/openbmc/linux/drivers/net/wireguard/ |
H A D | noise.c | 46 /* Must hold peer->handshake.static_identity->lock */ 49 down_write(&peer->handshake.lock); in wg_noise_precompute_static_static() 50 if (!peer->handshake.static_identity->has_identity || in wg_noise_precompute_static_static() 51 !curve25519(peer->handshake.precomputed_static_static, in wg_noise_precompute_static_static() 52 peer->handshake.static_identity->static_private, in wg_noise_precompute_static_static() 53 peer->handshake.remote_static)) in wg_noise_precompute_static_static() 54 memset(peer->handshake.precomputed_static_static, 0, in wg_noise_precompute_static_static() 56 up_write(&peer->handshake.lock); in wg_noise_precompute_static_static() 59 void wg_noise_handshake_init(struct noise_handshake *handshake, in wg_noise_handshake_init() argument 65 memset(handshake, 0, sizeof(*handshake)); in wg_noise_handshake_init() [all …]
|
H A D | timers.c | 13 * - Timer for retransmitting the handshake if we don't hear back after 19 * - Timer for initiating new handshake if we have sent a packet but after have 47 pr_debug("%s: Handshake for peer %llu (%pISpfsc) did not complete after %d attempts, giving up\n", in wg_expired_retransmit_handshake() 53 * if we try unsuccessfully for too long to make a handshake. in wg_expired_retransmit_handshake() 65 …pr_debug("%s: Handshake for peer %llu (%pISpfsc) did not complete after %d seconds, retrying (try … in wg_expired_retransmit_handshake() 95 …pr_debug("%s: Retrying handshake with peer %llu (%pISpfsc) because we stopped hearing back after %… in wg_expired_new_handshake() 130 wg_noise_handshake_clear(&peer->handshake); in wg_queued_expired_zero_key_material() 166 * keepalive, data, or handshake. 174 * keepalive, data, or handshake. 181 /* Should be called after a handshake initiation message is sent. */ [all …]
|
H A D | noise.h | 95 void wg_noise_handshake_init(struct noise_handshake *handshake, 100 void wg_noise_handshake_clear(struct noise_handshake *handshake); 121 struct noise_handshake *handshake); 127 struct noise_handshake *handshake); 132 bool wg_noise_handshake_begin_session(struct noise_handshake *handshake,
|
H A D | send.c | 30 net_dbg_ratelimited("%s: Sending handshake initiation to peer %llu (%pISpfsc)\n", in wg_packet_send_handshake_initiation() 34 if (wg_noise_handshake_create_initiation(&packet, &peer->handshake)) { in wg_packet_send_handshake_initiation() 90 net_dbg_ratelimited("%s: Sending handshake response to peer %llu (%pISpfsc)\n", in wg_packet_send_handshake_response() 94 if (wg_noise_handshake_create_response(&packet, &peer->handshake)) { in wg_packet_send_handshake_response() 96 if (wg_noise_handshake_begin_session(&peer->handshake, in wg_packet_send_handshake_response() 116 net_dbg_skb_ratelimited("%s: Sending cookie response for denied handshake message for %pISpfsc\n", in wg_packet_send_handshake_cookie() 372 * handshake. in wg_packet_send_staged_packets() 396 /* We orphan the packets if we're waiting on a handshake, so that they in wg_packet_send_staged_packets() 411 * means we should initiate a new handshake. in wg_packet_send_staged_packets()
|
/openbmc/linux/Documentation/networking/ |
H A D | tls-handshake.rst | 4 In-Kernel TLS Handshake 15 does not handle the TLS handshake subprotocol which is used to establish 19 There are several possible ways to provide a handshake service in the 22 aware of how the handshake gets done. 25 User handshake agent 28 As of this writing, there is no TLS handshake implementation in the 29 Linux kernel. To provide a handshake service, a handshake agent 31 kernel consumer might require a TLS handshake. Handshake agents listen 32 for events sent from the kernel that indicate a handshake request is 35 An open socket is passed to a handshake agent via a netlink operation, [all …]
|
/openbmc/linux/net/handshake/ |
H A D | request.c | 3 * Handshake request lifetime events 25 #include <uapi/linux/handshake.h> 26 #include "handshake.h" 28 #include <trace/events/handshake.h> 34 * To avoid adding another pointer field to struct sock, net/handshake 103 * handshake_req_alloc - Allocate a handshake request 134 * handshake_req_private - Get per-handshake private data 135 * @req: handshake arguments 201 * handshake_req_submit - Submit a handshake request 202 * @sock: open socket on which to perform the handshake [all …]
