Home
last modified time | relevance | path

Searched refs:unencrypted (Results 1 – 16 of 16) sorted by relevance

/linux/crypto/asymmetric_keys/
H A Dpkcs8.asn18 -- This is the unencrypted variant
/linux/Documentation/virt/kvm/s390/
H A Ds390-pv-dump.rst46 write out the encrypted vcpu state, but also the unencrypted state
/linux/Documentation/filesystems/
H A Decryptfs.rst36 eCryptfs, you should copy the files to an unencrypted location and
H A Dfscrypt.rst27 with different keys and to have unencrypted files on the same
38 line with unencrypted files. Similarly, half as many dentries and
721 - ``ENOTDIR``: the file is unencrypted and is a regular file, not a
723 - ``ENOTEMPTY``: the file is unencrypted and is a nonempty directory
828 On unencrypted files and directories, it fails with ENODATA.
1206 symlinks behave very similarly to their unencrypted counterparts ---
1215 into an unencrypted directory.
1217 Note: "moving" an unencrypted file into an encrypted directory, e.g.
1219 followed by a delete. Be aware that the original unencrypted data
1242 the maximum length of an unencrypted symlink. For example, on an
[all …]
/linux/net/wireless/
H A Dtrace.h2226 bool unencrypted, int link_id),
2227 TP_ARGS(wiphy, netdev, buf, len, dest, proto, unencrypted, link_id),
2233 __field(bool, unencrypted)
2241 __entry->unencrypted = unencrypted;
2248 BOOL_TO_STR(__entry->unencrypted),
3420 bool unencrypted, int link_id),
3421 TP_ARGS(netdev, skb, unencrypted, link_id),
3427 __field(bool, unencrypted)
3435 __entry->unencrypted = unencrypted;
3440 __entry->proto, BOOL_TO_STR(__entry->unencrypted),
H A Dnl80211.c20666 bool unencrypted, in __nl80211_rx_control_port() argument
20702 (unencrypted && nla_put_flag(msg, in __nl80211_rx_control_port()
20721 bool unencrypted, int link_id) in cfg80211_rx_control_port() argument
20725 trace_cfg80211_rx_control_port(dev, skb, unencrypted, link_id); in cfg80211_rx_control_port()
20726 ret = __nl80211_rx_control_port(dev, skb, unencrypted, link_id, in cfg80211_rx_control_port()
/linux/Documentation/power/
H A Dswsusp-dmcrypt.rst64 /dev/hda1 contains an unencrypted mini system that sets up all
/linux/Documentation/core-api/
H A Dswiotlb.rst40 directed to guest memory that is unencrypted. CoCo VMs set a kernel-wide option
42 up as unencrypted. The host does DMA I/O to/from the bounce buffer memory, and
45 the unencrypted and the encrypted memory. This use of bounce buffers allows
/linux/Documentation/networking/
H A Dtls.rst163 Control message data should be provided unencrypted, and will be
/linux/Documentation/arch/x86/
H A Dintel_txt.rst221 (unencrypted) module signed by Intel that is used as part of the
/linux/Documentation/block/
H A Dinline-encryption.rst122 unencrypted, or both encrypted with the same key and contiguous data unit
164 encryption context. Therefore, lower layers only see standard unencrypted I/O.
/linux/Documentation/virt/hyperv/
H A Dcoco.rst349 unencrypted (unless the device supports encrypted memory). Currently, there are
/linux/Documentation/admin-guide/
H A Dbcache.rst266 First setup bcache unencrypted and then install dmcrypt on top of
/linux/net/mac80211/
H A Dieee80211_i.h2170 const u8 *dest, __be16 proto, bool unencrypted,
H A Dtx.c6326 const u8 *dest, __be16 proto, bool unencrypted, in ieee80211_tx_control_port() argument
6352 if (unencrypted) in ieee80211_tx_control_port()
/linux/include/net/
H A Dcfg80211.h9219 bool unencrypted, int link_id);