Lines Matching full:encryption

3  * Key setup facility for FS encryption support.
71 …WARN_ONCE(1, "fscrypt: filesystem tried to load encryption info for inode %lu, which is not encryp… in select_encryption_mode()
76 /* Create a symmetric cipher object for the given encryption mode and key */
124 * raw key, encryption mode, and flag indicating which encryption implementation
161 /* Given a per-file encryption key, set up the file's crypto transform object */
204 "Hardware-wrapped keys require inline encryption (-o inlinecrypt)"); in setup_per_mode_enc_key()
211 "Each hardware-wrapped key can only be used with one encryption mode"); in setup_per_mode_enc_key()
355 * DIRECT_KEY: instead of deriving per-file encryption keys, the in fscrypt_setup_v2_file_key()
359 * encryption key. This ensures that the master key is in fscrypt_setup_v2_file_key()
367 * IV_INO_LBLK_64: encryption keys are derived from (master_key, in fscrypt_setup_v2_file_key()
370 * encryption hardware compliant with the UFS standard. in fscrypt_setup_v2_file_key()
406 * encryption settings which a particular file will use (@ci).
408 * If the file uses a v1 encryption policy, then the master key must be at least
444 * Find the master key, then set up the inode's actual encryption key.
632 * fscrypt_get_encryption_info() - set up an inode's encryption key
634 * @allow_unsupported: if %true, treat an unsupported encryption policy (or
635 * unrecognized encryption context) the same way as the key
646 * encryption key is unavailable. (Use fscrypt_has_encryption_key() to
662 fscrypt_warn(inode, "Error %d getting encryption context", res); in fscrypt_get_encryption_info()
671 "Unrecognized or corrupt encryption context"); in fscrypt_get_encryption_info()
708 * This doesn't persist the new inode's encryption context. That still needs to
711 * Return: 0 on success, -ENOKEY if the encryption key is missing, or another
792 * If ci is NULL, then the inode doesn't have an encryption key set up in fscrypt_drop_inode()