Searched refs:seal (Results 1 – 11 of 11) sorted by relevance
/Linux-v5.4/tools/testing/selftests/tpm2/ |
D | tpm2_tests.py | 26 blob = self.client.seal(self.root_key, data, auth, None) 45 blob = self.client.seal(self.root_key, data, auth, policy_dig) 65 blob = self.client.seal(self.root_key, data, auth, None) 88 blob = self.client.seal(self.root_key, data, auth, policy_dig) 138 blob = self.client.seal(self.root_key, data, auth, None)
|
D | tpm2.py | 567 def seal(self, parent_key, data, auth_value, policy_dig, member in Client
|
/Linux-v5.4/Documentation/security/keys/ |
D | trusted-encrypted.rst | 13 Trusted Keys use a TPM both to generate and to seal the keys. Keys are sealed 75 seal the key.
|
/Linux-v5.4/drivers/net/can/usb/ |
D | Kconfig | 116 https://www.theobroma-systems.com/seal)
|
/Linux-v5.4/fs/cifs/ |
D | connect.c | 1911 vol->seal = 1; in cifs_parse_mount_options() 2905 bool seal = false; in cifs_setup_ipc() local 2912 if (volume_info->seal) { in cifs_setup_ipc() 2914 seal = true; in cifs_setup_ipc() 2934 tcon->seal = seal; in cifs_setup_ipc() 3310 if (tcon->seal != volume_info->seal) in match_tcon() 3451 if (volume_info->seal) { in cifs_get_tcon() 3459 tcon->seal = true; in cifs_get_tcon()
|
D | cifsglob.h | 577 bool seal:1; /* request transport encryption on share */ member 1086 bool seal:1; /* transport encryption for this mounted share */ member
|
D | cifs_debug.c | 108 if ((tcon->seal) || in cifs_debug_tcon()
|
D | cifsfs.c | 526 if (tcon->seal) in cifs_show_options()
|
D | smb2pdu.c | 93 if (tcon->seal && in smb3_encryption_required() 1769 if (tcon->seal && in SMB2_tcon()
|
/Linux-v5.4/Documentation/x86/ |
D | intel_txt.rst | 181 authentication code) over and then seal with the TPM. On resume
|
/Linux-v5.4/Documentation/admin-guide/cifs/ |
D | usage.rst | 646 seal 647 Must seal (encrypt) all data on this mounted share before
|