Lines Matching full:encrypted
208 Allows the encrypted Master Key to be backed up and restored,
222 Allows suspending and resuming encrypted devices.
230 Initialize providers which need to be encrypted.
267 This makes it possible to use an encrypted root partition.
290 When entering the passphrase to boot from this encrypted root filesystem, echo
307 Enable booting from this encrypted root filesystem.
310 from the encrypted partition.
366 By default, if the underlying provider grows, the encrypted provider will
370 size, attaching encrypted provider will no longer be possible as the metadata
402 The encrypted Master Keys are loaded from the metadata and decrypted
531 When entering the passphrase to boot from this encrypted root filesystem, echo
537 encrypted root filesystem.
540 Enable booting from this encrypted root filesystem.
543 from the encrypted partition.
545 Deactivate booting from this encrypted root partition.
562 Install a copy of the Master Key into the selected slot, encrypted with
566 each encrypted with an independent User Key.
683 Suspending a laptop should not leave an encrypted device attached.
687 filesystems on the encrypted device, unmounting the filesystem, and
689 Any access to the encrypted device will be blocked until the Master Key is
700 such as the filesystem cache after suspending an encrypted device.
768 This will erase with zeros the encrypted Master Key copies stored in the
800 up to two, independently-encrypted copies of the Master Key.
802 Each stored copy of the Master Key is encrypted with a User Key, which
937 Initialize a provider which is going to be encrypted with a
958 Create an encrypted provider, but use two User Keys:
974 Create an encrypted provider for use by the user, but remember that users
980 (use key number 0, so the encrypted Master Key will be re-encrypted by this)
987 Encrypted swap partition setup:
1102 If an encrypted filesystem is extended, it is necessary to relocate and
1144 encrypted filesystem with a file as storage device follow this example.
1231 If an attacker can remember the encrypted data, he can overwrite any future