/openbmc/estoraged/include/ |
H A D | cryptsetupInterface.hpp | 59 * @param[in] passphrase - passphrase for new keyslot. 60 * @param[in] passphraseSize - size of passphrase. 61 * @param[in] newPassphrase - new passphrase for the specified keyslot 68 const char* passphrase, size_t passphraseSize, 79 * @param[in] passphrase - passphrase for new keyslot. 80 * @param[in] passphrase_size - size of passphrase. 86 size_t volumeKeySize, const char* passphrase, 106 * passphrase. 108 * @param[in] passphrase - passphrase used to unlock volume key. 109 * @param[in] passphrase_size - size of passphrase. [all …]
|
/openbmc/linux/Documentation/driver-api/nvdimm/ |
H A D | security.rst | 10 security DSMs: "get security state", "set passphrase", "disable passphrase", 28 update <old_keyid> <new_keyid> - enable or update passphrase. 33 master_update <keyid> <new_keyid> - enable or update master passphrase. 42 The DIMM id would be provided along with the key payload (passphrase) to 46 key "passphrase" is expected to be 32bytes long. This is similar to the ATA 66 the passphrase for the respective nvdimms. It is also recommended that the 93 An key with the current passphrase payload that is tied to the nvdimm should be 101 An key with the current passphrase payload that is tied to the nvdimm should be 115 An encrypted-key with the current user passphrase that is tied to the nvdimm 124 master passphrase key is passed to the kernel. The master passphrase key [all …]
|
/openbmc/openbmc/poky/meta/lib/oe/ |
H A D | gpg_sign.py | 42 def sign_rpms(self, files, keyid, passphrase, digest, sign_chunk, fsk=None, fsk_password=None): argument 46 …args = '--no-permission-warning --batch --passphrase=%s --agent-program=%s|--auto-expand-secmem' %… 64 …def detach_sign(self, input_file, keyid, passphrase_file, passphrase=None, armor=True, output_suff… argument 67 if passphrase_file and passphrase: 68 raise Exception("You should use either passphrase_file of passphrase, not both") 71 '--no-tty', '--yes', '--passphrase-fd', '0', '-u', keyid] 88 passphrase = fobj.readline(); 100 (_, stderr) = job.communicate(passphrase.encode("utf-8"))
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | Memory.v1_20_0.json | 150 "description": "Disables the master passphrase for the given region.", 151 …: "This action shall disable the master passphrase on the supplied region provided the supplied ma… 153 "Passphrase": { object 154 "description": "The master passphrase for the specified region.", 155 … "longDescription": "This parameter shall contain the master passphrase for the specified region.", 160 … "description": "The memory region ID to which to disable the master passphrase.", 161 …n": "This parameter shall contain the memory region ID to which to disable the master passphrase.", 196 "description": "Disable passphrase for the given region.", 197 … the need for passphrases on the supplied region provided the supplied passphrase matches that of … 199 "Passphrase": { object [all …]
|
H A D | AggregationSource.v1_4_3.json | 414 …passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st… 415 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{24,96}$)|(^\\*+$)", 447 …passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st… 448 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{16,64}$)|(^\\*+$)",
|
H A D | ManagerAccount.v1_13_0.json | 601 …passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st… 602 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{24,96})|(^\\*+$)", 634 …passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st… 635 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{16,64}$)|(^\\*+$)",
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema-installed/ |
H A D | Memory.v1_20_0.json | 150 "description": "Disables the master passphrase for the given region.", 151 …: "This action shall disable the master passphrase on the supplied region provided the supplied ma… 153 "Passphrase": { object 154 "description": "The master passphrase for the specified region.", 155 … "longDescription": "This parameter shall contain the master passphrase for the specified region.", 160 … "description": "The memory region ID to which to disable the master passphrase.", 161 …n": "This parameter shall contain the memory region ID to which to disable the master passphrase.", 196 "description": "Disable passphrase for the given region.", 197 … the need for passphrases on the supplied region provided the supplied passphrase matches that of … 199 "Passphrase": { object [all …]
|
H A D | AggregationSource.v1_4_3.json | 414 …passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st… 415 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{24,96}$)|(^\\*+$)", 447 …passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st… 448 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{16,64}$)|(^\\*+$)",
|
