Home
last modified time | relevance | path

Searched refs:keypairs (Results 1 – 10 of 10) sorted by relevance

/openbmc/linux/drivers/net/wireguard/
H A Dnoise.c151 void wg_noise_keypairs_clear(struct noise_keypairs *keypairs) in wg_noise_keypairs_clear() argument
155 spin_lock_bh(&keypairs->keypair_update_lock); in wg_noise_keypairs_clear()
161 old = rcu_dereference_protected(keypairs->next_keypair, in wg_noise_keypairs_clear()
162 lockdep_is_held(&keypairs->keypair_update_lock)); in wg_noise_keypairs_clear()
163 RCU_INIT_POINTER(keypairs->next_keypair, NULL); in wg_noise_keypairs_clear()
166 old = rcu_dereference_protected(keypairs->previous_keypair, in wg_noise_keypairs_clear()
167 lockdep_is_held(&keypairs->keypair_update_lock)); in wg_noise_keypairs_clear()
168 RCU_INIT_POINTER(keypairs->previous_keypair, NULL); in wg_noise_keypairs_clear()
171 old = rcu_dereference_protected(keypairs->current_keypair, in wg_noise_keypairs_clear()
172 lockdep_is_held(&keypairs->keypair_update_lock)); in wg_noise_keypairs_clear()
[all …]
H A Dnoise.h109 void wg_noise_keypairs_clear(struct noise_keypairs *keypairs);
110 bool wg_noise_received_with_keypair(struct noise_keypairs *keypairs,
133 struct noise_keypairs *keypairs);
H A Dpeer.c47 spin_lock_init(&peer->keypairs.keypair_update_lock); in wg_peer_create()
101 wg_noise_keypairs_clear(&peer->keypairs); in peer_remove_after_dead()
H A Dsend.c97 &peer->keypairs)) { in wg_packet_send_handshake_response()
130 keypair = rcu_dereference_bh(peer->keypairs.current_keypair); in keep_key_fresh()
359 rcu_dereference_bh(peer->keypairs.current_keypair)); in wg_packet_send_staged_packets()
H A Dpeer.h43 struct noise_keypairs keypairs; member
H A Dreceive.c177 &peer->keypairs)) { in wg_receive_handshake_packet()
229 keypair = rcu_dereference_bh(peer->keypairs.current_keypair); in keep_key_fresh()
345 if (unlikely(wg_noise_received_with_keypair(&peer->keypairs, in wg_packet_consume_data_done()
H A Ddevice.c86 wg_noise_keypairs_clear(&peer->keypairs); in wg_pm_notification()
126 wg_noise_keypairs_clear(&peer->keypairs); in wg_stop()
H A Dtimers.c131 wg_noise_keypairs_clear(&peer->keypairs); in wg_queued_expired_zero_key_material()
/openbmc/qemu/block/
H A Drbd.c119 const char *keypairs, const char *secretid,
171 QList *keypairs = NULL; in qemu_rbd_parse_filename() local
241 if (!keypairs) { in qemu_rbd_parse_filename()
242 keypairs = qlist_new(); in qemu_rbd_parse_filename()
244 qlist_append_str(keypairs, name); in qemu_rbd_parse_filename()
245 qlist_append_str(keypairs, value); in qemu_rbd_parse_filename()
249 if (keypairs) { in qemu_rbd_parse_filename()
251 qstring_from_gstring(qobject_to_json(QOBJECT(keypairs)))); in qemu_rbd_parse_filename()
256 qobject_unref(keypairs); in qemu_rbd_parse_filename()
305 QList *keypairs; in qemu_rbd_set_keypairs() local
[all …]
/openbmc/linux/Documentation/admin-guide/
H A Dmodule-signing.rst128 Cryptographic keypairs are required to generate and check signatures. A