Home
last modified time | relevance | path

Searched +full:crypto +full:- +full:rst (Results 1 – 25 of 93) sorted by relevance

1234

/linux/Documentation/devicetree/bindings/crypto/
H A Drockchip,rk3288-crypto.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/crypto/rockchip,rk3288-crypto.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Heiko Stuebner <heiko@sntech.de>
15 - rockchip,rk3288-crypto
16 - rockchip,rk3328-crypto
17 - rockchip,rk3399-crypto
29 clock-names:
37 reset-names:
[all …]
/linux/net/rxrpc/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
9 select CRYPTO
22 See Documentation/networking/rxrpc.rst.
54 See Documentation/networking/rxrpc.rst.
59 select CRYPTO
68 See Documentation/networking/rxrpc.rst.
/linux/Documentation/power/
H A Dswsusp-dmcrypt.rst2 How to use dm-crypt and swsusp together
10 You know how dm-crypt works. If not, visit the following web page:
11 http://www.saout.de/misc/dm-crypt/
12 You have read Documentation/power/swsusp.rst and understand it.
13 You did read Documentation/admin-guide/initrd.rst and know how an initrd works.
18 system for crypto setup and/or rescue purposes. You may even have
19 an initrd that does your current crypto setup already.
26 up dm-crypt and then asks swsusp to resume from the encrypted
29 The most important thing is that you set up dm-crypt in such
36 brw------- 1 root root 254, 0 Jul 28 13:37 /dev/mapper/swap0
[all …]
/linux/
H A DMAINTAINERS5 ---------------------------------------------------
21 W: *Web-page* with status/info
23 B: URI for where to file *bugs*. A web-page with detailed bug
28 patches to the given subsystem. This is either an in-tree file,
29 or a URI. See Documentation/maintainer/maintainer-entry-profile.rst
46 N: [^a-z]tegra all files whose path contains tegra
64 ----------------
74 F: Documentation/networking/device_drivers/ethernet/3com/vortex.rst
83 3WARE SAS/SATA-RAID SCSI DRIVERS (3W-XXXX, 3W-9XXX, 3W-SAS)
85 L: linux-scsi@vger.kernel.org
[all …]
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0
4 # see Documentation/kbuild/kconfig-language.rst.
26 source "crypto/Kconfig"
/linux/fs/crypto/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
3 bool "FS Encryption (Per-file encryption)"
4 select CRYPTO
18 # whereas selecting them from FS_ENCRYPTION would force them to be built-in.
21 # needs "by default". If userspace will use "non-default" encryption modes such
23 # in the crypto API; see Documentation/filesystems/fscrypt.rst for details.
26 # algorithms, not any per-architecture optimized implementations. It is
43 bool "Enable fscrypt to use inline crypto"
/linux/drivers/crypto/starfive/
H A Djh7110-cryp.h1 /* SPDX-License-Identifier: GPL-2.0 */
5 #include <crypto/aes.h>
6 #include <crypto/hash.h>
7 #include <crypto/scatterwalk.h>
8 #include <crypto/sha2.h>
9 #include <crypto/sm3.h>
11 #include <linux/dma-mapping.h>
181 struct reset_control *rst; member
/linux/Documentation/networking/device_drivers/ethernet/mellanox/mlx5/
H A Dswitchdev.rst1 .. SPDX-License-Identifier: GPL-2.0 OR Linux-OpenIB
19 - Change device to switchdev mode::
23 - Attach mlx5 switchdev representor 'enp8s0f0' to bridge netdev 'bridge1'::
28 -----
32 - VLAN filtering (including multiple VLANs per port)::
35 $ bridge vlan add dev enp8s0f0 vid 2-3
37 - VLAN push on bridge ingress::
41 - VLAN pop on bridge egress::
48 Subfunction which are spawned over the E-switch are created only with devlink
55 - Create SF::
[all …]
/linux/drivers/crypto/allwinner/sun4i-ss/
H A Dsun4i-ss.h1 /* SPDX-License-Identifier: GPL-2.0-only */
3 * sun4i-ss.h - hardware cryptographic accelerator for Allwinner A20 SoC
5 * Copyright (C) 2013-2015 Corentin LABBE <clabbe.montjoie@gmail.com>
11 * You could find the datasheet in Documentation/arch/arm/sunxi.rst
15 #include <linux/crypto.h>
21 #include <crypto/scatterwalk.h>
26 #include <crypto/md5.h>
27 #include <crypto/skcipher.h>
28 #include <crypto/sha1.h>
29 #include <crypto/hash.h>
[all …]
/linux/drivers/crypto/rockchip/
H A Drk3288_crypto.h1 /* SPDX-License-Identifier: GPL-2.0 */
5 #include <crypto/aes.h>
6 #include <crypto/engine.h>
7 #include <crypto/internal/des.h>
8 #include <crypto/internal/hash.h>
9 #include <crypto/internal/skcipher.h>
10 #include <crypto/md5.h>
11 #include <crypto/sha1.h>
12 #include <crypto/sha2.h>
13 #include <linux/dma-mapping.h>
[all …]
/linux/block/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0
18 - block device files will become unusable
19 - some filesystems (such as ext3) will become unavailable.
