/openbmc/linux/net/sctp/ |
H A D | ulpevent.c | 435 struct sctp_send_failed *ssf; in sctp_ulpevent_make_send_failed() local 457 ssf = skb_push(skb, sizeof(struct sctp_send_failed)); in sctp_ulpevent_make_send_failed() 465 ssf->ssf_type = SCTP_SEND_FAILED; in sctp_ulpevent_make_send_failed() 480 ssf->ssf_flags = flags; in sctp_ulpevent_make_send_failed() 489 ssf->ssf_length = sizeof(struct sctp_send_failed) + len; in sctp_ulpevent_make_send_failed() 490 skb_trim(skb, ssf->ssf_length); in sctp_ulpevent_make_send_failed() 500 ssf->ssf_error = error; in sctp_ulpevent_make_send_failed() 509 memcpy(&ssf->ssf_info, &chunk->sinfo, sizeof(struct sctp_sndrcvinfo)); in sctp_ulpevent_make_send_failed() 514 ssf->ssf_info.sinfo_flags = chunk->chunk_hdr->flags; in sctp_ulpevent_make_send_failed() 526 ssf->ssf_assoc_id = sctp_assoc2id(asoc); in sctp_ulpevent_make_send_failed() [all …]
|
/openbmc/qemu/ui/ |
H A D | vnc-auth-sasl.c | 210 int err, ssf; in vnc_auth_sasl_check_ssf() local 219 ssf = *(const int *)val; in vnc_auth_sasl_check_ssf() 221 trace_vnc_auth_sasl_ssf(vs, ssf); in vnc_auth_sasl_check_ssf() 223 if (ssf < 56) in vnc_auth_sasl_check_ssf() 234 /* We have a SSF that's good enough */ in vnc_auth_sasl_check_ssf() 314 trace_vnc_auth_fail(vs, vs->auth, "SASL SSF too weak", ""); in protocol_client_auth_sasl_step() 326 * Delay writing in SSF encoded mode until pending output in protocol_client_auth_sasl_step() 442 trace_vnc_auth_fail(vs, vs->auth, "SASL SSF too weak", ""); in protocol_client_auth_sasl_start() 619 /* Inform SASL that we've got an external SSF layer from TLS/x509 */ in start_auth_sasl() 623 sasl_ssf_t ssf; in start_auth_sasl() local [all …]
|
H A D | vnc-auth-sasl.h | 37 /* If we want to negotiate an SSF layer with client */ 39 /* If we are now running the SSF layer */ 43 * to be written plain, before switching to SSF encoding
|
H A D | trace-events | 83 vnc_auth_sasl_ssf(void *state, int ssf) "VNC client auth SASL SSF state=%p size=%d"
|
H A D | vnc.c | 1423 * using any SASL SSF encryption layers. Will write as much data 1437 VNC_DEBUG("Write Plain: Pending output %p size %zd offset %zd. Wait SSF %d\n", in vnc_client_write_plain() 1484 * SASL SSF layers are enabled (thus requiring encryption calls) 1551 * when not using any SASL SSF encryption layers. Will read as much 1582 * SASL SSF layers are enabled (thus requiring decryption calls)
|
/openbmc/linux/Documentation/devicetree/bindings/pinctrl/ |
H A D | renesas,rzg2l-poeg.yaml | 18 * SSF bit setting(ie, by setting POEGGn.SSF to 1)
|
/openbmc/qemu/docs/system/ |
H A D | vnc-security.rst | 122 configured. If the chosen mechanism also provides a SSF layer, then it 126 for authentication, but assuming use of one supporting SSF, then QEMU 138 If the desired SASL authentication mechanism does not supported SSF
|
/openbmc/qemu/crypto/ |
H A D | tlssession.c | 594 int ssf; in qcrypto_tls_session_get_key_size() local 597 ssf = gnutls_cipher_get_key_size(cipher); in qcrypto_tls_session_get_key_size() 598 if (!ssf) { in qcrypto_tls_session_get_key_size() 602 return ssf; in qcrypto_tls_session_get_key_size()
|
/openbmc/qemu/linux-user/include/host/s390x/ |
H A D | host-signal.h | 71 case 0xc8: /* SSF format insns */ in host_signal_write()
|
/openbmc/linux/arch/s390/tools/ |
H A D | gen_opcode_table.c | 88 "SSF",
|
/openbmc/qemu/target/s390x/tcg/ |
H A D | insn-format.h.inc | 56 F3(SSF, BD(1,16,20), BD(2,32,36), R(3,8))
|
H A D | insn-data.h.inc | 281 C(0xc802, CSST, SSF, CASS, la1, a2, 0, 0, csst, 0) 390 F(0xc801, ECTG, SSF, ECT, 0, 0, 0, 0, ectg, 0, IF_IO) 575 D(0xc804, LPD, SSF, ILA, 0, 0, new_P, r3_P32, lpd, 0, MO_TEUL) 576 D(0xc805, LPDG, SSF, ILA, 0, 0, new_P, r3_P64, lpd, 0, MO_TEUQ) 658 C(0xc800, MVCOS, SSF, MVCOS, la1, a2, 0, 0, mvcos, 0)
|
H A D | translate.c | 6183 case 0xc8: /* SSF */ in extract_insn()
|
/openbmc/linux/drivers/net/can/slcan/ |
H A D | slcan-core.c | 494 *pos = 'T'; /* becomes 't' in standard frame format (SSF) */ in slcan_encaps()
|
/openbmc/linux/drivers/pci/ |
H A D | quirks.c | 1618 case 0x001A: /* Compaq Deskpro EN SSF P667 815E */ in asus_hides_smbus_hostbridge()
|