Home
last modified time | relevance | path

Searched full:passphrase (Results 1 – 25 of 77) sorted by relevance

1234

/openbmc/estoraged/include/
H A DcryptsetupInterface.hpp59 * @param[in] passphrase - passphrase for new keyslot.
60 * @param[in] passphraseSize - size of passphrase.
61 * @param[in] newPassphrase - new passphrase for the specified keyslot
68 const char* passphrase, size_t passphraseSize,
79 * @param[in] passphrase - passphrase for new keyslot.
80 * @param[in] passphrase_size - size of passphrase.
86 size_t volumeKeySize, const char* passphrase,
106 * passphrase.
108 * @param[in] passphrase - passphrase used to unlock volume key.
109 * @param[in] passphrase_size - size of passphrase.
[all …]
/openbmc/linux/Documentation/driver-api/nvdimm/
H A Dsecurity.rst10 security DSMs: "get security state", "set passphrase", "disable passphrase",
28 update <old_keyid> <new_keyid> - enable or update passphrase.
33 master_update <keyid> <new_keyid> - enable or update master passphrase.
42 The DIMM id would be provided along with the key payload (passphrase) to
46 key "passphrase" is expected to be 32bytes long. This is similar to the ATA
66 the passphrase for the respective nvdimms. It is also recommended that the
93 An key with the current passphrase payload that is tied to the nvdimm should be
101 An key with the current passphrase payload that is tied to the nvdimm should be
115 An encrypted-key with the current user passphrase that is tied to the nvdimm
124 master passphrase key is passed to the kernel. The master passphrase key
[all …]
/openbmc/openbmc/poky/meta/lib/oe/
H A Dgpg_sign.py42 def sign_rpms(self, files, keyid, passphrase, digest, sign_chunk, fsk=None, fsk_password=None): argument
46 …args = '--no-permission-warning --batch --passphrase=%s --agent-program=%s|--auto-expand-secmem' %…
64 …def detach_sign(self, input_file, keyid, passphrase_file, passphrase=None, armor=True, output_suff… argument
67 if passphrase_file and passphrase:
68 raise Exception("You should use either passphrase_file of passphrase, not both")
71 '--no-tty', '--yes', '--passphrase-fd', '0', '-u', keyid]
88 passphrase = fobj.readline();
100 (_, stderr) = job.communicate(passphrase.encode("utf-8"))
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/
H A DMemory.v1_20_0.json150 "description": "Disables the master passphrase for the given region.",
151 …: "This action shall disable the master passphrase on the supplied region provided the supplied ma…
153 "Passphrase": { object
154 "description": "The master passphrase for the specified region.",
155 … "longDescription": "This parameter shall contain the master passphrase for the specified region.",
160 … "description": "The memory region ID to which to disable the master passphrase.",
161 …n": "This parameter shall contain the memory region ID to which to disable the master passphrase.",
196 "description": "Disable passphrase for the given region.",
197 … the need for passphrases on the supplied region provided the supplied passphrase matches that of …
199 "Passphrase": { object
[all …]
H A DAggregationSource.v1_4_3.json414passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st…
415 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{24,96}$)|(^\\*+$)",
447passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st…
448 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{16,64}$)|(^\\*+$)",
H A DManagerAccount.v1_13_0.json601passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st…
602 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{24,96})|(^\\*+$)",
634passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st…
635 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{16,64}$)|(^\\*+$)",
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema-installed/
H A DMemory.v1_20_0.json150 "description": "Disables the master passphrase for the given region.",
151 …: "This action shall disable the master passphrase on the supplied region provided the supplied ma…
153 "Passphrase": { object
154 "description": "The master passphrase for the specified region.",
155 … "longDescription": "This parameter shall contain the master passphrase for the specified region.",
160 … "description": "The memory region ID to which to disable the master passphrase.",
161 …n": "This parameter shall contain the memory region ID to which to disable the master passphrase.",
196 "description": "Disable passphrase for the given region.",
197 … the need for passphrases on the supplied region provided the supplied passphrase matches that of …
199 "Passphrase": { object
[all …]
H A DAggregationSource.v1_4_3.json414passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st…
