Lines Matching full:encryption

26  * absolute minimum, which applies when only 128-bit encryption is used.
57 * fscrypt_context - the encryption context of an inode
61 * fields from the fscrypt_policy, in order to identify the encryption algorithm
130 /* Return the contents encryption mode of a valid encryption policy */
143 /* Return the filenames encryption mode of a valid encryption policy */
156 /* Return the flags (FSCRYPT_POLICY_FLAG*) of a valid encryption policy */
199 * struct fscrypt_prepared_key - a key prepared for actual encryption/decryption
213 * fscrypt_inode_info - the "encryption key" for an inode
221 /* The key in a form prepared for actual encryption/decryption */
229 * True if this inode will use inline encryption (blk-crypto) instead of
230 * the traditional filesystem-layer encryption.
239 * log2 of the data unit size (granularity of contents encryption) of
252 * Encryption mode used for this inode. It corresponds to either the
253 * contents or filenames encryption mode, depending on the inode type.
274 * If non-NULL, then encryption is done using the master key directly
286 /* The encryption policy used by this inode */
396 * @prep_key, depending on which encryption implementation the file will use.
406 * encryption key) another task can publish blk_key or tfm concurrently, in fscrypt_is_key_prepared()
479 * This represents a master encryption key which has been added to the
572 * Per-mode encryption keys for the various types of encryption policies
672 * fscrypt_require_key() - require an inode's encryption key
675 * If the inode is encrypted, set up its encryption key if not already done.
682 * if a problem occurred while setting up the encryption key.