Home
last modified time | relevance | path

Searched refs:decrypted (Results 1 – 25 of 60) sorted by relevance

123

/Linux-v6.6/net/tls/
Dtrace.h47 bool encrypted, bool decrypted),
49 TP_ARGS(sk, tcp_seq, rec_no, rec_len, encrypted, decrypted),
57 __field( bool, decrypted )
66 __entry->decrypted = decrypted;
73 __entry->encrypted, __entry->decrypted
Dtls_sw.c1839 size_t len_left, size_t decrypted, ssize_t done, in tls_read_flush_backlog() argument
1844 if (len_left <= decrypted) in tls_read_flush_backlog()
1927 ssize_t decrypted = 0, async_copy_bytes = 0; in tls_sw_recvmsg() local
1970 decrypted = 0; in tls_sw_recvmsg()
1971 while (len && (decrypted + copied < target || tls_strp_msg_ready(ctx))) { in tls_sw_recvmsg()
1982 decrypted += chunk; in tls_sw_recvmsg()
2033 decrypted + copied, in tls_sw_recvmsg()
2052 decrypted += chunk; in tls_sw_recvmsg()
2090 decrypted += chunk; in tls_sw_recvmsg()
2118 decrypted = 0; in tls_sw_recvmsg()
[all …]
Dtls_device.c937 if (skb->decrypted) { in tls_device_reencrypt()
964 if (skb_iter->decrypted) { in tls_device_reencrypt()
990 is_decrypted = skb->decrypted; in tls_device_decrypted()
/Linux-v6.6/Documentation/networking/
Dtls.rst103 are decrypted using TLS parameters provided. A full TLS record must
111 Received data is decrypted directly in to the user buffer if it is
113 buffer is too small, data is decrypted in the kernel and copied to
246 to be decrypted directly into user space buffers with TLS 1.3.
251 If the record decrypted turns out to had been padded or is not a data
252 record it will be decrypted again into a kernel buffer without zero copy.
282 number of RX records which had to be re-decrypted due to
287 number of data RX records which had to be re-decrypted due to
Dtls-offload.rst55 successfully, the driver will set the decrypted bit in the associated
60 If device decrypted all the segments of the record the decryption is skipped,
186 the :c:member:`decrypted` mark in :c:type:`struct sk_buff <sk_buff>`
187 corresponding to the segment. Networking stack makes sure decrypted
188 and non-decrypted segments do not get coalesced (e.g. by GRO or socket layer)
274 Green segments are successfully decrypted, blue ones are passed
277 In above case segment 1 is received and decrypted successfully.
288 even though two segments did not get decrypted.
341 whenever it sees the records are no longer getting decrypted.
389 have the :c:member:`decrypted` mark set.
[all …]
/Linux-v6.6/security/keys/
DKconfig98 generated random numbers or provided decrypted data, and are
99 encrypted/decrypted with a 'master' symmetric key. The 'master'
106 bool "Allow encrypted keys with user decrypted data"
110 user-provided decrypted data. The decrypted data must be hex-ascii
/Linux-v6.6/Documentation/security/keys/
Dtrusted-encrypted.rst109 New keys are created from random numbers. They are encrypted/decrypted using
140 random numbers or user-provided decrypted data, and are encrypted/decrypted
237 The decrypted portion of encrypted keys can contain either a simple symmetric
246 decrypted-data" ring
351 Instantiate an encrypted key "evm" using user-provided decrypted data::
/Linux-v6.6/net/ipv4/
Dtcp_offload.c269 flush |= p->decrypted ^ skb->decrypted; in tcp_gro_receive()
/Linux-v6.6/fs/crypto/
DKconfig13 decrypted pages in the page cache. Currently Ext4,
/Linux-v6.6/net/tipc/
DKconfig47 All TIPC messages will be encrypted/decrypted by using the currently most
/Linux-v6.6/Documentation/arch/x86/
Damd-memory-encryption.rst12 automatically decrypted when read from DRAM and encrypted when written to
17 of the guest VM are secured so that a decrypted version is available only
/Linux-v6.6/drivers/net/wireless/realtek/rtlwifi/rtl8192cu/
Dtrx.c299 stats->decrypted = !get_rx_desc_swdec(pdesc); in rtl92cu_rx_query_desc()
319 if (stats->decrypted) in rtl92cu_rx_query_desc()
367 stats.decrypted = !get_rx_desc_swdec(rxdesc); in _rtl_rx_process()
/Linux-v6.6/Documentation/ABI/testing/
Dsecurityfs-secrets-coco11 by the Guest Owner and decrypted inside the trusted enclave,
/Linux-v6.6/drivers/net/wireless/realtek/rtw88/
Drx.c166 if (pkt_stat->decrypted) in rtw_rx_fill_rx_status()
/Linux-v6.6/drivers/net/wireless/realtek/rtlwifi/rtl8192se/
Dtrx.c248 stats->decrypted = !get_rx_status_desc_swdec(pdesc); in rtl92se_rx_query_desc()
284 if (stats->decrypted) { in rtl92se_rx_query_desc()
/Linux-v6.6/drivers/net/wireless/realtek/rtlwifi/rtl8723ae/
Dtrx.c277 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl8723e_rx_query_desc()
314 if (status->decrypted) { in rtl8723e_rx_query_desc()
/Linux-v6.6/drivers/net/wireless/realtek/rtlwifi/rtl8192ce/
Dtrx.c274 stats->decrypted = !get_rx_desc_swdec(p_desc); in rtl92ce_rx_query_desc()
311 if (stats->decrypted) { in rtl92ce_rx_query_desc()
/Linux-v6.6/arch/x86/kernel/
Dvmlinux.lds.S83 *(.bss..decrypted); \
/Linux-v6.6/Documentation/virt/kvm/s390/
Ds390-pv-boot.rst60 and initrd. The components are decrypted by the UV.
/Linux-v6.6/drivers/net/wireless/realtek/rtlwifi/rtl8723be/
Dtrx.c313 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl8723be_rx_query_desc()
369 if (status->decrypted) { in rtl8723be_rx_query_desc()
/Linux-v6.6/include/asm-generic/
Dvmlinux.lds.h355 *(.data..decrypted) \
957 *(.data..percpu..decrypted) \
/Linux-v6.6/Documentation/security/secrets/
Dcoco.rst64 Host can't read the decrypted content from memory because it's a
/Linux-v6.6/drivers/net/wireless/realtek/rtlwifi/rtl8188ee/
Dtrx.c390 status->decrypted = !get_rx_desc_swdec(pdesc); in rtl88ee_rx_query_desc()
441 if (status->decrypted) { in rtl88ee_rx_query_desc()
/Linux-v6.6/drivers/net/wireless/realtek/rtlwifi/rtl8192de/
Dtrx.c417 stats->decrypted = !get_rx_desc_swdec(pdesc); in rtl92de_rx_query_desc()
437 if (stats->decrypted) in rtl92de_rx_query_desc()
/Linux-v6.6/Documentation/networking/device_drivers/ethernet/mellanox/mlx5/
Dcounters.rst606 - Number of successfully decrypted RX packets which were part of a TLS
612 decrypted.
665 - Number of TLS decrypted packets copied over from NIC over DMA.
669 - Number of TLS decrypted bytes copied over from NIC over DMA.
674 decrypted.
679 decrypted.

123