/linux/Documentation/devicetree/bindings/crypto/ |
H A D | rockchip,rk3288-crypto.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/crypto/rockchip,rk3288-crypto.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Heiko Stuebner <heiko@sntech.de> 15 - rockchip,rk3288-crypto 16 - rockchip,rk3328-crypto 17 - rockchip,rk3399-crypto 29 clock-names: 37 reset-names: [all …]
|
/linux/net/rxrpc/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 9 select CRYPTO 22 See Documentation/networking/rxrpc.rst. 54 See Documentation/networking/rxrpc.rst. 59 select CRYPTO 68 See Documentation/networking/rxrpc.rst.
|
/linux/Documentation/power/ |
H A D | swsusp-dmcrypt.rst | 2 How to use dm-crypt and swsusp together 10 You know how dm-crypt works. If not, visit the following web page: 11 http://www.saout.de/misc/dm-crypt/ 12 You have read Documentation/power/swsusp.rst and understand it. 13 You did read Documentation/admin-guide/initrd.rst and know how an initrd works. 18 system for crypto setup and/or rescue purposes. You may even have 19 an initrd that does your current crypto setup already. 26 up dm-crypt and then asks swsusp to resume from the encrypted 29 The most important thing is that you set up dm-crypt in such 36 brw------- 1 root root 254, 0 Jul 28 13:37 /dev/mapper/swap0 [all …]
|
/linux/ |
H A D | MAINTAINERS | 5 --------------------------------------------------- 21 W: *Web-page* with status/info 23 B: URI for where to file *bugs*. A web-page with detailed bug 28 patches to the given subsystem. This is either an in-tree file, 29 or a URI. See Documentation/maintainer/maintainer-entry-profile.rst 46 N: [^a-z]tegra all files whose path contains tegra 64 ---------------- 74 F: Documentation/networking/device_drivers/ethernet/3com/vortex.rst 83 3WARE SAS/SATA-RAID SCSI DRIVERS (3W-XXXX, 3W-9XXX, 3W-SAS) 85 L: linux-scsi@vger.kernel.org [all …]
|
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 4 # see Documentation/kbuild/kconfig-language.rst. 26 source "crypto/Kconfig"
|
/linux/fs/crypto/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 3 bool "FS Encryption (Per-file encryption)" 4 select CRYPTO 18 # whereas selecting them from FS_ENCRYPTION would force them to be built-in. 21 # needs "by default". If userspace will use "non-default" encryption modes such 23 # in the crypto API; see Documentation/filesystems/fscrypt.rst for details. 26 # algorithms, not any per-architecture optimized implementations. It is 43 bool "Enable fscrypt to use inline crypto"
|
/linux/drivers/crypto/starfive/ |
H A D | jh7110-cryp.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 5 #include <crypto/aes.h> 6 #include <crypto/hash.h> 7 #include <crypto/scatterwalk.h> 8 #include <crypto/sha2.h> 9 #include <crypto/sm3.h> 11 #include <linux/dma-mapping.h> 181 struct reset_control *rst; member
|
/linux/Documentation/networking/device_drivers/ethernet/mellanox/mlx5/ |
H A D | switchdev.rst | 1 .. SPDX-License-Identifier: GPL-2.0 OR Linux-OpenIB 19 - Change device to switchdev mode:: 23 - Attach mlx5 switchdev representor 'enp8s0f0' to bridge netdev 'bridge1':: 28 ----- 32 - VLAN filtering (including multiple VLANs per port):: 35 $ bridge vlan add dev enp8s0f0 vid 2-3 37 - VLAN push on bridge ingress:: 41 - VLAN pop on bridge egress:: 48 Subfunction which are spawned over the E-switch are created only with devlink 55 - Create SF:: [all …]
|
/linux/drivers/crypto/allwinner/sun4i-ss/ |
