Home
last modified time | relevance | path

Searched refs:passphrase (Results 1 – 25 of 94) sorted by relevance

1234

/OK3568_Linux_fs/kernel/Documentation/driver-api/nvdimm/
H A Dsecurity.rst10 security DSMs: "get security state", "set passphrase", "disable passphrase",
28 update <old_keyid> <new_keyid> - enable or update passphrase.
33 master_update <keyid> <new_keyid> - enable or update master passphrase.
42 The DIMM id would be provided along with the key payload (passphrase) to
46 key "passphrase" is expected to be 32bytes long. This is similar to the ATA
66 the passphrase for the respective nvdimms. It is also recommended that the
93 An key with the current passphrase payload that is tied to the nvdimm should be
101 An key with the current passphrase payload that is tied to the nvdimm should be
115 An encrypted-key with the current user passphrase that is tied to the nvdimm
124 master passphrase key is passed to the kernel. The master passphrase key
[all …]
/OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/mvl88w8977/mlan/esa/common/
H A DpmkCache.c93 pPassphrase = pPMKElement->passphrase; in pmkCacheFindPassphrase()
187 pPassphrase = psk->psk.passphrase.passphrase; in SupplicantSetPassphrase()
191 psk->psk.passphrase.passphrase_len)); in SupplicantSetPassphrase()
244 pPassphrase = psk->psk.passphrase.passphrase; in SupplicantClearPMK_internal()
295 memcpy(util_fns, psk->psk.passphrase.passphrase, in SupplicantQueryPassphrase()
297 psk->psk.passphrase.passphrase_len = in SupplicantQueryPassphrase()
H A DpmkCache_rom.h43 UINT8 passphrase[PSK_PASS_PHRASE_LEN_MAX]; member
/OK3568_Linux_fs/kernel/drivers/acpi/nfit/
H A Dintel.h77 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member
82 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member
91 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member
96 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member
111 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member
H A Dintel.c216 memcpy(nd_cmd.cmd.passphrase, key_data->data, in intel_security_unlock()
217 sizeof(nd_cmd.cmd.passphrase)); in intel_security_unlock()
257 memcpy(nd_cmd.cmd.passphrase, key_data->data, in intel_security_disable()
258 sizeof(nd_cmd.cmd.passphrase)); in intel_security_disable()
302 memcpy(nd_cmd.cmd.passphrase, key->data, in intel_security_erase()
303 sizeof(nd_cmd.cmd.passphrase)); in intel_security_erase()
385 memcpy(nd_cmd.cmd.passphrase, nkey->data, in intel_security_overwrite()
386 sizeof(nd_cmd.cmd.passphrase)); in intel_security_overwrite()
/OK3568_Linux_fs/yocto/poky/meta/lib/oe/
H A Dgpg_sign.py39 def sign_rpms(self, files, keyid, passphrase, digest, sign_chunk, fsk=None, fsk_password=None): argument
43 …ng --batch --passphrase=%s --agent-program=%s|--auto-expand-secmem' % (passphrase, self.gpg_agent_…
61 …def detach_sign(self, input_file, keyid, passphrase_file, passphrase=None, armor=True, output_suff… argument
64 if passphrase_file and passphrase:
89 passphrase = fobj.readline();
92 (_, stderr) = job.communicate(passphrase.encode("utf-8"))
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-security/passwdqc/
H A Dpasswdqc_1.3.1.bb1 SUMMARY = "A password/passphrase strength checking and enforcement toolset"
3 passwdqc is a password/passphrase strength checking and policy enforcement \
7 passwd(1). It is capable of checking password or passphrase strength, \
11 pwqcheck and pwqgen are standalone password/passphrase strength checking \
12 and random passphrase generator programs, respectively, which are usable \
/OK3568_Linux_fs/app/forlinx/flapp/src/plugins/wifi/
H A Dhostapdcli.cpp34 QString passphrase; member in HostapdcliPrivate
152 void Hostapdcli::setWifiPassword(const QString &passphrase) in setWifiPassword() argument
154 m_d->passphrase = passphrase; in setWifiPassword()
155 send(QString(AP_WPA_PASSPHRASE).arg(passphrase)); in setWifiPassword()
278 }else if(cmdHead.contains(QString(AP_WPA_PASSPHRASE).arg(passphrase))) in handCmdMessage()
H A Dhostapdcli.h49 void setWifiPassword(const QString &passphrase);
/OK3568_Linux_fs/yocto/meta-openembedded/meta-python/recipes-devtools/python/python-pygpgme/
H A D0003-handle-generic-error-when-no-passphrase-callback-pre.patch4 Subject: [PATCH] handle generic error when no passphrase callback present
7 in loopback mode and no passphrase callback was supplied. Earlier
