/linux/Documentation/block/ |
A D | inline-encryption.rst | 12 Inline encryption hardware sits logically between memory and disk, and can 18 Some inline encryption hardware accepts all encryption parameters including raw 19 keys directly in low-level I/O requests. However, most inline encryption 26 crypto accelerators operate on memory regions, whereas inline encryption 42 encryption hardware is absent. We also want inline encryption to work with 95 encryption-related state for a particular inline encryption device. The 139 implement encryption in multiple ways. 144 Essentially, when a bio with an encryption context is submitted to a 176 Note that regardless of whether real inline encryption hardware or 203 Next, to attach an encryption context to a bio, users should call [all …]
|
A D | index.rst | 18 inline-encryption
|
/linux/Documentation/x86/ |
A D | amd-memory-encryption.rst | 23 A page is encrypted when a page table entry has the encryption bit set (see 24 below on how to determine its position). The encryption bit can also be 40 forces the memory encryption bit to 1. 50 encryption 52 memory encryption is enabled (this only affects 57 determine if SME is enabled and/or to enable memory encryption:: 60 Bit[23] 0 = memory encryption features are disabled 61 1 = memory encryption features are enabled 67 Bit[0] 0 = memory encryption is not active 68 1 = memory encryption is active [all …]
|
A D | index.rst | 26 amd-memory-encryption
|
/linux/Documentation/filesystems/ |
A D | fscrypt.rst | 2 Filesystem-level encryption (fscrypt) 212 the key is used for v1 encryption policies or for v2 encryption 237 Per-file encryption keys 275 - For v1 encryption policies, the encryption is done directly with the 279 - For v2 encryption policies, the encryption is done with a per-mode 287 the encryption keys are derived from the master key, encryption mode 365 Contents encryption 394 Filenames encryption 564 had encryption enabled on it. (For example, to use encryption on an 792 For v1 encryption policies, a master encryption key can also be [all …]
|
A D | ubifs-authentication.rst | 20 At the current state, UBIFS encryption however does not prevent attacks where 28 Other full disk encryption systems like dm-crypt cover all filesystem metadata, 38 name encryption, the authentication system could be tied into fscrypt such that 40 be possible to use UBIFS authentication without using encryption. 395 (fscrypt) to provide confidentiality and authenticity. Since UBIFS encryption 396 has a different approach of encryption policies per directory, there can be 397 multiple fscrypt master keys and there might be folders without encryption. 401 encryption, it does not share the same master key with fscrypt, but manages 411 or key in userspace that covers UBIFS authentication and encryption. This can 414 encryption. [all …]
|
/linux/fs/crypto/ |
A D | Kconfig | 3 bool "FS Encryption (Per-file encryption)" 10 Enable encryption of files and directories. This 16 # Filesystems supporting encryption must select this if FS_ENCRYPTION. This 20 # Note: this option only pulls in the algorithms that filesystem encryption 21 # needs "by default". If userspace will use "non-default" encryption modes such 22 # as Adiantum encryption, then those other modes need to be explicitly enabled 46 Enable fscrypt to use inline encryption hardware if available.
|
/linux/Documentation/admin-guide/device-mapper/ |
A D | dm-crypt.rst | 5 Device-Mapper's "crypt" target provides transparent encryption of block devices 17 Encryption cipher, encryption mode and Initial Vector (IV) generator. 52 Key used for encryption. It is encoded either as a hexadecimal number 66 The encryption key size in bytes. The kernel key payload size must match 112 Perform encryption using the same cpu that IO was submitted on. 113 The default is to use an unbound workqueue so that encryption work 117 Disable offloading writes to a separate thread after encryption. 119 encryption threads to a single thread degrades performance 145 Use <bytes> as the encryption unit instead of 512 bytes sectors. 161 encryption with dm-crypt using the 'cryptsetup' utility, see [all …]
|
/linux/net/sunrpc/ |
A D | Kconfig | 38 bool "Secure RPC: Disable insecure Kerberos encryption types" 42 Choose Y here to disable the use of deprecated encryption types 44 deprecated encryption types include DES-CBC-MD5, DES-CBC-CRC, 49 keytabs that contain only these deprecated encryption types. 50 Choosing Y prevents the use of known-insecure encryption types
|
/linux/Documentation/virt/kvm/ |
A D | amd-memory-encryption.rst | 29 Bit[23] 1 = memory encryption can be enabled 30 0 = memory encryption can not be enabled 33 Bit[0] 1 = memory encryption can be enabled 34 0 = memory encryption can not be enabled 43 SEV hardware uses ASIDs to associate a memory encryption key with a VM. 93 The KVM_SEV_LAUNCH_START command is used for creating the memory encryption 94 context. To create the encryption context, user must provide a guest policy, 297 outgoing guest encryption context. 328 outgoing guest memory region with the encryption context creating using 356 issued by the hypervisor to delete the encryption context. [all …]
|
A D | index.rst | 11 amd-memory-encryption
|
/linux/Documentation/crypto/ |
A D | descore-readme.rst | 5 Fast & Portable DES encryption & decryption 15 des - fast & portable DES encryption & decryption. 41 1. Highest possible encryption/decryption PERFORMANCE. 62 - 30us per encryption (options: 64k tables, no IP/FP) 80 - 53us per encryption (uses 2k of tables) 106 - 68us per encryption (uses 2k of tables) 133 - 108us per encryption (uses 34k worth of tables) 153 - 165us per encryption (uses 6k worth of tables) 162 - 226us per encryption 387 e.g., encryption filters, etc. [all …]
|
A D | api-samples.rst | 8 all inputs are random bytes, the encryption is done in-place, and it's 29 * encryption/decryption operations. But in this example, we'll just do a 30 * single encryption operation with it (which is not very efficient).
