| /linux/Documentation/security/keys/ |
| H A D | ecryptfs.rst | 8 Each FEK is in turn encrypted with a File Encryption Key Encryption Key (FEKEK) 12 the FEK is encrypted by 'ecryptfsd' with the help of external libraries in order 22 The 'encrypted' key type has been extended with the introduction of the new 31 encrypted form. 33 The eCryptfs filesystem may really benefit from using encrypted keys in that the 42 keyctl add encrypted name "new ecryptfs key-type:master-key-name keylen" ring 43 keyctl add encrypted name "load hex_blob" ring 53 Example of encrypted key usage with the eCryptfs filesystem: 55 Create an encrypted key "1000100010001000" of length 64 bytes with format 58 $ keyctl add encrypted 1000100010001000 "new ecryptfs user:test 64" @u [all …]
|
| H A D | index.rst | 11 trusted-encrypted
|
| /linux/security/keys/encrypted-keys/ |
| H A D | Makefile | 6 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys.o 8 encrypted-keys-y := encrypted.o ecryptfs_format.o 11 encrypted-keys-y += $(masterkey-y) $(masterkey-m-m)
|
| /linux/net/tls/ |
| H A D | trace.h | 47 bool encrypted, bool decrypted), 49 TP_ARGS(sk, tcp_seq, rec_no, rec_len, encrypted, decrypted), 56 __field( bool, encrypted ) 65 __entry->encrypted = encrypted; 73 __entry->encrypted, __entry->decrypted
|
| /linux/net/rxrpc/ |
| H A D | rxkad.c | 716 response->encrypted.checksum = htonl(csum); in rxkad_calc_response_checksum() 729 size_t encsize = sizeof(((struct rxkad_response *)0)->encrypted); in rxkad_encrypt_response() 735 offsetof(struct rxkad_response, encrypted), encsize); in rxkad_encrypt_response() 838 h.resp.encrypted.epoch = htonl(conn->proto.epoch); in rxkad_insert_response_header() 839 h.resp.encrypted.cid = htonl(conn->proto.cid); in rxkad_insert_response_header() 840 h.resp.encrypted.checksum = 0; in rxkad_insert_response_header() 841 h.resp.encrypted.securityIndex = htonl(conn->security_ix); in rxkad_insert_response_header() 842 h.resp.encrypted.call_id[0] = htonl(conn->channels[0].call_counter); in rxkad_insert_response_header() 843 h.resp.encrypted.call_id[1] = htonl(conn->channels[1].call_counter); in rxkad_insert_response_header() 844 h.resp.encrypted.call_id[2] = htonl(conn->channels[2].call_counter); in rxkad_insert_response_header() [all …]
|
| /linux/Documentation/virt/kvm/s390/ |
| H A D | s390-pv-boot.rst | 12 Memory made accessible to the hypervisor will be encrypted. See 16 information about the encrypted components and necessary metadata to 27 switch into PV mode itself, the user can load encrypted guest 59 The components are for instance an encrypted kernel, kernel parameters 62 After the initial import of the encrypted data, all defined pages will 82 encrypted images.
|
| H A D | s390-pv-dump.rst | 20 provides an interface to KVM over which encrypted CPU and memory data 34 and extracts dump keys with which the VM dump data will be encrypted. 46 write out the encrypted vcpu state, but also the unencrypted state 49 The memory state is further divided into the encrypted memory and its 51 encrypted memory can simply be read once it has been exported. The
|
| /linux/Documentation/driver-api/nvdimm/ |
| H A D | security.rst | 51 A nvdimm encrypted-key of format enc32 has the description format of: 54 See file ``Documentation/security/keys/trusted-encrypted.rst`` for creating 55 encrypted-keys of enc32 format. TPM usage with a master trusted key is 56 preferred for sealing the encrypted-keys. 64 relevant encrypted-keys into the kernel user keyring during the initramfs phase. 115 An encrypted-key with the current user passphrase that is tied to the nvdimm 125 is just another encrypted-key. 136 another encrypted-key.
