Home
last modified time | relevance | path

Searched refs:encryption (Results 1 – 25 of 101) sorted by relevance

12345

/linux/Documentation/block/
H A Dinline-encryption.rst12 Inline encryption hardware sits logically between memory and disk, and can
14 can control exactly how the inline encryption hardware will en/decrypt the data
18 Some inline encryption hardware accepts all encryption parameters including raw
19 keys directly in low-level I/O requests. However, most inline encryption
24 Note that inline encryption hardware is very different from traditional crypto
26 crypto accelerators operate on memory regions, whereas inline encryption
27 hardware operates on I/O requests. Thus, inline encryption hardware needs to be
30 Inline encryption hardware is also very different from "self-encrypting drives",
32 drives don't provide fine-grained control of encryption and provide no way to
33 verify the correctness of the resulting ciphertext. Inline encryption hardware
[all …]
H A Dindex.rst16 inline-encryption
/linux/Documentation/filesystems/
H A Dfscrypt.rst2 Filesystem-level encryption (fscrypt)
9 transparent encryption of files and directories.
15 use encryption, see the documentation for the userspace tool `fscrypt
20 <https://source.android.com/security/encryption/file-based>`_, over
56 Provided that userspace chooses a strong encryption key, fscrypt
72 fscrypt (and storage encryption in general) can only provide limited
80 Cryptographic API algorithms or inline encryption hardware are. If a
89 After an encryption key has been added, fscrypt does not hide the
97 encryption but rather only by the correctness of the kernel.
98 Therefore, any encryption-specific access control checks would merely
[all …]
/linux/fs/crypto/
H A DKconfig3 bool "FS Encryption (Per-file encryption)"
10 Enable encryption of files and directories. This
16 # Filesystems supporting encryption must select this if FS_ENCRYPTION. This
20 # Note: this option only pulls in the algorithms that filesystem encryption
21 # needs "by default". If userspace will use "non-default" encryption modes such
22 # as Adiantum encryption, then those other modes need to be explicitly enabled
40 Enable fscrypt to use inline encryption hardware if available.
/linux/Documentation/admin-guide/device-mapper/
H A Ddm-crypt.rst5 Device-Mapper's "crypt" target provides transparent encryption of block devices
17 Encryption cipher, encryption mode and Initial Vector (IV) generator.
52 Key used for encryption. It is encoded either as a hexadecimal number
66 The encryption key size in bytes. The kernel key payload size must match
112 Perform encryption using the same cpu that IO was submitted on.
113 The default is to use an unbound workqueue so that encryption work
122 Disable offloading writes to a separate thread after encryption.
124 encryption threads to a single thread degrades performance
155 Use <bytes> as the encryption unit instead of 512 bytes sectors.
192 encryption with dm-crypt using the 'cryptsetup' utility, see
[all …]
/linux/drivers/crypto/aspeed/
H A DKconfig7 throughput of hash data digest, encryption and decryption.
45 Supports AES/DES symmetric-key encryption and decryption
56 Supports 256 bits to 4096 bits RSA encryption/decryption
/linux/Documentation/crypto/
H A Ddescore-readme.rst5 Fast & Portable DES encryption & decryption
15 des - fast & portable DES encryption & decryption.
41 1. Highest possible encryption/decryption PERFORMANCE.
62 - 30us per encryption (options: 64k tables, no IP/FP)
63 - 33us per encryption (options: 64k tables, FIPS standard bit ordering)
64 - 45us per encryption (options: 2k tables, no IP/FP)
65 - 48us per encryption (options: 2k tables, FIPS standard bit ordering)
68 this has the quickest encryption/decryption routines i've seen.
80 - 53us per encryption (uses 2k of tables)
85 encryption/decryption is still slower on the sparc and 68000.
[all …]
H A Dapi-samples.rst8 all inputs are random bytes, the encryption is done in-place, and it's
29 * encryption/decryption operations. But in this example, we'll just do a
30 * single encryption operation with it (which is not very efficient).
H A Duserspace-if.rst95 to provide different memory pointers for the encryption and decryption
159 should be processed for encryption or decryption. In addition, the IV is
170 - ALG_OP_ENCRYPT - encryption of data
218 should be processed for encryption or decryption. In addition, the IV is
229 - ALG_OP_ENCRYPT - encryption of data
277 - AEAD encryption input: AAD \|\| plaintext
284 - AEAD encryption output: ciphertext \|\| authentication tag
