| /linux/tools/testing/selftests/mm/ |
| H A D | mseal_test.c | 520 static void test_seal_mprotect(bool seal) in test_seal_mprotect() argument 530 if (seal) { in test_seal_mprotect() 536 if (seal) in test_seal_mprotect() 544 static void test_seal_start_mprotect(bool seal) in test_seal_start_mprotect() argument 554 if (seal) { in test_seal_start_mprotect() 561 if (seal) in test_seal_start_mprotect() 574 static void test_seal_end_mprotect(bool seal) in test_seal_end_mprotect() argument 584 if (seal) { in test_seal_end_mprotect() 596 if (seal) in test_seal_end_mprotect() 604 static void test_seal_mprotect_unalign_len(bool seal) in test_seal_mprotect_unalign_len() argument [all …]
|
| /linux/tools/testing/selftests/tpm2/ |
| H A D | tpm2_tests.py | 26 blob = self.client.seal(self.root_key, data, auth, None) 55 blob = self.client.seal(self.root_key, data, auth, policy_dig) 75 blob = self.client.seal(self.root_key, data, auth, None) 102 blob = self.client.seal(self.root_key, data, auth, policy_dig) 152 blob = self.client.seal(self.root_key, data, auth, None)
|
| H A D | tpm2.py | 589 def seal(self, parent_key, data, auth_value, policy_dig, member in Client
|
| /linux/security/keys/trusted-keys/ |
| H A D | trusted_core.c | 56 DEFINE_STATIC_CALL_NULL(trusted_key_seal, *trusted_key_sources[0].ops->seal); 372 static_call_update(trusted_key_seal, trusted_key_sources[i].ops->seal); in init_trusted()
|
| H A D | trusted_pkwm.c | 187 .seal = trusted_pkwm_seal,
|
| H A D | trusted_caam.c | 185 .seal = trusted_caam_seal,
|
| H A D | trusted_tee.c | 61 * Have the TEE seal(encrypt) the symmetric key 283 .seal = trusted_tee_seal,
|
| H A D | trusted_dcp.c | 353 .seal = trusted_dcp_seal,
|
| H A D | trusted_tpm1.c | 993 .seal = trusted_tpm_seal,
|
| /linux/fs/smb/client/ |
| H A D | connect.c | 2024 struct cifs_tcon *cifs_setup_ipc(struct cifs_ses *ses, bool seal) in cifs_setup_ipc() argument 2035 if (seal && !(server->capabilities & SMB2_GLOBAL_CAP_ENCRYPTION)) { in cifs_setup_ipc() 2052 tcon->seal = seal; in cifs_setup_ipc() 2519 ipc = cifs_setup_ipc(ses, ctx->seal); in cifs_get_smb_ses() 2553 if (tcon->seal != ctx->seal) in match_tcon() 2740 if (ctx->seal) { in cifs_get_tcon() 2748 tcon->seal = true; in cifs_get_tcon() 4228 ctx->seal = master_tcon->seal; in cifs_construct_tcon()
|
| H A D | fs_context.h | 278 bool seal:1; /* request transport encryption on share */ member
|
| H A D | cifsproto.h | 329 struct cifs_tcon *cifs_setup_ipc(struct cifs_ses *ses, bool seal);
|
| H A D | dfs_cache.c | 1150 ipc = cifs_setup_ipc(ses, tcon->seal); in is_ses_good()
|
| H A D | cifsglob.h | 1257 bool seal:1; /* transport encryption for this mounted share */ member
|
| H A D | fs_context.c | 1811 ctx->seal = 1; in smb3_fs_context_parse_param()
|
| H A D | cifsfs.c | 707 if (tcon->seal) in cifs_show_options()
|
| H A D | smb2pdu.c | 85 if (tcon->seal && in smb3_encryption_required() 2211 if (tcon->seal && in SMB2_tcon()
|
| /linux/drivers/md/dm-vdo/indexer/ |
| H A D | index-layout.c | 199 struct layout_region seal; member 425 layout->seal = (struct layout_region) { in initialize_layout() 660 *lr++ = layout->seal; in make_layout_region_table() 1339 layout->seal = table->regions[table->header.region_count - 1]; in reconstitute_layout() 1340 result = verify_region(&layout->seal, next_block + layout->super.volume_offset, in reconstitute_layout()
|
| /linux/Documentation/userspace-api/ |
| H A D | mseal.rst | 20 applied by the runtime loader to seal .text and .rodata pages and 21 applications can additionally seal security critical data at runtime.
|
| /linux/Documentation/gpu/rfc/ |
| H A D | gpusvm.rst | 15 invent driver defined locks to seal core MM races.
|
| /linux/Documentation/admin-guide/cifs/ |
| H A D | usage.rst | 647 seal 648 Must seal (encrypt) all data on this mounted share before 746 seal (packet encryption) 0x00040 747 must seal 0x40040
|
| /linux/Documentation/arch/x86/ |
| H A D | intel_txt.rst | 181 authentication code) over and then seal with the TPM. On resume
|