| /linux/fs/crypto/ |
| H A D | Kconfig | 3 bool "FS Encryption (Per-file encryption)" 10 Enable encryption of files and directories. This 16 # Filesystems supporting encryption must select this if FS_ENCRYPTION. This 20 # Note: this option only pulls in the algorithms that filesystem encryption 21 # needs "by default". If userspace will use "non-default" encryption modes such 22 # as Adiantum encryption, then those other modes need to be explicitly enabled 40 Enable fscrypt to use inline encryption hardware if available.
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | dm-crypt.rst | 5 Device-Mapper's "crypt" target provides transparent encryption of block devices 17 Encryption cipher, encryption mode and Initial Vector (IV) generator. 52 Key used for encryption. It is encoded either as a hexadecimal number 66 The encryption key size in bytes. The kernel key payload size must match 112 Perform encryption using the same cpu that IO was submitted on. 113 The default is to use an unbound workqueue so that encryption work 122 Disable offloading writes to a separate thread after encryption. 124 encryption threads to a single thread degrades performance 155 Use <bytes> as the encryption unit instead of 512 bytes sectors. 192 encryption with dm-crypt using the 'cryptsetup' utility, see [all …]
|
| /linux/drivers/crypto/aspeed/ |
| H A D | Kconfig | 7 throughput of hash data digest, encryption and decryption. 45 Supports AES/DES symmetric-key encryption and decryption 56 Supports 256 bits to 4096 bits RSA encryption/decryption
|
| /linux/Documentation/crypto/ |
| H A D | descore-readme.rst | 5 Fast & Portable DES encryption & decryption 15 des - fast & portable DES encryption & decryption. 41 1. Highest possible encryption/decryption PERFORMANCE. 62 - 30us per encryption (options: 64k tables, no IP/FP) 63 - 33us per encryption (options: 64k tables, FIPS standard bit ordering) 64 - 45us per encryption (options: 2k tables, no IP/FP) 65 - 48us per encryption (options: 2k tables, FIPS standard bit ordering) 68 this has the quickest encryption/decryption routines i've seen. 80 - 53us per encryption (uses 2k of tables) 85 encryption/decryption is still slower on the sparc and 68000. [all …]
|
| H A D | api-samples.rst | 8 all inputs are random bytes, the encryption is done in-place, and it's 29 * encryption/decryption operations. But in this example, we'll just do a 30 * single encryption operation with it (which is not very efficient).
|
| H A D | userspace-if.rst | 95 to provide different memory pointers for the encryption and decryption 159 should be processed for encryption or decryption. In addition, the IV is 170 - ALG_OP_ENCRYPT - encryption of data 218 should be processed for encryption or decryption. In addition, the IV is 229 - ALG_OP_ENCRYPT - encryption of data 277 - AEAD encryption input: AAD \|\| plaintext 284 - AEAD encryption output: ciphertext \|\| authentication tag 387 key for symmetric encryption. 394 AEAD ciphers. For a encryption operation, the authentication tag of
|
| /linux/drivers/gpu/drm/amd/display/modules/hdcp/ |
| H A D | hdcp1_transition.c | 81 } else if (!conn->is_repeater && input->encryption != PASS) { in mod_hdcp_hdcp1_transition() 131 input->encryption != PASS) { in mod_hdcp_hdcp1_transition() 229 } else if ((!conn->is_repeater && input->encryption != PASS) || in mod_hdcp_hdcp1_dp_transition() 308 } else if (input->encryption != PASS || in mod_hdcp_hdcp1_dp_transition()
|
| /linux/net/sunrpc/ |
| H A D | Kconfig | 45 Choose Y to enable the use of Kerberos 5 encryption types 51 bool "Enable Kerberos encryption types based on Camellia and CMAC" 57 Choose Y to enable the use of Kerberos 5 encryption types 70 Choose Y to enable the use of Kerberos 5 encryption types
|
| /linux/Documentation/virt/kvm/s390/ |
| H A D | s390-pv-dump.rst | 21 can be requested. The encryption is based on the Customer 50 metadata comprised of the encryption tweaks and status flags. The 52 time of the export does not matter as no re-encryption is
|
| /linux/net/tipc/ |
| H A D | Kconfig | 40 bool "TIPC encryption support" 47 Saying Y here will enable support for TIPC encryption.
|
| /linux/Documentation/virt/kvm/x86/ |
| H A D | index.rst | 10 amd-memory-encryption
|
| /linux/Documentation/block/ |
| H A D | index.rst | 16 inline-encryption
|
| /linux/Documentation/translations/zh_CN/block/ |
| H A D | index.rst | 27 * inline-encryption
|
| /linux/fs/smb/client/ |
| H A D | smb2transport.c | 307 struct derivation encryption; member 367 rc = generate_key(ses, ptriplet->encryption.label, in generate_smb3signingkey() 368 ptriplet->encryption.context, in generate_smb3signingkey() 424 d = &triplet.encryption; in generate_smb30signingkey() 453 d = &triplet.encryption; in generate_smb311signingkey()
|
| /linux/Documentation/arch/x86/ |
| H A D | index.rst | 29 amd-memory-encryption
|
| /linux/drivers/crypto/intel/qat/qat_common/ |
| H A D | qat_crypto.h | 49 bool encryption; member
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-class-tsm | 8 link encryption and other device-security features coordinated
|
| /linux/fs/smb/server/ |
| H A D | auth.c | 637 struct derivation encryption; member 645 generate_key(conn, sess, ptwin->encryption.label, in generate_smb3encryptionkey() 646 ptwin->encryption.context, sess->smb3encryptionkey, in generate_smb3encryptionkey() 678 d = &twin.encryption; in ksmbd_gen_smb30_encryptionkey() 699 d = &twin.encryption; in ksmbd_gen_smb311_encryptionkey()
|
| /linux/drivers/net/wireless/purelifi/plfxlc/ |
| H A D | Kconfig | 9 The driver supports common 802.11 encryption/authentication
|
| /linux/Documentation/security/tpm/ |
| H A D | tpm-security.rst | 29 encryption`_ schemes. The next phase of research seems to be hacking 74 encryption to prevent the loss of secret information. 134 HMAC and encryption keys are usually derived from the shared 144 session may also be reused for the in-kernel HMAC, encryption and 151 protect the integrity. Additionally, we use parameter encryption to 214 .. _attack against TPM based Linux disk encryption: https://www.secura.com/blog/tpm-sniffing-attack…
|
| /linux/Documentation/networking/mac80211_hwsim/ |
| H A D | mac80211_hwsim.rst | 45 radio. Software encryption in mac80211 is used so that the frames are 47 complete testing of encryption.
|
| /linux/fs/ecryptfs/ |
| H A D | Kconfig | 22 for userspace to wrap/unwrap file encryption keys by other
|
| /linux/drivers/nvme/target/ |
| H A D | Kconfig | 98 bool "NVMe over Fabrics TCP target TLS encryption support" 103 Enables TLS encryption for the NVMe TCP target using the netlink handshake API.
|
| /linux/Documentation/driver-api/mei/ |
| H A D | hdcp.rst | 19 the HDCP encryption keys to Intel graphics hardware.
|
| /linux/net/tls/ |
| H A D | Kconfig | 16 encryption handling of the TLS protocol to be done in-kernel.
|