/openbmc/qemu/backends/ |
H A D | hostmem-memfd.c | 31 bool seal; member 48 m->hugetlb, m->hugetlbsize, m->seal ? in memfd_backend_memory_alloc() 112 return MEMORY_BACKEND_MEMFD(o)->seal; in memfd_backend_get_seal() 118 MEMORY_BACKEND_MEMFD(o)->seal = value; in memfd_backend_set_seal() 127 m->seal = true; in memfd_backend_instance_init()
|
/openbmc/linux/tools/testing/selftests/tpm2/ |
H A D | tpm2_tests.py | 26 blob = self.client.seal(self.root_key, data, auth, None) 55 blob = self.client.seal(self.root_key, data, auth, policy_dig) 75 blob = self.client.seal(self.root_key, data, auth, None) 102 blob = self.client.seal(self.root_key, data, auth, policy_dig) 152 blob = self.client.seal(self.root_key, data, auth, None)
|
H A D | tpm2.py | 589 def seal(self, parent_key, data, auth_value, policy_dig, member in Client
|
/openbmc/linux/include/keys/ |
H A D | trusted-type.h | 62 int (*seal)(struct trusted_key_payload *p, char *datablob); member
|
/openbmc/linux/security/keys/trusted-keys/ |
H A D | trusted_caam.c | 77 .seal = trusted_caam_seal,
|
H A D | trusted_core.c | 47 DEFINE_STATIC_CALL_NULL(trusted_key_seal, *trusted_key_sources[0].ops->seal); 363 static_call_update(trusted_key_seal, trusted_key_sources[i].ops->seal); in init_trusted()
|
H A D | trusted_tee.c | 286 .seal = trusted_tee_seal,
|
H A D | trusted_tpm1.c | 1070 .seal = trusted_tpm_seal,
|
/openbmc/linux/fs/smb/client/ |
H A D | fs_context.h | 234 bool seal:1; /* request transport encryption on share */ member
|
H A D | connect.c | 1939 bool seal = false; in cifs_setup_ipc() local 1946 if (ctx->seal) { in cifs_setup_ipc() 1948 seal = true; in cifs_setup_ipc() 1968 tcon->seal = seal; in cifs_setup_ipc() 2420 if (tcon->seal != ctx->seal) in match_tcon() 2600 if (ctx->seal) { in cifs_get_tcon() 2608 tcon->seal = true; in cifs_get_tcon() 4075 ctx->seal = master_tcon->seal; in __cifs_construct_tcon()
|
H A D | cifs_debug.c | 111 if ((tcon->seal) || in cifs_debug_tcon()
|
H A D | cifsglob.h | 1252 bool seal:1; /* transport encryption for this mounted share */ member
|
H A D | fs_context.c | 1572 ctx->seal = 1; in smb3_fs_context_parse_param()
|
H A D | cifsfs.c | 608 if (tcon->seal) in cifs_show_options()
|
H A D | smb2pdu.c | 80 if (tcon->seal && in smb3_encryption_required() 2145 if (tcon->seal && in SMB2_tcon()
|
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/tpm-tools/files/ |
H A D | tpm-tools-extendpcr.patch | 195 + "can only seal\n data to PCRs 0-15. PCR %u is out of range"
|
/openbmc/linux/drivers/net/can/usb/ |
H A D | Kconfig | 158 https://www.theobroma-systems.com/seal)
|
/openbmc/linux/Documentation/admin-guide/cifs/ |
H A D | usage.rst | 645 seal 646 Must seal (encrypt) all data on this mounted share before 743 seal (packet encryption) 0x00040 744 must seal 0x40040
|
/openbmc/linux/Documentation/arch/x86/ |
H A D | intel_txt.rst | 181 authentication code) over and then seal with the TPM. On resume
|
/openbmc/qemu/qapi/ |
H A D | qom.json | 715 # @seal: if true, create a sealed-file, which will block further 724 '*seal': 'bool' },
|
/openbmc/linux/Documentation/security/keys/ |
H A D | trusted-encrypted.rst | 201 seal the key.
|
/openbmc/linux/tools/objtool/Documentation/ |
H A D | objtool.txt | 50 instruction sites, enabling the kernel to "seal" them (replace them
|
/openbmc/qemu/ |
H A D | qemu-options.hx | 5410 …,size=size,host-nodes=host-nodes,policy=default|preferred|bind|interleave,seal=on|off,hugetlb=on|o… 5416 The ``seal`` option creates a sealed-file, that will block 5427 incompatible with the ``seal`` option (requires at least Linux
|
/openbmc/linux/arch/x86/ |
H A D | Kconfig | 1826 In addition to building the kernel with IBT, seal all functions that
|