Home
last modified time | relevance | path

Searched refs:passphrase (Results 1 – 23 of 23) sorted by relevance

/openbmc/estoraged/include/
H A DcryptsetupInterface.hpp68 const char* passphrase, size_t passphraseSize,
86 size_t volumeKeySize, const char* passphrase,
116 const char* passphrase, size_t passphraseSize, uint32_t flags) = 0;
193 const char* passphrase, size_t passphraseSize, in cryptKeyslotChangeByPassphrase() argument
197 cd, keyslotOld, keyslotNew, passphrase, passphraseSize, in cryptKeyslotChangeByPassphrase()
203 const char* passphrase, in cryptKeyslotAddByVolumeKey() argument
207 cd, keyslot, volumeKey, volumeKeySize, passphrase, passphraseSize); in cryptKeyslotAddByVolumeKey()
218 const char* passphrase, size_t passphraseSize, uint32_t flags) override in cryptActivateByPassphrase() argument
220 return crypt_activate_by_passphrase(cd, name, keyslot, passphrase, in cryptActivateByPassphrase()
/openbmc/openbmc/poky/meta/lib/oe/
H A Dgpg_sign.py42 def sign_rpms(self, files, keyid, passphrase, digest, sign_chunk, fsk=None, fsk_password=None): argument
46 …ng --batch --passphrase=%s --agent-program=%s|--auto-expand-secmem' % (passphrase, self.gpg_agent_…
64 …def detach_sign(self, input_file, keyid, passphrase_file, passphrase=None, armor=True, output_suff… argument
67 if passphrase_file and passphrase:
88 passphrase = fobj.readline();
100 (_, stderr) = job.communicate(passphrase.encode("utf-8"))
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/passwdqc/
H A Dpasswdqc_2.0.3.bb1 SUMMARY = "A password/passphrase strength checking and enforcement toolset"
3 passwdqc is a password/passphrase strength checking and policy enforcement \
7 passwd(1). It is capable of checking password or passphrase strength, \
11 pwqcheck and pwqgen are standalone password/passphrase strength checking \
12 and random passphrase generator programs, respectively, which are usable \
/openbmc/estoraged/src/test/include/
H A Destoraged_test.hpp62 size_t volumeKeySize, const char* passphrase,
73 const char* passphrase, size_t passphraseSize,
79 const char* passphrase, size_t passphraseSize, uint32_t flags),
/openbmc/qemu/block/
H A Drbd.c349 char **passphrase, in qemu_rbd_convert_luks_options() argument
353 return qcrypto_secret_lookup(luks_opts->key_secret, (uint8_t **)passphrase, in qemu_rbd_convert_luks_options()
360 char **passphrase, in qemu_rbd_convert_luks_create_options() argument
368 passphrase, passphrase_len, errp); in qemu_rbd_convert_luks_create_options()
403 g_autofree char *passphrase = NULL; in qemu_rbd_encryption_format() local
425 &luks_opts.alg, &passphrase, &luks_opts.passphrase_size, in qemu_rbd_encryption_format()
430 luks_opts.passphrase = passphrase; in qemu_rbd_encryption_format()
441 &luks2_opts.alg, &passphrase, &luks2_opts.passphrase_size, in qemu_rbd_encryption_format()
446 luks2_opts.passphrase = passphrase; in qemu_rbd_encryption_format()
486 g_autofree char *passphrase = NULL; in qemu_rbd_encryption_load() local
[all …]
/openbmc/openbmc/poky/meta/recipes-support/pinentry/
H A Dpinentry_1.3.1.bb1 SUMMARY = "Collection of simple PIN or passphrase entry dialogs"
3 Pinentry is a collection of simple PIN or passphrase entry dialogs which \
/openbmc/openbmc/meta-security/recipes-ids/tripwire/files/
H A Dtripwire.txt20 …ic characters for each passphrase. The maximum length of a passphrase is 1023 characters. Quotes s…
22passphrase for the site key. The site key passphrase protects the site key, which is used to sign …
24 …e is no way to remove encryption from a signed file if you forget your passphrase. If you forget t…
H A Dtwinstall.sh285 --local-passphrase $TW_LOCAL_PASS 2> /dev/null
/openbmc/qemu/tests/qemu-iotests/
H A D28846 SECRET=secret,id=sec0,data=passphrase
H A D082.out65 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
91 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
117 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
143 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
169 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
195 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
221 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
247 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
288 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
375 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase
[all …]
/openbmc/openbmc/poky/meta/recipes-connectivity/wpa-supplicant/
H A Dwpa-supplicant_2.11.bb104 PACKAGE_BEFORE_PN += "${PN}-passphrase ${PN}-cli"
112 FILES:${PN}-passphrase = "${sbindir}/wpa_passphrase"
120 RRECOMMENDS:${PN} = "${PN}-passphrase ${PN}-cli ${PN}-plugins"
/openbmc/openbmc/meta-security/recipes-security/fscryptctl/
H A Dfscryptctl_1.1.0.bb5 generation, key wrapping, PAM integration, and passphrase hashing, see \
/openbmc/openbmc/poky/meta/classes/
H A Dsign_ipk.bbclass11 # Path to a file containing the passphrase of the signing key.
H A Dsign_package_feed.bbclass12 # Path to a file containing the passphrase of the signing key.
H A Dsign_rpm.bbclass11 # The passphrase of the signing key.
/openbmc/qemu/docs/system/
H A Dqemu-block-drivers.rst.inc68 qcow2 header) be encrypted using the LUKS format. The passphrase to
81 - The user passphrase is directly used as the encryption key. A poorly
82 chosen or short passphrase will compromise the security of the encryption.
83 - In the event of the passphrase being compromised there is no way to
84 change the passphrase to protect data in any qcow images. The files must
85 be cloned, using a different encryption passphrase in the new file. The
96 Provides the ID of a ``secret`` object that contains the passphrase
256 Provides the ID of a ``secret`` object that contains the passphrase.
H A Dsecrets.rst8 devices often require a password, LUKS block devices require a passphrase to
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/liboauth/liboauth/
H A D0001-Support-OpenSSL-1.1.0.patch32 unsigned char *passphrase = NULL;
/openbmc/openbmc/meta-security/meta-integrity/
H A DREADME.md127 # When asked for a PEM passphrase, that will be for the root CA.
128 # Signing images then will not require entering that passphrase,
/openbmc/openbmc/poky/documentation/dev-manual/
H A Dpackages.rst840 # Provide passphrase for the key
841 RPM_GPG_PASSPHRASE = "passphrase"
846 `passphrase`.
871 For signed package feeds, the passphrase must be specified in a separate file,
873 variable. Regarding security, keeping a plain text passphrase out of the
/openbmc/openbmc/poky/meta/classes-global/
H A Dsstate.bbclass116 # The GnuPG key ID and passphrase to use to sign sstate archives (or unset to
/openbmc/
Dopengrok1.0.log[all...]
Dopengrok2.0.log[all...]