H A D | ManagerAccount.v1_13_0.json | 601 …passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st… 602 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{24,96})|(^\\*+$)", 634 …passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st… 635 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{16,64}$)|(^\\*+$)",
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/passwdqc/ |
H A D | passwdqc_2.0.3.bb | 1 SUMMARY = "A password/passphrase strength checking and enforcement toolset" 3 passwdqc is a password/passphrase strength checking and policy enforcement \ 7 passwd(1). It is capable of checking password or passphrase strength, \ 11 pwqcheck and pwqgen are standalone password/passphrase strength checking \ 12 and random passphrase generator programs, respectively, which are usable \
|
/openbmc/linux/drivers/acpi/nfit/ |
H A D | intel.h | 77 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member 82 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member 91 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member 96 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member 111 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member
|
H A D | intel.c | 215 memcpy(nd_cmd.cmd.passphrase, key_data->data, in intel_security_unlock() 216 sizeof(nd_cmd.cmd.passphrase)); in intel_security_unlock() 253 memcpy(nd_cmd.cmd.passphrase, key_data->data, in intel_security_disable() 254 sizeof(nd_cmd.cmd.passphrase)); in intel_security_disable() 296 memcpy(nd_cmd.cmd.passphrase, key->data, in intel_security_erase() 297 sizeof(nd_cmd.cmd.passphrase)); in intel_security_erase() 373 memcpy(nd_cmd.cmd.passphrase, nkey->data, in intel_security_overwrite() 374 sizeof(nd_cmd.cmd.passphrase)); in intel_security_overwrite()
|
/openbmc/openbmc/meta-security/recipes-ids/tripwire/files/ |
H A D | tripwire.txt | 20 …ic characters for each passphrase. The maximum length of a passphrase is 1023 characters. Quotes s… 22 …passphrase for the site key. The site key passphrase protects the site key, which is used to sign … 24 …e is no way to remove encryption from a signed file if you forget your passphrase. If you forget t…
|
H A D | twinstall.sh | 32 # Site Passphrase variable 38 # Local Passphrase variable 77 ## If user has to enter a passphrase, give some 122 cmdargs="$cmdargs --site-passphrase \"$TW_SITE_PASS\"" 150 cmdargs="$cmdargs --local-passphrase \"$TW_LOCAL_PASS\"" 191 cmdargs="$cmdargs --site-passphrase \"$TW_SITE_PASS\"" 251 cmdargs="$cmdargs --site-passphrase \"$TW_SITE_PASS\"" 285 --local-passphrase $TW_LOCAL_PASS 2> /dev/null
|
/openbmc/qemu/block/ |
H A D | rbd.c | 344 char **passphrase, in qemu_rbd_convert_luks_options() argument 348 return qcrypto_secret_lookup(luks_opts->key_secret, (uint8_t **)passphrase, in qemu_rbd_convert_luks_options() 355 char **passphrase, in qemu_rbd_convert_luks_create_options() argument 363 passphrase, passphrase_len, errp); in qemu_rbd_convert_luks_create_options() 398 g_autofree char *passphrase = NULL; in qemu_rbd_encryption_format() local 420 &luks_opts.alg, &passphrase, &luks_opts.passphrase_size, in qemu_rbd_encryption_format() 425 luks_opts.passphrase = passphrase; in qemu_rbd_encryption_format() 436 &luks2_opts.alg, &passphrase, &luks2_opts.passphrase_size, in qemu_rbd_encryption_format() 441 luks2_opts.passphrase = passphrase; in qemu_rbd_encryption_format() 479 g_autofree char *passphrase = NULL; in qemu_rbd_encryption_load() local [all …]
|
/openbmc/estoraged/src/test/include/ |
H A D | estoraged_test.hpp | 54 size_t volume_key_size, const char* passphrase, 65 const char* passphrase, size_t passphraseSize, 71 const char* passphrase, size_t passphrase_size,
|
/openbmc/linux/Documentation/process/ |
H A D | maintainer-pgp-guide.rst | 81 of caching the private key passphrase. There are two options you should 82 know in order to tweak when the passphrase should be expired from cache: 88 the key since initial passphrase entry, if the maximum time-to-live 89 countdown expires, you'll have to enter the passphrase again. The 180 Ensure your passphrase is strong 186 obtaining the passphrase to decrypt them. 189 strong passphrase. To set it or change it, use:: 191 $ gpg --change-passphrase [fpr] 228 pen and write your passphrase on the margin of the paper. **This is 230 that passphrase, and if you ever change it you will not remember what it [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Inventory/Item/PersistentMemory/ |
H A D | SecurityCapabilities.interface.yaml | 11 Memory passphrase set capability. 23 The maximum number of incorrect passphrase attempts allowed before
|
/openbmc/linux/Documentation/translations/it_IT/process/ |
