Home
last modified time | relevance | path

Searched refs:encrypted (Results 101 – 125 of 187) sorted by relevance

12345678

/openbmc/qemu/block/
H A Dqcow2.c1522 bs->encrypted = true; in qcow2_do_open()
1965 if (bs->encrypted) { in qcow2_refresh_limits()
2226 assert(bs->encrypted && s->crypto); in qcow2_co_preadv_encrypted()
2341 if (bs->encrypted) { in qcow2_co_preadv_task()
2524 if (bs->encrypted) { in handle_alloc_space()
2588 if (bs->encrypted) { in qcow2_co_pwritev_task()
2684 if (bs->encrypted) { in qcow2_co_pwritev_part()
4144 assert(!bs->encrypted); in qcow2_co_copy_range_from()
4227 assert(!bs->encrypted); in qcow2_co_copy_range_to()
5335 } else if (bs->encrypted) { in qcow2_has_zero_init()
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/vpnc/vpnc/
H A Dlong-help81 enables using no encryption for data traffic (key exchanged must be encrypted)
/openbmc/linux/drivers/net/wireless/intel/ipw2x00/
H A Dlibipw_tx.c419 txb->encrypted = encrypt; in libipw_xmit()
H A Dipw2100.h278 u8 encrypted; // BOOLEAN in win! TRUE if frame is enc by driver member
H A Dlibipw.h486 u8 encrypted; member
/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/
H A Dlogin.defs_shadow-sysroot288 # If set to "yes", new passwords will be encrypted using the MD5-based
291 # Set to "no" if you need to copy encrypted passwords to other systems
/openbmc/linux/Documentation/process/
H A Dmaintainer-pgp-guide.rst147 subkey). All subkeys are fully independent -- a message encrypted to
229 strongly recommended** because the key printout is still encrypted with
240 your parallel port, but since the output is still encrypted with
267 over to the encrypted storage::
386 different from the encrypted USB storage device we used earlier for
390 Using external encrypted USB media is not a substitute to having a
/openbmc/qemu/
H A D.travis.yml19 # The channel name "irc.oftc.net#qemu" is encrypted against qemu/qemu
/openbmc/u-boot/doc/
H A DREADME.iscsi108 The iSCSI protocol is not encrypted. The traffic could be secured using IPsec
/openbmc/linux/Documentation/virt/kvm/x86/
H A Dhypercalls.rst185 * bit 4 - plaintext = 0, encrypted = 1
H A Dmsr.rst387 When a guest is started, bit 0 will be 0 if the guest has encrypted
388 memory and 1 if the guest does not have encrypted memory. If the
/openbmc/linux/Documentation/arch/x86/
H A Dsgx.rst22 region is denied from outside access by the CPU, and encrypted before it leaves
193 SRAM to maintain integrity of the encrypted data. This provides integrity and
/openbmc/linux/Documentation/crypto/
H A Dapi-intro.rst12 mode ciphers), this will allow for pages to be encrypted in-place
H A Duserspace-if.rst188 at least as large as to hold all blocks of the encrypted or decrypted
392 logon, encrypted, and trusted.
/openbmc/linux/fs/proc/
H A Dvmcore.c132 u64 *ppos, bool encrypted) in read_from_oldmem() argument
156 if (encrypted) in read_from_oldmem()
/openbmc/u-boot/doc/imx/mkimage/
H A Dmxsimage.txt4 This tool allows user to produce SB BootStream encrypted with a zero key.
/openbmc/linux/fs/ubifs/
H A Djournal.c731 bool encrypted = IS_ENCRYPTED(inode); in ubifs_jnl_write_data() local
738 if (encrypted) in ubifs_jnl_write_data()
771 if (encrypted) { in ubifs_jnl_write_data()
/openbmc/linux/fs/f2fs/
H A Dcompress.c1225 .encrypted = fscrypt_inode_uses_fs_layer_crypto(cc->inode) ? in f2fs_write_compressed_pages()
1298 if (fio.encrypted) { in f2fs_write_compressed_pages()
1342 if (fio.encrypted) in f2fs_write_compressed_pages()
/openbmc/qemu/docs/system/
H A Dqemu-block-drivers.rst.inc68 qcow2 header) be encrypted using the LUKS format. The passphrase to
73 If this is set to ``aes``, the image is encrypted with 128-bit AES-CBC.
80 which can reveal the existence of encrypted data.
228 If this is set to ``aes``, the image is encrypted with 128-bit AES-CBC.
/openbmc/linux/Documentation/networking/
H A Dxfrm_device.rst178 and not encrypted, the HW is responsible to perform it.
/openbmc/ipmitool/control/
H A Dipmitool.spec.in18 the IPMI specification. IPMIv2 adds support for encrypted LAN
261 - Fix memory corruption when sending encrypted SOL traffic
/openbmc/linux/Documentation/devicetree/bindings/fpga/
H A Dfpga-region.txt189 - encrypted-fpga-config : boolean, set if the bitstream is encrypted
/openbmc/qemu/include/block/
H A Dblock_int-common.h1076 bool encrypted; /* if true, the media is encrypted */ member
/openbmc/qemu/qapi/
H A Dblock-core.json89 # encrypted (since 2.10)
275 # @encrypted: true if the image is encrypted
295 '*cluster-size': 'int', '*encrypted': 'bool', '*compressed': 'bool',
477 # @encrypted: true if the backing device is encrypted
547 'encrypted': 'bool',
3466 # @encrypt: Image decryption options. Mandatory for encrypted images,
3567 # @encrypt: Image decryption options. Mandatory for encrypted images,
4190 # be left unspecified if this cloned image is encrypted using the
4192 # formatted) or if its parent image is not encrypted. (Since 8.0)
5004 # @encrypt: Encryption options if the image should be encrypted
[all …]
/openbmc/docs/designs/
H A Dbinarystore-via-blobs.md31 is not encrypted in anyway, extra caution should be used. It is not meant for

12345678