/openbmc/estoraged/include/ |
H A D | cryptsetupInterface.hpp | 59 * @param[in] passphrase - passphrase for new keyslot. 60 * @param[in] passphraseSize - size of passphrase. 61 * @param[in] newPassphrase - new passphrase for the specified keyslot 68 const char* passphrase, size_t passphraseSize, 79 * @param[in] passphrase - passphrase for new keyslot. 80 * @param[in] passphraseSize - size of passphrase. 86 size_t volumeKeySize, const char* passphrase, 106 * passphrase. 108 * @param[in] passphrase - passphrase used to unlock volume key. 109 * @param[in] passphraseSize - size of passphrase. [all …]
|
/openbmc/linux/Documentation/driver-api/nvdimm/ |
D | security.rst |
|
/openbmc/openbmc/poky/meta/lib/oe/ |
H A D | gpg_sign.py | 42 def sign_rpms(self, files, keyid, passphrase, digest, sign_chunk, fsk=None, fsk_password=None): argument 46 …args = '--no-permission-warning --batch --passphrase=%s --agent-program=%s|--auto-expand-secmem' %… 64 …def detach_sign(self, input_file, keyid, passphrase_file, passphrase=None, armor=True, output_suff… argument 67 if passphrase_file and passphrase: 68 raise Exception("You should use either passphrase_file of passphrase, not both") 71 '--no-tty', '--yes', '--passphrase-fd', '0', '-u', keyid] 88 passphrase = fobj.readline(); 100 (_, stderr) = job.communicate(passphrase.encode("utf-8"))
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/passwdqc/ |
H A D | passwdqc_2.0.3.bb | 1 SUMMARY = "A password/passphrase strength checking and enforcement toolset" 3 passwdqc is a password/passphrase strength checking and policy enforcement \ 7 passwd(1). It is capable of checking password or passphrase strength, \ 11 pwqcheck and pwqgen are standalone password/passphrase strength checking \ 12 and random passphrase generator programs, respectively, which are usable \
|
/openbmc/linux/drivers/acpi/nfit/ |
D | intel.h |
|
D | intel.c |
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema-installed/ |
H A D | Memory.v1_21_0.json | 153 "description": "Disables the master passphrase for the given region.", 154 …: "This action shall disable the master passphrase on the supplied region provided the supplied ma… 156 "Passphrase": { object 157 "description": "The master passphrase for the specified region.", 158 … "longDescription": "This parameter shall contain the master passphrase for the specified region.", 163 … "description": "The memory region ID to which to disable the master passphrase.", 164 …n": "This parameter shall contain the memory region ID to which to disable the master passphrase.", 199 "description": "Disable passphrase for the given region.", 200 … the need for passphrases on the supplied region provided the supplied passphrase matches that of … 202 "Passphrase": { object [all …]
|
H A D | AggregationSource.v1_5_0.json | 435 …passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st… 436 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{24,96}$)|(^\\*+$)", 468 …passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st… 469 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{16,64}$)|(^\\*+$)",
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | Memory.v1_21_0.json | 153 "description": "Disables the master passphrase for the given region.", 154 …: "This action shall disable the master passphrase on the supplied region provided the supplied ma… 156 "Passphrase": { object 157 "description": "The master passphrase for the specified region.", 158 … "longDescription": "This parameter shall contain the master passphrase for the specified region.", 163 … "description": "The memory region ID to which to disable the master passphrase.", 164 …n": "This parameter shall contain the memory region ID to which to disable the master passphrase.", 199 "description": "Disable passphrase for the given region.", 200 … the need for passphrases on the supplied region provided the supplied passphrase matches that of … 202 "Passphrase": { object [all …]
|
H A D | AggregationSource.v1_5_0.json | 435 …passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st… 436 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{24,96}$)|(^\\*+$)", 468 …passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st… 469 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{16,64}$)|(^\\*+$)",
|
H A D | ManagerAccount.v1_14_0.json | 601 …passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st… 602 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{24,96})|(^\\*+$)", 634 …passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st… 635 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{16,64}$)|(^\\*+$)",
|
/openbmc/openbmc/meta-security/recipes-ids/tripwire/files/ |
H A D | tripwire.txt | 20 …ic characters for each passphrase. The maximum length of a passphrase is 1023 characters. Quotes s… 22 …passphrase for the site key. The site key passphrase protects the site key, which is used to sign … 24 …e is no way to remove encryption from a signed file if you forget your passphrase. If you forget t…
|
H A D | twinstall.sh | 32 # Site Passphrase variable 38 # Local Passphrase variable 77 ## If user has to enter a passphrase, give some 122 cmdargs="$cmdargs --site-passphrase \"$TW_SITE_PASS\"" 150 cmdargs="$cmdargs --local-passphrase \"$TW_LOCAL_PASS\"" 191 cmdargs="$cmdargs --site-passphrase \"$TW_SITE_PASS\"" 251 cmdargs="$cmdargs --site-passphrase \"$TW_SITE_PASS\"" 285 --local-passphrase $TW_LOCAL_PASS 2> /dev/null
