| /OK3568_Linux_fs/kernel/tools/testing/selftests/tpm2/ |
| H A D | tpm2_tests.py | 26 blob = self.client.seal(self.root_key, data, auth, None) 45 blob = self.client.seal(self.root_key, data, auth, policy_dig) 65 blob = self.client.seal(self.root_key, data, auth, None) 89 blob = self.client.seal(self.root_key, data, auth, policy_dig) 139 blob = self.client.seal(self.root_key, data, auth, None)
|
| H A D | tpm2.py | 588 def seal(self, parent_key, data, auth_value, policy_dig, member in Client
|
| /OK3568_Linux_fs/kernel/Documentation/security/keys/ |
| H A D | trusted-encrypted.rst | 13 Trusted Keys use a TPM both to generate and to seal the keys. Keys are sealed 74 seal the key.
|
| /OK3568_Linux_fs/kernel/fs/cifs/ |
| H A D | connect.c | 1707 vol->seal = 1; in cifs_parse_mount_options() 2734 bool seal = false; in cifs_setup_ipc() local 2741 if (volume_info->seal) { in cifs_setup_ipc() 2743 seal = true; in cifs_setup_ipc() 2763 tcon->seal = seal; in cifs_setup_ipc() 3161 if (tcon->seal != volume_info->seal) in match_tcon() 3308 if (volume_info->seal) { in cifs_get_tcon() 3316 tcon->seal = true; in cifs_get_tcon() 5127 vol_info->seal = master_tcon->seal; in cifs_construct_tcon()
|
| H A D | cifsglob.h | 582 bool seal:1; /* request transport encryption on share */ member 1144 bool seal:1; /* transport encryption for this mounted share */ member
|
| H A D | cifs_debug.c | 108 if ((tcon->seal) || in cifs_debug_tcon()
|
| H A D | cifsfs.c | 539 if (tcon->seal) in cifs_show_options()
|
| H A D | smb2pdu.c | 93 if (tcon->seal && in smb3_encryption_required() 1826 if (tcon->seal && in SMB2_tcon()
|
| /OK3568_Linux_fs/kernel/drivers/net/can/usb/ |
| H A D | Kconfig | 116 https://www.theobroma-systems.com/seal)
|
| /OK3568_Linux_fs/kernel/Documentation/x86/ |
| H A D | intel_txt.rst | 181 authentication code) over and then seal with the TPM. On resume
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/cifs/ |
| H A D | usage.rst | 645 seal 646 Must seal (encrypt) all data on this mounted share before
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/openssl/ |
| H A D | ssl.h | 2104 int (*seal)(SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out_len, member
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/include/openssl/ |
| H A D | ssl.h | 2104 int (*seal)(SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out_len, member
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/openssl/ |
| H A D | ssl.h | 2211 int (*seal)(SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out_len, member
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/openssl/ |
| H A D | ssl.h | 2211 int (*seal)(SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out_len, member
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/openssl/ |
| H A D | ssl.h | 2211 int (*seal)(SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out_len, member
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/openssl/ |
| H A D | ssl.h | 2211 int (*seal)(SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out_len, member
|