/openbmc/qemu/block/ |
H A D | qcow2.c | 1522 bs->encrypted = true; in qcow2_do_open() 1965 if (bs->encrypted) { in qcow2_refresh_limits() 2226 assert(bs->encrypted && s->crypto); in qcow2_co_preadv_encrypted() 2341 if (bs->encrypted) { in qcow2_co_preadv_task() 2524 if (bs->encrypted) { in handle_alloc_space() 2588 if (bs->encrypted) { in qcow2_co_pwritev_task() 2684 if (bs->encrypted) { in qcow2_co_pwritev_part() 4144 assert(!bs->encrypted); in qcow2_co_copy_range_from() 4227 assert(!bs->encrypted); in qcow2_co_copy_range_to() 5335 } else if (bs->encrypted) { in qcow2_has_zero_init()
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/vpnc/vpnc/ |
H A D | long-help | 81 enables using no encryption for data traffic (key exchanged must be encrypted)
|
/openbmc/linux/drivers/net/wireless/intel/ipw2x00/ |
H A D | libipw_tx.c | 419 txb->encrypted = encrypt; in libipw_xmit()
|
H A D | ipw2100.h | 278 u8 encrypted; // BOOLEAN in win! TRUE if frame is enc by driver member
|
H A D | libipw.h | 486 u8 encrypted; member
|
/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/ |
H A D | login.defs_shadow-sysroot | 288 # If set to "yes", new passwords will be encrypted using the MD5-based 291 # Set to "no" if you need to copy encrypted passwords to other systems
|
/openbmc/linux/Documentation/process/ |
H A D | maintainer-pgp-guide.rst | 147 subkey). All subkeys are fully independent -- a message encrypted to 229 strongly recommended** because the key printout is still encrypted with 240 your parallel port, but since the output is still encrypted with 267 over to the encrypted storage:: 386 different from the encrypted USB storage device we used earlier for 390 Using external encrypted USB media is not a substitute to having a
|
/openbmc/qemu/ |
H A D | .travis.yml | 19 # The channel name "irc.oftc.net#qemu" is encrypted against qemu/qemu
|
/openbmc/u-boot/doc/ |
H A D | README.iscsi | 108 The iSCSI protocol is not encrypted. The traffic could be secured using IPsec
|
/openbmc/linux/Documentation/virt/kvm/x86/ |
H A D | hypercalls.rst | 185 * bit 4 - plaintext = 0, encrypted = 1
|
H A D | msr.rst | 387 When a guest is started, bit 0 will be 0 if the guest has encrypted 388 memory and 1 if the guest does not have encrypted memory. If the
|
/openbmc/linux/Documentation/arch/x86/ |
H A D | sgx.rst | 22 region is denied from outside access by the CPU, and encrypted before it leaves 193 SRAM to maintain integrity of the encrypted data. This provides integrity and
|
/openbmc/linux/Documentation/crypto/ |
H A D | api-intro.rst | 12 mode ciphers), this will allow for pages to be encrypted in-place
|
H A D | userspace-if.rst | 188 at least as large as to hold all blocks of the encrypted or decrypted 392 logon, encrypted, and trusted.
|
/openbmc/linux/fs/proc/ |
H A D | vmcore.c | 132 u64 *ppos, bool encrypted) in read_from_oldmem() argument 156 if (encrypted) in read_from_oldmem()
|
/openbmc/u-boot/doc/imx/mkimage/ |
H A D | mxsimage.txt | 4 This tool allows user to produce SB BootStream encrypted with a zero key.
|
/openbmc/linux/fs/ubifs/ |
H A D | journal.c | 731 bool encrypted = IS_ENCRYPTED(inode); in ubifs_jnl_write_data() local 738 if (encrypted) in ubifs_jnl_write_data() 771 if (encrypted) { in ubifs_jnl_write_data()
|
/openbmc/linux/fs/f2fs/ |
H A D | compress.c | 1225 .encrypted = fscrypt_inode_uses_fs_layer_crypto(cc->inode) ? in f2fs_write_compressed_pages() 1298 if (fio.encrypted) { in f2fs_write_compressed_pages() 1342 if (fio.encrypted) in f2fs_write_compressed_pages()
|
/openbmc/qemu/docs/system/ |
H A D | qemu-block-drivers.rst.inc | 68 qcow2 header) be encrypted using the LUKS format. The passphrase to 73 If this is set to ``aes``, the image is encrypted with 128-bit AES-CBC. 80 which can reveal the existence of encrypted data. 228 If this is set to ``aes``, the image is encrypted with 128-bit AES-CBC.
|
/openbmc/linux/Documentation/networking/ |
H A D | xfrm_device.rst | 178 and not encrypted, the HW is responsible to perform it.
|
/openbmc/ipmitool/control/ |
H A D | ipmitool.spec.in | 18 the IPMI specification. IPMIv2 adds support for encrypted LAN 261 - Fix memory corruption when sending encrypted SOL traffic
|
/openbmc/linux/Documentation/devicetree/bindings/fpga/ |
H A D | fpga-region.txt | 189 - encrypted-fpga-config : boolean, set if the bitstream is encrypted
|
/openbmc/qemu/include/block/ |
H A D | block_int-common.h | 1076 bool encrypted; /* if true, the media is encrypted */ member
|
/openbmc/qemu/qapi/ |
H A D | block-core.json | 89 # encrypted (since 2.10) 275 # @encrypted: true if the image is encrypted 295 '*cluster-size': 'int', '*encrypted': 'bool', '*compressed': 'bool', 477 # @encrypted: true if the backing device is encrypted 547 'encrypted': 'bool', 3466 # @encrypt: Image decryption options. Mandatory for encrypted images, 3567 # @encrypt: Image decryption options. Mandatory for encrypted images, 4190 # be left unspecified if this cloned image is encrypted using the 4192 # formatted) or if its parent image is not encrypted. (Since 8.0) 5004 # @encrypt: Encryption options if the image should be encrypted [all …]
|
/openbmc/docs/designs/ |
H A D | binarystore-via-blobs.md | 31 is not encrypted in anyway, extra caution should be used. It is not meant for
|