Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 25 of 85) sorted by relevance

1234

/linux/Documentation/security/keys/
H A Decryptfs.rst8 Each FEK is in turn encrypted with a File Encryption Key Encryption Key (FEKEK)
12 the FEK is encrypted by 'ecryptfsd' with the help of external libraries in order
22 The 'encrypted' key type has been extended with the introduction of the new
31 encrypted form.
33 The eCryptfs filesystem may really benefit from using encrypted keys in that the
42 keyctl add encrypted name "new ecryptfs key-type:master-key-name keylen" ring
43 keyctl add encrypted name "load hex_blob" ring
53 Example of encrypted key usage with the eCryptfs filesystem:
55 Create an encrypted key "1000100010001000" of length 64 bytes with format
58 $ keyctl add encrypted 1000100010001000 "new ecryptfs user:test 64" @u
[all …]
H A Dtrusted-encrypted.rst8 stores, and loads only encrypted blobs. Trusted Keys require the availability
18 - Key-blob, an encrypted key-data, created to be stored, loaded and seen by
31 protected keys is encrypted with Key-Encryption-Key(KEK), and decrypted inside
164 New keys are created from random numbers. They are encrypted/decrypted using
202 random numbers or user-provided decrypted data, and are encrypted/decrypted
204 user-key type. The main disadvantage of encrypted keys is that if they are not
327 The decrypted portion of encrypted keys can contain either a simple symmetric
333 keyctl add encrypted name "new [format] key-type:master-key-name keylen"
335 keyctl add encrypted name "new [format] key-type:master-key-name keylen
337 keyctl add encrypted name "load hex_blob" ring
[all …]
H A Dindex.rst11 trusted-encrypted
/linux/security/keys/encrypted-keys/
H A DMakefile6 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys.o
8 encrypted-keys-y := encrypted.o ecryptfs_format.o
11 encrypted-keys-y += $(masterkey-y) $(masterkey-m-m)
/linux/net/tls/
H A Dtrace.h47 bool encrypted, bool decrypted),
49 TP_ARGS(sk, tcp_seq, rec_no, rec_len, encrypted, decrypted),
56 __field( bool, encrypted )
65 __entry->encrypted = encrypted;
73 __entry->encrypted, __entry->decrypted
/linux/net/rxrpc/
H A Drxkad.c716 response->encrypted.checksum = htonl(csum); in rxkad_send_response()
729 size_t encsize = sizeof(((struct rxkad_response *)0)->encrypted); in rxkad_send_response()
735 offsetof(struct rxkad_response, encrypted), encsize); in rxkad_send_response()
838 h.resp.encrypted.epoch = htonl(conn->proto.epoch); in rxkad_respond_to_challenge()
839 h.resp.encrypted.cid = htonl(conn->proto.cid); in rxkad_respond_to_challenge()
840 h.resp.encrypted.checksum = 0; in rxkad_respond_to_challenge()
841 h.resp.encrypted.securityIndex = htonl(conn->security_ix); in rxkad_respond_to_challenge()
842 h.resp.encrypted.call_id[0] = htonl(conn->channels[0].call_counter); in rxkad_respond_to_challenge()
843 h.resp.encrypted.call_id[1] = htonl(conn->channels[1].call_counter); in rxkad_respond_to_challenge()
844 h.resp.encrypted in rxkad_respond_to_challenge()
[all...]
/linux/Documentation/virt/kvm/s390/
H A Ds390-pv-boot.rst12 Memory made accessible to the hypervisor will be encrypted. See
16 information about the encrypted components and necessary metadata to
27 switch into PV mode itself, the user can load encrypted guest
59 The components are for instance an encrypted kernel, kernel parameters
62 After the initial import of the encrypted data, all defined pages will
82 encrypted images.
H A Ds390-pv-dump.rst20 provides an interface to KVM over which encrypted CPU and memory data
34 and extracts dump keys with which the VM dump data will be encrypted.
46 write out the encrypted vcpu state, but also the unencrypted state
49 The memory state is further divided into the encrypted memory and its
51 encrypted memory can simply be read once it has been exported. The
/linux/Documentation/filesystems/
H A Dfscrypt.rst35 and CephFS. This allows encrypted files to be read and written
36 without caching both the decrypted and encrypted pages in the
39 inodes are needed. eCryptfs also limits encrypted filenames to 143
45 supports marking an empty directory as encrypted. Then, after
48 encrypted.
125 "locked", i.e. in ciphertext or encrypted form.
131 encrypted files and directories before removing a master key, as
133 encrypted directory.
179 with another user's encrypted files to which they have read-only
192 policies on all new encrypted directories.
[all …]
H A Decryptfs.rst44 Create a new directory into which eCryptfs will write its encrypted
59 host page size). This is the encrypted underlying file for what you
/linux/Documentation/driver-api/nvdimm/
H A Dsecurity.rst51 A nvdimm encrypted-key of format enc32 has the description format of:
54 See file ``Documentation/security/keys/trusted-encrypted.rst`` for creating
55 encrypted-keys of enc32 format. TPM usage with a master trusted key is
56 preferred for sealing the encrypted-keys.
64 relevant encrypted-keys into the kernel user keyring during the initramfs phase.