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Inventory/Item/PersistentMemory/ |
H A D | SecurityCapabilities.interface.yaml | 11 Memory passphrase set capability. 23 The maximum number of incorrect passphrase attempts allowed before
|
/openbmc/estoraged/src/test/include/ |
H A D | estoraged_test.hpp | 54 size_t volumeKeySize, const char* passphrase, 65 const char* passphrase, size_t passphraseSize, 71 const char* passphrase, size_t passphraseSize, uint32_t flags),
|
/openbmc/qemu/block/ |
H A D | rbd.c | 351 char **passphrase, in qemu_rbd_convert_luks_options() argument 355 return qcrypto_secret_lookup(luks_opts->key_secret, (uint8_t **)passphrase, in qemu_rbd_convert_luks_options() 362 char **passphrase, in qemu_rbd_convert_luks_create_options() argument 370 passphrase, passphrase_len, errp); in qemu_rbd_convert_luks_create_options() 405 g_autofree char *passphrase = NULL; in qemu_rbd_encryption_format() local 427 &luks_opts.alg, &passphrase, &luks_opts.passphrase_size, in qemu_rbd_encryption_format() 432 luks_opts.passphrase = passphrase; in qemu_rbd_encryption_format() 443 &luks2_opts.alg, &passphrase, &luks2_opts.passphrase_size, in qemu_rbd_encryption_format() 448 luks2_opts.passphrase = passphrase; in qemu_rbd_encryption_format() 488 g_autofree char *passphrase = NULL; in qemu_rbd_encryption_load() local [all …]
|
/openbmc/linux/Documentation/process/ |
D | maintainer-pgp-guide.rst |
|
/openbmc/openbmc/poky/meta/recipes-support/pinentry/ |
H A D | pinentry_1.3.1.bb | 1 SUMMARY = "Collection of simple PIN or passphrase entry dialogs" 3 Pinentry is a collection of simple PIN or passphrase entry dialogs which \
|
/openbmc/linux/Documentation/translations/it_IT/process/ |
D | maintainer-pgp-guide.rst |
|
/openbmc/linux/tools/testing/cxl/test/ |
D | mem.c |
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 082.out | 65 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 91 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 117 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 143 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 169 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 195 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 221 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 247 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 288 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 375 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/installed/ |
H A D | Memory_v1.xml | 111 …m="OData.LongDescription" String="This action shall apply the supplied passphrase to the supplied … 117 <Parameter Name="Passphrase" Type="Edm.String" Nullable="false"> 118 … <Annotation Term="OData.Description" String="The passphrase required to complete the operation."/> 119 …n Term="OData.LongDescription" String="This property shall contain the passphrase required to comp… 125 … action shall securely erase the supplied region provided the supplied passphrase matches that of … 131 <Parameter Name="Passphrase" Type="Edm.String" Nullable="false"> 132 <Annotation Term="OData.Description" String="Passphrase for doing the operation."/> 133 …n Term="OData.LongDescription" String="This property shall contain the passphrase used in this act… 199 … action shall securely erase the supplied region provided the supplied passphrase matches that of … 213 <Parameter Name="Passphrase" Type="Edm.String" Nullable="false"> [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/ |
H A D | Memory_v1.xml | 111 …m="OData.LongDescription" String="This action shall apply the supplied passphrase to the supplied … 117 <Parameter Name="Passphrase" Type="Edm.String" Nullable="false"> 118 … <Annotation Term="OData.Description" String="The passphrase required to complete the operation."/> 119 …n Term="OData.LongDescription" String="This property shall contain the passphrase required to comp… 125 … action shall securely erase the supplied region provided the supplied passphrase matches that of … 131 <Parameter Name="Passphrase" Type="Edm.String" Nullable="false"> 132 <Annotation Term="OData.Description" String="Passphrase for doing the operation."/> 133 …n Term="OData.LongDescription" String="This property shall contain the passphrase used in this act… 199 … action shall securely erase the supplied region provided the supplied passphrase matches that of … 213 <Parameter Name="Passphrase" Type="Edm.String" Nullable="false"> [all …]
|
/openbmc/linux/Documentation/filesystems/ |
D | ecryptfs.rst |
|
/openbmc/openbmc/poky/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/ |
H A D | wpa_supplicant.conf | 232 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be 233 # generated using the passphrase and SSID). ASCII passphrase must be between 237 # from ASCII passphrase. This process uses lot of CPU and wpa_supplicant 239 # only when the passphrase or SSID has actually changed. 426 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers 429 psk="very secret passphrase" 438 psk="very secret passphrase" 614 psk="secret passphrase" 625 psk="very secret passphrase"
|