415 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{24,96}$)|(^\\*+$)",
447passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st…
448 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{16,64}$)|(^\\*+$)",
H A DManagerAccount.v1_13_0.json601passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st…
602 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{24,96})|(^\\*+$)",
634passphrase or a hex-encoded key. If the string starts with `Passphrase:`, the remainder of the st…
635 … "pattern": "(^[ -~]+$)|(^Passphrase:[ -~]+$)|(^Hex:[0-9A-Fa-f]{16,64}$)|(^\\*+$)",
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/passwdqc/
H A Dpasswdqc_2.0.3.bb1 SUMMARY = "A password/passphrase strength checking and enforcement toolset"
3 passwdqc is a password/passphrase strength checking and policy enforcement \
7 passwd(1). It is capable of checking password or passphrase strength, \
11 pwqcheck and pwqgen are standalone password/passphrase strength checking \
12 and random passphrase generator programs, respectively, which are usable \
/openbmc/linux/drivers/acpi/nfit/
H A Dintel.h77 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member
82 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member
91 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member
96 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member
111 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member
H A Dintel.c215 memcpy(nd_cmd.cmd.passphrase, key_data->data, in intel_security_unlock()
216 sizeof(nd_cmd.cmd.passphrase)); in intel_security_unlock()
253 memcpy(nd_cmd.cmd.passphrase, key_data->data, in intel_security_disable()
254 sizeof(nd_cmd.cmd.passphrase)); in intel_security_disable()
296 memcpy(nd_cmd.cmd.passphrase, key->data, in intel_security_erase()
297 sizeof(nd_cmd.cmd.passphrase)); in intel_security_erase()
373 memcpy(nd_cmd.cmd.passphrase, nkey->data, in intel_security_overwrite()
374 sizeof(nd_cmd.cmd.passphrase)); in intel_security_overwrite()
/openbmc/openbmc/meta-security/recipes-ids/tripwire/files/
H A Dtripwire.txt20 …ic characters for each passphrase. The maximum length of a passphrase is 1023 characters. Quotes s…
22passphrase for the site key. The site key passphrase protects the site key, which is used to sign …
24 …e is no way to remove encryption from a signed file if you forget your passphrase. If you forget t…
H A Dtwinstall.sh32 # Site Passphrase variable
38 # Local Passphrase variable
77 ## If user has to enter a passphrase, give some
122 cmdargs="$cmdargs --site-passphrase \"$TW_SITE_PASS\""
150 cmdargs="$cmdargs --local-passphrase \"$TW_LOCAL_PASS\""
191 cmdargs="$cmdargs --site-passphrase \"$TW_SITE_PASS\""
251 cmdargs="$cmdargs --site-passphrase \"$TW_SITE_PASS\""
285 --local-passphrase $TW_LOCAL_PASS 2> /dev/null
/openbmc/qemu/block/
H A Drbd.c344 char **passphrase, in qemu_rbd_convert_luks_options() argument
348 return qcrypto_secret_lookup(luks_opts->key_secret, (uint8_t **)passphrase, in qemu_rbd_convert_luks_options()
355 char **passphrase, in qemu_rbd_convert_luks_create_options() argument
363 passphrase, passphrase_len, errp); in qemu_rbd_convert_luks_create_options()
398 g_autofree char *passphrase = NULL; in qemu_rbd_encryption_format() local
420 &luks_opts.alg, &passphrase, &luks_opts.passphrase_size, in qemu_rbd_encryption_format()
425 luks_opts.passphrase = passphrase; in qemu_rbd_encryption_format()
436 &luks2_opts.alg, &passphrase, &luks2_opts.passphrase_size, in qemu_rbd_encryption_format()
441 luks2_opts.passphrase = passphrase; in qemu_rbd_encryption_format()
479 g_autofree char *passphrase = NULL; in qemu_rbd_encryption_load() local
[all …]
/openbmc/estoraged/src/test/include/
H A Destoraged_test.hpp54 size_t volume_key_size, const char* passphrase,
65 const char* passphrase, size_t passphraseSize,
71 const char* passphrase, size_t passphrase_size,
/openbmc/linux/Documentation/process/
H A Dmaintainer-pgp-guide.rst81 of caching the private key passphrase. There are two options you should
82 know in order to tweak when the passphrase should be expired from cache:
88 the key since initial passphrase entry, if the maximum time-to-live
89 countdown expires, you'll have to enter the passphrase again. The
180 Ensure your passphrase is strong
186 obtaining the passphrase to decrypt them.
189 strong passphrase. To set it or change it, use::
191 $ gpg --change-passphrase [fpr]
228 pen and write your passphrase on the margin of the paper. **This is
230 that passphrase, and if you ever change it you will not remember what it
[all …]
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Inventory/Item/PersistentMemory/
H A DSecurityCapabilities.interface.yaml11 Memory passphrase set capability.
