Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 47 of 47) sorted by relevance

/linux-4.4.14/Documentation/security/
Dkeys-ecryptfs.txt6 Each FEK is in turn encrypted with a File Encryption Key Encryption Key (FEFEK)
10 the FEK is encrypted by 'ecryptfsd' with the help of external libraries in order
20 The 'encrypted' key type has been extended with the introduction of the new
29 encrypted form.
31 The eCryptfs filesystem may really benefit from using encrypted keys in that the
39 keyctl add encrypted name "new ecryptfs key-type:master-key-name keylen" ring
40 keyctl add encrypted name "load hex_blob" ring
48 Example of encrypted key usage with the eCryptfs filesystem:
50 Create an encrypted key "1000100010001000" of length 64 bytes with format
53 $ keyctl add encrypted 1000100010001000 "new ecryptfs user:test 64" @u
[all …]
Dkeys-trusted-encrypted.txt6 stores, and loads only encrypted blobs. Trusted Keys require the availability
49 numbers, and are encrypted/decrypted using a specified 'master' key. The
51 disadvantage of encrypted keys is that if they are not rooted in a trusted key,
56 The decrypted portion of encrypted keys can contain either a simple symmetric
61 keyctl add encrypted name "new [format] key-type:master-key-name keylen"
63 keyctl add encrypted name "load hex_blob" ring
70 Examples of trusted and encrypted key usage:
129 encrypted key "evm" using the above trusted key "kmk":
132 $ keyctl add encrypted evm "new trusted:kmk 32" @u
136 $ keyctl add encrypted evm "new default trusted:kmk 32" @u
[all …]
D00-INDEX19 keys-trusted-encrypted.txt
/linux-4.4.14/security/keys/encrypted-keys/
DMakefile5 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys.o
7 encrypted-keys-y := encrypted.o ecryptfs_format.o
10 encrypted-keys-y += $(masterkey-y) $(masterkey-m-m)
/linux-4.4.14/net/rxrpc/
Drxkad.c688 response->encrypted.checksum = htonl(csum); in rxkad_calc_response_checksum()
731 rxkad_sg_set_buf2(sg, &resp->encrypted, sizeof(resp->encrypted)); in rxkad_encrypt_response()
732 crypto_blkcipher_encrypt_iv(&desc, sg, sg, sizeof(resp->encrypted)); in rxkad_encrypt_response()
789 resp.encrypted.epoch = conn->epoch; in rxkad_respond_to_challenge()
790 resp.encrypted.cid = conn->cid; in rxkad_respond_to_challenge()
791 resp.encrypted.securityIndex = htonl(conn->security_ix); in rxkad_respond_to_challenge()
792 resp.encrypted.call_id[0] = in rxkad_respond_to_challenge()
794 resp.encrypted.call_id[1] = in rxkad_respond_to_challenge()
796 resp.encrypted.call_id[2] = in rxkad_respond_to_challenge()
798 resp.encrypted.call_id[3] = in rxkad_respond_to_challenge()
[all …]
/linux-4.4.14/Documentation/ABI/testing/
Devm11 with a trusted/encrypted key for the HMAC-sha1 operation.
20 loading existing trusted/encrypted keys, refer to:
21 Documentation/keys-trusted-encrypted.txt. (A sample dracut
22 patch, which loads the trusted/encrypted key and enables
Ddebugfs-pfo-nx-crypto29 - The total number of bytes encrypted using AES in any of the driver's
/linux-4.4.14/Documentation/device-mapper/
Ddm-crypt.txt33 then sectors are encrypted according to their offsets (sector 0 uses key0;
42 encrypted data. You can specify it as a path like /dev/xxx or a device
46 Starting sector within the device where the encrypted data begins.
61 option. For example, allowing discards on encrypted devices may lead to
/linux-4.4.14/Documentation/power/
Dswsusp-dmcrypt.txt14 Now your system is properly set up, your disk is encrypted except for
24 up dm-crypt and then asks swsusp to resume from the encrypted
54 card contains at least the encrypted swap setup in a file
65 initrd that allows you to resume from encrypted swap and that
131 Otherwise we just remove the encrypted swap device and leave it to the
Dswsusp.txt276 A: First of all: it is not a replacement for dm-crypt encrypted swap.
290 encrypted and protected are retrieved and stolen from the swap device.
303 As a rule of thumb use encrypted swap to protect your data while your
304 system is shut down or suspended. Additionally use the encrypted
/linux-4.4.14/security/keys/
DKconfig62 see encrypted blobs.
