/linux-master/drivers/crypto/intel/qat/qat_common/ |
H A D | qat_crypto.h | 49 bool encryption; member in struct:qat_crypto_request
|
H A D | qat_algs.c | 708 if (qat_req->encryption) 749 if (qat_req->encryption) 1044 qat_req->encryption = true; 1111 qat_req->encryption = false;
|
/linux-master/drivers/gpu/drm/amd/display/modules/hdcp/ |
H A D | hdcp1_transition.c | 81 } else if (!conn->is_repeater && input->encryption != PASS) { 131 input->encryption != PASS) { 229 } else if ((!conn->is_repeater && input->encryption != PASS) || 308 } else if (input->encryption != PASS ||
|
H A D | hdcp1_execution.c | 236 &input->encryption, &status, 237 hdcp, "encryption")) 241 &input->encryption, &status, 242 hdcp, "encryption")) 362 if (input->encryption != PASS) 364 &input->encryption, &status, 365 hdcp, "encryption"))
|
H A D | hdcp.h | 51 uint8_t encryption; member in struct:mod_hdcp_transition_input_hdcp1
|
/linux-master/fs/smb/client/ |
H A D | smb2transport.c | 399 struct derivation encryption; member in struct:derivation_triplet 429 * All channels use the same encryption/decryption keys but 459 rc = generate_key(ses, ptriplet->encryption.label, 460 ptriplet->encryption.context, 516 d = &triplet.encryption; 545 d = &triplet.encryption;
|
/linux-master/fs/smb/server/ |
H A D | auth.c | 835 struct derivation encryption; member in struct:derivation_twin 845 rc = generate_key(conn, sess, ptwin->encryption.label, 846 ptwin->encryption.context, sess->smb3encryptionkey, 857 ksmbd_debug(AUTH, "dumping generated AES encryption keys\n"); 883 d = &twin.encryption; 904 d = &twin.encryption;
|
/linux-master/fs/ext4/ |
H A D | sysfs.c | 309 EXT4_ATTR_FEATURE(encryption); variable 329 ATTR_LIST(encryption),
|
/linux-master/include/uapi/linux/ |
H A D | btrfs_tree.h | 151 * of the descriptor item and some extra data for encryption. 1088 * including compression and encryption. If any of these 1094 __u8 encryption; member in struct:btrfs_file_extent_item 1327 __u8 encryption; member in struct:btrfs_verity_descriptor_item
|
H A D | btrfs.h | 1012 __u32 encryption; member in struct:btrfs_ioctl_encoded_io_args
|
/linux-master/fs/btrfs/ |
H A D | accessors.h | 940 encryption, 8); 1043 encryption, 8); 1047 struct btrfs_verity_descriptor_item, encryption, 8);
|
H A D | ioctl.c | 109 __u32 encryption; member in struct:btrfs_ioctl_encoded_io_args_32 4560 args.encryption = args32.encryption; 4578 args.encryption == BTRFS_ENCODED_IO_ENCRYPTION_NONE) 4581 args.encryption >= BTRFS_ENCODED_IO_ENCRYPTION_TYPES)
|
H A D | inode.c | 10348 if (encoded->encryption != BTRFS_ENCODED_IO_ENCRYPTION_NONE)
|
/linux-master/include/net/bluetooth/ |
H A D | bluetooth.h | 195 __u8 encryption; member in struct:bt_iso_bcast_qos
|
H A D | hci.h | 2193 __u8 encryption; member in struct:hci_bis 2214 __u8 encryption; member in struct:hci_cp_le_big_create_sync 2904 __u8 encryption; member in struct:hci_evt_le_big_info_adv_report
|
/linux-master/fs/f2fs/ |
H A D | sysfs.c | 186 "encryption"); 1070 F2FS_FEATURE_RO_ATTR(encryption); variable 1208 ATTR_LIST(encryption), 1257 F2FS_SB_FEATURE_RO_ATTR(encryption, ENCRYPT);
|
/linux-master/drivers/net/wireless/ath/ath10k/ |
H A D | wow.c | 203 pno->a_networks[i].encryption = 0;
|
H A D | wmi.h | 7324 u32 encryption; member in struct:wmi_network_type
|
/linux-master/net/bluetooth/ |
H A D | iso.c | 833 .encryption = 0x00, 1469 if (qos->bcast.encryption > 0x01) 1842 iso_pi(sk)->qos.bcast.encryption = ev3->encryption;
|
H A D | hci_conn.c | 1717 cp.bis.encryption = qos->bcast.encryption; 2131 pdu.cp.encryption = qos->bcast.encryption; 2331 /* AES encryption is required for Level 4: 2336 * 128-bit equivalent strength for link and encryption keys 2338 * SAFER+ not allowed, and P-192 not allowed; encryption key 2380 /* Set the ENCRYPT_PEND to trigger encryption after 2474 /* Ensure that the encryption key size has been read,
|
/linux-master/drivers/net/wireless/ath/ath11k/ |
H A D | wow.c | 273 pno->a_networks[i].encryption = 0;
|
H A D | wmi.h | 6114 u32 encryption; member in struct:wmi_network_type
|
/linux-master/drivers/net/wireless/ath/wcn36xx/ |
H A D | hal.h | 1514 /* The unicast encryption type in the association */ 1695 /* The unicast encryption type in the association */ 4332 enum ed_type encryption; member in struct:network_type 4408 enum ed_type encryption; member in struct:network_type_new 4887 /* key encryption key */
|
/linux-master/arch/x86/crypto/ |
H A D | aesni-intel_asm.S | 631 # PARTIAL_BLOCK: Handles encryption/decryption and the tag partial blocks 868 * Precomputations for HashKey parallel with encryption of first 4 blocks. 1607 * u64 plaintext_len, // Length of data in bytes for encryption. 1713 * u64 plaintext_len, // Length of data in bytes for encryption. 1728 * u64 plaintext_len, // Length of data in bytes for encryption.
|
H A D | aesni-intel_avx-x86_64.S | 712 # PARTIAL_BLOCK: Handles encryption/decryption and the tag partial blocks 1757 # u64 plaintext_len) /* Length of data in Bytes for encryption. */ 1786 # u64 plaintext_len) /* Length of data in Bytes for encryption. */ 2725 # u64 plaintext_len) /* Length of data in Bytes for encryption. */ 2754 # u64 plaintext_len) /* Length of data in Bytes for encryption. */
|