| /linux/crypto/asymmetric_keys/ |
| H A D | pkcs8.asn1 | 8 -- This is the unencrypted variant
|
| /linux/Documentation/virt/kvm/s390/ |
| H A D | s390-pv-dump.rst | 46 write out the encrypted vcpu state, but also the unencrypted state
|
| /linux/Documentation/filesystems/ |
| H A D | ecryptfs.rst | 36 eCryptfs, you should copy the files to an unencrypted location and
|
| H A D | fscrypt.rst | 27 with different keys and to have unencrypted files on the same 38 line with unencrypted files. Similarly, half as many dentries and 721 - ``ENOTDIR``: the file is unencrypted and is a regular file, not a 723 - ``ENOTEMPTY``: the file is unencrypted and is a nonempty directory 828 On unencrypted files and directories, it fails with ENODATA. 1206 symlinks behave very similarly to their unencrypted counterparts --- 1215 into an unencrypted directory. 1217 Note: "moving" an unencrypted file into an encrypted directory, e.g. 1219 followed by a delete. Be aware that the original unencrypted data 1242 the maximum length of an unencrypted symlink. For example, on an [all …]
|
| /linux/net/wireless/ |
| H A D | trace.h | 2226 bool unencrypted, int link_id), 2227 TP_ARGS(wiphy, netdev, buf, len, dest, proto, unencrypted, link_id), 2233 __field(bool, unencrypted) 2241 __entry->unencrypted = unencrypted; 2248 BOOL_TO_STR(__entry->unencrypted), 3420 bool unencrypted, int link_id), 3421 TP_ARGS(netdev, skb, unencrypted, link_id), 3427 __field(bool, unencrypted) 3435 __entry->unencrypted = unencrypted; 3440 __entry->proto, BOOL_TO_STR(__entry->unencrypted),
|
| H A D | nl80211.c | 20666 bool unencrypted, in __nl80211_rx_control_port() argument 20702 (unencrypted && nla_put_flag(msg, in __nl80211_rx_control_port() 20721 bool unencrypted, int link_id) in cfg80211_rx_control_port() argument 20725 trace_cfg80211_rx_control_port(dev, skb, unencrypted, link_id); in cfg80211_rx_control_port() 20726 ret = __nl80211_rx_control_port(dev, skb, unencrypted, link_id, in cfg80211_rx_control_port()
|
| /linux/Documentation/power/ |
| H A D | swsusp-dmcrypt.rst | 64 /dev/hda1 contains an unencrypted mini system that sets up all
|
| /linux/Documentation/core-api/ |
| H A D | swiotlb.rst | 40 directed to guest memory that is unencrypted. CoCo VMs set a kernel-wide option 42 up as unencrypted. The host does DMA I/O to/from the bounce buffer memory, and 45 the unencrypted and the encrypted memory. This use of bounce buffers allows
|
| /linux/Documentation/networking/ |
| H A D | tls.rst | 163 Control message data should be provided unencrypted, and will be
|
| /linux/Documentation/arch/x86/ |
| H A D | intel_txt.rst | 221 (unencrypted) module signed by Intel that is used as part of the
|
| /linux/Documentation/block/ |
| H A D | inline-encryption.rst | 122 unencrypted, or both encrypted with the same key and contiguous data unit 164 encryption context. Therefore, lower layers only see standard unencrypted I/O.
|
| /linux/Documentation/virt/hyperv/ |
| H A D | coco.rst | 349 unencrypted (unless the device supports encrypted memory). Currently, there are
|
| /linux/Documentation/admin-guide/ |
| H A D | bcache.rst | 266 First setup bcache unencrypted and then install dmcrypt on top of
|
| /linux/net/mac80211/ |
| H A D | ieee80211_i.h | 2170 const u8 *dest, __be16 proto, bool unencrypted,
|
| H A D | tx.c | 6326 const u8 *dest, __be16 proto, bool unencrypted, in ieee80211_tx_control_port() argument 6352 if (unencrypted) in ieee80211_tx_control_port()
|
| /linux/include/net/ |
| H A D | cfg80211.h | 9219 bool unencrypted, int link_id);
|