Searched refs:seal (Results 1 – 9 of 9) sorted by relevance
486 bool seal:1; /* request transport encryption on share */ member894 bool seal:1; /* transport encryption for this mounted share */ member
1482 vol->seal = 1; in cifs_parse_mount_options()2649 if (tcon->seal != volume_info->seal) in cifs_get_tcon()2690 tcon->seal = volume_info->seal; in cifs_get_tcon()
451 if (tcon->seal) in cifs_show_options()
925 if ((tcon && tcon->seal) && in SMB2_tcon()
11 Trusted Keys use a TPM both to generate and to seal the keys. Keys are sealed
411 int (*seal) (struct ptlrpc_cli_ctx *ctx, member
165 authentication code) over and then seal with the TPM. On resume
916 LASSERT(ctx->cc_ops->seal); in sptlrpc_cli_wrap_request()917 rc = ctx->cc_ops->seal(ctx, req); in sptlrpc_cli_wrap_request()
555 seal Must seal (encrypt) all data on this mounted share before