Searched refs:keypairs (Results 1 – 10 of 10) sorted by relevance
/openbmc/linux/drivers/net/wireguard/ |
H A D | noise.c | 151 void wg_noise_keypairs_clear(struct noise_keypairs *keypairs) in wg_noise_keypairs_clear() argument 155 spin_lock_bh(&keypairs->keypair_update_lock); in wg_noise_keypairs_clear() 161 old = rcu_dereference_protected(keypairs->next_keypair, in wg_noise_keypairs_clear() 162 lockdep_is_held(&keypairs->keypair_update_lock)); in wg_noise_keypairs_clear() 163 RCU_INIT_POINTER(keypairs->next_keypair, NULL); in wg_noise_keypairs_clear() 166 old = rcu_dereference_protected(keypairs->previous_keypair, in wg_noise_keypairs_clear() 167 lockdep_is_held(&keypairs->keypair_update_lock)); in wg_noise_keypairs_clear() 168 RCU_INIT_POINTER(keypairs->previous_keypair, NULL); in wg_noise_keypairs_clear() 171 old = rcu_dereference_protected(keypairs->current_keypair, in wg_noise_keypairs_clear() 172 lockdep_is_held(&keypairs->keypair_update_lock)); in wg_noise_keypairs_clear() [all …]
|
H A D | noise.h | 109 void wg_noise_keypairs_clear(struct noise_keypairs *keypairs); 110 bool wg_noise_received_with_keypair(struct noise_keypairs *keypairs, 133 struct noise_keypairs *keypairs);
|
H A D | peer.c | 47 spin_lock_init(&peer->keypairs.keypair_update_lock); in wg_peer_create() 101 wg_noise_keypairs_clear(&peer->keypairs); in peer_remove_after_dead()
|
H A D | send.c | 97 &peer->keypairs)) { in wg_packet_send_handshake_response() 130 keypair = rcu_dereference_bh(peer->keypairs.current_keypair); in keep_key_fresh() 359 rcu_dereference_bh(peer->keypairs.current_keypair)); in wg_packet_send_staged_packets()
|
H A D | peer.h | 43 struct noise_keypairs keypairs; member
|
H A D | receive.c | 177 &peer->keypairs)) { in wg_receive_handshake_packet() 229 keypair = rcu_dereference_bh(peer->keypairs.current_keypair); in keep_key_fresh() 345 if (unlikely(wg_noise_received_with_keypair(&peer->keypairs, in wg_packet_consume_data_done()
|
H A D | device.c | 86 wg_noise_keypairs_clear(&peer->keypairs); in wg_pm_notification() 126 wg_noise_keypairs_clear(&peer->keypairs); in wg_stop()
|
H A D | timers.c | 131 wg_noise_keypairs_clear(&peer->keypairs); in wg_queued_expired_zero_key_material()
|
/openbmc/qemu/block/ |
H A D | rbd.c | 119 const char *keypairs, const char *secretid, 171 QList *keypairs = NULL; in qemu_rbd_parse_filename() local 241 if (!keypairs) { in qemu_rbd_parse_filename() 242 keypairs = qlist_new(); in qemu_rbd_parse_filename() 244 qlist_append_str(keypairs, name); in qemu_rbd_parse_filename() 245 qlist_append_str(keypairs, value); in qemu_rbd_parse_filename() 249 if (keypairs) { in qemu_rbd_parse_filename() 251 qstring_from_gstring(qobject_to_json(QOBJECT(keypairs)))); in qemu_rbd_parse_filename() 256 qobject_unref(keypairs); in qemu_rbd_parse_filename() 305 QList *keypairs; in qemu_rbd_set_keypairs() local [all …]
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | module-signing.rst | 128 Cryptographic keypairs are required to generate and check signatures. A
|