| /OK3568_Linux_fs/kernel/Documentation/driver-api/nvdimm/ |
| H A D | security.rst | 10 security DSMs: "get security state", "set passphrase", "disable passphrase", 28 update <old_keyid> <new_keyid> - enable or update passphrase. 33 master_update <keyid> <new_keyid> - enable or update master passphrase. 42 The DIMM id would be provided along with the key payload (passphrase) to 46 key "passphrase" is expected to be 32bytes long. This is similar to the ATA 66 the passphrase for the respective nvdimms. It is also recommended that the 93 An key with the current passphrase payload that is tied to the nvdimm should be 101 An key with the current passphrase payload that is tied to the nvdimm should be 115 An encrypted-key with the current user passphrase that is tied to the nvdimm 124 master passphrase key is passed to the kernel. The master passphrase key [all …]
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/mvl88w8977/mlan/esa/common/ |
| H A D | pmkCache.c | 93 pPassphrase = pPMKElement->passphrase; in pmkCacheFindPassphrase() 187 pPassphrase = psk->psk.passphrase.passphrase; in SupplicantSetPassphrase() 191 psk->psk.passphrase.passphrase_len)); in SupplicantSetPassphrase() 244 pPassphrase = psk->psk.passphrase.passphrase; in SupplicantClearPMK_internal() 295 memcpy(util_fns, psk->psk.passphrase.passphrase, in SupplicantQueryPassphrase() 297 psk->psk.passphrase.passphrase_len = in SupplicantQueryPassphrase()
|
| H A D | pmkCache_rom.h | 43 UINT8 passphrase[PSK_PASS_PHRASE_LEN_MAX]; member
|
| /OK3568_Linux_fs/kernel/drivers/acpi/nfit/ |
| H A D | intel.h | 77 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member 82 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member 91 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member 96 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member 111 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member
|
| H A D | intel.c | 216 memcpy(nd_cmd.cmd.passphrase, key_data->data, in intel_security_unlock() 217 sizeof(nd_cmd.cmd.passphrase)); in intel_security_unlock() 257 memcpy(nd_cmd.cmd.passphrase, key_data->data, in intel_security_disable() 258 sizeof(nd_cmd.cmd.passphrase)); in intel_security_disable() 302 memcpy(nd_cmd.cmd.passphrase, key->data, in intel_security_erase() 303 sizeof(nd_cmd.cmd.passphrase)); in intel_security_erase() 385 memcpy(nd_cmd.cmd.passphrase, nkey->data, in intel_security_overwrite() 386 sizeof(nd_cmd.cmd.passphrase)); in intel_security_overwrite()
|
| /OK3568_Linux_fs/yocto/poky/meta/lib/oe/ |
| H A D | gpg_sign.py | 39 def sign_rpms(self, files, keyid, passphrase, digest, sign_chunk, fsk=None, fsk_password=None): argument 43 …ng --batch --passphrase=%s --agent-program=%s|--auto-expand-secmem' % (passphrase, self.gpg_agent_… 61 …def detach_sign(self, input_file, keyid, passphrase_file, passphrase=None, armor=True, output_suff… argument 64 if passphrase_file and passphrase: 89 passphrase = fobj.readline(); 92 (_, stderr) = job.communicate(passphrase.encode("utf-8"))
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-security/passwdqc/ |
| H A D | passwdqc_1.3.1.bb | 1 SUMMARY = "A password/passphrase strength checking and enforcement toolset" 3 passwdqc is a password/passphrase strength checking and policy enforcement \ 7 passwd(1). It is capable of checking password or passphrase strength, \ 11 pwqcheck and pwqgen are standalone password/passphrase strength checking \ 12 and random passphrase generator programs, respectively, which are usable \
|
| /OK3568_Linux_fs/app/forlinx/flapp/src/plugins/wifi/ |
| H A D | hostapdcli.cpp | 34 QString passphrase; member in HostapdcliPrivate 152 void Hostapdcli::setWifiPassword(const QString &passphrase) in setWifiPassword() argument 154 m_d->passphrase = passphrase; in setWifiPassword() 155 send(QString(AP_WPA_PASSPHRASE).arg(passphrase)); in setWifiPassword() 278 }else if(cmdHead.contains(QString(AP_WPA_PASSPHRASE).arg(passphrase))) in handCmdMessage()
