| /openbmc/estoraged/include/ |
| H A D | cryptsetupInterface.hpp | 68 const char* passphrase, size_t passphraseSize, 86 size_t volumeKeySize, const char* passphrase, 116 const char* passphrase, size_t passphraseSize, uint32_t flags) = 0; 193 const char* passphrase, size_t passphraseSize, in cryptKeyslotChangeByPassphrase() argument 197 cd, keyslotOld, keyslotNew, passphrase, passphraseSize, in cryptKeyslotChangeByPassphrase() 203 const char* passphrase, in cryptKeyslotAddByVolumeKey() argument 207 cd, keyslot, volumeKey, volumeKeySize, passphrase, passphraseSize); in cryptKeyslotAddByVolumeKey() 218 const char* passphrase, size_t passphraseSize, uint32_t flags) override in cryptActivateByPassphrase() argument 220 return crypt_activate_by_passphrase(cd, name, keyslot, passphrase, in cryptActivateByPassphrase()
|
| /openbmc/openbmc/poky/meta/lib/oe/ |
| H A D | gpg_sign.py | 42 def sign_rpms(self, files, keyid, passphrase, digest, sign_chunk, fsk=None, fsk_password=None): argument 46 …ng --batch --passphrase=%s --agent-program=%s|--auto-expand-secmem' % (passphrase, self.gpg_agent_… 64 …def detach_sign(self, input_file, keyid, passphrase_file, passphrase=None, armor=True, output_suff… argument 67 if passphrase_file and passphrase: 88 passphrase = fobj.readline(); 100 (_, stderr) = job.communicate(passphrase.encode("utf-8"))
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/passwdqc/ |
| H A D | passwdqc_2.0.3.bb | 1 SUMMARY = "A password/passphrase strength checking and enforcement toolset" 3 passwdqc is a password/passphrase strength checking and policy enforcement \ 7 passwd(1). It is capable of checking password or passphrase strength, \ 11 pwqcheck and pwqgen are standalone password/passphrase strength checking \ 12 and random passphrase generator programs, respectively, which are usable \
|
| /openbmc/estoraged/src/test/include/ |
| H A D | estoraged_test.hpp | 62 size_t volumeKeySize, const char* passphrase, 73 const char* passphrase, size_t passphraseSize, 79 const char* passphrase, size_t passphraseSize, uint32_t flags),
|
| /openbmc/qemu/block/ |
| H A D | rbd.c | 349 char **passphrase, in qemu_rbd_convert_luks_options() argument 353 return qcrypto_secret_lookup(luks_opts->key_secret, (uint8_t **)passphrase, in qemu_rbd_convert_luks_options() 360 char **passphrase, in qemu_rbd_convert_luks_create_options() argument 368 passphrase, passphrase_len, errp); in qemu_rbd_convert_luks_create_options() 403 g_autofree char *passphrase = NULL; in qemu_rbd_encryption_format() local 425 &luks_opts.alg, &passphrase, &luks_opts.passphrase_size, in qemu_rbd_encryption_format() 430 luks_opts.passphrase = passphrase; in qemu_rbd_encryption_format() 441 &luks2_opts.alg, &passphrase, &luks2_opts.passphrase_size, in qemu_rbd_encryption_format() 446 luks2_opts.passphrase = passphrase; in qemu_rbd_encryption_format() 486 g_autofree char *passphrase = NULL; in qemu_rbd_encryption_load() local [all …]
|
| /openbmc/openbmc/poky/meta/recipes-support/pinentry/ |
| H A D | pinentry_1.3.1.bb | 1 SUMMARY = "Collection of simple PIN or passphrase entry dialogs" 3 Pinentry is a collection of simple PIN or passphrase entry dialogs which \
|
| /openbmc/openbmc/meta-security/recipes-ids/tripwire/files/ |
| H A D | tripwire.txt | 20 …ic characters for each passphrase. The maximum length of a passphrase is 1023 characters. Quotes s… 22 …passphrase for the site key. The site key passphrase protects the site key, which is used to sign … 24 …e is no way to remove encryption from a signed file if you forget your passphrase. If you forget t…
|
| H A D | twinstall.sh | 285 --local-passphrase $TW_LOCAL_PASS 2> /dev/null
|
| /openbmc/qemu/tests/qemu-iotests/ |
| H A D | 288 | 46 SECRET=secret,id=sec0,data=passphrase
|
| H A D | 082.out | 65 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 91 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 117 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 143 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 169 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 195 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 221 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 247 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 288 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase 375 encrypt.key-secret=<str> - ID of secret providing qcow AES key or LUKS passphrase [all …]
|
| /openbmc/openbmc/poky/meta/recipes-connectivity/wpa-supplicant/ |
| H A D | wpa-supplicant_2.11.bb | 104 PACKAGE_BEFORE_PN += "${PN}-passphrase ${PN}-cli" 112 FILES:${PN}-passphrase = "${sbindir}/wpa_passphrase" 120 RRECOMMENDS:${PN} = "${PN}-passphrase ${PN}-cli ${PN}-plugins"
|
| /openbmc/openbmc/meta-security/recipes-security/fscryptctl/ |
| H A D | fscryptctl_1.1.0.bb | 5 generation, key wrapping, PAM integration, and passphrase hashing, see \
|
| /openbmc/openbmc/poky/meta/classes/ |
| H A D | sign_ipk.bbclass | 11 # Path to a file containing the passphrase of the signing key.
|
| H A D | sign_package_feed.bbclass | 12 # Path to a file containing the passphrase of the signing key.
|
| H A D | sign_rpm.bbclass | 11 # The passphrase of the signing key.
|
| /openbmc/qemu/docs/system/ |
| H A D | qemu-block-drivers.rst.inc | 68 qcow2 header) be encrypted using the LUKS format. The passphrase to 81 - The user passphrase is directly used as the encryption key. A poorly 82 chosen or short passphrase will compromise the security of the encryption. 83 - In the event of the passphrase being compromised there is no way to 84 change the passphrase to protect data in any qcow images. The files must 85 be cloned, using a different encryption passphrase in the new file. The 96 Provides the ID of a ``secret`` object that contains the passphrase 256 Provides the ID of a ``secret`` object that contains the passphrase.
|
| H A D | secrets.rst | 8 devices often require a password, LUKS block devices require a passphrase to
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/liboauth/liboauth/ |
| H A D | 0001-Support-OpenSSL-1.1.0.patch | 32 unsigned char *passphrase = NULL;
|
| /openbmc/openbmc/meta-security/meta-integrity/ |
| H A D | README.md | 127 # When asked for a PEM passphrase, that will be for the root CA. 128 # Signing images then will not require entering that passphrase,
|
| /openbmc/openbmc/poky/documentation/dev-manual/ |
| H A D | packages.rst | 840 # Provide passphrase for the key 841 RPM_GPG_PASSPHRASE = "passphrase" 846 `passphrase`. 871 For signed package feeds, the passphrase must be specified in a separate file, 873 variable. Regarding security, keeping a plain text passphrase out of the
|
| /openbmc/openbmc/poky/meta/classes-global/ |
| H A D | sstate.bbclass | 116 # The GnuPG key ID and passphrase to use to sign sstate archives (or unset to
|
| /openbmc/ |
| D | opengrok1.0.log | [all...] |
| D | opengrok2.0.log | [all...] |