387 key for symmetric encryption.
394 AEAD ciphers. For a encryption operation, the authentication tag of
/linux/Documentation/virt/kvm/x86/
H A Damd-memory-encryption.rst31 Bit[23] 1 = memory encryption can be enabled
32 0 = memory encryption can not be enabled
35 Bit[0] 1 = memory encryption can be enabled
36 0 = memory encryption can not be enabled
45 SEV hardware uses ASIDs to associate a memory encryption key with a VM.
132 The KVM_SEV_LAUNCH_START command is used for creating the memory encryption
133 context. To create the encryption context, user must provide a guest policy,
336 outgoing guest encryption context.
367 outgoing guest memory region with the encryption context creating using
395 issued by the hypervisor to delete the encryption context.
[all …]
H A Dindex.rst10 amd-memory-encryption
/linux/drivers/gpu/drm/amd/display/modules/hdcp/
H A Dhdcp1_transition.c81 } else if (!conn->is_repeater && input->encryption != PASS) { in mod_hdcp_hdcp1_transition()
131 input->encryption != PASS) { in mod_hdcp_hdcp1_transition()
229 } else if ((!conn->is_repeater && input->encryption != PASS) || in mod_hdcp_hdcp1_dp_transition()
308 } else if (input->encryption != PASS || in mod_hdcp_hdcp1_dp_transition()
/linux/arch/arm/crypto/
H A DKconfig70 and for XTS mode encryption, CBC and XTS mode decryption speedup is
71 around 25%. (CBC encryption speed is not affected by this driver.)
78 encryption (not CBC decryption), the encryption of XTS tweaks, XTS
/linux/net/sunrpc/
H A DKconfig45 Choose Y to enable the use of Kerberos 5 encryption types
51 bool "Enable Kerberos encryption types based on Camellia and CMAC"
57 Choose Y to enable the use of Kerberos 5 encryption types
70 Choose Y to enable the use of Kerberos 5 encryption types
/linux/Documentation/virt/kvm/s390/
H A Ds390-pv-dump.rst21 can be requested. The encryption is based on the Customer
50 metadata comprised of the encryption tweaks and status flags. The
52 time of the export does not matter as no re-encryption is
/linux/crypto/
H A DKconfig254 profile. This is required for Kerberos 5-style encryption, used by
380 solely on encryption (although decryption is supported as well, but
383 Instead of using 16 lookup tables of 1 KB each, (8 for encryption and
410 ARIA is a standard encryption algorithm of the Republic of Korea.
469 CAST6 (CAST-256) encryption algorithm (RFC2612)
512 national standard encryption algorithm of the Republic of Korea.
609 Adiantum tweakable, length-preserving encryption mode
611 Designed for fast and secure disk encryption, especially on
621 bound. Unlike XTS, Adiantum is a true wide-block encryption
687 for AES encryption.
[all …]
/linux/net/tipc/
H A DKconfig40 bool "TIPC encryption support"
47 Saying Y here will enable support for TIPC encryption.
/linux/Documentation/translations/zh_CN/block/
H A Dindex.rst27 * inline-encryption
/linux/fs/smb/client/
H A Dsmb2transport.c307 struct derivation encryption; member
367 rc = generate_key(ses, ptriplet->encryption.label, in generate_smb3signingkey()
368 ptriplet->encryption.context, in generate_smb3signingkey()
424 d = &triplet.encryption; in generate_smb30signingkey()
453 d = &triplet.encryption; in generate_smb311signingkey()
/linux/Documentation/arch/x86/
H A Dindex.rst29 amd-memory-encryption
/linux/drivers/crypto/intel/qat/qat_common/
H A Dqat_crypto.h49 bool encryption; member
/linux/arch/arm64/crypto/
H A DKconfig184 authenticated encryption mode (NIST SP800-38C)
200 authenticated encryption mode (NIST SP800-38C)
215 GCM (Galois/Counter Mode) authenticated encryption mode (NIST SP800-38D)
/linux/fs/smb/server/
H A Dauth.c637 struct derivation encryption; member
645 generate_key(conn, sess, ptwin->encryption.label, in generate_smb3encryptionkey()
646 ptwin->encryption.context, sess->smb3encryptionkey, in generate_smb3encryptionkey()
678 d = &twin.encryption; in ksmbd_gen_smb30_encryptionkey()
699 d = &twin.encryption; in ksmbd_gen_smb311_encryptionkey()
/linux/drivers/net/wireless/purelifi/plfxlc/
H A DKconfig9 The driver supports common 802.11 encryption/authentication
/linux/Documentation/security/tpm/
H A Dtpm-security.rst29 encryption`_ schemes. The next phase of research seems to be hacking
74 encryption to prevent the loss of secret information.
134 HMAC and encryption keys are usually derived from the shared
144 session may also be reused for the in-kernel HMAC, encryption and
151 protect the integrity. Additionally, we use parameter encryption to
214 .. _attack against TPM based Linux disk encryption: https://www.secura.com/blog/tpm-sniffing-attack…

12345