/kernel/linux/linux-5.10/security/keys/encrypted-keys/ |
H A D | Makefile | 3 # Makefile for encrypted keys 6 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys.o 8 encrypted-keys-y := encrypted.o ecryptfs_format.o 11 encrypted-keys-y += $(masterkey-y) $(masterkey-m-m)
|
H A D | masterkey_trusted.c | 11 * See Documentation/security/keys/trusted-encrypted.rst 17 #include <keys/encrypted-type.h> 18 #include "encrypted.h" 24 * manages both trusted/encrypted key-types, like the encrypted key type
|
/kernel/linux/linux-6.6/security/keys/encrypted-keys/ |
H A D | Makefile | 3 # Makefile for encrypted keys 6 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys.o 8 encrypted-keys-y := encrypted.o ecryptfs_format.o 11 encrypted-keys-y += $(masterkey-y) $(masterkey-m-m)
|
H A D | masterkey_trusted.c | 11 * See Documentation/security/keys/trusted-encrypted.rst 17 #include <keys/encrypted-type.h> 18 #include "encrypted.h" 24 * manages both trusted/encrypted key-types, like the encrypted key type
|
/kernel/linux/linux-5.10/net/rxrpc/ |
H A D | rxkad.c | 593 * Locate the data contained in a packet that was partially encrypted. 607 * Locate the data contained in a packet that was completely encrypted. 774 response->encrypted.checksum = htonl(csum); in rxkad_calc_response_checksum() 796 sg_set_buf(sg, &resp->encrypted, sizeof(resp->encrypted)); in rxkad_encrypt_response() 799 skcipher_request_set_crypt(req, sg, sg, sizeof(resp->encrypted), iv.x); in rxkad_encrypt_response() 863 resp->encrypted.epoch = htonl(conn->proto.epoch); in rxkad_respond_to_challenge() 864 resp->encrypted.cid = htonl(conn->proto.cid); in rxkad_respond_to_challenge() 865 resp->encrypted.securityIndex = htonl(conn->security_ix); in rxkad_respond_to_challenge() 866 resp->encrypted in rxkad_respond_to_challenge() [all...] |
H A D | protocol.h | 158 __be32 nonce; /* encrypted random number */ 171 /* encrypted bit of the response */ 177 __be32 call_id[4]; /* encrypted call IDs */ 180 } encrypted; member
|
/kernel/linux/linux-6.6/net/rxrpc/ |
H A D | rxkad.c | 753 response->encrypted.checksum = htonl(csum); in rxkad_calc_response_checksum() 775 sg_set_buf(sg, &resp->encrypted, sizeof(resp->encrypted)); in rxkad_encrypt_response() 778 skcipher_request_set_crypt(req, sg, sg, sizeof(resp->encrypted), iv.x); in rxkad_encrypt_response() 835 resp->encrypted.epoch = htonl(conn->proto.epoch); in rxkad_respond_to_challenge() 836 resp->encrypted.cid = htonl(conn->proto.cid); in rxkad_respond_to_challenge() 837 resp->encrypted.securityIndex = htonl(conn->security_ix); in rxkad_respond_to_challenge() 838 resp->encrypted.inc_nonce = htonl(nonce + 1); in rxkad_respond_to_challenge() 839 resp->encrypted.level = htonl(conn->security_level); in rxkad_respond_to_challenge() 842 resp->encrypted in rxkad_respond_to_challenge() [all...] |
H A D | protocol.h | 151 __be32 nonce; /* encrypted random number */ 164 /* encrypted bit of the response */ 170 __be32 call_id[4]; /* encrypted call IDs */ 173 } encrypted; member
|
/kernel/linux/linux-5.10/net/tls/ |
H A D | trace.h | 47 bool encrypted, bool decrypted), 49 TP_ARGS(sk, tcp_seq, rec_no, rec_len, encrypted, decrypted), 56 __field( bool, encrypted ) 65 __entry->encrypted = encrypted; 70 "sk=%p tcp_seq=%u rec_no=%llu len=%u encrypted=%d decrypted=%d", 73 __entry->encrypted, __entry->decrypted
|
/kernel/linux/linux-6.6/net/tls/ |
H A D | trace.h | 47 bool encrypted, bool decrypted), 49 TP_ARGS(sk, tcp_seq, rec_no, rec_len, encrypted, decrypted), 56 __field( bool, encrypted ) 65 __entry->encrypted = encrypted; 70 "sk=%p tcp_seq=%u rec_no=%llu len=%u encrypted=%d decrypted=%d", 73 __entry->encrypted, __entry->decrypted
|
/kernel/linux/linux-5.10/arch/x86/kernel/ |
H A D | crash_dump_64.c | 16 bool encrypted) in __copy_oldmem_page() 23 if (encrypted) in __copy_oldmem_page() 14 __copy_oldmem_page(unsigned long pfn, char *buf, size_t csize, unsigned long offset, int userbuf, bool encrypted) __copy_oldmem_page() argument
|
/kernel/linux/linux-6.6/arch/x86/kernel/ |
H A D | crash_dump_64.c | 17 bool encrypted) in __copy_oldmem_page() 24 if (encrypted) in __copy_oldmem_page() 15 __copy_oldmem_page(struct iov_iter *iter, unsigned long pfn, size_t csize, unsigned long offset, bool encrypted) __copy_oldmem_page() argument