86 like running fsck on read-only mounted root device, modifying some
101 support for ZAC/ZBC/ZNS host-managed and host-aware zoned block
116 See Documentation/admin-guide/cgroup-v1/blkio-controller.rst for more information.
132 Enable writeback throttling by default for request-based block devices.
198 Build the blk-crypto subsystem. Enabling this lets the
203 bool "Enable crypto API fallback for blk-crypto"
205 select CRYPTO
[all …]
H A Dblk-crypto.c1 // SPDX-License-Identifier: GPL-2.0
7 * Refer to Documentation/block/inline-encryption.rst for detailed explanation.
10 #define pr_fmt(fmt) "blk-crypto: " fmt
14 #include <linux/blk-crypto-profile.h>
19 #include "blk-crypto-internal.h"
23 .name = "AES-256-XTS",
29 .name = "AES-128-CBC-ESSIV",
41 .name = "SM4-XTS",
58 "Number of bio crypto contexts to preallocate");
104 bc->bc_key = key; in bio_crypt_set_ctx()
[all …]
H A Dblk-crypto-profile.c1 // SPDX-License-Identifier: GPL-2.0
7 * DOC: blk-crypto profiles
9 * 'struct blk_crypto_profile' contains all generic inline encryption-related
11 * as the way that drivers for inline encryption hardware expose their crypto
14 * construct a crypto profile, then associate it with the disk's request_queue.
17 * these keyslots in a device-independent way, using the driver-provided
22 * For more information, see Documentation/block/inline-encryption.rst.
25 #define pr_fmt(fmt) "blk-crypto: " fmt
27 #include <linux/blk-crypto-profile.h>
34 #include <linux/blk-integrity.h>
[all …]
/linux/fs/ecryptfs/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
4 depends on KEYS && CRYPTO && (ENCRYPTED_KEYS || ENCRYPTED_KEYS=n)
10 <file:Documentation/filesystems/ecryptfs.rst> to learn more about
/linux/include/keys/
H A Dasymmetric-parser.h1 /* SPDX-License-Identifier: GPL-2.0-or-later */
2 /* Asymmetric public-key cryptography data parser
4 * See Documentation/crypto/asymmetric-keys.rst
H A Dasymmetric-subtype.h1 /* SPDX-License-Identifier: GPL-2.0-or-later */
2 /* Asymmetric public-key cryptography key subtype
4 * See Documentation/crypto/asymmetric-keys.rst
14 #include <keys/asymmetric-type.h>
48 * asymmetric_key_subtype - Get the subtype from an asymmetric key
52 * type-specific data attached to the key.
57 return key->payload.data[asym_subtype]; in asymmetric_key_subtype()
/linux/net/ceph/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
11 select CRYPTO
36 bool "Use in-kernel support for DNS lookup"
45 Documentation/networking/dns_resolver.rst
/linux/net/tipc/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
21 as a module, say M here and read <file:Documentation/kbuild/modules.rst>.
