| /linux-6.15/net/tls/ |
| H A D | trace.h | 47 bool encrypted, bool decrypted), 49 TP_ARGS(sk, tcp_seq, rec_no, rec_len, encrypted, decrypted), 57 __field( bool, decrypted ) 66 __entry->decrypted = decrypted; 73 __entry->encrypted, __entry->decrypted
|
| H A D | tls_sw.c | 1910 if (len_left <= decrypted) in tls_read_flush_backlog() 2038 decrypted = 0; in tls_sw_recvmsg() 2050 decrypted += chunk; in tls_sw_recvmsg() 2101 decrypted + copied, in tls_sw_recvmsg() 2120 decrypted += chunk; in tls_sw_recvmsg() 2162 decrypted += chunk; in tls_sw_recvmsg() 2199 copied += decrypted; in tls_sw_recvmsg() 2292 ssize_t decrypted; in tls_sw_read_sock() local 2309 decrypted = 0; in tls_sw_read_sock() 2331 0, decrypted, in tls_sw_read_sock() [all …]
|
| H A D | tls_device.c | 925 if (skb->decrypted) { in tls_device_reencrypt() 952 if (skb_iter->decrypted) { in tls_device_reencrypt() 978 is_decrypted = skb->decrypted; in tls_device_decrypted()
|
| /linux-6.15/net/mac80211/tests/ |
| H A D | mfp.c | 16 bool sta, mfp, decrypted, unicast, assoc; member 137 .decrypted = true, 148 .decrypted = true, 232 KUNIT_ASSERT_FALSE(test, params->decrypted); in accept_mfp() 245 if (params->decrypted) { in accept_mfp()
|
| /linux-6.15/security/keys/ |
| H A D | Kconfig | 98 generated random numbers or provided decrypted data, and are 99 encrypted/decrypted with a 'master' symmetric key. The 'master' 106 bool "Allow encrypted keys with user decrypted data" 110 user-provided decrypted data. The decrypted data must be hex-ascii
|
| /linux-6.15/Documentation/virt/hyperv/ |
| H A D | coco.rst | 106 appropriate ranges as decrypted (shared). In paravisor mode, Linux does not 134 of the decrypted references that would be used in a fully-enlightened CoCo 140 memory between encrypted and decrypted requires coordinating with the 173 marked decrypted to enable communication. Furthermore, since the threat model 177 These Hyper-V and VMBus memory pages are marked as decrypted: 186 * VMBus ring buffers. The direct mapping is marked decrypted in 188 hv_ringbuffer_init() must also include the "decrypted" attribute. 214 Linux kernel DMA APIs, and so bounce buffering through decrypted swiotlb 218 receive buffers are marked decrypted by __vmbus_establish_gpadl(). Because 220 equivalent of bounce buffering between encrypted and decrypted memory is [all …]
|
| /linux-6.15/drivers/uio/ |
| H A D | uio_hv_generic.c | 182 if (!pdata->send_gpadl.decrypted) in hv_uio_cleanup() 188 if (!pdata->recv_gpadl.decrypted) in hv_uio_cleanup() 296 if (!pdata->recv_gpadl.decrypted) in hv_uio_probe() 318 if (!pdata->send_gpadl.decrypted) in hv_uio_probe()
|
| /linux-6.15/Documentation/networking/ |
| H A D | tls.rst | 103 are decrypted using TLS parameters provided. A full TLS record must 111 Received data is decrypted directly in to the user buffer if it is 113 buffer is too small, data is decrypted in the kernel and copied to 272 to be decrypted directly into user space buffers with TLS 1.3. 277 If the record decrypted turns out to had been padded or is not a data 278 record it will be decrypted again into a kernel buffer without zero copy. 308 number of RX records which had to be re-decrypted due to 313 number of data RX records which had to be re-decrypted due to
|
