| /Linux-v5.4/Documentation/networking/ |
| D | tls-offload.rst | 55 successfully, the driver will set the decrypted bit in the associated 60 If device decrypted all the segments of the record the decryption is skipped, 186 the :c:member:`decrypted` mark in :c:type:`struct sk_buff <sk_buff>` 187 corresponding to the segment. Networking stack makes sure decrypted 188 and non-decrypted segments do not get coalesced (e.g. by GRO or socket layer) 274 Green segments are successfully decrypted, blue ones are passed 277 In above case segment 1 is received and decrypted successfully. 288 even though two segments did not get decrypted. 341 whenever it sees the records are no longer getting decrypted. 389 have the :c:member:`decrypted` mark set. [all …]
|
| D | tls.rst | 103 are decrypted using TLS parameters provided. A full TLS record must 111 Received data is decrypted directly in to the user buffer if it is 113 buffer is too small, data is decrypted in the kernel and copied to
|
| D | xfrm_device.txt | 104 the packet's skb. At this point the data should be decrypted but the
|
| /Linux-v5.4/fs/crypto/ |
| D | Kconfig | 17 decrypted pages in the page cache. Currently Ext4,
|
| /Linux-v5.4/net/tls/ |
| D | tls_sw.c | 1493 if (!ctx->decrypted) { in decrypt_skb_update() 1501 if (!ctx->decrypted) { in decrypt_skb_update() 1523 ctx->decrypted = true; in decrypt_skb_update() 1686 ssize_t decrypted = 0; in tls_sw_recvmsg() local 1723 while (len && (decrypted + copied < target || ctx->recv_pkt)) { in tls_sw_recvmsg() 1738 decrypted += ret; in tls_sw_recvmsg() 1834 decrypted += chunk; in tls_sw_recvmsg() 1866 decrypted = 0; in tls_sw_recvmsg() 1877 decrypted, false, is_peek); in tls_sw_recvmsg() 1880 decrypted, true, is_peek); in tls_sw_recvmsg() [all …]
|
| D | tls_device.c | 793 if (skb->decrypted) { in tls_device_reencrypt() 820 if (skb_iter->decrypted) { in tls_device_reencrypt() 841 int is_decrypted = skb->decrypted; in tls_device_decrypted() 847 is_decrypted &= skb_iter->decrypted; in tls_device_decrypted() 848 is_encrypted &= !skb_iter->decrypted; in tls_device_decrypted() 851 ctx->sw.decrypted |= is_decrypted; in tls_device_decrypted()
|
| /Linux-v5.4/net/ipv4/ |
| D | tcp_offload.c | 263 flush |= p->decrypted ^ skb->decrypted; in tcp_gro_receive()
|
| /Linux-v5.4/Documentation/x86/ |
| D | amd-memory-encryption.rst | 12 automatically decrypted when read from DRAM and encrypted when written to 17 of the guest VM are secured so that a decrypted version is available only
|
| /Linux-v5.4/drivers/net/wireless/realtek/rtlwifi/rtl8192cu/ |
| D | trx.c | 299 stats->decrypted = !get_rx_desc_swdec(pdesc); in rtl92cu_rx_query_desc() 319 if (stats->decrypted) in rtl92cu_rx_query_desc() 367 stats.decrypted = !get_rx_desc_swdec(rxdesc); in _rtl_rx_process()
|
| /Linux-v5.4/drivers/net/wireless/realtek/rtw88/ |
| D | rx.c | 100 if (pkt_stat->decrypted) in rtw_rx_fill_rx_status()
|
| /Linux-v5.4/arch/x86/kernel/ |
| D | vmlinux.lds.S | 79 *(.bss..decrypted); \
|
| /Linux-v5.4/Documentation/security/keys/ |
| D | trusted-encrypted.rst | 84 numbers, and are encrypted/decrypted using a specified 'master' key. The 91 The decrypted portion of encrypted keys can contain either a simple symmetric
|
| /Linux-v5.4/drivers/net/wireless/realtek/rtlwifi/rtl8192se/ |
| D | trx.c | 248 stats->decrypted = !GET_RX_STATUS_DESC_SWDEC(pdesc); in rtl92se_rx_query_desc() 284 if (stats->decrypted) { in rtl92se_rx_query_desc()
|
| /Linux-v5.4/drivers/net/wireless/realtek/rtlwifi/rtl8723ae/ |
| D | trx.c | 277 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl8723e_rx_query_desc() 314 if (status->decrypted) { in rtl8723e_rx_query_desc()
|
| /Linux-v5.4/drivers/net/wireless/realtek/rtlwifi/rtl8723be/ |
| D | trx.c | 315 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl8723be_rx_query_desc() 371 if (status->decrypted) { in rtl8723be_rx_query_desc()
|
| /Linux-v5.4/drivers/net/wireless/realtek/rtlwifi/rtl8192ce/ |
| D | trx.c | 314 stats->decrypted = !get_rx_desc_swdec(p_desc); in rtl92ce_rx_query_desc() 351 if (stats->decrypted) { in rtl92ce_rx_query_desc()
|
| /Linux-v5.4/security/keys/ |
| D | Kconfig | 105 which are encrypted/decrypted with a 'master' symmetric key. The
|
| /Linux-v5.4/drivers/net/wireless/realtek/rtlwifi/rtl8188ee/ |
| D | trx.c | 390 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl88ee_rx_query_desc() 441 if (status->decrypted) { in rtl88ee_rx_query_desc()
|
| /Linux-v5.4/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
| D | tls_rxtx.c | 368 skb->decrypted = 1; in mlx5e_tls_handle_rx_skb()
|
| /Linux-v5.4/drivers/net/wireless/realtek/rtlwifi/rtl8192de/ |
| D | trx.c | 454 stats->decrypted = !GET_RX_DESC_SWDEC(pdesc); in rtl92de_rx_query_desc() 474 if (stats->decrypted) in rtl92de_rx_query_desc()
|
| /Linux-v5.4/drivers/net/wireless/realtek/rtlwifi/rtl8821ae/ |
| D | trx.c | 450 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl8821ae_rx_query_desc() 521 if (status->decrypted) { in rtl8821ae_rx_query_desc()
|
| /Linux-v5.4/drivers/net/wireless/realtek/rtlwifi/rtl8192ee/ |
| D | trx.c | 350 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl92ee_rx_query_desc() 394 if (status->decrypted) { in rtl92ee_rx_query_desc()
|
| /Linux-v5.4/include/net/ |
| D | tls.h | 179 bool decrypted; member
|
| /Linux-v5.4/include/asm-generic/ |
| D | vmlinux.lds.h | 847 *(.data..percpu..decrypted) \
|
| /Linux-v5.4/fs/cifs/ |
| D | smb2transport.c | 665 if (len > 24 && server->sign && !mid->decrypted) { in smb2_check_receive()
|