/linux-master/net/handshake/ |
H A D | tlshd.c | 19 #include <net/handshake.h> 24 #include <uapi/linux/handshake.h> 25 #include "handshake.h" 90 * @req: socket on which the handshake was performed 190 * @req: handshake parameters to return 270 * tls_client_hello_anon - request an anonymous TLS handshake on a socket 271 * @args: socket and handshake parameters for this request 296 * tls_client_hello_x509 - request an x.509-based TLS handshake on a socket 297 * @args: socket and handshake parameters for this request 324 * tls_client_hello_psk - request a PSK-based TLS handshake o [all...] |
H A D | handshake-test.c | 5 * KUnit test of the handshake upcall mechanism. 17 #include <uapi/linux/handshake.h> 18 #include "handshake.h" 539 MODULE_DESCRIPTION("Test handshake upcall API functions");
|
/linux-master/drivers/net/ethernet/cavium/liquidio/ |
H A D | lio_main.c | 133 struct handshake { struct 156 static struct handshake handshake[MAX_OCTEON_DEVICES]; variable in typeref:struct:handshake 832 struct handshake *hs; 863 hs = &handshake[oct_dev->octeon_id]; 954 struct handshake *hs; 1076 hs = &handshake[i]; 1079 handshake[oct->octeon_id].init_ok = 0; 1080 complete(&handshake[oct->octeon_id].init); 1081 handshake[oc [all...] |
/linux-master/drivers/net/wireguard/ |
H A D | device.c | 85 wg_noise_handshake_clear(&peer->handshake); 125 wg_noise_handshake_clear(&peer->handshake);
|
H A D | timers.c | 13 * - Timer for retransmitting the handshake if we don't hear back after 19 * - Timer for initiating new handshake if we have sent a packet but after have 53 * if we try unsuccessfully for too long to make a handshake. 95 pr_debug("%s: Retrying handshake with peer %llu (%pISpfsc) because we stopped hearing back after %d seconds\n", 130 wg_noise_handshake_clear(&peer->handshake); 166 * keepalive, data, or handshake. 174 * keepalive, data, or handshake. 181 /* Should be called after a handshake initiation message is sent. */ 189 /* Should be called after a handshake response message is received and processed 201 * handshake respons [all...] |
H A D | receive.c | 129 net_dbg_skb_ratelimited("%s: Invalid MAC of handshake, dropping packet from %pISpfsc\n", 146 net_dbg_skb_ratelimited("%s: Invalid handshake initiation from %pISpfsc\n", 151 net_dbg_ratelimited("%s: Receiving handshake initiation from peer %llu (%pISpfsc)\n", 168 net_dbg_skb_ratelimited("%s: Invalid handshake response from %pISpfsc\n", 173 net_dbg_ratelimited("%s: Receiving handshake response from peer %llu (%pISpfsc)\n", 176 if (wg_noise_handshake_begin_session(&peer->handshake, 193 WARN(1, "Somehow a wrong type of packet wound up in the handshake queue!\n"); 563 net_dbg_skb_ratelimited("%s: Dropping handshake packet from %pISpfsc\n",
|
/linux-master/drivers/usb/host/ |
H A D | pci-quirks.c | 1009 * handshake - spin reading a register until handshake completes 1012 * @done: value of those bits when handshake succeeds 1021 static int handshake(void __iomem *ptr, u32 mask, u32 done, function 1194 timeout = handshake(base + ext_cap_offset, XHCI_HC_BIOS_OWNED, 1223 timeout = handshake(op_reg_base + XHCI_STS_OFFSET, XHCI_STS_CNR, 0, 1239 timeout = handshake(op_reg_base + XHCI_STS_OFFSET, XHCI_STS_HALT, 1,
|
H A D | oxu210hp-hcd.c | 732 * handshake - spin reading hc until handshake completes or fails 735 * @done: value of those bits when handshake succeeds 741 * handshake done). There are two failure modes: "usec" have passed (major 748 static int handshake(struct oxu_hcd *oxu, void __iomem *ptr, function 778 return handshake(oxu, &oxu->regs->status, 805 retval = handshake(oxu, &oxu->regs->command, 828 if (handshake(oxu, &oxu->regs->status, STS_ASS | STS_PSS, 840 if (handshake(oxu, &oxu->regs->status, STS_ASS | STS_PSS, 1929 (void)handshake(ox [all...] |