|
H A D | tlshd.c | 19 #include <net/handshake.h> 24 #include <uapi/linux/handshake.h> 25 #include "handshake.h" 90 * @req: socket on which the handshake was performed 190 * @req: handshake parameters to return 271 * tls_client_hello_anon - request an anonymous TLS handshake on a socket 272 * @args: socket and handshake parameters for this request 276 * %0: Handshake request enqueue; ->done will be called when complete 297 * tls_client_hello_x509 - request an x.509-based TLS handshake on a socket 298 * @args: socket and handshake parameters for this request [all …]
|
H A D | netlink.c | 3 * Generic netlink handshake service 23 #include <uapi/linux/handshake.h> 24 #include "handshake.h" 27 #include <trace/events/handshake.h> 32 * @proto: handshake protocol 232 * handshake_pernet - Get the handshake private per-net structure 236 * handshake module, or NULL if handshake_init() failed. 251 pr_warn("handshake: hash initialization failed (%d)\n", ret); in handshake_init() 257 pr_warn("handshake: netlink registration failed (%d)\n", ret); in handshake_init() 267 * shunts the handshake consumer API to return ENOTSUPP in handshake_init() [all …]
|
H A D | Makefile | 3 # Makefile for the Generic HANDSHAKE service 10 obj-y += handshake.o 11 handshake-y := alert.o genl.o netlink.o request.o tlshd.o trace.o 13 obj-$(CONFIG_NET_HANDSHAKE_KUNIT_TEST) += handshake-test.o
|
H A D | genl.c | 3 /* Documentation/netlink/specs/handshake.yaml */ 11 #include <uapi/linux/handshake.h> 25 /* Ops table for handshake */
|
H A D | handshake.h | 3 * Generic netlink handshake service 29 /* One handshake request */ 49 /* Invariants for all handshake requests for one transport layer
|
/openbmc/openbmc/poky/meta/recipes-connectivity/openssl/openssl/ |
H A D | 0001-Added-handshake-history-reporting-when-test-fails.patch | 4 Subject: [PATCH] Added handshake history reporting when test fails 10 test/helpers/handshake.c | 137 +++++++++++++++++++++++++++++---------- 11 test/helpers/handshake.h | 70 +++++++++++++++++++- 15 diff --git a/test/helpers/handshake.c b/test/helpers/handshake.c 17 --- a/test/helpers/handshake.c 18 +++ b/test/helpers/handshake.c 31 + {"Handshake", HANDSHAKE}, 98 + * Create a new history entry for a handshake loop with statuses given in 113 + /* Evict the oldest handshake loop entry when the ring buffer is full. */ 143 - HANDSHAKE, [all …]
|
/openbmc/qemu/include/io/ |
H A D | channel-tls.h | 57 * @creds: the credentials to use for TLS handshake 62 * a TLS session. The TLS session handshake will use the 72 * Once the handshake has completed, all I/O should be done 87 * @creds: the credentials to use for TLS handshake 92 * a TLS session. The TLS session handshake will use the 102 * Once the handshake has completed, all I/O should be done 120 * @context: the context that TLS handshake will run with. If %NULL, 123 * Perform the TLS session handshake. This method 124 * will return immediately and the handshake will 126 * loop is running. When the handshake is complete,
|
H A D | channel-websock.h | 81 * Once the handshake has completed, all I/O should be done 97 * Perform the websocket handshake. This method 98 * will return immediately and the handshake will 100 * loop is running. When the handshake is complete,
|
/openbmc/qemu/io/ |
H A D | trace-events | 42 qio_channel_tls_handshake_start(void *ioc) "TLS handshake start ioc=%p" 43 qio_channel_tls_handshake_pending(void *ioc, int status) "TLS handshake pending ioc=%p status=%d" 44 qio_channel_tls_handshake_fail(void *ioc) "TLS handshake fail ioc=%p" 45 qio_channel_tls_handshake_complete(void *ioc) "TLS handshake complete ioc=%p" 46 qio_channel_tls_handshake_cancel(void *ioc) "TLS handshake cancel ioc=%p" 52 qio_channel_websock_handshake_start(void *ioc) "Websock handshake start ioc=%p" 53 qio_channel_websock_handshake_pending(void *ioc, int status) "Websock handshake pending ioc=%p stat… 54 qio_channel_websock_handshake_reply(void *ioc) "Websock handshake reply ioc=%p" 55 qio_channel_websock_handshake_fail(void *ioc, const char *msg) "Websock handshake fail ioc=%p err=%… 56 qio_channel_websock_handshake_complete(void *ioc) "Websock handshake complete ioc=%p"
|
/openbmc/linux/arch/powerpc/kernel/ |
