/linux/net/tls/ |
A D | trace.h | 47 bool encrypted, bool decrypted), 49 TP_ARGS(sk, tcp_seq, rec_no, rec_len, encrypted, decrypted), 57 __field( bool, decrypted ) 66 __entry->decrypted = decrypted; 73 __entry->encrypted, __entry->decrypted
|
A D | tls_device.c | 903 if (skb->decrypted) { in tls_device_reencrypt() 930 if (skb_iter->decrypted) { in tls_device_reencrypt() 951 int is_decrypted = skb->decrypted; in tls_device_decrypted() 957 is_decrypted &= skb_iter->decrypted; in tls_device_decrypted() 958 is_encrypted &= !skb_iter->decrypted; in tls_device_decrypted() 965 ctx->sw.decrypted |= is_decrypted; in tls_device_decrypted()
|
A D | tls_sw.c | 1568 if (!ctx->decrypted) { in decrypt_skb_update() 1576 if (!ctx->decrypted) { in decrypt_skb_update() 1600 ctx->decrypted = 1; in decrypt_skb_update() 1763 ssize_t decrypted = 0; in tls_sw_recvmsg() local 1818 decrypted += ret; in tls_sw_recvmsg() 1928 decrypted += chunk; in tls_sw_recvmsg() 1963 decrypted = 0; in tls_sw_recvmsg() 1978 decrypted, false, is_peek); in tls_sw_recvmsg() 1981 decrypted, true, is_peek); in tls_sw_recvmsg() 1989 copied += decrypted; in tls_sw_recvmsg() [all …]
|
/linux/Documentation/networking/ |
A D | tls-offload.rst | 55 successfully, the driver will set the decrypted bit in the associated 60 If device decrypted all the segments of the record the decryption is skipped, 186 the :c:member:`decrypted` mark in :c:type:`struct sk_buff <sk_buff>` 187 corresponding to the segment. Networking stack makes sure decrypted 274 Green segments are successfully decrypted, blue ones are passed 277 In above case segment 1 is received and decrypted successfully. 288 even though two segments did not get decrypted. 341 whenever it sees the records are no longer getting decrypted. 389 have the :c:member:`decrypted` mark set. 430 which were successfully decrypted. [all …]
|
A D | tls.rst | 103 are decrypted using TLS parameters provided. A full TLS record must 111 Received data is decrypted directly in to the user buffer if it is 113 buffer is too small, data is decrypted in the kernel and copied to
|
/linux/net/ipv4/ |
A D | tcp_offload.c | 263 flush |= p->decrypted ^ skb->decrypted; in tcp_gro_receive()
|
/linux/Documentation/x86/ |
A D | amd-memory-encryption.rst | 12 automatically decrypted when read from DRAM and encrypted when written to 17 of the guest VM are secured so that a decrypted version is available only
|
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192cu/ |
A D | trx.c | 299 stats->decrypted = !get_rx_desc_swdec(pdesc); in rtl92cu_rx_query_desc() 319 if (stats->decrypted) in rtl92cu_rx_query_desc() 367 stats.decrypted = !get_rx_desc_swdec(rxdesc); in _rtl_rx_process()
|
/linux/fs/crypto/ |
A D | Kconfig | 13 decrypted pages in the page cache. Currently Ext4,
|
/linux/net/tipc/ |
A D | Kconfig | 47 All TIPC messages will be encrypted/decrypted by using the currently most
|
/linux/Documentation/security/keys/ |
A D | trusted-encrypted.rst | 91 are encrypted/decrypted using a child key in the storage key hierarchy. 111 numbers, and are encrypted/decrypted using a specified ‘master’ key. The 194 The decrypted portion of encrypted keys can contain either a simple symmetric
|
/linux/drivers/net/wireless/realtek/rtw88/ |
A D | rx.c | 155 if (pkt_stat->decrypted) in rtw_rx_fill_rx_status()
|
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192se/ |
A D | trx.c | 248 stats->decrypted = !get_rx_status_desc_swdec(pdesc); in rtl92se_rx_query_desc() 284 if (stats->decrypted) { in rtl92se_rx_query_desc()
|
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8723ae/ |
A D | trx.c | 277 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl8723e_rx_query_desc() 314 if (status->decrypted) { in rtl8723e_rx_query_desc()
|
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192ce/ |
A D | trx.c | 274 stats->decrypted = !get_rx_desc_swdec(p_desc); in rtl92ce_rx_query_desc() 311 if (stats->decrypted) { in rtl92ce_rx_query_desc()
|
/linux/arch/x86/kernel/ |
A D | vmlinux.lds.S | 83 *(.bss..decrypted); \
|
/linux/include/asm-generic/ |
A D | vmlinux.lds.h | 986 *(.data..decrypted) \ 987 *(.data..percpu..decrypted) \
|
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8723be/ |
A D | trx.c | 313 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl8723be_rx_query_desc() 369 if (status->decrypted) { in rtl8723be_rx_query_desc()
|
/linux/Documentation/virt/kvm/ |
A D | s390-pv-boot.rst | 60 and initrd. The components are decrypted by the UV.
|
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8188ee/ |
A D | trx.c | 390 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl88ee_rx_query_desc() 441 if (status->decrypted) { in rtl88ee_rx_query_desc()
|
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192de/ |
A D | trx.c | 417 stats->decrypted = !get_rx_desc_swdec(pdesc); in rtl92de_rx_query_desc() 437 if (stats->decrypted) in rtl92de_rx_query_desc()
|
/linux/security/keys/ |
A D | Kconfig | 102 which are encrypted/decrypted with a 'master' symmetric key. The
|
/linux/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
A D | tls_rxtx.c | 358 skb->decrypted = 1; in mlx5e_tls_handle_rx_skb_metadata()
|
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8192ee/ |
A D | trx.c | 350 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl92ee_rx_query_desc() 394 if (status->decrypted) { in rtl92ee_rx_query_desc()
|
/linux/drivers/net/wireless/realtek/rtlwifi/rtl8821ae/ |
A D | trx.c | 450 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl8821ae_rx_query_desc() 521 if (status->decrypted) { in rtl8821ae_rx_query_desc()
|