Searched refs:seal (Results 1 – 11 of 11) sorted by relevance
/kernel/linux/linux-5.10/tools/testing/selftests/tpm2/ |
D | tpm2_tests.py | 26 blob = self.client.seal(self.root_key, data, auth, None) 45 blob = self.client.seal(self.root_key, data, auth, policy_dig) 65 blob = self.client.seal(self.root_key, data, auth, None) 89 blob = self.client.seal(self.root_key, data, auth, policy_dig) 139 blob = self.client.seal(self.root_key, data, auth, None)
|
D | tpm2.py | 584 def seal(self, parent_key, data, auth_value, policy_dig, member in Client
|
/kernel/linux/linux-5.10/Documentation/security/keys/ |
D | trusted-encrypted.rst | 13 Trusted Keys use a TPM both to generate and to seal the keys. Keys are sealed 74 seal the key.
|
/kernel/linux/linux-5.10/fs/cifs/ |
D | connect.c | 1695 vol->seal = 1; in cifs_parse_mount_options() 2722 bool seal = false; in cifs_setup_ipc() local 2729 if (volume_info->seal) { in cifs_setup_ipc() 2731 seal = true; in cifs_setup_ipc() 2751 tcon->seal = seal; in cifs_setup_ipc() 3149 if (tcon->seal != volume_info->seal) in match_tcon() 3296 if (volume_info->seal) { in cifs_get_tcon() 3304 tcon->seal = true; in cifs_get_tcon() 5115 vol_info->seal = master_tcon->seal; in cifs_construct_tcon()
|
D | cifsglob.h | 582 bool seal:1; /* request transport encryption on share */ member 1144 bool seal:1; /* transport encryption for this mounted share */ member
|
D | cifs_debug.c | 108 if ((tcon->seal) || in cifs_debug_tcon()
|
D | cifsfs.c | 539 if (tcon->seal) in cifs_show_options()
|
D | smb2pdu.c | 93 if (tcon->seal && in smb3_encryption_required() 1823 if (tcon->seal && in SMB2_tcon()
|
/kernel/linux/linux-5.10/drivers/net/can/usb/ |
D | Kconfig | 116 https://www.theobroma-systems.com/seal)
|
/kernel/linux/linux-5.10/Documentation/x86/ |
D | intel_txt.rst | 181 authentication code) over and then seal with the TPM. On resume
|
/kernel/linux/linux-5.10/Documentation/admin-guide/cifs/ |
D | usage.rst | 645 seal 646 Must seal (encrypt) all data on this mounted share before
|