| /linux/tools/testing/selftests/mm/ |
| H A D | mseal_test.c | 520 static void test_seal_mprotect(bool seal) in test_seal_mprotect() argument 530 if (seal) { in test_seal_mprotect() 536 if (seal) in test_seal_mprotect() 544 static void test_seal_start_mprotect(bool seal) in test_seal_start_mprotect() argument 554 if (seal) { in test_seal_start_mprotect() 561 if (seal) in test_seal_start_mprotect() 574 static void test_seal_end_mprotect(bool seal) in test_seal_end_mprotect() argument 584 if (seal) { in test_seal_end_mprotect() 596 if (seal) in test_seal_end_mprotect() 604 static void test_seal_mprotect_unalign_len(bool seal) in test_seal_mprotect_unalign_len() argument [all …]
|
| /linux/tools/testing/selftests/tpm2/ |
| H A D | tpm2_tests.py | 26 blob = self.client.seal(self.root_key, data, auth, None) 55 blob = self.client.seal(self.root_key, data, auth, policy_dig) 75 blob = self.client.seal(self.root_key, data, auth, None) 102 blob = self.client.seal(self.root_key, data, auth, policy_dig) 152 blob = self.client.seal(self.root_key, data, auth, None)
|
| H A D | tpm2.py | 589 def seal(self, parent_key, data, auth_value, policy_dig, member in Client
|
| /linux/include/keys/ |
| H A D | trusted-type.h | 62 int (*seal)(struct trusted_key_payload *p, char *datablob); member
|
| /linux/security/keys/trusted-keys/ |
| H A D | trusted_core.c | 51 DEFINE_STATIC_CALL_NULL(trusted_key_seal, *trusted_key_sources[0].ops->seal); 367 static_call_update(trusted_key_seal, trusted_key_sources[i].ops->seal); in init_trusted()
|
| H A D | trusted_caam.c | 185 .seal = trusted_caam_seal,
|
| H A D | trusted_tee.c | 286 .seal = trusted_tee_seal,
|
| H A D | trusted_dcp.c | 353 .seal = trusted_dcp_seal,
|
| /linux/drivers/md/dm-vdo/indexer/ |
| H A D | index-layout.c | 199 struct layout_region seal; member 425 layout->seal = (struct layout_region) { in initialize_layout() 660 *lr++ = layout->seal; in make_layout_region_table() 1339 layout->seal = table->regions[table->header.region_count - 1]; in reconstitute_layout() 1340 result = verify_region(&layout->seal, next_block + layout->super.volume_offset, in reconstitute_layout()
|
| /linux/fs/smb/client/ |
| H A D | connect.c | 2017 struct cifs_tcon *cifs_setup_ipc(struct cifs_ses *ses, bool seal) in cifs_setup_ipc() argument 2028 if (seal && !(server->capabilities & SMB2_GLOBAL_CAP_ENCRYPTION)) { in cifs_setup_ipc() 2045 tcon->seal = seal; in cifs_setup_ipc() 2513 ipc = cifs_setup_ipc(ses, ctx->seal); in cifs_get_smb_ses() 2547 if (tcon->seal != ctx->seal) in match_tcon() 2734 if (ctx->seal) { in cifs_get_tcon() 2742 tcon->seal = true; in cifs_get_tcon() 4397 ctx->seal = master_tcon->seal; in cifs_construct_tcon()
|
| H A D | fs_context.h | 278 bool seal:1; /* request transport encryption on share */ member
|
| H A D | cifsproto.h | 605 struct cifs_tcon *cifs_setup_ipc(struct cifs_ses *ses, bool seal);
|
| H A D | dfs_cache.c | 1150 ipc = cifs_setup_ipc(ses, tcon->seal); in is_ses_good()
|
| H A D | cifs_debug.c | 113 if ((tcon->seal) || in cifs_debug_tcon()
|
| H A D | cifsglob.h | 1267 bool seal:1; /* transport encryption for this mounted share */ member
|
| H A D | fs_context.c | 1812 ctx->seal = 1; in smb3_fs_context_parse_param()
|
| H A D | cifsfs.c | 700 if (tcon->seal) in cifs_show_options()
|
| H A D | smb2pdu.c | 85 if (tcon->seal && in smb3_encryption_required() 2214 if (tcon->seal && in SMB2_tcon()
|
| /linux/Documentation/userspace-api/ |
| H A D | mseal.rst | 20 applied by the runtime loader to seal .text and .rodata pages and 21 applications can additionally seal security critical data at runtime.
|
| /linux/Documentation/gpu/rfc/ |
| H A D | gpusvm.rst | 15 invent driver defined locks to seal core MM races.
|
| /linux/Documentation/admin-guide/cifs/ |
| H A D | usage.rst | 647 seal 648 Must seal (encrypt) all data on this mounted share before 746 seal (packet encryption) 0x00040 747 must seal 0x40040
|
| /linux/Documentation/arch/x86/ |
| H A D | intel_txt.rst | 181 authentication code) over and then seal with the TPM. On resume
|
| /linux/Documentation/security/keys/ |
| H A D | trusted-encrypted.rst | 263 seal the key.
|
| /linux/arch/x86/ |
| H A D | Kconfig | 1789 In addition to building the kernel with IBT, seal all functions that
|