Lines Matching full:encryption
26 * absolute minimum, which applies when only 128-bit encryption is used.
56 * fscrypt_context - the encryption context of an inode
60 * fields from the fscrypt_policy, in order to identify the encryption algorithm
129 /* Return the contents encryption mode of a valid encryption policy */
142 /* Return the filenames encryption mode of a valid encryption policy */
155 /* Return the flags (FSCRYPT_POLICY_FLAG*) of a valid encryption policy */
178 * struct fscrypt_prepared_key - a key prepared for actual encryption/decryption
192 * fscrypt_info - the "encryption key" for an inode
200 /* The key in a form prepared for actual encryption/decryption */
208 * True if this inode will use inline encryption (blk-crypto) instead of
209 * the traditional filesystem-layer encryption.
215 * Encryption mode used for this inode. It corresponds to either the
216 * contents or filenames encryption mode, depending on the inode type.
237 * If non-NULL, then encryption is done using the master key directly
250 /* The encryption policy used by this inode */
352 * @prep_key, depending on which encryption implementation the file will use.
362 * encryption key) another task can publish blk_key or tfm concurrently, in fscrypt_is_key_prepared()
435 * This represents a master encryption key which has been added to the
521 * Per-mode encryption keys for the various types of encryption policies
619 * fscrypt_require_key() - require an inode's encryption key
622 * If the inode is encrypted, set up its encryption key if not already done.
629 * if a problem occurred while setting up the encryption key.