|
| H A D | hostapdcli.h | 49 void setWifiPassword(const QString &passphrase);
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-python/recipes-devtools/python/python-pygpgme/ |
| H A D | 0003-handle-generic-error-when-no-passphrase-callback-pre.patch | 4 Subject: [PATCH] handle generic error when no passphrase callback present 7 in loopback mode and no passphrase callback was supplied. Earlier
|
| H A D | 0002-passphrase_cb-is-deprecated.patch | 10 installations -- just strip out all passphrase handling from your 15 However, if a developer really wants to use the passphrase callback
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/pinentry/ |
| H A D | pinentry_1.2.0.bb | 1 SUMMARY = "Collection of simple PIN or passphrase entry dialogs" 3 Pinentry is a collection of simple PIN or passphrase entry dialogs which \
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/wpa-supplicant/ |
| H A D | wpa-supplicant_2.10.bb | 11 RRECOMMENDS:${PN} = "wpa-supplicant-passphrase wpa-supplicant-cli" 35 PACKAGES:prepend = "wpa-supplicant-passphrase wpa-supplicant-cli " 36 FILES:wpa-supplicant-passphrase = "${bindir}/wpa_passphrase"
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/marvell/mwifiex/ |
| H A D | uap_cmd.c | 312 struct host_cmd_tlv_passphrase *passphrase; in mwifiex_uap_bss_wpa() local 363 passphrase = (struct host_cmd_tlv_passphrase *)tlv; in mwifiex_uap_bss_wpa() 364 passphrase->header.type = in mwifiex_uap_bss_wpa() 366 passphrase->header.len = cpu_to_le16(bss_cfg->wpa_cfg.length); in mwifiex_uap_bss_wpa() 367 memcpy(passphrase->passphrase, bss_cfg->wpa_cfg.passphrase, in mwifiex_uap_bss_wpa()
|
| /OK3568_Linux_fs/kernel/Documentation/process/ |
| H A D | maintainer-pgp-guide.rst | 99 of caching the private key passphrase. There are two options you should 100 know in order to tweak when the passphrase should be expired from cache: 106 the key since initial passphrase entry, if the maximum time-to-live 107 countdown expires, you'll have to enter the passphrase again. The 202 Ensure your passphrase is strong 208 obtaining the passphrase to decrypt them. 211 strong passphrase. To set it or change it, use:: 213 $ gpg --change-passphrase [fpr] 266 pen and write your passphrase on the margin of the paper. **This is 268 that passphrase, and if you ever change it you will not remember what it [all …]
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/nxp/mlinux/ |
| H A D | moal_priv.c | 3763 sec->param.passphrase.ssid.ssid_len = strlen(end); in woal_passphrase() 3765 sec->param.passphrase.ssid.ssid, end, in woal_passphrase() 3768 sec->param.passphrase.ssid.ssid, in woal_passphrase() 3769 (int)sec->param.passphrase.ssid.ssid_len); in woal_passphrase() 3771 woal_mac2u8(sec->param.passphrase.bssid, end); in woal_passphrase() 3780 (t_u8 *)(sec->param.passphrase.psk.pmk.pmk), in woal_passphrase() 3782 sec->param.passphrase.psk_type = MLAN_PSK_PMK; in woal_passphrase() 3792 sec->param.passphrase.psk_type = MLAN_PSK_PASSPHRASE; in woal_passphrase() 3795 sec->param.passphrase.psk.passphrase.passphrase, in woal_passphrase() 3797 sizeof(sec->param.passphrase.psk.passphrase in woal_passphrase() [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/translations/it_IT/process/ |
| H A D | maintainer-pgp-guide.rst | 107 individuare la passphrase. Ci sono due opzioni che dovreste conoscere 108 per personalizzare la scadenza della passphrase nella cache: 115 uso della chiave da quando avete inserito la passphrase, se il massimo 116 time-to-live è scaduto, dovrete reinserire nuovamente la passphrase. 212 Assicuratevi che la vostra passphrase sia forte 219 aver prima ottenuto la passphrase per decriptarle. 222 una passphrase forte. Per impostarla o cambiarla, usate:: 224 $ gpg --change-passphrase [fpr] 277 la passphrase, e se mai doveste cambiarla non vi ricorderete qual'era al 280 Mettete la copia cartacea e la passphrase scritta a mano in una busta e [all …]
