/linux-4.4.14/Documentation/security/ |
D | keys-ecryptfs.txt | 6 Each FEK is in turn encrypted with a File Encryption Key Encryption Key (FEFEK) 10 the FEK is encrypted by 'ecryptfsd' with the help of external libraries in order 20 The 'encrypted' key type has been extended with the introduction of the new 29 encrypted form. 31 The eCryptfs filesystem may really benefit from using encrypted keys in that the 39 keyctl add encrypted name "new ecryptfs key-type:master-key-name keylen" ring 40 keyctl add encrypted name "load hex_blob" ring 48 Example of encrypted key usage with the eCryptfs filesystem: 50 Create an encrypted key "1000100010001000" of length 64 bytes with format 53 $ keyctl add encrypted 1000100010001000 "new ecryptfs user:test 64" @u [all …]
|
D | keys-trusted-encrypted.txt | 6 stores, and loads only encrypted blobs. Trusted Keys require the availability 49 numbers, and are encrypted/decrypted using a specified 'master' key. The 51 disadvantage of encrypted keys is that if they are not rooted in a trusted key, 56 The decrypted portion of encrypted keys can contain either a simple symmetric 61 keyctl add encrypted name "new [format] key-type:master-key-name keylen" 63 keyctl add encrypted name "load hex_blob" ring 70 Examples of trusted and encrypted key usage: 129 encrypted key "evm" using the above trusted key "kmk": 132 $ keyctl add encrypted evm "new trusted:kmk 32" @u 136 $ keyctl add encrypted evm "new default trusted:kmk 32" @u [all …]
|
D | 00-INDEX | 19 keys-trusted-encrypted.txt
|
/linux-4.4.14/security/keys/encrypted-keys/ |
D | Makefile | 5 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys.o 7 encrypted-keys-y := encrypted.o ecryptfs_format.o 10 encrypted-keys-y += $(masterkey-y) $(masterkey-m-m)
|
/linux-4.4.14/net/rxrpc/ |
D | rxkad.c | 688 response->encrypted.checksum = htonl(csum); in rxkad_calc_response_checksum() 731 rxkad_sg_set_buf2(sg, &resp->encrypted, sizeof(resp->encrypted)); in rxkad_encrypt_response() 732 crypto_blkcipher_encrypt_iv(&desc, sg, sg, sizeof(resp->encrypted)); in rxkad_encrypt_response() 789 resp.encrypted.epoch = conn->epoch; in rxkad_respond_to_challenge() 790 resp.encrypted.cid = conn->cid; in rxkad_respond_to_challenge() 791 resp.encrypted.securityIndex = htonl(conn->security_ix); in rxkad_respond_to_challenge() 792 resp.encrypted.call_id[0] = in rxkad_respond_to_challenge() 794 resp.encrypted.call_id[1] = in rxkad_respond_to_challenge() 796 resp.encrypted.call_id[2] = in rxkad_respond_to_challenge() 798 resp.encrypted.call_id[3] = in rxkad_respond_to_challenge() [all …]
|
/linux-4.4.14/Documentation/ABI/testing/ |
D | evm | 11 with a trusted/encrypted key for the HMAC-sha1 operation. 20 loading existing trusted/encrypted keys, refer to: 21 Documentation/keys-trusted-encrypted.txt. (A sample dracut 22 patch, which loads the trusted/encrypted key and enables
|
D | debugfs-pfo-nx-crypto | 29 - The total number of bytes encrypted using AES in any of the driver's
|
/linux-4.4.14/Documentation/device-mapper/ |
D | dm-crypt.txt | 33 then sectors are encrypted according to their offsets (sector 0 uses key0; 42 encrypted data. You can specify it as a path like /dev/xxx or a device 46 Starting sector within the device where the encrypted data begins. 61 option. For example, allowing discards on encrypted devices may lead to
|
/linux-4.4.14/Documentation/power/ |
D | swsusp-dmcrypt.txt | 14 Now your system is properly set up, your disk is encrypted except for 24 up dm-crypt and then asks swsusp to resume from the encrypted 54 card contains at least the encrypted swap setup in a file 65 initrd that allows you to resume from encrypted swap and that 131 Otherwise we just remove the encrypted swap device and leave it to the
|
D | swsusp.txt | 276 A: First of all: it is not a replacement for dm-crypt encrypted swap. 290 encrypted and protected are retrieved and stolen from the swap device. 303 As a rule of thumb use encrypted swap to protect your data while your 304 system is shut down or suspended. Additionally use the encrypted
|
/linux-4.4.14/security/keys/ |
D | Kconfig | 62 see encrypted blobs. 78 which are encrypted/decrypted with a 'master' symmetric key. The 80 Userspace only ever sees/stores encrypted blobs.
|
D | Makefile | 28 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys/
|
/linux-4.4.14/Documentation/filesystems/ |
D | ecryptfs.txt | 38 Create a new directory into which eCryptfs will write its encrypted 53 host page size). This is the encrypted underlying file for what you
|
D | fiemap.txt | 133 encoded (e.g. encrypted or compressed). Reading the data in this 148 The data in this extent has been encrypted by the file system.
