/linux-master/include/keys/ |
H A D | trusted-type.h | 62 int (*seal)(struct trusted_key_payload *p, char *datablob); member in struct:trusted_key_ops
|
/linux-master/security/keys/trusted-keys/ |
H A D | trusted_caam.c | 77 .seal = trusted_caam_seal,
|
H A D | trusted_core.c | 47 DEFINE_STATIC_CALL_NULL(trusted_key_seal, *trusted_key_sources[0].ops->seal); 141 * random key, then seal and create a trusted key-type key, 363 static_call_update(trusted_key_seal, trusted_key_sources[i].ops->seal);
|
H A D | trusted_tee.c | 61 * Have the TEE seal(encrypt) the symmetric key 286 .seal = trusted_tee_seal,
|
H A D | trusted_tpm1.c | 454 * Have the TPM seal(encrypt) the trusted key, possibly based on 659 * Have the TPM seal(encrypt) the symmetric key 1070 .seal = trusted_tpm_seal,
|
/linux-master/tools/testing/selftests/tpm2/ |
H A D | tpm2_tests.py | 26 blob = self.client.seal(self.root_key, data, auth, None) 55 blob = self.client.seal(self.root_key, data, auth, policy_dig) 75 blob = self.client.seal(self.root_key, data, auth, None) 102 blob = self.client.seal(self.root_key, data, auth, policy_dig) 152 blob = self.client.seal(self.root_key, data, auth, None)
|
H A D | tpm2.py | 589 def seal(self, parent_key, data, auth_value, policy_dig, member in class:Client
|
/linux-master/fs/smb/client/ |
H A D | fs_context.h | 234 bool seal:1; /* request transport encryption on share */ member in struct:smb3_fs_context
|
H A D | connect.c | 1928 bool seal = false; local 1935 if (ctx->seal) { 1937 seal = true; 1957 tcon->seal = seal; 2409 if (tcon->seal != ctx->seal) 2589 if (ctx->seal) { 2597 tcon->seal = true; 4033 ctx->seal [all...] |
H A D | cifs_debug.c | 111 if ((tcon->seal) ||
|
H A D | cifsglob.h | 1252 bool seal:1; /* transport encryption for this mounted share */ member in struct:cifs_tcon
|
H A D | cifsfs.c | 598 if (tcon->seal) 599 seq_puts(s, ",seal");
|
H A D | fs_context.c | 112 fsparam_flag("seal", Opt_seal), 216 cifs_errorf(fc, "sec=krb5p is not supported. Use sec=krb5,seal instead\n"); 1560 /* we do not do the following in secFlags because seal 1565 ctx->seal = 1;
|
H A D | smb2pdu.c | 80 if (tcon->seal && 856 * in which mount requested encryption ("seal") checks later 858 * seal not requested by client, since server is allowed to 2136 if (tcon->seal &&
|
/linux-master/drivers/md/dm-vdo/indexer/ |
H A D | index-layout.c | 198 struct layout_region seal; member in struct:index_layout 450 layout->seal = (struct layout_region) { 664 /* Regions: header, config, index, volume, saves, seal */ 685 *lr++ = layout->seal; 1364 layout->seal = table->regions[table->header.region_count - 1]; 1365 result = verify_region(&layout->seal, next_block + layout->super.volume_offset,
|