Home
last modified time | relevance | path

Searched refs:decrypted (Results 1 – 25 of 64) sorted by relevance

123

/linux/net/tls/
H A Dtrace.h47 bool encrypted, bool decrypted),
49 TP_ARGS(sk, tcp_seq, rec_no, rec_len, encrypted, decrypted),
57 __field( bool, decrypted )
66 __entry->decrypted = decrypted;
73 __entry->encrypted, __entry->decrypted
H A Dtls_sw.c1953 size_t len_left, size_t decrypted, ssize_t done, in tls_read_flush_backlog() argument
1958 if (len_left <= decrypted) in tls_read_flush_backlog()
2041 ssize_t decrypted = 0, async_copy_bytes = 0; in tls_sw_recvmsg() local
2088 decrypted = 0; in tls_sw_recvmsg()
2089 while (len && (decrypted + copied < target || tls_strp_msg_ready(ctx))) { in tls_sw_recvmsg()
2100 decrypted += chunk; in tls_sw_recvmsg()
2151 decrypted + copied, in tls_sw_recvmsg()
2170 decrypted += chunk; in tls_sw_recvmsg()
2212 decrypted += chunk; in tls_sw_recvmsg()
2239 decrypted - peeked, is_peek, NULL); in tls_sw_recvmsg()
[all …]
/linux/net/mac80211/tests/
H A Dmfp.c16 bool sta, mfp, decrypted, unicast, assoc; member
137 .decrypted = true,
148 .decrypted = true,
232 KUNIT_ASSERT_FALSE(test, params->decrypted); in accept_mfp()
245 if (params->decrypted) { in accept_mfp()
/linux/security/keys/
H A DKconfig94 generated random numbers or provided decrypted data, and are
95 encrypted/decrypted with a 'master' symmetric key. The 'master'
102 bool "Allow encrypted keys with user decrypted data"
106 user-provided decrypted data. The decrypted data must be hex-ascii
/linux/drivers/uio/
H A Duio_hv_generic.c199 if (!pdata->send_gpadl.decrypted) in hv_uio_cleanup()
205 if (!pdata->recv_gpadl.decrypted) in hv_uio_cleanup()
314 if (!pdata->recv_gpadl.decrypted) in hv_uio_probe()
336 if (!pdata->send_gpadl.decrypted) in hv_uio_probe()
/linux/Documentation/virt/hyperv/
H A Dcoco.rst106 appropriate ranges as decrypted (shared). In paravisor mode, Linux does not
134 of the decrypted references that would be used in a fully-enlightened CoCo
140 memory between encrypted and decrypted requires coordinating with the
173 marked decrypted to enable communication. Furthermore, since the threat model
177 These Hyper-V and VMBus memory pages are marked as decrypted:
186 * VMBus ring buffers. The direct mapping is marked decrypted in
188 hv_ringbuffer_init() must also include the "decrypted" attribute.
214 Linux kernel DMA APIs, and so bounce buffering through decrypted swiotlb
218 receive buffers are marked decrypted by __vmbus_establish_gpadl(). Because
220 equivalent of bounce buffering between encrypted and decrypted memory is
[all …]
/linux/Documentation/networking/
H A Dtls.rst105 are decrypted using TLS parameters provided. A full TLS record must
113 Received data is decrypted directly in to the user buffer if it is
115 buffer is too small, data is decrypted in the kernel and copied to
274 to be decrypted directly into user space buffers with TLS 1.3.
279 If the record decrypted turns out to had been padded or is not a data
280 record it will be decrypted again into a kernel buffer without zero copy.
330 number of RX records which had to be re-decrypted due to
335 number of data RX records which had to be re-decrypted due to
H A Dtls-offload.rst55 successfully, the driver will set the decrypted bit in the associated
60 If device decrypted all the segments of the record the decryption is skipped,
187 the :c:member:`decrypted` mark in :c:type:`struct sk_buff <sk_buff>`
188 corresponding to the segment. Networking stack makes sure decrypted
189 and non-decrypted segments do not get coalesced (e.g. by GRO or socket layer)
275 Green segments are successfully decrypted, blue ones are passed