H A D | sun4i-ss.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 3 * sun4i-ss.h - hardware cryptographic accelerator for Allwinner A20 SoC 5 * Copyright (C) 2013-2015 Corentin LABBE <clabbe.montjoie@gmail.com> 11 * You could find the datasheet in Documentation/arch/arm/sunxi.rst 15 #include <linux/crypto.h> 21 #include <crypto/scatterwalk.h> 26 #include <crypto/md5.h> 27 #include <crypto/skcipher.h> 28 #include <crypto/sha1.h> 29 #include <crypto/hash.h> [all …]
|
/linux/drivers/crypto/rockchip/ |
H A D | rk3288_crypto.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 5 #include <crypto/aes.h> 6 #include <crypto/engine.h> 7 #include <crypto/internal/des.h> 8 #include <crypto/internal/hash.h> 9 #include <crypto/internal/skcipher.h> 10 #include <crypto/md5.h> 11 #include <crypto/sha1.h> 12 #include <crypto/sha2.h> 13 #include <linux/dma-mapping.h> [all …]
|
/linux/block/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 18 - block device files will become unusable 19 - some filesystems (such as ext3) will become unavailable. 86 like running fsck on read-only mounted root device, modifying some 101 support for ZAC/ZBC/ZNS host-managed and host-aware zoned block 116 See Documentation/admin-guide/cgroup-v1/blkio-controller.rst for more information. 132 Enable writeback throttling by default for request-based block devices. 198 Build the blk-crypto subsystem. Enabling this lets the 203 bool "Enable crypto API fallback for blk-crypto" 205 select CRYPTO [all …]
|
H A D | blk-crypto.c | 1 // SPDX-License-Identifier: GPL-2.0 7 * Refer to Documentation/block/inline-encryption.rst for detailed explanation. 10 #define pr_fmt(fmt) "blk-crypto: " fmt 14 #include <linux/blk-crypto-profile.h> 19 #include "blk-crypto-internal.h" 23 .name = "AES-256-XTS", 29 .name = "AES-128-CBC-ESSIV", 41 .name = "SM4-XTS", 58 "Number of bio crypto contexts to preallocate"); 104 bc->bc_key = key; in bio_crypt_set_ctx() [all …]
|
H A D | blk-crypto-profile.c | 1 // SPDX-License-Identifier: GPL-2.0 7 * DOC: blk-crypto profiles 9 * 'struct blk_crypto_profile' contains all generic inline encryption-related 11 * as the way that drivers for inline encryption hardware expose their crypto 14 * construct a crypto profile, then associate it with the disk's request_queue. 17 * these keyslots in a device-independent way, using the driver-provided 22 * For more information, see Documentation/block/inline-encryption.rst. 25 #define pr_fmt(fmt) "blk-crypto: " fmt 27 #include <linux/blk-crypto-profile.h> 34 #include <linux/blk-integrity.h> [all …]
|
/linux/fs/ecryptfs/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 4 depends on KEYS && CRYPTO && (ENCRYPTED_KEYS || ENCRYPTED_KEYS=n) 10 <file:Documentation/filesystems/ecryptfs.rst> to learn more about
|
/linux/include/keys/ |
H A D | asymmetric-parser.h | 1 /* SPDX-License-Identifier: GPL-2.0-or-later */ 2 /* Asymmetric public-key cryptography data parser 4 * See Documentation/crypto/asymmetric-keys.rst
|
H A D | asymmetric-subtype.h | 1 /* SPDX-License-Identifier: GPL-2.0-or-later */ 2 /* Asymmetric public-key cryptography key subtype 4 * See Documentation/crypto/asymmetric-keys.rst 14 #include <keys/asymmetric-type.h> 48 * asymmetric_key_subtype - Get the subtype from an asymmetric key 52 * type-specific data attached to the key. 57 return key->payload.data[asym_subtype]; in asymmetric_key_subtype()
|
/linux/net/ceph/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 11 select CRYPTO 36 bool "Use in-kernel support for DNS lookup" 45 Documentation/networking/dns_resolver.rst
|
/linux/net/tipc/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 21 as a module, say M here and read <file:Documentation/kbuild/modules.rst>. 30 IP-over-InfiniBand devices. 42 select CRYPTO 49 advanced algorithm: AEAD AES-GCM (like IPSec or TLS) before leaving/ 51 Key setting from user-space is performed via netlink by a user program