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/mvl88w8977/mlinux/ |
| H A D | moal_priv.c | 3960 sec->param.passphrase.ssid.ssid_len = strlen(end); in woal_passphrase() 3961 strncpy((char *)sec->param.passphrase.ssid.ssid, end, in woal_passphrase() 3964 sec->param.passphrase.ssid.ssid, in woal_passphrase() 3965 (int)sec->param.passphrase.ssid.ssid_len); in woal_passphrase() 3967 woal_mac2u8(sec->param.passphrase.bssid, end); in woal_passphrase() 3975 woal_ascii2hex((t_u8 *)(sec->param.passphrase.psk.pmk. in woal_passphrase() 3978 sec->param.passphrase.psk_type = MLAN_PSK_PMK; in woal_passphrase() 3988 sec->param.passphrase.psk_type = MLAN_PSK_PASSPHRASE; in woal_passphrase() 3989 memcpy(sec->param.passphrase.psk.passphrase.passphrase, in woal_passphrase() 3991 sizeof(sec->param.passphrase.psk.passphrase. in woal_passphrase() [all …]
|
| H A D | moal_eth_ioctl.c | 2023 sec->param.passphrase.ssid.ssid_len = strlen(end); in woal_setget_priv_passphrase() 2024 strncpy((char *)sec->param.passphrase.ssid.ssid, end, in woal_setget_priv_passphrase() 2027 sec->param.passphrase.ssid.ssid, in woal_setget_priv_passphrase() 2028 (int)sec->param.passphrase.ssid.ssid_len); in woal_setget_priv_passphrase() 2030 woal_mac2u8((t_u8 *)&sec->param.passphrase.bssid, end); in woal_setget_priv_passphrase() 2038 woal_ascii2hex((t_u8 *)(sec->param.passphrase.psk.pmk. in woal_setget_priv_passphrase() 2041 sec->param.passphrase.psk_type = MLAN_PSK_PMK; in woal_setget_priv_passphrase() 2051 sec->param.passphrase.psk_type = MLAN_PSK_PASSPHRASE; in woal_setget_priv_passphrase() 2052 memcpy(sec->param.passphrase.psk.passphrase.passphrase, in woal_setget_priv_passphrase() 2054 sizeof(sec->param.passphrase.psk.passphrase. in woal_setget_priv_passphrase() [all …]
|
| /OK3568_Linux_fs/kernel/tools/testing/nvdimm/test/ |
| H A D | nfit.c | 143 u8 passphrase[32]; member 972 } else if (memcmp(nd_cmd->passphrase, sec->passphrase, in nd_intel_test_cmd_unlock_unit() 996 } else if (memcmp(nd_cmd->old_pass, sec->passphrase, in nd_intel_test_cmd_set_pass() 1001 memcpy(sec->passphrase, nd_cmd->new_pass, in nd_intel_test_cmd_set_pass() 1041 } else if (memcmp(nd_cmd->passphrase, sec->passphrase, in nd_intel_test_cmd_disable_pass() 1046 memset(sec->passphrase, 0, ND_INTEL_PASSPHRASE_SIZE); in nd_intel_test_cmd_disable_pass() 1064 } else if (memcmp(nd_cmd->passphrase, sec->passphrase, in nd_intel_test_cmd_secure_erase() 1070 && (memcmp(nd_cmd->passphrase, zero_key, in nd_intel_test_cmd_secure_erase() 1075 memset(sec->passphrase, 0, ND_INTEL_PASSPHRASE_SIZE); in nd_intel_test_cmd_secure_erase() 1093 memcmp(nd_cmd->passphrase, sec->passphrase, in nd_intel_test_cmd_overwrite() [all …]
|
| /OK3568_Linux_fs/buildroot/package/ecryptfs-utils/ |
| H A D | Config.in | 26 Files are encrypted using a passphrase. Consider building
|
| /OK3568_Linux_fs/yocto/poky/meta/classes/ |
| H A D | sign_ipk.bbclass | 5 # Path to a file containing the passphrase of the signing key.
|
| H A D | sign_package_feed.bbclass | 6 # Path to a file containing the passphrase of the signing key.
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/mvl88w8977/mlan/esa/ |
| H A D | hostsa_ext_def.h | 393 t_u8 passphrase[64]; member 556 t_u8 passphrase[MLAN_MAX_PASSPHRASE_LENGTH]; member 581 mlan_passphrase_t passphrase; member
|
| H A D | authenticator_api.c | 229 memcpy(util_fns, bss_config->wpa_cfg.passphrase, in AuthenticatorGetBssConfig() 351 bss_config->wpa_cfg.passphrase, in AuthenticatorGetBssConfig() 359 bss_config->wpa_cfg.passphrase, in AuthenticatorGetBssConfig()
|