H A D | smp-tbsync.c | 28 volatile int handshake; member 58 while (!tbsync->handshake) in smp_generic_take_timebase() 69 while (tbsync->handshake) in smp_generic_take_timebase() 94 tbsync->handshake = 1; in start_contest() 100 tbsync->handshake = 0; in start_contest() 164 tbsync->handshake = 1; in smp_generic_give_timebase() 167 tbsync->handshake = 0; in smp_generic_give_timebase()
|
/openbmc/linux/Documentation/netlink/specs/ |
H A D | handshake.yaml | 8 name: handshake 12 doc: Netlink protocol to request a transport layer security handshake. 92 doc: Notify handlers that a new handshake request is waiting 96 doc: Handler retrieves next queued handshake request 114 doc: Handler reports handshake completion
|
/openbmc/qemu/ui/ |
H A D | vnc-ws.c | 35 VNC_DEBUG("Handshake failed %s\n", error_get_pretty(err)); in vncws_tls_handshake_done() 39 VNC_DEBUG("TLS handshake complete, starting websocket handshake\n"); in vncws_tls_handshake_done() 104 VNC_DEBUG("Websock handshake failed %s\n", error_get_pretty(err)); in vncws_handshake_done() 108 VNC_DEBUG("Websock handshake complete, starting VNC protocol\n"); in vncws_handshake_done()
|
/openbmc/linux/tools/net/ynl/generated/ |
H A D | handshake-user.h | 3 /* Documentation/netlink/specs/handshake.yaml */ 12 #include <linux/handshake.h> 82 * Handler retrieves next queued handshake request 141 * Handler reports handshake completion
|
/openbmc/qemu/tests/unit/ |
H A D | test-crypto-tlssession.c | 111 * We have an evil loop to do the handshake in a single in test_crypto_tls_session_psk() 139 /* For handshake to work, we need to set the I/O callbacks in test_crypto_tls_session_psk() 150 * Finally we loop around & around doing handshake on each in test_crypto_tls_session_psk() 151 * session until we get an error, or the handshake completes. in test_crypto_tls_session_psk() 153 * deadlocking ourselves upon handshake in test_crypto_tls_session_psk() 239 * active TLS session after handshake completes. To 265 * We have an evil loop to do the handshake in a single in test_crypto_tls_session_x509() 333 /* For handshake to work, we need to set the I/O callbacks in test_crypto_tls_session_x509() 344 * Finally we loop around & around doing handshake on each in test_crypto_tls_session_x509() 345 * session until we get an error, or the handshake completes. in test_crypto_tls_session_x509() [all …]
|
/openbmc/qemu/include/crypto/ |
H A D | tlssession.h | 140 * method. A TLS handshake sequence must then be completed 172 * TLS handshake. It is an error to call this before 288 * Start, or continue, a TLS handshake sequence. If 290 * this method may return control before the handshake 293 * should be used to determine whether the handshake 313 * Check the status of the TLS handshake. This 315 * determine whether the handshake is waiting
|
/openbmc/linux/drivers/net/ipa/ |
H A D | ipa_qmi.h | 47 * of QMI messages that perform a "handshake" between the AP and modem. 51 * IPA hardware until this handshake is complete. 53 * If the modem crashes (or shuts down) a new handshake begins when the
|
/openbmc/u-boot/arch/arm/include/asm/arch-aspeed/ |
H A D | platform.h | 22 #define ASPEED_VGA_HANDSHAKE0 0x1e6e2040 /* VGA function handshake register */ 37 #define ASPEED_VGA_HANDSHAKE0 0x1e6e2040 /* VGA function handshake register */ 57 #define ASPEED_VGA_HANDSHAKE0 0x1e6e2100 /* VGA function handshake register */
|
/openbmc/u-boot/doc/ |
H A D | kwboot.1 | 21 UART for a brief period of time, sensing a handshake message which 36 Handshake; then upload file \fIimage\fP over \fITTY\fP. 44 This mode writes handshake status and upload progress indication to
|
/openbmc/linux/drivers/char/ |
H A D | dsp56k.c | 60 #define handshake(count, maxio, timeout, ENABLE, f) \ macro 203 handshake(count, dsp56k.maxio, dsp56k.timeout, DSP56K_RECEIVE, in dsp56k_read() 213 handshake(count, dsp56k.maxio, dsp56k.timeout, DSP56K_RECEIVE, in dsp56k_read() 220 handshake(count, dsp56k.maxio, dsp56k.timeout, DSP56K_RECEIVE, in dsp56k_read() 232 handshake(count, dsp56k.maxio, dsp56k.timeout, DSP56K_RECEIVE, in dsp56k_read() 265 handshake(count, dsp56k.maxio, dsp56k.timeout, DSP56K_TRANSMIT, in dsp56k_write() 275 handshake(count, dsp56k.maxio, dsp56k.timeout, DSP56K_TRANSMIT, in dsp56k_write() 282 handshake(count, dsp56k.maxio, dsp56k.timeout, DSP56K_TRANSMIT, in dsp56k_write() 294 handshake(count, dsp56k.maxio, dsp56k.timeout, DSP56K_TRANSMIT, in dsp56k_write()
|