|
D | ramfs-rootfs-initramfs.txt | 349 compressed, encrypted, copy-on-write, loopback mounted, strangely partitioned,
|
D | ntfs.txt | 58 is not implemented at all. Also, neither read nor write access to encrypted
|
/linux-4.4.14/include/rxrpc/ |
D | packet.h | 164 } encrypted; member
|
/linux-4.4.14/Documentation/filesystems/cifs/ |
D | TODO | 15 - encrypted shares 69 r) encrypted file support
|
D | CHANGES | 298 directio. Recognize share mode security and send NTLM encrypted password
|
/linux-4.4.14/arch/powerpc/boot/dts/fsl/ |
D | c293pcie.dts | 101 /* 1MB for blob encrypted key */ 103 label = "NOR blob encrypted key";
|
/linux-4.4.14/Documentation/devicetree/bindings/soc/mediatek/ |
D | pwrap.txt | 8 optionally be encrypted. Also a non standard Dual IO SPI mode can be
|
/linux-4.4.14/Documentation/networking/ |
D | mac80211-injection.txt | 22 IEEE80211_RADIOTAP_F_WEP: frame will be encrypted if key available
|
D | rxrpc.txt | 429 encrypted - which includes the actual packet length. 433 Encrypted checksum plus entire packet padded and encrypted, including 460 uint8_t ticket[0]; /* the encrypted ticket */
|
/linux-4.4.14/drivers/staging/rtl8192e/ |
D | rtllib_tx.c | 625 txb->encrypted = 0; in rtllib_xmit_inter() 787 txb->encrypted = encrypt; in rtllib_xmit_inter() 894 txb->encrypted = 0; in rtllib_xmit_inter()
|
D | rtllib.h | 912 u8 encrypted; member
|
/linux-4.4.14/Documentation/ |
D | digsig.txt | 85 891974900 --alswrv 0 0 \_ encrypted: evm-key
|
D | module-signing.txt | 103 If the PEM file containing the private key is encrypted, or if the
|
D | email-clients.txt | 204 set ssl_force_tls = yes # Require encrypted connection
|
D | devices.txt | 1170 64 block Scramdisk/DriveCrypt encrypted devices 1172 1 = /dev/scramdisk/1 First encrypted device 1173 2 = /dev/scramdisk/2 Second encrypted device 1175 255 = /dev/scramdisk/255 255th encrypted device 1177 The filename of the encrypted container and the passwords 1665 92 block PPDD encrypted disk driver 1666 0 = /dev/ppdd0 First encrypted disk 1667 1 = /dev/ppdd1 Second encrypted disk
|
/linux-4.4.14/fs/f2fs/ |
D | Kconfig | 91 efficient since it avoids caching the encrypted and
|
/linux-4.4.14/Documentation/networking/mac80211_hwsim/ |
D | README | 37 actually encrypted over the virtual air interface to allow more
|
/linux-4.4.14/drivers/staging/rtl8192u/ieee80211/ |
D | ieee80211_tx.c | 754 txb->encrypted = encrypt; in ieee80211_xmit() 861 txb->encrypted = 0; in ieee80211_xmit()
|
D | ieee80211.h | 1022 u8 encrypted; member
|
/linux-4.4.14/fs/ext4/ |
D | Kconfig | 116 efficient since it avoids caching the encrypted and
|
/linux-4.4.14/drivers/net/wireless/ipw2x00/ |
D | libipw_tx.c | 433 txb->encrypted = encrypt; in libipw_xmit()
|
D | ipw2100.h | 292 u8 encrypted; // BOOLEAN in win! TRUE if frame is enc by driver member
|
D | libipw.h | 492 u8 encrypted; member
|
D | ipw2100.c | 3140 ipw_hdr->encrypted = packet->info.d_struct.txb->encrypted; in ipw2100_tx_send_data()
|
D | ipw2200.c | 10187 if (txb->encrypted && !priv->ieee->host_encrypt) { in ipw_tx_skb()
|
/linux-4.4.14/drivers/staging/rtl8712/ |
D | ieee80211.h | 621 u8 encrypted; member
|
/linux-4.4.14/Documentation/crypto/ |
D | api-intro.txt | 8 mode ciphers), this will allow for pages to be encrypted in-place
|
/linux-4.4.14/drivers/staging/rtl8188eu/include/ |
D | ieee80211.h | 775 u8 encrypted; member
|
/linux-4.4.14/scripts/ |
D | spelling.txt | 379 encrupted||encrypted
|
/linux-4.4.14/Documentation/ioctl/ |
D | ioctl-number.txt | 156 'L' E0-FF linux/ppdd.h encrypted disk device driver
|
/linux-4.4.14/arch/x86/crypto/ |
D | aesni-intel_avx-x86_64.S | 630 # ghash the 8 previously encrypted ciphertext blocks 1894 # ghash the 8 previously encrypted ciphertext blocks
|
/linux-4.4.14/arch/arm/crypto/ |
D | aesbs-core.S_shipped | 1521 vld1.8 {q1}, [sp,:64] @ load encrypted counter
|
/linux-4.4.14/ |
D | MAINTAINERS | 6147 F: Documentation/security/keys-trusted-encrypted.txt 6158 F: Documentation/security/keys-trusted-encrypted.txt 6159 F: include/keys/encrypted-type.h 6160 F: security/keys/encrypted-keys/
|