| /linux/net/tls/ |
| H A D | trace.h | 47 bool encrypted, bool decrypted), 49 TP_ARGS(sk, tcp_seq, rec_no, rec_len, encrypted, decrypted), 57 __field( bool, decrypted ) 66 __entry->decrypted = decrypted; 73 __entry->encrypted, __entry->decrypted
|
| H A D | tls_sw.c | 1952 size_t len_left, size_t decrypted, ssize_t done, in tls_read_flush_backlog() argument 1957 if (len_left <= decrypted) in tls_read_flush_backlog() 2040 ssize_t decrypted = 0, async_copy_bytes = 0; in tls_sw_recvmsg() local 2087 decrypted = 0; in tls_sw_recvmsg() 2088 while (len && (decrypted + copied < target || tls_strp_msg_ready(ctx))) { in tls_sw_recvmsg() 2099 decrypted += chunk; in tls_sw_recvmsg() 2150 decrypted + copied, in tls_sw_recvmsg() 2169 decrypted += chunk; in tls_sw_recvmsg() 2211 decrypted += chunk; in tls_sw_recvmsg() 2239 decrypted - peeked, is_peek, NULL); in tls_sw_recvmsg() [all …]
|
| H A D | tls_device.c | 930 if (skb->decrypted) { in tls_device_reencrypt() 957 if (skb_iter->decrypted) { in tls_device_reencrypt() 983 is_decrypted = skb->decrypted; in tls_device_decrypted()
|
| /linux/net/mac80211/tests/ |
| H A D | mfp.c | 16 bool sta, mfp, decrypted, unicast, assoc; member 137 .decrypted = true, 148 .decrypted = true, 232 KUNIT_ASSERT_FALSE(test, params->decrypted); in accept_mfp() 245 if (params->decrypted) { in accept_mfp()
|
| /linux/Documentation/virt/hyperv/ |
| H A D | coco.rst | 106 appropriate ranges as decrypted (shared). In paravisor mode, Linux does not 134 of the decrypted references that would be used in a fully-enlightened CoCo 140 memory between encrypted and decrypted requires coordinating with the 173 marked decrypted to enable communication. Furthermore, since the threat model 177 These Hyper-V and VMBus memory pages are marked as decrypted: 186 * VMBus ring buffers. The direct mapping is marked decrypted in 188 hv_ringbuffer_init() must also include the "decrypted" attribute. 214 Linux kernel DMA APIs, and so bounce buffering through decrypted swiotlb 218 receive buffers are marked decrypted by __vmbus_establish_gpadl(). Because 220 equivalent of bounce buffering between encrypted and decrypted memory is [all …]
|
| /linux/drivers/hv/ |
| H A D | channel.c | 158 if (!channel->ringbuffer_gpadlhandle.decrypted) in vmbus_free_ring() 458 gpadl->decrypted = false; in __vmbus_establish_gpadl() 462 gpadl->decrypted = !((channel->co_external_memory && type == HV_GPADL_BUFFER) || in __vmbus_establish_gpadl() 464 if (gpadl->decrypted) { in __vmbus_establish_gpadl() 563 if (gpadl->decrypted) { in __vmbus_establish_gpadl() 565 gpadl->decrypted = false; in __vmbus_establish_gpadl() 884 if (gpadl->decrypted) in vmbus_teardown_gpadl() 892 gpadl->decrypted = ret; in vmbus_teardown_gpadl()
|
| /linux/Documentation/networking/ |
| H A D | tls-offload.rst | 55 successfully, the driver will set the decrypted bit in the associated 60 If device decrypted all the segments of the record the decryption is skipped, 187 the :c:member:`decrypted` mark in :c:type:`struct sk_buff <sk_buff>` 188 corresponding to the segment. Networking stack makes sure decrypted 189 and non-decrypted segments do not get coalesced (e.g. by GRO or socket layer) 275 Green segments are successfully decrypted, blue ones are passed 278 In above case segment 1 is received and decrypted successfully. 289 even though two segments did not get decrypted. 342 whenever it sees the records are no longer getting decrypted. 390 have the :c:member:`decrypted` mark set. [all …]
