Home
last modified time | relevance | path

Searched refs:encryption (Results 1 – 25 of 121) sorted by relevance

12345

/linux-6.3-rc2/Documentation/block/
A Dinline-encryption.rst12 Inline encryption hardware sits logically between memory and disk, and can
18 Some inline encryption hardware accepts all encryption parameters including raw
19 keys directly in low-level I/O requests. However, most inline encryption
26 crypto accelerators operate on memory regions, whereas inline encryption
42 encryption hardware is absent. We also want inline encryption to work with
95 encryption-related state for a particular inline encryption device. The
139 implement encryption in multiple ways.
144 Essentially, when a bio with an encryption context is submitted to a
176 Note that regardless of whether real inline encryption hardware or
203 Next, to attach an encryption context to a bio, users should call
[all …]
A Dindex.rst16 inline-encryption
/linux-6.3-rc2/Documentation/x86/
A Damd-memory-encryption.rst23 A page is encrypted when a page table entry has the encryption bit set (see
24 below on how to determine its position). The encryption bit can also be
40 forces the memory encryption bit to 1.
50 encryption
52 memory encryption is enabled (this only affects
57 determine if SME is enabled and/or to enable memory encryption::
60 Bit[23] 0 = memory encryption features are disabled
61 1 = memory encryption features are enabled
67 Bit[0] 0 = memory encryption is not active
68 1 = memory encryption is active
[all …]
A Dindex.rst27 amd-memory-encryption
/linux-6.3-rc2/Documentation/filesystems/
A Dfscrypt.rst2 Filesystem-level encryption (fscrypt)
212 the key is used for v1 encryption policies or for v2 encryption
237 Per-file encryption keys
275 - For v1 encryption policies, the encryption is done directly with the
279 - For v2 encryption policies, the encryption is done with a per-mode
287 the encryption keys are derived from the master key, encryption mode
384 Contents encryption
413 Filenames encryption
583 had encryption enabled on it. (For example, to use encryption on an
811 For v1 encryption policies, a master encryption key can also be
[all …]
A Dubifs-authentication.rst20 At the current state, UBIFS encryption however does not prevent attacks where
28 Other full disk encryption systems like dm-crypt cover all filesystem metadata,
38 name encryption, the authentication system could be tied into fscrypt such that
40 be possible to use UBIFS authentication without using encryption.
395 (fscrypt) to provide confidentiality and authenticity. Since UBIFS encryption
396 has a different approach of encryption policies per directory, there can be
397 multiple fscrypt master keys and there might be folders without encryption.
401 encryption, it does not share the same master key with fscrypt, but manages
411 or key in userspace that covers UBIFS authentication and encryption. This can
414 encryption.
[all …]
/linux-6.3-rc2/fs/crypto/
A DKconfig3 bool "FS Encryption (Per-file encryption)"
10 Enable encryption of files and directories. This
16 # Filesystems supporting encryption must select this if FS_ENCRYPTION. This
20 # Note: this option only pulls in the algorithms that filesystem encryption
21 # needs "by default". If userspace will use "non-default" encryption modes such
22 # as Adiantum encryption, then those other modes need to be explicitly enabled
46 Enable fscrypt to use inline encryption hardware if available.
/linux-6.3-rc2/Documentation/admin-guide/device-mapper/
A Ddm-crypt.rst5 Device-Mapper's "crypt" target provides transparent encryption of block devices
17 Encryption cipher, encryption mode and Initial Vector (IV) generator.
52 Key used for encryption. It is encoded either as a hexadecimal number
66 The encryption key size in bytes. The kernel key payload size must match
112 Perform encryption using the same cpu that IO was submitted on.
113 The default is to use an unbound workqueue so that encryption work
117 Disable offloading writes to a separate thread after encryption.
119 encryption threads to a single thread degrades performance
145 Use <bytes> as the encryption unit instead of 512 bytes sectors.
161 encryption with dm-crypt using the 'cryptsetup' utility, see
[all …]
/linux-6.3-rc2/net/sunrpc/
A DKconfig55 encryption types that utilize Data Encryption Standard
61 These encryption types are known to be insecure, therefore
63 encryption types is available only for compatibility with
78 Choose Y to enable the use of Kerberos 5 encryption types
84 bool "Enable Kerberos encryption types based on Camellia and CMAC"
91 Choose Y to enable the use of Kerberos 5 encryption types
105 Choose Y to enable the use of Kerberos 5 encryption types