H A D | maintainer-pgp-guide.rst | 89 individuare la passphrase. Ci sono due opzioni che dovreste conoscere 90 per personalizzare la scadenza della passphrase nella cache: 97 uso della chiave da quando avete inserito la passphrase, se il massimo 98 time-to-live è scaduto, dovrete reinserire nuovamente la passphrase. 189 Assicuratevi che la vostra passphrase sia forte 196 aver prima ottenuto la passphrase per decriptarle. 199 una passphrase forte. Per impostarla o cambiarla, usate:: 201 $ gpg --change-passphrase [fpr] 244 la passphrase, e se mai doveste cambiarla non vi ricorderete qual'era al 247 Mettete la copia cartacea e la passphrase scritta a mano in una busta e [all …]
|
/openbmc/openbmc/poky/meta/recipes-support/pinentry/ |
H A D | pinentry_1.3.1.bb | 1 SUMMARY = "Collection of simple PIN or passphrase entry dialogs" 3 Pinentry is a collection of simple PIN or passphrase entry dialogs which \
|
/openbmc/linux/tools/testing/cxl/test/ |
H A D | mem.c | 671 * the security disabled state when the user passphrase is not set. in mock_set_passphrase() 867 * where a master passphrase is passed in while the master in mock_passphrase_secure_erase() 868 * passphrase is not set and user passphrase is not set. The in mock_passphrase_secure_erase() 870 * as a CXL secure erase command without passphrase (0x4401). in mock_passphrase_secure_erase() 886 * CXL rev3 8.2.9.8.6.3 Disable Passphrase in mock_passphrase_secure_erase() 887 * When master passphrase is disabled, the device shall in mock_passphrase_secure_erase() 888 * return Invalid Input for the Passphrase Secure Erase in mock_passphrase_secure_erase() 889 * command with master passphrase. in mock_passphrase_secure_erase() 898 * where a user passphrase is passed in while the user in mock_passphrase_secure_erase() 899 * passphrase is not set. The code will take the assumption that in mock_passphrase_secure_erase() [all …]
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 082.out | 65 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 91 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 117 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 143 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 169 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 195 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 221 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 247 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 288 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 375 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/ |
H A D | Memory_v1.xml | 111 …m="OData.LongDescription" String="This action shall apply the supplied passphrase to the supplied … 117 <Parameter Name="Passphrase" Type="Edm.String" Nullable="false"> 118 … <Annotation Term="OData.Description" String="The passphrase required to complete the operation."/> 119 …n Term="OData.LongDescription" String="This property shall contain the passphrase required to comp… 125 … action shall securely erase the supplied region provided the supplied passphrase matches that of … 131 <Parameter Name="Passphrase" Type="Edm.String" Nullable="false"> 132 <Annotation Term="OData.Description" String="Passphrase for doing the operation."/> 133 …n Term="OData.LongDescription" String="This property shall contain the passphrase used in this act… 199 … action shall securely erase the supplied region provided the supplied passphrase matches that of … 213 <Parameter Name="Passphrase" Type="Edm.String" Nullable="false"> [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/installed/ |
H A D | Memory_v1.xml | 111 …m="OData.LongDescription" String="This action shall apply the supplied passphrase to the supplied … 117 <Parameter Name="Passphrase" Type="Edm.String" Nullable="false"> 118 … <Annotation Term="OData.Description" String="The passphrase required to complete the operation."/> 119 …n Term="OData.LongDescription" String="This property shall contain the passphrase required to comp… 125 … action shall securely erase the supplied region provided the supplied passphrase matches that of … 131 <Parameter Name="Passphrase" Type="Edm.String" Nullable="false"> 132 <Annotation Term="OData.Description" String="Passphrase for doing the operation."/> 133 …n Term="OData.LongDescription" String="This property shall contain the passphrase used in this act… 199 … action shall securely erase the supplied region provided the supplied passphrase matches that of … 213 <Parameter Name="Passphrase" Type="Edm.String" Nullable="false"> [all …]
|
/openbmc/openbmc/poky/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/ |
H A D | wpa_supplicant.conf | 232 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be 233 # generated using the passphrase and SSID). ASCII passphrase must be between 237 # from ASCII passphrase. This process uses lot of CPU and wpa_supplicant 239 # only when the passphrase or SSID has actually changed. 426 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers 429 psk="very secret passphrase" 438 psk="very secret passphrase" 614 psk="secret passphrase" 625 psk="very secret passphrase"
|