30 IP-over-InfiniBand devices.
42 select CRYPTO
49 advanced algorithm: AEAD AES-GCM (like IPSec or TLS) before leaving/
51 Key setting from user-space is performed via netlink by a user program
/linux/kernel/
H A DKconfig.kexec1 # SPDX-License-Identifier: GPL-2.0-only
41 select CRYPTO
108 which are loaded in the main kernel with kexec-tools into
114 For more details see Documentation/admin-guide/kdump/kdump.rst
117 See also <file:Documentation/arch/s390/zfcpdump.rst>
/linux/Documentation/security/keys/
H A Dtrusted-encrypted.rst31 provides crypto operation to establish root of trust for storage.
33 (2) TEE (Trusted Execution Environment: OP-TEE based on Arm TrustZone)
35 Rooted to Hardware Unique Key (HUK) which is generally burnt in on-chip
41 mode, trust is rooted to the OTPMK, a never-disclosed 256-bit key
45 (4) DCP (Data Co-Processor: crypto accelerator of various i.MX SoCs)
47 Rooted to a one-time programmable key (OTP) that is generally burnt
48 in the on-chip fuses and is accessible to the DCP encryption engine only.
105 TPMs have well-documented, standardized interfaces and APIs.
109 TEEs have well-documented, standardized client interface and APIs. For
110 more details refer to ``Documentation/driver-api/tee.rst``.
[all …]
/linux/net/ipv4/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
40 so-called IP spoofing, however it can pose problems if you use
42 than packets from that host to you) or if you operate a non-routing
52 <file:Documentation/networking/ip-sysctl.rst>.
71 address into account. Furthermore, the TOS (Type-Of-Service) field
89 equal "cost" and chooses one of them in a non-deterministic fashion
132 <file:Documentation/admin-guide/nfs/nfsroot.rst> for details.
147 Read <file:Documentation/admin-guide/nfs/nfsroot.rst> for details.
160 <file:Documentation/admin-guide/nfs/nfsroot.rst> for details.
173 mobile-IP facilities (allowing laptops to seamlessly move between
[all …]
/linux/fs/verity/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0
4 bool "FS Verity (read-only file-based authenticity protection)"
5 select CRYPTO
7 # SHA-256 is implied as it's intended to be the default hash algorithm.
12 # be omitted even if SHA-256 is being used.
15 This option enables fs-verity. fs-verity is the dm-verity
21 against the Merkle tree. The file is also made read-only.
30 fs-verity is especially useful on large files where not all
31 the contents may actually be needed. Also, fs-verity verifies
33 protection against malicious disks vs. an ahead-of-time hash.
[all …]
/linux/Documentation/arch/powerpc/
H A Delf_hwcaps.rst11 ---------------
46 -------------
56 -------------
65 -------------------
67 HWCAPs are allocated as described in Power Architecture 64-Bit ELF V2 ABI
71 ---------------------------------
74 32-bit CPU
77 64-bit CPU (userspace may be running in 32-bit mode).
167 The processor supports architected PMU events in the range 0xE0-0xFF.
170 The processor supports true little-endian mode.
[all …]
/linux/net/ipv6/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
17 Documentation/networking/ipv6.rst and read the HOWTO at
18 <https://www.tldp.org/HOWTO/Linux+IPv6-HOWTO/>
31 are placed in a multi-homed network.
61 them in the crypto API. You should also enable accelerated
76 them in the crypto API. You should also enable accelerated
140 "ip -6 route" command. ILA is described in
141 https://tools.ietf.org/html/draft-herbert-nvo3-ila-00.
167 tristate "IPv6: IPv6-in-IPv4 tunnel (SIT driver)"
177 networks over an IPv4-only path.
[all …]
/linux/Documentation/driver-api/
H A Dindex.rst1 .. SPDX-License-Identifier: GPL-2.0
23 driver-model/index
38 early-userspace/index
40 device-io
42 dma-buf
44 io-mapping
46 uio-howto
47 vfio-mediate
[all...]

1234