/linux-master/drivers/dma/dw-edma/ |
H A D | dw-hdma-v0-debugfs.c | 86 CTX_REGISTER(dw, handshake, dir, ch),
|
/linux-master/sound/pci/echoaudio/ |
H A D | echoaudio.h | 457 chip->comm_page->handshake = 0;
|
H A D | echoaudio_dsp.h | 165 -Wait for the DSP handshake 650 __le32 handshake; /* DSP command handshake 0x010 4 */ member in struct:comm_page
|
H A D | echoaudio_dsp.c | 41 comm page. This function waits for the handshake to show up. */ 46 /* Wait up to 20ms for the handshake from the DSP */ 48 /* Look for the handshake value */ 50 if (chip->comm_page->handshake) { 65 PCI posting is not required thanks to the handshake logic. */ 536 /* Wait for the handshake (OK even if ASIC is not loaded) */ 680 chip->comm_page->handshake = cpu_to_le32(0xffffffff); 990 chip->comm_page->handshake = cpu_to_le32(0xffffffff);
|
/linux-master/include/trace/events/ |
H A D | handshake.h | 3 #define TRACE_SYSTEM handshake
|
/linux-master/drivers/usb/fotg210/ |
H A D | fotg210-hcd.c | 860 /* handshake - spin reading hc until handshake completes or fails 863 * @done: value of those bits when handshake succeeds 869 * handshake done). There are two failure modes: "usec" have passed (major 876 static int handshake(struct fotg210_hcd *fotg210, void __iomem *ptr, function 915 return handshake(fotg210, &fotg210->regs->status, 938 retval = handshake(fotg210, &fotg210->regs->command, 964 handshake(fotg210, &fotg210->regs->status, STS_ASS | STS_PSS, temp, 974 handshake(fotg210, &fotg210->regs->status, STS_ASS | STS_PSS, 0, 1586 retval = handshake(fotg21 [all...] |
/linux-master/drivers/block/ |
H A D | swim.c | 122 /* Bits in handshake register */ 303 stat = swim_read(base, handshake);
|
/linux-master/fs/nfs/ |
H A D | fs_context.c | 22 #include <net/handshake.h>
|
/linux-master/drivers/usb/gadget/udc/ |
H A D | net2280.c | 361 static int handshake(u32 __iomem *ptr, u32 mask, u32 done, int usec) function 695 handshake(statp, BIT(USB_OUT_PING_NAK_SENT), 838 handshake(&dma->dmactl, BIT(DMA_ENABLE), 0, 50);
|
/linux-master/net/sunrpc/ |
H A D | svcsock.c | 49 #include <net/handshake.h> 72 * handshake request, the request could instead be deferred. 418 * @status: status of handshake 441 * svc_tcp_handshake - Perform a transport-layer security handshake 482 * traffic before the kernel received the handshake
|
H A D | xprtsock.c | 51 #include <net/handshake.h> 195 * TLS handshake timeout. 2555 * xs_tls_handshake_done - TLS handshake completion handler 2557 * @status: status of handshake 2642 * then driving the TLS handshake. Once all that is complete, the upper 2689 /* RPC_AUTH_TLS probe was successful. Try a TLS handshake on
|
/linux-master/drivers/nvme/host/ |
H A D | tcp.c | 18 #include <net/handshake.h> 48 * TLS handshake timeout 54 "nvme TLS handshake timeout in seconds (default 10)"); 1576 dev_dbg(ctrl->ctrl.device, "queue %d: TLS handshake done, key %x, status %d\n", 1634 "queue %d: TLS handshake failed, error %d\n", 1639 "queue %d: TLS handshake complete, error %d\n",
|
/linux-master/drivers/nvme/target/ |
H A D | tcp.c | 18 #include <net/handshake.h> 78 * TLS handshake timeout 83 "nvme TLS handshake timeout in seconds (default 10)"); 1399 /* Socket closed during handshake */ 1795 pr_debug("queue %d: TLS handshake done, key %x, status %d\n", 1822 pr_warn("queue %d: TLS handshake timeout\n", queue->idx); 1941 /* TLS handshake failed, terminate the connection */
|