115 An encrypted-key with the current user passphrase that is tied to the nvdimm
125 is just another encrypted-key.
136 another encrypted-key.
/linux/Documentation/admin-guide/device-mapper/
H A Ddm-crypt.rst70 Either 'logon', 'user', 'encrypted' or 'trusted' kernel key type.
78 then sectors are encrypted according to their offsets (sector 0 uses key0;
87 encrypted data. You can specify it as a path like /dev/xxx or a device
91 Starting sector within the device where the encrypted data begins.
106 option. For example, allowing discards on encrypted devices may lead to
146 integrity for the encrypted device. The additional space is then
177 concurrency (the split requests could be encrypted in parallel by multiple
184 concurrency (the split requests could be encrypted in parallel by multiple
/linux/arch/x86/kernel/
H A Dcrash_dump_64.c17 bool encrypted) in __copy_oldmem_page() argument
24 if (encrypted) in __copy_oldmem_page()
/linux/Documentation/virt/hyperv/
H A Dcoco.rst104 paravisor runs first and sets up the guest physical memory as encrypted. The
133 context), MMIO accesses to these devices must be encrypted references instead
136 check whether a particular address range should be treated as encrypted
140 memory between encrypted and decrypted requires coordinating with the
201 copied into a temporary (encrypted) buffer for further validation and
220 equivalent of bounce buffering between encrypted and decrypted memory is
255 operates in encrypted memory, the memory used for communication with
262 and that supports encrypted memory. In such a case, neither the host partition
270 In the case the device does not support encrypted memory, the paravisor
271 provides bounce-buffering, and although the data is not encrypted, the backing
[all …]
/linux/Documentation/power/
H A Dswsusp-dmcrypt.rst16 Now your system is properly set up, your disk is encrypted except for
26 up dm-crypt and then asks swsusp to resume from the encrypted
56 card contains at least the encrypted swap setup in a file
67 initrd that allows you to resume from encrypted swap and that
133 Otherwise we just remove the encrypted swap device and leave it to the
/linux/include/linux/
H A Dcrash_dump.h183 u64 *ppos, bool encrypted);
186 u64 *ppos, bool encrypted) in read_from_oldmem() argument
/linux/Documentation/ABI/testing/
H A Devm13 trusted/encrypted key stored in the Kernel Key
90 creating and loading existing trusted/encrypted keys,
92 Documentation/security/keys/trusted-encrypted.rst. Both
H A Dsysfs-bus-papr-pmem25 * "encrypted"
26 NVDIMM contents are encrypted.
/linux/Documentation/security/secrets/
H A Dcoco.rst55 Consider a guest performing computations on encrypted files. The Guest Owner
62 because they are encrypted. Host can't read the decryption key because
65 confidential (memory-encrypted) guest.
/linux/Documentation/process/
H A Dembargoed-hardware-issues.rst38 The list is encrypted and email to the list can be sent by either PGP or
39 S/MIME encrypted and must be signed with the reporter's PGP key or S/MIME
62 The encrypted mailing-lists which are used in our process are hosted on
135 The hardware security team will provide an incident-specific encrypted
172 team via the specific encrypted mailing-list.
181 The initial response team sets up an encrypted mailing-list or repurposes
322 We use encrypted mailing lists for communication. The operating principle
323 of these lists is that email sent to the list is encrypted either with the
357 can send encrypted email to the list.
/linux/security/keys/
H A DMakefile32 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys/
/linux/Documentation/virt/kvm/x86/
H A Damd-memory-encryption.rst14 the memory contents of a VM will be transparently encrypted with a key
25 Bits[31:0] Number of encrypted guests supported simultaneously
165 that the memory was encrypted correctly by the firmware.
174 __u64 uaddr; /* userspace address to be encrypted (must be 16-byte aligned) */
175 __u32 len; /* length of the data to be encrypted (must be 16-byte aligned) */
184 data encrypted by the KVM_SEV_LAUNCH_UPDATE_DATA command. The guest owner may
384 __u64 guest_uaddr; /* the source memory region to be encrypted */
526 __u64 uaddr; /* Userspace address of data to be loaded/encrypted. */
/linux/fs/ubifs/
H A Dsb.c500 if (c->encrypted && c->fmt_version < 5) { in validate_sb()
736 c->encrypted = !!(sup_flags & UBIFS_FLG_ENCRYPTION); in ubifs_read_superblock()
749 if (!IS_ENABLED(CONFIG_FS_ENCRYPTION) && c->encrypted) { in ubifs_read_superblock()
938 if (c->encrypted) in ubifs_enable_encryption()
953 c->encrypted = 1; in ubifs_enable_encryption()
/linux/fs/smb/server/
H A Dksmbd_work.h75 bool encrypted:1; member
/linux/fs/ceph/
H A Dcrypto.c106 bool encrypted = false; in ceph_fscrypt_prepare_context() local
109 ret = fscrypt_prepare_new_inode(dir, inode, &encrypted); in ceph_fscrypt_prepare_context()
112 if (!encrypted) in ceph_fscrypt_prepare_context()

1234