/linux-6.3-rc2/drivers/crypto/aspeed/
A DKconfig7 throughput of hash data digest, encryption and decryption.
47 Supports AES/DES symmetric-key encryption and decryption
58 Supports 256 bits to 4096 bits RSA encryption/decryption
/linux-6.3-rc2/Documentation/virt/kvm/x86/
A Damd-memory-encryption.rst31 Bit[23] 1 = memory encryption can be enabled
32 0 = memory encryption can not be enabled
35 Bit[0] 1 = memory encryption can be enabled
36 0 = memory encryption can not be enabled
45 SEV hardware uses ASIDs to associate a memory encryption key with a VM.
100 The KVM_SEV_LAUNCH_START command is used for creating the memory encryption
101 context. To create the encryption context, user must provide a guest policy,
304 outgoing guest encryption context.
335 outgoing guest memory region with the encryption context creating using
363 issued by the hypervisor to delete the encryption context.
[all …]
A Dindex.rst10 amd-memory-encryption
/linux-6.3-rc2/Documentation/crypto/
A Ddescore-readme.rst5 Fast & Portable DES encryption & decryption
15 des - fast & portable DES encryption & decryption.
41 1. Highest possible encryption/decryption PERFORMANCE.
62 - 30us per encryption (options: 64k tables, no IP/FP)
80 - 53us per encryption (uses 2k of tables)
106 - 68us per encryption (uses 2k of tables)
133 - 108us per encryption (uses 34k worth of tables)
153 - 165us per encryption (uses 6k worth of tables)
162 - 226us per encryption
387 e.g., encryption filters, etc.
[all …]
A Dapi-samples.rst8 all inputs are random bytes, the encryption is done in-place, and it's
29 * encryption/decryption operations. But in this example, we'll just do a
30 * single encryption operation with it (which is not very efficient).
A Duserspace-if.rst95 to provide different memory pointers for the encryption and decryption
159 should be processed for encryption or decryption. In addition, the IV is
170 - ALG_OP_ENCRYPT - encryption of data
218 should be processed for encryption or decryption. In addition, the IV is
229 - ALG_OP_ENCRYPT - encryption of data
277 - AEAD encryption input: AAD \|\| plaintext
284 - AEAD encryption output: ciphertext \|\| authentication tag
388 key for symmetric encryption.
395 AEAD ciphers. For a encryption operation, the authentication tag of
/linux-6.3-rc2/drivers/gpu/drm/amd/display/modules/hdcp/
A Dhdcp1_transition.c81 } else if (!conn->is_repeater && input->encryption != PASS) { in mod_hdcp_hdcp1_transition()
131 input->encryption != PASS) { in mod_hdcp_hdcp1_transition()
229 } else if ((!conn->is_repeater && input->encryption != PASS) || in mod_hdcp_hdcp1_dp_transition()
308 } else if (input->encryption != PASS || in mod_hdcp_hdcp1_dp_transition()
A Dhdcp1_execution.c236 &input->encryption, &status, in computations_validate_rx_test_for_repeater()
241 &input->encryption, &status, in computations_validate_rx_test_for_repeater()
362 if (input->encryption != PASS) in read_ksv_list()
364 &input->encryption, &status, in read_ksv_list()
/linux-6.3-rc2/Documentation/virt/kvm/s390/
A Ds390-pv-dump.rst21 can be requested. The encryption is based on the Customer
50 metadata comprised of the encryption tweaks and status flags. The
52 time of the export does not matter as no re-encryption is
/linux-6.3-rc2/crypto/
A DKconfig454 CAST6 (CAST-256) encryption algorithm (RFC2612)
593 Adiantum tweakable, length-preserving encryption mode
595 Designed for fast and secure disk encryption, especially on
605 bound. Unlike XTS, Adiantum is a true wide-block encryption
680 for AES encryption.
695 HCTR2 length-preserving encryption mode
741 normally even when applied before encryption.
821 authenticated encryption mode (NIST SP800-38C)
860 This IV generator generates an IV based on the encryption of
874 encryption.
[all …]
/linux-6.3-rc2/block/
A DKconfig189 bool "Enable inline encryption support in block layer"
192 block layer handle encryption, so users can take
193 advantage of inline encryption hardware if present.
201 Enabling this lets the block layer handle inline encryption
203 encryption hardware is not present.
/linux-6.3-rc2/net/tipc/
A DKconfig40 bool "TIPC encryption support"
46 Saying Y here will enable support for TIPC encryption.
/linux-6.3-rc2/drivers/net/wireless/cisco/
A DKconfig27 - with or without encryption) as well as card before the Cisco
50 - with or without encryption) as well as card before the Cisco
/linux-6.3-rc2/drivers/crypto/qat/qat_common/
A Dqat_crypto.h49 bool encryption; member
/linux-6.3-rc2/drivers/net/wireless/purelifi/plfxlc/
A DKconfig9 The driver supports common 802.11 encryption/authentication
/linux-6.3-rc2/drivers/net/wireless/
A Dray_cs.h51 UCHAR encryption; member

Completed in 48 milliseconds

12345