|
/kernel/linux/linux-5.10/include/linux/ |
H A D | crash_dump.h | 121 bool encrypted); 125 bool encrypted) in read_from_oldmem() 123 read_from_oldmem(char *buf, size_t count, u64 *ppos, int userbuf, bool encrypted) read_from_oldmem() argument
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | crash_dump.h | 138 u64 *ppos, bool encrypted); 141 u64 *ppos, bool encrypted) in read_from_oldmem() 140 read_from_oldmem(struct iov_iter *iter, size_t count, u64 *ppos, bool encrypted) read_from_oldmem() argument
|
/kernel/linux/linux-5.10/security/keys/ |
H A D | Makefile | 32 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys/
|
/kernel/linux/linux-6.6/security/keys/ |
H A D | Makefile | 32 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys/
|
/kernel/linux/linux-5.10/fs/ubifs/ |
H A D | sb.c | 497 if (c->encrypted && c->fmt_version < 5) { in validate_sb() 733 c->encrypted = !!(sup_flags & UBIFS_FLG_ENCRYPTION); in ubifs_read_superblock() 746 if (!IS_ENABLED(CONFIG_FS_ENCRYPTION) && c->encrypted) { in ubifs_read_superblock() 747 ubifs_err(c, "file system contains encrypted files but UBIFS" in ubifs_read_superblock() 935 if (c->encrypted) in ubifs_enable_encryption() 950 c->encrypted = 1; in ubifs_enable_encryption()
|
H A D | dir.c | 82 bool encrypted = false; in ubifs_new_inode() local 102 err = fscrypt_prepare_new_inode(dir, inode, &encrypted); in ubifs_new_inode() 164 if (encrypted) { in ubifs_new_inode() 565 bool encrypted = IS_ENCRYPTED(dir); in ubifs_readdir() local 576 if (encrypted) { in ubifs_readdir() 610 if (encrypted) in ubifs_readdir() 655 if (encrypted) { in ubifs_readdir() 672 if (encrypted) in ubifs_readdir() 695 if (encrypted) in ubifs_readdir()
|
/kernel/linux/linux-6.6/fs/ubifs/ |
H A D | sb.c | 500 if (c->encrypted && c->fmt_version < 5) { in validate_sb() 736 c->encrypted = !!(sup_flags & UBIFS_FLG_ENCRYPTION); in ubifs_read_superblock() 749 if (!IS_ENABLED(CONFIG_FS_ENCRYPTION) && c->encrypted) { in ubifs_read_superblock() 750 ubifs_err(c, "file system contains encrypted files but UBIFS" in ubifs_read_superblock() 938 if (c->encrypted) in ubifs_enable_encryption() 953 c->encrypted = 1; in ubifs_enable_encryption()
|
H A D | dir.c | 83 bool encrypted = false; in ubifs_new_inode() local 103 err = fscrypt_prepare_new_inode(dir, inode, &encrypted); in ubifs_new_inode() 166 if (encrypted) { in ubifs_new_inode() 563 bool encrypted = IS_ENCRYPTED(dir); in ubifs_readdir() local 574 if (encrypted) { in ubifs_readdir() 608 if (encrypted) in ubifs_readdir() 653 if (encrypted) { in ubifs_readdir() 670 if (encrypted) in ubifs_readdir() 693 if (encrypted) in ubifs_readdir()
|
/kernel/linux/linux-6.6/fs/smb/server/ |
H A D | ksmbd_work.h | 74 /* Request is encrypted */ 75 bool encrypted:1; member
|
H A D | server.c | 181 work->encrypted = true; in __handle_ksmbd_work() 247 if (work->sess && work->sess->enc && work->encrypted && in __handle_ksmbd_work()
|
/kernel/linux/linux-6.6/fs/ceph/ |
H A D | crypto.c | 156 bool encrypted = false; in ceph_fscrypt_prepare_context() local 159 ret = fscrypt_prepare_new_inode(dir, inode, &encrypted); in ceph_fscrypt_prepare_context() 162 if (!encrypted) in ceph_fscrypt_prepare_context() 330 /* base64 encode the encrypted name */ in ceph_encode_encrypted_dname() 371 * userland. If @parent is not encrypted, just pass it back as-is. 544 * We can't deal with partial blocks on an encrypted file, so mask off in ceph_fscrypt_decrypt_pages() 606 pr_warn("%s: bad encrypted sparse extent idx %d off %llx len %llx\n", in ceph_fscrypt_decrypt_extents() 634 * data encrypted. Any data in the page prior to the start of the 638 * Returns the length of the encrypted data or a negative errno. 648 * We can't deal with partial blocks on an encrypted fil in ceph_fscrypt_encrypt_pages() [all...] |
/kernel/linux/linux-5.10/drivers/staging/rtl8192e/ |
H A D | rtllib_tx.c | 609 txb->encrypted = 0; in rtllib_xmit_inter() 772 txb->encrypted = encrypt; in rtllib_xmit_inter() 877 txb->encrypted = 0; in rtllib_xmit_inter()
|
/kernel/linux/linux-6.6/drivers/staging/rtl8192e/ |
H A D | rtllib_tx.c | 601 txb->encrypted = 0; in rtllib_xmit_inter() 763 txb->encrypted = encrypt; in rtllib_xmit_inter() 868 txb->encrypted = 0; in rtllib_xmit_inter()
|