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | dm-crypt.rst | 70 Either 'logon', 'user', 'encrypted' or 'trusted' kernel key type. 78 then sectors are encrypted according to their offsets (sector 0 uses key0; 87 encrypted data. You can specify it as a path like /dev/xxx or a device 91 Starting sector within the device where the encrypted data begins. 106 option. For example, allowing discards on encrypted devices may lead to 146 integrity for the encrypted device. The additional space is then 177 concurrency (the split requests could be encrypted in parallel by multiple 184 concurrency (the split requests could be encrypted in parallel by multiple
|
| /linux/Documentation/virt/hyperv/ |
| H A D | coco.rst | 104 paravisor runs first and sets up the guest physical memory as encrypted. The 133 context), MMIO accesses to these devices must be encrypted references instead 136 check whether a particular address range should be treated as encrypted 140 memory between encrypted and decrypted requires coordinating with the 201 copied into a temporary (encrypted) buffer for further validation and 220 equivalent of bounce buffering between encrypted and decrypted memory is 255 operates in encrypted memory, the memory used for communication with 262 and that supports encrypted memory. In such a case, neither the host partition 270 In the case the device does not support encrypted memory, the paravisor 271 provides bounce-buffering, and although the data is not encrypted, the backing [all …]
|
| /linux/arch/x86/kernel/ |
| H A D | crash_dump_64.c | 17 bool encrypted) in __copy_oldmem_page() argument 24 if (encrypted) in __copy_oldmem_page()
|
| /linux/Documentation/power/ |
| H A D | swsusp-dmcrypt.rst | 16 Now your system is properly set up, your disk is encrypted except for 26 up dm-crypt and then asks swsusp to resume from the encrypted 56 card contains at least the encrypted swap setup in a file 67 initrd that allows you to resume from encrypted swap and that 133 Otherwise we just remove the encrypted swap device and leave it to the
|
| /linux/include/linux/ |
| H A D | crash_dump.h | 183 u64 *ppos, bool encrypted); 186 u64 *ppos, bool encrypted) in read_from_oldmem() argument
|
| /linux/Documentation/ABI/testing/ |
| H A D | evm | 13 trusted/encrypted key stored in the Kernel Key 90 creating and loading existing trusted/encrypted keys, 92 Documentation/security/keys/trusted-encrypted.rst. Both
|
| H A D | sysfs-bus-papr-pmem | 25 * "encrypted" 26 NVDIMM contents are encrypted.
|
| /linux/Documentation/process/ |
| H A D | embargoed-hardware-issues.rst | 38 The list is encrypted and email to the list can be sent by either PGP or 39 S/MIME encrypted and must be signed with the reporter's PGP key or S/MIME 62 The encrypted mailing-lists which are used in our process are hosted on 135 The hardware security team will provide an incident-specific encrypted 172 team via the specific encrypted mailing-list. 181 The initial response team sets up an encrypted mailing-list or repurposes 322 We use encrypted mailing lists for communication. The operating principle 323 of these lists is that email sent to the list is encrypted either with the 357 can send encrypted email to the list.
|
| /linux/Documentation/security/secrets/ |
| H A D | coco.rst | 55 Consider a guest performing computations on encrypted files. The Guest Owner 62 because they are encrypted. Host can't read the decryption key because 65 confidential (memory-encrypted) guest.
|
| /linux/Documentation/filesystems/ |
| H A D | ecryptfs.rst | 44 Create a new directory into which eCryptfs will write its encrypted 59 host page size). This is the encrypted underlying file for what you
|
| /linux/security/keys/ |
| H A D | Makefile | 32 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys/
|
| /linux/fs/ubifs/ |
| H A D | dir.c | 88 bool encrypted = false; in ubifs_new_inode() local 108 err = fscrypt_prepare_new_inode(dir, inode, &encrypted); in ubifs_new_inode() 183 if (encrypted) { in ubifs_new_inode() 589 bool encrypted = IS_ENCRYPTED(dir); in ubifs_readdir() local 601 if (encrypted) { in ubifs_readdir() 635 if (encrypted) in ubifs_readdir() 680 if (encrypted) { in ubifs_readdir() 697 if (encrypted) in ubifs_readdir() 720 if (encrypted) in ubifs_readdir()
|
| H A D | sb.c | 500 if (c->encrypted && c->fmt_version < 5) { in validate_sb() 736 c->encrypted = !!(sup_flags & UBIFS_FLG_ENCRYPTION); in ubifs_read_superblock() 749 if (!IS_ENABLED(CONFIG_FS_ENCRYPTION) && c->encrypted) { in ubifs_read_superblock() 938 if (c->encrypted) in ubifs_enable_encryption() 953 c->encrypted = 1; in ubifs_enable_encryption()
|
| /linux/fs/smb/server/ |
| H A D | ksmbd_work.h | 75 bool encrypted:1; member
|
| /linux/fs/ceph/ |
| H A D | crypto.c | 106 bool encrypted = false; in ceph_fscrypt_prepare_context() local 109 ret = fscrypt_prepare_new_inode(dir, inode, &encrypted); in ceph_fscrypt_prepare_context() 112 if (!encrypted) in ceph_fscrypt_prepare_context()
|
| /linux/arch/powerpc/boot/dts/fsl/ |
| H A D | c293pcie.dts | 101 /* 1MB for blob encrypted key */ 103 label = "NOR blob encrypted key";
|
| /linux/arch/arm/boot/dts/synaptics/ |
| H A D | berlin2cd-google-chromecast.dts | 27 * because the (signed and encrypted) bootloader that shipped
|