Home
last modified time | relevance | path

Searched full:ssf (Results 1 – 15 of 15) sorted by relevance

/openbmc/linux/net/sctp/
H A Dulpevent.c435 struct sctp_send_failed *ssf; in sctp_ulpevent_make_send_failed() local
457 ssf = skb_push(skb, sizeof(struct sctp_send_failed)); in sctp_ulpevent_make_send_failed()
465 ssf->ssf_type = SCTP_SEND_FAILED; in sctp_ulpevent_make_send_failed()
480 ssf->ssf_flags = flags; in sctp_ulpevent_make_send_failed()
489 ssf->ssf_length = sizeof(struct sctp_send_failed) + len; in sctp_ulpevent_make_send_failed()
490 skb_trim(skb, ssf->ssf_length); in sctp_ulpevent_make_send_failed()
500 ssf->ssf_error = error; in sctp_ulpevent_make_send_failed()
509 memcpy(&ssf->ssf_info, &chunk->sinfo, sizeof(struct sctp_sndrcvinfo)); in sctp_ulpevent_make_send_failed()
514 ssf->ssf_info.sinfo_flags = chunk->chunk_hdr->flags; in sctp_ulpevent_make_send_failed()
526 ssf->ssf_assoc_id = sctp_assoc2id(asoc); in sctp_ulpevent_make_send_failed()
[all …]
/openbmc/qemu/ui/
H A Dvnc-auth-sasl.c210 int err, ssf; in vnc_auth_sasl_check_ssf() local
219 ssf = *(const int *)val; in vnc_auth_sasl_check_ssf()
221 trace_vnc_auth_sasl_ssf(vs, ssf); in vnc_auth_sasl_check_ssf()
223 if (ssf < 56) in vnc_auth_sasl_check_ssf()
234 /* We have a SSF that's good enough */ in vnc_auth_sasl_check_ssf()
314 trace_vnc_auth_fail(vs, vs->auth, "SASL SSF too weak", ""); in protocol_client_auth_sasl_step()
326 * Delay writing in SSF encoded mode until pending output in protocol_client_auth_sasl_step()
442 trace_vnc_auth_fail(vs, vs->auth, "SASL SSF too weak", ""); in protocol_client_auth_sasl_start()
619 /* Inform SASL that we've got an external SSF layer from TLS/x509 */ in start_auth_sasl()
623 sasl_ssf_t ssf; in start_auth_sasl() local
[all …]
H A Dvnc-auth-sasl.h37 /* If we want to negotiate an SSF layer with client */
39 /* If we are now running the SSF layer */
43 * to be written plain, before switching to SSF encoding
H A Dtrace-events83 vnc_auth_sasl_ssf(void *state, int ssf) "VNC client auth SASL SSF state=%p size=%d"
H A Dvnc.c1423 * using any SASL SSF encryption layers. Will write as much data
1437 VNC_DEBUG("Write Plain: Pending output %p size %zd offset %zd. Wait SSF %d\n", in vnc_client_write_plain()
1484 * SASL SSF layers are enabled (thus requiring encryption calls)
1551 * when not using any SASL SSF encryption layers. Will read as much
1582 * SASL SSF layers are enabled (thus requiring decryption calls)
/openbmc/linux/Documentation/devicetree/bindings/pinctrl/
H A Drenesas,rzg2l-poeg.yaml18 * SSF bit setting(ie, by setting POEGGn.SSF to 1)
/openbmc/qemu/docs/system/
H A Dvnc-security.rst122 configured. If the chosen mechanism also provides a SSF layer, then it
126 for authentication, but assuming use of one supporting SSF, then QEMU
138 If the desired SASL authentication mechanism does not supported SSF
/openbmc/qemu/crypto/
H A Dtlssession.c594 int ssf; in qcrypto_tls_session_get_key_size() local
597 ssf = gnutls_cipher_get_key_size(cipher); in qcrypto_tls_session_get_key_size()
598 if (!ssf) { in qcrypto_tls_session_get_key_size()
602 return ssf; in qcrypto_tls_session_get_key_size()
/openbmc/qemu/linux-user/include/host/s390x/
H A Dhost-signal.h71 case 0xc8: /* SSF format insns */ in host_signal_write()
/openbmc/linux/arch/s390/tools/
H A Dgen_opcode_table.c88 "SSF",
/openbmc/qemu/target/s390x/tcg/
H A Dinsn-format.h.inc56 F3(SSF, BD(1,16,20), BD(2,32,36), R(3,8))
H A Dinsn-data.h.inc281 C(0xc802, CSST, SSF, CASS, la1, a2, 0, 0, csst, 0)
390 F(0xc801, ECTG, SSF, ECT, 0, 0, 0, 0, ectg, 0, IF_IO)
575 D(0xc804, LPD, SSF, ILA, 0, 0, new_P, r3_P32, lpd, 0, MO_TEUL)
576 D(0xc805, LPDG, SSF, ILA, 0, 0, new_P, r3_P64, lpd, 0, MO_TEUQ)
658 C(0xc800, MVCOS, SSF, MVCOS, la1, a2, 0, 0, mvcos, 0)
H A Dtranslate.c6183 case 0xc8: /* SSF */ in extract_insn()
/openbmc/linux/drivers/net/can/slcan/
H A Dslcan-core.c494 *pos = 'T'; /* becomes 't' in standard frame format (SSF) */ in slcan_encaps()
/openbmc/linux/drivers/pci/
H A Dquirks.c1618 case 0x001A: /* Compaq Deskpro EN SSF P667 815E */ in asus_hides_smbus_hostbridge()