|
A D | userspace-if.rst | 95 to provide different memory pointers for the encryption and decryption 159 should be processed for encryption or decryption. In addition, the IV is 170 - ALG_OP_ENCRYPT - encryption of data 218 should be processed for encryption or decryption. In addition, the IV is 229 - ALG_OP_ENCRYPT - encryption of data 277 - AEAD encryption input: AAD \|\| plaintext 284 - AEAD encryption output: ciphertext \|\| authentication tag 386 AEAD ciphers. For a encryption operation, the authentication tag of
|
/linux/drivers/gpu/drm/amd/display/modules/hdcp/ |
A D | hdcp1_transition.c | 81 } else if (!conn->is_repeater && input->encryption != PASS) { in mod_hdcp_hdcp1_transition() 131 input->encryption != PASS) { in mod_hdcp_hdcp1_transition() 229 } else if ((!conn->is_repeater && input->encryption != PASS) || in mod_hdcp_hdcp1_dp_transition() 308 } else if (input->encryption != PASS || in mod_hdcp_hdcp1_dp_transition()
|
A D | hdcp1_execution.c | 236 &input->encryption, &status, in computations_validate_rx_test_for_repeater() 241 &input->encryption, &status, in computations_validate_rx_test_for_repeater() 362 if (input->encryption != PASS) in read_ksv_list() 364 &input->encryption, &status, in read_ksv_list()
|
/linux/block/ |
A D | Kconfig | 177 bool "Enable inline encryption support in block layer" 180 block layer handle encryption, so users can take 181 advantage of inline encryption hardware if present. 189 Enabling this lets the block layer handle inline encryption 191 encryption hardware is not present.
|
/linux/net/tipc/ |
A D | Kconfig | 40 bool "TIPC encryption support" 46 Saying Y here will enable support for TIPC encryption.
|
/linux/crypto/ |
A D | Kconfig | 410 for AES encryption. 445 normally even when applied before encryption. 484 Adiantum encryption mode. 492 Adiantum encryption mode. 501 Adiantum is a tweakable, length-preserving encryption mode 502 designed for fast and secure disk encryption, especially on 519 tristate "ESSIV support for block encryption" 527 encryption. 544 block encryption) 572 XCBC: Keyed-Hashing with encryption algorithm [all …]
|
/linux/drivers/net/wireless/cisco/ |
A D | Kconfig | 27 - with or without encryption) as well as card before the Cisco 50 - with or without encryption) as well as card before the Cisco
|
/linux/fs/cifs/ |
A D | smb2transport.c | 387 struct derivation encryption; member 428 rc = generate_key(ses, ptriplet->encryption.label, in generate_smb3signingkey() 429 ptriplet->encryption.context, in generate_smb3signingkey() 485 d = &triplet.encryption; in generate_smb30signingkey() 513 d = &triplet.encryption; in generate_smb311signingkey()
|
/linux/Documentation/networking/mac80211_hwsim/ |
A D | mac80211_hwsim.rst | 45 radio. Software encryption in mac80211 is used so that the frames are 47 complete testing of encryption.
|
/linux/drivers/crypto/qat/qat_common/ |
A D | qat_crypto.h | 55 bool encryption; member
|
/linux/drivers/net/wireless/ |
A D | ray_cs.h | 51 UCHAR encryption; member
|
/linux/Documentation/devicetree/bindings/crypto/ |
A D | intel,keembay-ocs-aes.yaml | 14 hardware-accelerated AES/SM4 encryption/decryption.
|