78 which are encrypted/decrypted with a 'master' symmetric key. The
80 Userspace only ever sees/stores encrypted blobs.
DMakefile28 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys/
/linux-4.4.14/Documentation/filesystems/
Decryptfs.txt38 Create a new directory into which eCryptfs will write its encrypted
53 host page size). This is the encrypted underlying file for what you
Dfiemap.txt133 encoded (e.g. encrypted or compressed). Reading the data in this
148 The data in this extent has been encrypted by the file system.
Dramfs-rootfs-initramfs.txt349 compressed, encrypted, copy-on-write, loopback mounted, strangely partitioned,
Dntfs.txt58 is not implemented at all. Also, neither read nor write access to encrypted
/linux-4.4.14/include/rxrpc/
Dpacket.h164 } encrypted; member
/linux-4.4.14/Documentation/filesystems/cifs/
DTODO15 - encrypted shares
69 r) encrypted file support
DCHANGES298 directio. Recognize share mode security and send NTLM encrypted password
/linux-4.4.14/arch/powerpc/boot/dts/fsl/
Dc293pcie.dts101 /* 1MB for blob encrypted key */
103 label = "NOR blob encrypted key";
/linux-4.4.14/Documentation/devicetree/bindings/soc/mediatek/
Dpwrap.txt8 optionally be encrypted. Also a non standard Dual IO SPI mode can be
/linux-4.4.14/Documentation/networking/
Dmac80211-injection.txt22 IEEE80211_RADIOTAP_F_WEP: frame will be encrypted if key available
Drxrpc.txt429 encrypted - which includes the actual packet length.
433 Encrypted checksum plus entire packet padded and encrypted, including
460 uint8_t ticket[0]; /* the encrypted ticket */
/linux-4.4.14/drivers/staging/rtl8192e/
Drtllib_tx.c625 txb->encrypted = 0; in rtllib_xmit_inter()
787 txb->encrypted = encrypt; in rtllib_xmit_inter()
894 txb->encrypted = 0; in rtllib_xmit_inter()
Drtllib.h912 u8 encrypted; member
/linux-4.4.14/Documentation/
Ddigsig.txt85 891974900 --alswrv 0 0 \_ encrypted: evm-key
Dmodule-signing.txt103 If the PEM file containing the private key is encrypted, or if the
Demail-clients.txt204 set ssl_force_tls = yes # Require encrypted connection
Ddevices.txt1170 64 block Scramdisk/DriveCrypt encrypted devices
1172 1 = /dev/scramdisk/1 First encrypted device
1173 2 = /dev/scramdisk/2 Second encrypted device
1175 255 = /dev/scramdisk/255 255th encrypted device
1177 The filename of the encrypted container and the passwords
1665 92 block PPDD encrypted disk driver
1666 0 = /dev/ppdd0 First encrypted disk
1667 1 = /dev/ppdd1 Second encrypted disk
/linux-4.4.14/fs/f2fs/
DKconfig91 efficient since it avoids caching the encrypted and
/linux-4.4.14/Documentation/networking/mac80211_hwsim/
DREADME37 actually encrypted over the virtual air interface to allow more
/linux-4.4.14/drivers/staging/rtl8192u/ieee80211/
Dieee80211_tx.c754 txb->encrypted = encrypt; in ieee80211_xmit()
861 txb->encrypted = 0; in ieee80211_xmit()
Dieee80211.h1022 u8 encrypted; member
/linux-4.4.14/fs/ext4/
DKconfig116 efficient since it avoids caching the encrypted and
/linux-4.4.14/drivers/net/wireless/ipw2x00/
Dlibipw_tx.c433 txb->encrypted = encrypt; in libipw_xmit()
Dipw2100.h292 u8 encrypted; // BOOLEAN in win! TRUE if frame is enc by driver member
Dlibipw.h492 u8 encrypted; member
Dipw2100.c3140 ipw_hdr->encrypted = packet->info.d_struct.txb->encrypted; in ipw2100_tx_send_data()
Dipw2200.c10187 if (txb->encrypted && !priv->ieee->host_encrypt) { in ipw_tx_skb()
/linux-4.4.14/drivers/staging/rtl8712/
Dieee80211.h621 u8 encrypted; member
/linux-4.4.14/Documentation/crypto/
Dapi-intro.txt8 mode ciphers), this will allow for pages to be encrypted in-place
/linux-4.4.14/drivers/staging/rtl8188eu/include/
Dieee80211.h775 u8 encrypted; member
/linux-4.4.14/scripts/
Dspelling.txt379 encrupted||encrypted
/linux-4.4.14/Documentation/ioctl/
Dioctl-number.txt156 'L' E0-FF linux/ppdd.h encrypted disk device driver
/linux-4.4.14/arch/x86/crypto/
Daesni-intel_avx-x86_64.S630 # ghash the 8 previously encrypted ciphertext blocks
1894 # ghash the 8 previously encrypted ciphertext blocks
/linux-4.4.14/arch/arm/crypto/
Daesbs-core.S_shipped1521 vld1.8 {q1}, [sp,:64] @ load encrypted counter
/linux-4.4.14/
DMAINTAINERS6147 F: Documentation/security/keys-trusted-encrypted.txt
6158 F: Documentation/security/keys-trusted-encrypted.txt
6159 F: include/keys/encrypted-type.h
6160 F: security/keys/encrypted-keys/