, in dsp56k_read()
213 handshake(count, dsp56k.maxio, dsp56k.timeout, DSP56K_RECEIVE, in dsp56k_read()
220 handshake(count, dsp56k.maxio, dsp56k.timeout, DSP56K_RECEIVE, in dsp56k_read()
232 handshake(count, dsp56k.maxio, dsp56k.timeout, DSP56K_RECEIVE, in dsp56k_read()
265 handshake(count, dsp56k.maxio, dsp56k.timeout, DSP56K_TRANSMIT, in dsp56k_write()
275 handshake(count, dsp56k.maxio, dsp56k.timeout, DSP56K_TRANSMIT, in dsp56k_write()
282 handshake(count, dsp56k.maxio, dsp56k.timeout, DSP56K_TRANSMIT, in dsp56k_write()
294 handshake(count, dsp56k.maxio, dsp56k.timeout, DSP56K_TRANSMIT, in dsp56k_write()

12345678910>>...21