278 In above case segment 1 is received and decrypted successfully.
289 even though two segments did not get decrypted.
372 whenever it sees the records are no longer getting decrypted.
420 have the :c:member:`decrypted` mark set.
[all …]
H A Dpsp.rst173 the ``SKB_EXT_PSP`` skb extension, and set the skb->decrypted bit to 1.
179 offload, with per-socket state, and the use of skb->decrypted to prevent
/linux/drivers/hv/
H A Dchannel.c158 if (!channel->ringbuffer_gpadlhandle.decrypted) in vmbus_free_ring()
458 gpadl->decrypted = false; in __vmbus_establish_gpadl()
462 gpadl->decrypted = !((channel->co_external_memory && type == HV_GPADL_BUFFER) || in __vmbus_establish_gpadl()
464 if (gpadl->decrypted) { in __vmbus_establish_gpadl()
563 if (gpadl->decrypted) { in __vmbus_establish_gpadl()
565 gpadl->decrypted = false; in __vmbus_establish_gpadl()
884 if (gpadl->decrypted) in vmbus_teardown_gpadl()
892 gpadl->decrypted = ret; in vmbus_teardown_gpadl()
/linux/include/net/psp/
H A Dfunctions.h51 skb->decrypted = 1; in psp_enqueue_set_decrypted()
144 if (!skb->decrypted || !skb->sk) in psp_skb_get_assoc_rcu()
/linux/Documentation/security/keys/
H A Dtrusted-encrypted.rst31 protected keys is encrypted with Key-Encryption-Key(KEK), and decrypted inside
190 New keys are created from random numbers. They are encrypted/decrypted using
232 random numbers or user-provided decrypted data, and are encrypted/decrypted
377 The decrypted portion of encrypted keys can contain either a simple symmetric
386 decrypted-data" ring
531 Instantiate an encrypted key "evm" using user-provided decrypted data::
/linux/drivers/net/wireless/realtek/rtw88/
H A Drx.c212 if (pkt_stat->decrypted) in rtw_rx_fill_rx_status()
285 pkt_stat->decrypted = !swdec && enc_type != RX_DESC_ENC_NONE; in rtw_rx_query_rx_desc()
/linux/fs/crypto/
H A DKconfig13 decrypted pages in the page cache. Currently Ext4,
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192cu/
H A Dtrx.c306 stats->decrypted = !get_rx_desc_swdec(pdesc); in rtl92cu_rx_query_desc()
326 if (stats->decrypted) in rtl92cu_rx_query_desc()
374 stats.decrypted = !get_rx_desc_swdec(rxdesc); in _rtl_rx_process()
/linux/net/tipc/
H A DKconfig48 All TIPC messages will be encrypted/decrypted by using the currently most
/linux/drivers/net/ethernet/mellanox/mlx5/core/en_accel/
H A Dpsp_rxtx.c138 skb->decrypted = 1; in mlx5e_psp_offload_handle_rx_skb()
/linux/Documentation/ABI/testing/
H A Dsecurityfs-secrets-coco11 by the Guest Owner and decrypted inside the trusted enclave,
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192d/
H A Dtrx_common.c399 stats->decrypted = !get_rx_desc_swdec(pdesc) && in rtl92d_rx_query_desc()
418 if (stats->decrypted) in rtl92d_rx_query_desc()
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192ce/
H A Dtrx.c274 stats->decrypted = !get_rx_desc_swdec(p_desc); in rtl92ce_rx_query_desc()
311 if (stats->decrypted) { in rtl92ce_rx_query_desc()
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8723ae/
H A Dtrx.c277 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl8723e_rx_query_desc()
314 if (status->decrypted) { in rtl8723e_rx_query_desc()
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192se/
H A Dtrx.c248 stats->decrypted = !get_rx_status_desc_swdec(pdesc); in rtl92se_rx_query_desc()
284 if (stats->decrypted) { in rtl92se_rx_query_desc()
/linux/drivers/net/netdevsim/
H A Dpsp.c72 skb->decrypted = 1; in nsim_do_psp()
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8723be/
H A Dtrx.c313 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl8723be_rx_query_desc()
369 if (status->decrypted) { in rtl8723be_rx_query_desc()
/linux/net/psp/
H A Dpsp_sock.c291 skb->decrypted = 1; in psp_reply_set_decrypted()

123