|
| /linux/include/net/psp/ |
| H A D | functions.h | 51 skb->decrypted = 1; in psp_enqueue_set_decrypted() 144 if (!skb->decrypted || !skb->sk) in psp_skb_get_assoc_rcu()
|
| /linux/Documentation/security/keys/ |
| H A D | trusted-encrypted.rst | 31 protected keys is encrypted with Key-Encryption-Key(KEK), and decrypted inside 164 New keys are created from random numbers. They are encrypted/decrypted using 202 random numbers or user-provided decrypted data, and are encrypted/decrypted 327 The decrypted portion of encrypted keys can contain either a simple symmetric 336 decrypted-data" ring 481 Instantiate an encrypted key "evm" using user-provided decrypted data::
|
| /linux/fs/crypto/ |
| H A D | Kconfig | 13 decrypted pages in the page cache. Currently Ext4,
|
| /linux/drivers/net/wireless/realtek/rtw88/ |
| H A D | rx.c | 212 if (pkt_stat->decrypted) in rtw_rx_fill_rx_status() 285 pkt_stat->decrypted = !swdec && enc_type != RX_DESC_ENC_NONE; in rtw_rx_query_rx_desc()
|
| /linux/drivers/net/wireless/realtek/rtlwifi/rtl8192cu/ |
| H A D | trx.c | 306 stats->decrypted = !get_rx_desc_swdec(pdesc); in rtl92cu_rx_query_desc() 326 if (stats->decrypted) in rtl92cu_rx_query_desc() 374 stats.decrypted = !get_rx_desc_swdec(rxdesc); in _rtl_rx_process()
|
| /linux/net/tipc/ |
| H A D | Kconfig | 48 All TIPC messages will be encrypted/decrypted by using the currently most
|
| /linux/Documentation/ABI/testing/ |
| H A D | securityfs-secrets-coco | 11 by the Guest Owner and decrypted inside the trusted enclave,
|
| /linux/drivers/net/wireless/realtek/rtlwifi/rtl8192d/ |
| H A D | trx_common.c | 399 stats->decrypted = !get_rx_desc_swdec(pdesc) && in rtl92d_rx_query_desc() 418 if (stats->decrypted) in rtl92d_rx_query_desc()
|
| /linux/drivers/net/wireless/realtek/rtlwifi/rtl8192ce/ |
| H A D | trx.c | 274 stats->decrypted = !get_rx_desc_swdec(p_desc); in rtl92ce_rx_query_desc() 311 if (stats->decrypted) { in rtl92ce_rx_query_desc()
|
| /linux/drivers/net/wireless/realtek/rtlwifi/rtl8723ae/ |
| H A D | trx.c | 277 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl8723e_rx_query_desc() 314 if (status->decrypted) { in rtl8723e_rx_query_desc()
|
| /linux/drivers/net/wireless/realtek/rtlwifi/rtl8192se/ |
| H A D | trx.c | 248 stats->decrypted = !get_rx_status_desc_swdec(pdesc); in rtl92se_rx_query_desc() 284 if (stats->decrypted) { in rtl92se_rx_query_desc()
|
| /linux/drivers/net/wireless/realtek/rtlwifi/rtl8723be/ |
| H A D | trx.c | 313 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl8723be_rx_query_desc() 369 if (status->decrypted) { in rtl8723be_rx_query_desc()
|
| /linux/Documentation/virt/kvm/s390/ |
| H A D | s390-pv-boot.rst | 60 and initrd. The components are decrypted by the UV.
|
| /linux/arch/x86/kernel/ |
| H A D | vmlinux.lds.S | 83 *(.bss..decrypted); \
|
| /linux/net/psp/ |
| H A D | psp_sock.c | 291 skb->decrypted = 1; in psp_reply_set_decrypted()
|
| /linux/drivers/net/wireless/realtek/rtlwifi/rtl8188ee/ |
| H A D | trx.c | 390 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl88ee_rx_query_desc() 441 if (status->decrypted) { in rtl88ee_rx_query_desc()
|
| /linux/include/asm-generic/ |
| H A D | vmlinux.lds.h | 374 *(.data..decrypted) \ 1010 *(.data..percpu..decrypted) \
|
| /linux/Documentation/security/secrets/ |
| H A D | coco.rst | 64 Host can't read the decrypted content from memory because it's a
|