23 The maximum number of incorrect passphrase attempts allowed before
/openbmc/linux/Documentation/translations/it_IT/process/
H A Dmaintainer-pgp-guide.rst89 individuare la passphrase. Ci sono due opzioni che dovreste conoscere
90 per personalizzare la scadenza della passphrase nella cache:
97 uso della chiave da quando avete inserito la passphrase, se il massimo
98 time-to-live è scaduto, dovrete reinserire nuovamente la passphrase.
189 Assicuratevi che la vostra passphrase sia forte
196 aver prima ottenuto la passphrase per decriptarle.
199 una passphrase forte. Per impostarla o cambiarla, usate::
201 $ gpg --change-passphrase [fpr]
244 la passphrase, e se mai doveste cambiarla non vi ricorderete qual'era al
247 Mettete la copia cartacea e la passphrase scritta a mano in una busta e
[all …]
/openbmc/openbmc/poky/meta/recipes-support/pinentry/
H A Dpinentry_1.3.1.bb1 SUMMARY = "Collection of simple PIN or passphrase entry dialogs"
3 Pinentry is a collection of simple PIN or passphrase entry dialogs which \
/openbmc/linux/tools/testing/cxl/test/
H A Dmem.c671 * the security disabled state when the user passphrase is not set. in mock_set_passphrase()
867 * where a master passphrase is passed in while the master in mock_passphrase_secure_erase()
868 * passphrase is not set and user passphrase is not set. The in mock_passphrase_secure_erase()
870 * as a CXL secure erase command without passphrase (0x4401). in mock_passphrase_secure_erase()
886 * CXL rev3 8.2.9.8.6.3 Disable Passphrase in mock_passphrase_secure_erase()
887 * When master passphrase is disabled, the device shall in mock_passphrase_secure_erase()
888 * return Invalid Input for the Passphrase Secure Erase in mock_passphrase_secure_erase()
889 * command with master passphrase. in mock_passphrase_secure_erase()
898 * where a user passphrase is passed in while the user in mock_passphrase_secure_erase()
899 * passphrase is not set. The code will take the assumption that in mock_passphrase_secure_erase()
[all …]
/openbmc/qemu/tests/qemu-iotests/
H A D082.out65 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
91 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
117 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
143 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
169 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
195 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
221 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
247 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
288 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
375 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
[all …]
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/
H A DMemory_v1.xml111 …m="OData.LongDescription" String="This action shall apply the supplied passphrase to the supplied …
117 <Parameter Name="Passphrase" Type="Edm.String" Nullable="false">
118 … <Annotation Term="OData.Description" String="The passphrase required to complete the operation."/>
119 …n Term="OData.LongDescription" String="This property shall contain the passphrase required to comp…
125 … action shall securely erase the supplied region provided the supplied passphrase matches that of …
131 <Parameter Name="Passphrase" Type="Edm.String" Nullable="false">
132 <Annotation Term="OData.Description" String="Passphrase for doing the operation."/>
133 …n Term="OData.LongDescription" String="This property shall contain the passphrase used in this act…
199 … action shall securely erase the supplied region provided the supplied passphrase matches that of …
213 <Parameter Name="Passphrase" Type="Edm.String" Nullable="false">
[all …]
/openbmc/bmcweb/redfish-core/schema/dmtf/installed/
H A DMemory_v1.xml111 …m="OData.LongDescription" String="This action shall apply the supplied passphrase to the supplied …
117 <Parameter Name="Passphrase" Type="Edm.String" Nullable="false">
118 … <Annotation Term="OData.Description" String="The passphrase required to complete the operation."/>
119 …n Term="OData.LongDescription" String="This property shall contain the passphrase required to comp…
125 … action shall securely erase the supplied region provided the supplied passphrase matches that of …
131 <Parameter Name="Passphrase" Type="Edm.String" Nullable="false">
132 <Annotation Term="OData.Description" String="Passphrase for doing the operation."/>
133 …n Term="OData.LongDescription" String="This property shall contain the passphrase used in this act…
199 … action shall securely erase the supplied region provided the supplied passphrase matches that of …
213 <Parameter Name="Passphrase" Type="Edm.String" Nullable="false">
[all …]
/openbmc/openbmc/poky/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/
H A Dwpa_supplicant.conf232 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be
233 # generated using the passphrase and SSID). ASCII passphrase must be between
237 # from ASCII passphrase. This process uses lot of CPU and wpa_supplicant
239 # only when the passphrase or SSID has actually changed.
426 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers
429 psk="very secret passphrase"
438 psk="very secret passphrase"
614 psk="secret passphrase"
625 psk="very secret passphrase"

1234