| /linux/tools/testing/selftests/mm/ |
| H A D | mseal_test.c | 520 static void test_seal_mprotect(bool seal) in test_seal_mprotect() argument 530 if (seal) { in test_seal_mprotect() 536 if (seal) in test_seal_mprotect() 544 static void test_seal_start_mprotect(bool seal) in test_seal_start_mprotect() argument 554 if (seal) { in test_seal_start_mprotect() 561 if (seal) in test_seal_start_mprotect() 574 static void test_seal_end_mprotect(bool seal) in test_seal_end_mprotect() argument 584 if (seal) { in test_seal_end_mprotect() 596 if (seal) in test_seal_end_mprotect() 604 static void test_seal_mprotect_unalign_len(bool seal) in test_seal_mprotect_unalign_len() argument [all …]
|
| /linux/tools/testing/selftests/tpm2/ |
| H A D | tpm2_tests.py | 26 blob = self.client.seal(self.root_key, data, auth, None) 55 blob = self.client.seal(self.root_key, data, auth, policy_dig) 75 blob = self.client.seal(self.root_key, data, auth, None) 102 blob = self.client.seal(self.root_key, data, auth, policy_dig) 152 blob = self.client.seal(self.root_key, data, auth, None)
|
| H A D | tpm2.py | 589 def seal(self, parent_key, data, auth_value, policy_dig, member in Client
|
| /linux/security/keys/trusted-keys/ |
| H A D | trusted_core.c | 56 DEFINE_STATIC_CALL_NULL(trusted_key_seal, *trusted_key_sources[0].ops->seal); 372 static_call_update(trusted_key_seal, trusted_key_sources[i].ops->seal); in init_trusted()
|
| H A D | trusted_pkwm.c | 187 .seal = trusted_pkwm_seal,
|
| H A D | trusted_caam.c | 185 .seal = trusted_caam_seal,
|
| H A D | trusted_tee.c | 61 * Have the TEE seal(encrypt) the symmetric key 283 .seal = trusted_tee_seal,
|
| H A D | trusted_dcp.c | 353 .seal = trusted_dcp_seal,
|
| H A D | trusted_tpm1.c | 993 .seal = trusted_tpm_seal,
|
| /linux/fs/smb/client/ |
| H A D | connect.c | 2023 struct cifs_tcon *cifs_setup_ipc(struct cifs_ses *ses, bool seal) in cifs_setup_ipc() argument 2034 if (seal && !(server->capabilities & SMB2_GLOBAL_CAP_ENCRYPTION)) { in cifs_setup_ipc() 2051 tcon->seal = seal; in cifs_setup_ipc() 2518 ipc = cifs_setup_ipc(ses, ctx->seal); in cifs_get_smb_ses() 2552 if (tcon->seal != ctx->seal) in match_tcon() 2739 if (ctx->seal) { in cifs_get_tcon() 2747 tcon->seal = true; in cifs_get_tcon() 4227 ctx->seal = master_tcon->seal; in cifs_construct_tcon()
|
| H A D | fs_context.h | 278 bool seal:1; /* request transport encryption on share */ member
|
| H A D | cifsproto.h | 329 struct cifs_tcon *cifs_setup_ipc(struct cifs_ses *ses, bool seal);
|
| H A D | dfs_cache.c | 1150 ipc = cifs_setup_ipc(ses, tcon->seal); in is_ses_good()
|
| H A D | cifsglob.h | 1254 bool seal:1; /* transport encryption for this mounted share */ member
|
| H A D | fs_context.c | 1790 ctx->seal = 1; in smb3_fs_context_parse_param()
|
| H A D | cifsfs.c | 673 if (tcon->seal) in cifs_show_options()
|
| H A D | smb2pdu.c | 84 if (tcon->seal && in smb3_encryption_required() 2223 if (tcon->seal && in SMB2_tcon()
|
| /linux/Documentation/userspace-api/ |
| H A D | mseal.rst | 20 applied by the runtime loader to seal .text and .rodata pages and 21 applications can additionally seal security critical data at runtime.
|
| /linux/Documentation/gpu/rfc/ |
| H A D | gpusvm.rst | 15 invent driver defined locks to seal core MM races.
|
| /linux/Documentation/admin-guide/cifs/ |
| H A D | usage.rst | 647 seal 648 Must seal (encrypt) all data on this mounted share before 746 seal (packet encryption) 0x00040 747 must seal 0x40040
|
| /linux/Documentation/arch/x86/ |
| H A D | intel_txt.rst | 181 authentication code) over and then seal with the TPM. On resume
|
| /linux/arch/x86/ |
| H A D | Kconfig | 1795 In addition to building the kernel with IBT, seal all functions that
|