| H A D | tls-offload.rst | 55 successfully, the driver will set the decrypted bit in the associated 60 If device decrypted all the segments of the record the decryption is skipped, 187 the :c:member:`decrypted` mark in :c:type:`struct sk_buff <sk_buff>` 188 corresponding to the segment. Networking stack makes sure decrypted 275 Green segments are successfully decrypted, blue ones are passed 278 In above case segment 1 is received and decrypted successfully. 289 even though two segments did not get decrypted. 342 whenever it sees the records are no longer getting decrypted. 390 have the :c:member:`decrypted` mark set. 431 which were successfully decrypted. [all …]
|
| /linux-6.15/drivers/hv/ |
| H A D | channel.c | 157 if (!channel->ringbuffer_gpadlhandle.decrypted) in vmbus_free_ring() 442 gpadl->decrypted = false; in __vmbus_establish_gpadl() 452 gpadl->decrypted = true; in __vmbus_establish_gpadl() 548 gpadl->decrypted = false; in __vmbus_establish_gpadl() 870 gpadl->decrypted = ret; in vmbus_teardown_gpadl()
|
| /linux-6.15/Documentation/security/keys/ |
| H A D | trusted-encrypted.rst | 133 New keys are created from random numbers. They are encrypted/decrypted using 171 random numbers or user-provided decrypted data, and are encrypted/decrypted 281 The decrypted portion of encrypted keys can contain either a simple symmetric 290 decrypted-data" ring 395 Instantiate an encrypted key "evm" using user-provided decrypted data::
|
| /linux-6.15/fs/crypto/ |
| H A D | Kconfig | 14 decrypted pages in the page cache. Currently Ext4,
|
| /linux-6.15/drivers/net/wireless/realtek/rtw88/ |
| H A D | rx.c | 212 if (pkt_stat->decrypted) in rtw_rx_fill_rx_status() 285 pkt_stat->decrypted = !swdec && enc_type != RX_DESC_ENC_NONE; in rtw_rx_query_rx_desc()
|
| /linux-6.15/net/tipc/ |
| H A D | Kconfig | 48 All TIPC messages will be encrypted/decrypted by using the currently most
|
| /linux-6.15/drivers/net/wireless/realtek/rtlwifi/rtl8192cu/ |
| H A D | trx.c | 306 stats->decrypted = !get_rx_desc_swdec(pdesc); in rtl92cu_rx_query_desc() 326 if (stats->decrypted) in rtl92cu_rx_query_desc() 374 stats.decrypted = !get_rx_desc_swdec(rxdesc); in _rtl_rx_process()
|
| /linux-6.15/Documentation/ABI/testing/ |
| H A D | securityfs-secrets-coco | 11 by the Guest Owner and decrypted inside the trusted enclave,
|
| /linux-6.15/drivers/net/wireless/realtek/rtlwifi/rtl8192d/ |
| H A D | trx_common.c | 399 stats->decrypted = !get_rx_desc_swdec(pdesc) && in rtl92d_rx_query_desc() 418 if (stats->decrypted) in rtl92d_rx_query_desc()
|
| /linux-6.15/drivers/net/wireless/realtek/rtlwifi/rtl8723ae/ |
| H A D | trx.c | 277 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl8723e_rx_query_desc() 314 if (status->decrypted) { in rtl8723e_rx_query_desc()
|
| /linux-6.15/drivers/net/wireless/realtek/rtlwifi/rtl8192se/ |
| H A D | trx.c | 248 stats->decrypted = !get_rx_status_desc_swdec(pdesc); in rtl92se_rx_query_desc() 284 if (stats->decrypted) { in rtl92se_rx_query_desc()
|
| /linux-6.15/drivers/net/wireless/realtek/rtlwifi/rtl8192ce/ |
| H A D | trx.c | 274 stats->decrypted = !get_rx_desc_swdec(p_desc); in rtl92ce_rx_query_desc() 311 if (stats->decrypted) { in rtl92ce_rx_query_desc()
|
| /linux-6.15/Documentation/virt/kvm/s390/ |
| H A D | s390-pv-boot.rst | 60 and initrd. The components are decrypted by the UV.
|
| /linux-6.15/arch/x86/kernel/ |
| H A D | vmlinux.lds.S | 82 *(.bss..decrypted); \
|
| /linux-6.15/drivers/net/wireless/realtek/rtlwifi/rtl8723be/ |
| H A D | trx.c | 313 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl8723be_rx_query_desc() 369 if (status->decrypted) { in rtl8723be_rx_query_desc()
|
| /linux-6.15/include/asm-generic/ |
| H A D | vmlinux.lds.h | 357 *(.data..decrypted) \ 990 *(.data..percpu..decrypted) \
|
| /linux-6.15/Documentation/security/secrets/ |
| H A D | coco.rst | 64 Host can't read the decrypted content from memory because it's a
|