|
/linux/kernel/ |
H A D | Kconfig.kexec | 1 # SPDX-License-Identifier: GPL-2.0-only 41 select CRYPTO 108 which are loaded in the main kernel with kexec-tools into 114 For more details see Documentation/admin-guide/kdump/kdump.rst 117 See also <file:Documentation/arch/s390/zfcpdump.rst>
|
/linux/Documentation/security/keys/ |
H A D | trusted-encrypted.rst | 31 provides crypto operation to establish root of trust for storage. 33 (2) TEE (Trusted Execution Environment: OP-TEE based on Arm TrustZone) 35 Rooted to Hardware Unique Key (HUK) which is generally burnt in on-chip 41 mode, trust is rooted to the OTPMK, a never-disclosed 256-bit key 45 (4) DCP (Data Co-Processor: crypto accelerator of various i.MX SoCs) 47 Rooted to a one-time programmable key (OTP) that is generally burnt 48 in the on-chip fuses and is accessible to the DCP encryption engine only. 105 TPMs have well-documented, standardized interfaces and APIs. 109 TEEs have well-documented, standardized client interface and APIs. For 110 more details refer to ``Documentation/driver-api/tee.rst``. [all …]
|
/linux/net/ipv4/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 40 so-called IP spoofing, however it can pose problems if you use 42 than packets from that host to you) or if you operate a non-routing 52 <file:Documentation/networking/ip-sysctl.rst>. 71 address into account. Furthermore, the TOS (Type-Of-Service) field 89 equal "cost" and chooses one of them in a non-deterministic fashion 132 <file:Documentation/admin-guide/nfs/nfsroot.rst> for details. 147 Read <file:Documentation/admin-guide/nfs/nfsroot.rst> for details. 160 <file:Documentation/admin-guide/nfs/nfsroot.rst> for details. 173 mobile-IP facilities (allowing laptops to seamlessly move between [all …]
|
/linux/fs/verity/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 4 bool "FS Verity (read-only file-based authenticity protection)" 5 select CRYPTO 7 # SHA-256 is implied as it's intended to be the default hash algorithm. 12 # be omitted even if SHA-256 is being used. 15 This option enables fs-verity. fs-verity is the dm-verity 21 against the Merkle tree. The file is also made read-only. 30 fs-verity is especially useful on large files where not all 31 the contents may actually be needed. Also, fs-verity verifies 33 protection against malicious disks vs. an ahead-of-time hash. [all …]
|
/linux/Documentation/arch/powerpc/ |
H A D | elf_hwcaps.rst | 11 --------------- 46 ------------- 56 ------------- 65 ------------------- 67 HWCAPs are allocated as described in Power Architecture 64-Bit ELF V2 ABI 71 --------------------------------- 74 32-bit CPU 77 64-bit CPU (userspace may be running in 32-bit mode). 167 The processor supports architected PMU events in the range 0xE0-0xFF. 170 The processor supports true little-endian mode. [all …]
|
/linux/net/ipv6/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 17 Documentation/networking/ipv6.rst and read the HOWTO at 18 <https://www.tldp.org/HOWTO/Linux+IPv6-HOWTO/> 31 are placed in a multi-homed network. 61 them in the crypto API. You should also enable accelerated 76 them in the crypto API. You should also enable accelerated 140 "ip -6 route" command. ILA is described in 141 https://tools.ietf.org/html/draft-herbert-nvo3-ila-00. 167 tristate "IPv6: IPv6-in-IPv4 tunnel (SIT driver)" 177 networks over an IPv4-only path. [all …]
|
/linux/Documentation/driver-api/ |
H A D | index.rst | 1 .. SPDX-License-Identifier: GPL-2.0 23 driver-model/index 38 early-userspace/index 40 device-io 42 dma-buf 44 io-mapping 46 uio-howto 47 vfio-mediate [all...] |