/linux-5.19.10/net/tls/ |
D | trace.h | 47 bool encrypted, bool decrypted), 49 TP_ARGS(sk, tcp_seq, rec_no, rec_len, encrypted, decrypted), 57 __field( bool, decrypted ) 66 __entry->decrypted = decrypted; 73 __entry->encrypted, __entry->decrypted
|
D | tls_sw.c | 1560 if (tlm->decrypted) { in decrypt_skb_update() 1571 tlm->decrypted = 1; in decrypt_skb_update() 1595 tlm->decrypted = 1; in decrypt_skb_update() 1731 ssize_t decrypted = 0; in tls_sw_recvmsg() local 1771 decrypted = 0; in tls_sw_recvmsg() 1772 while (len && (decrypted + copied < target || ctx->recv_pkt)) { in tls_sw_recvmsg() 1829 decrypted += chunk; in tls_sw_recvmsg() 1871 decrypted += chunk; in tls_sw_recvmsg() 1899 decrypted = 0; in tls_sw_recvmsg() 1907 decrypted, false, is_peek); in tls_sw_recvmsg() [all …]
|
D | tls_device.c | 934 if (skb->decrypted) { in tls_device_reencrypt() 961 if (skb_iter->decrypted) { in tls_device_reencrypt() 982 int is_decrypted = skb->decrypted; in tls_device_decrypted() 988 is_decrypted &= skb_iter->decrypted; in tls_device_decrypted() 989 is_encrypted &= !skb_iter->decrypted; in tls_device_decrypted()
|
/linux-5.19.10/security/keys/ |
D | Kconfig | 98 generated random numbers or provided decrypted data, and are 99 encrypted/decrypted with a 'master' symmetric key. The 'master' 106 bool "Allow encrypted keys with user decrypted data" 110 user-provided decrypted data. The decrypted data must be hex-ascii
|
/linux-5.19.10/Documentation/networking/ |
D | tls-offload.rst | 55 successfully, the driver will set the decrypted bit in the associated 60 If device decrypted all the segments of the record the decryption is skipped, 186 the :c:member:`decrypted` mark in :c:type:`struct sk_buff <sk_buff>` 187 corresponding to the segment. Networking stack makes sure decrypted 188 and non-decrypted segments do not get coalesced (e.g. by GRO or socket layer) 274 Green segments are successfully decrypted, blue ones are passed 277 In above case segment 1 is received and decrypted successfully. 288 even though two segments did not get decrypted. 341 whenever it sees the records are no longer getting decrypted. 389 have the :c:member:`decrypted` mark set. [all …]
|
D | tls.rst | 103 are decrypted using TLS parameters provided. A full TLS record must 111 Received data is decrypted directly in to the user buffer if it is 113 buffer is too small, data is decrypted in the kernel and copied to
|
/linux-5.19.10/Documentation/security/keys/ |
D | trusted-encrypted.rst | 109 New keys are created from random numbers. They are encrypted/decrypted using 140 random numbers or user-provided decrypted data, and are encrypted/decrypted 237 The decrypted portion of encrypted keys can contain either a simple symmetric 246 decrypted-data" ring 351 Instantiate an encrypted key "evm" using user-provided decrypted data::
|
/linux-5.19.10/net/ipv4/ |
D | tcp_offload.c | 264 flush |= p->decrypted ^ skb->decrypted; in tcp_gro_receive()
|
/linux-5.19.10/include/net/ |
D | strparser.h | 75 u8 decrypted; member
|
/linux-5.19.10/fs/crypto/ |
D | Kconfig | 13 decrypted pages in the page cache. Currently Ext4,
|
/linux-5.19.10/Documentation/x86/ |
D | amd-memory-encryption.rst | 12 automatically decrypted when read from DRAM and encrypted when written to 17 of the guest VM are secured so that a decrypted version is available only
|
/linux-5.19.10/net/tipc/ |
D | Kconfig | 47 All TIPC messages will be encrypted/decrypted by using the currently most
|
/linux-5.19.10/drivers/net/wireless/realtek/rtlwifi/rtl8192cu/ |
D | trx.c | 299 stats->decrypted = !get_rx_desc_swdec(pdesc); in rtl92cu_rx_query_desc() 319 if (stats->decrypted) in rtl92cu_rx_query_desc() 367 stats.decrypted = !get_rx_desc_swdec(rxdesc); in _rtl_rx_process()
|
/linux-5.19.10/Documentation/ABI/testing/ |
D | securityfs-secrets-coco | 11 by the Guest Owner and decrypted inside the trusted enclave,
|
/linux-5.19.10/drivers/net/wireless/realtek/rtw88/ |
D | rx.c | 166 if (pkt_stat->decrypted) in rtw_rx_fill_rx_status()
|
/linux-5.19.10/drivers/net/wireless/realtek/rtlwifi/rtl8192se/ |
D | trx.c | 248 stats->decrypted = !get_rx_status_desc_swdec(pdesc); in rtl92se_rx_query_desc() 284 if (stats->decrypted) { in rtl92se_rx_query_desc()
|
/linux-5.19.10/drivers/net/wireless/realtek/rtlwifi/rtl8723ae/ |
D | trx.c | 277 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl8723e_rx_query_desc() 314 if (status->decrypted) { in rtl8723e_rx_query_desc()
|
/linux-5.19.10/drivers/net/wireless/realtek/rtlwifi/rtl8192ce/ |
D | trx.c | 274 stats->decrypted = !get_rx_desc_swdec(p_desc); in rtl92ce_rx_query_desc() 311 if (stats->decrypted) { in rtl92ce_rx_query_desc()
|
/linux-5.19.10/arch/x86/kernel/ |
D | vmlinux.lds.S | 83 *(.bss..decrypted); \
|
/linux-5.19.10/Documentation/virt/kvm/s390/ |
D | s390-pv-boot.rst | 60 and initrd. The components are decrypted by the UV.
|
/linux-5.19.10/include/asm-generic/ |
D | vmlinux.lds.h | 979 *(.data..decrypted) \ 980 *(.data..percpu..decrypted) \
|
/linux-5.19.10/drivers/net/wireless/realtek/rtlwifi/rtl8723be/ |
D | trx.c | 313 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl8723be_rx_query_desc() 369 if (status->decrypted) { in rtl8723be_rx_query_desc()
|
/linux-5.19.10/Documentation/security/secrets/ |
D | coco.rst | 64 Host can't read the decrypted content from memory because it's a
|
/linux-5.19.10/drivers/net/wireless/realtek/rtlwifi/rtl8188ee/ |
D | trx.c | 390 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl88ee_rx_query_desc() 441 if (status->decrypted) { in rtl88ee_rx_query_desc()
|
/linux-5.19.10/drivers/net/wireless/realtek/rtlwifi/rtl8192de/ |
D | trx.c | 417 stats->decrypted = !get_rx_desc_swdec(pdesc); in rtl92de_rx_query_desc() 437 if (stats->decrypted) in rtl92de_rx_query_desc()
|