H A D0002-passphrase_cb-is-deprecated.patch10 installations -- just strip out all passphrase handling from your
15 However, if a developer really wants to use the passphrase callback
/OK3568_Linux_fs/yocto/poky/meta/recipes-support/pinentry/
H A Dpinentry_1.2.0.bb1 SUMMARY = "Collection of simple PIN or passphrase entry dialogs"
3 Pinentry is a collection of simple PIN or passphrase entry dialogs which \
/OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/wpa-supplicant/
H A Dwpa-supplicant_2.10.bb11 RRECOMMENDS:${PN} = "wpa-supplicant-passphrase wpa-supplicant-cli"
35 PACKAGES:prepend = "wpa-supplicant-passphrase wpa-supplicant-cli "
36 FILES:wpa-supplicant-passphrase = "${bindir}/wpa_passphrase"
/OK3568_Linux_fs/kernel/drivers/net/wireless/marvell/mwifiex/
H A Duap_cmd.c312 struct host_cmd_tlv_passphrase *passphrase; in mwifiex_uap_bss_wpa() local
363 passphrase = (struct host_cmd_tlv_passphrase *)tlv; in mwifiex_uap_bss_wpa()
364 passphrase->header.type = in mwifiex_uap_bss_wpa()
366 passphrase->header.len = cpu_to_le16(bss_cfg->wpa_cfg.length); in mwifiex_uap_bss_wpa()
367 memcpy(passphrase->passphrase, bss_cfg->wpa_cfg.passphrase, in mwifiex_uap_bss_wpa()
/OK3568_Linux_fs/kernel/Documentation/process/
H A Dmaintainer-pgp-guide.rst99 of caching the private key passphrase. There are two options you should
100 know in order to tweak when the passphrase should be expired from cache:
106 the key since initial passphrase entry, if the maximum time-to-live
107 countdown expires, you'll have to enter the passphrase again. The
202 Ensure your passphrase is strong
208 obtaining the passphrase to decrypt them.
211 strong passphrase. To set it or change it, use::
213 $ gpg --change-passphrase [fpr]
266 pen and write your passphrase on the margin of the paper. **This is
268 that passphrase, and if you ever change it you will not remember what it
[all …]
/OK3568_Linux_fs/kernel/drivers/net/wireless/nxp/mlinux/
H A Dmoal_priv.c3763 sec->param.passphrase.ssid.ssid_len = strlen(end); in woal_passphrase()
3765 sec->param.passphrase.ssid.ssid, end, in woal_passphrase()
3768 sec->param.passphrase.ssid.ssid, in woal_passphrase()
3769 (int)sec->param.passphrase.ssid.ssid_len); in woal_passphrase()
3771 woal_mac2u8(sec->param.passphrase.bssid, end); in woal_passphrase()
3780 (t_u8 *)(sec->param.passphrase.psk.pmk.pmk), in woal_passphrase()
3782 sec->param.passphrase.psk_type = MLAN_PSK_PMK; in woal_passphrase()
3792 sec->param.passphrase.psk_type = MLAN_PSK_PASSPHRASE; in woal_passphrase()
3795 sec->param.passphrase.psk.passphrase.passphrase, in woal_passphrase()
3797 sizeof(sec->param.passphrase.psk.passphrase in woal_passphrase()
[all …]
/OK3568_Linux_fs/kernel/Documentation/translations/it_IT/process/
H A Dmaintainer-pgp-guide.rst107 individuare la passphrase. Ci sono due opzioni che dovreste conoscere
108 per personalizzare la scadenza della passphrase nella cache:
115 uso della chiave da quando avete inserito la passphrase, se il massimo
116 time-to-live è scaduto, dovrete reinserire nuovamente la passphrase.
212 Assicuratevi che la vostra passphrase sia forte
219 aver prima ottenuto la passphrase per decriptarle.
222 una passphrase forte. Per impostarla o cambiarla, usate::
224 $ gpg --change-passphrase [fpr]
277 la passphrase, e se mai doveste cambiarla non vi ricorderete qual'era al
280 Mettete la copia cartacea e la passphrase scritta a mano in una busta e
[all …]
/OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/mvl88w8977/mlinux/
H A Dmoal_priv.c3960 sec->param.passphrase.ssid.ssid_len = strlen(end); in woal_passphrase()
3961 strncpy((char *)sec->param.passphrase.ssid.ssid, end, in woal_passphrase()
3964 sec->param.passphrase.ssid.ssid, in woal_passphrase()
3965 (int)sec->param.passphrase.ssid.ssid_len); in woal_passphrase()
3967 woal_mac2u8(sec->param.passphrase.bssid, end); in woal_passphrase()
3975 woal_ascii2hex((t_u8 *)(sec->param.passphrase.psk.pmk. in woal_passphrase()
3978 sec->param.passphrase.psk_type = MLAN_PSK_PMK; in woal_passphrase()
3988 sec->param.passphrase.psk_type = MLAN_PSK_PASSPHRASE; in woal_passphrase()
3989 memcpy(sec->param.passphrase.psk.passphrase.passphrase, in woal_passphrase()
3991 sizeof(sec->param.passphrase.psk.passphrase. in woal_passphrase()
[all …]
H A Dmoal_eth_ioctl.c2023 sec->param.passphrase.ssid.ssid_len = strlen(end); in woal_setget_priv_passphrase()
2024 strncpy((char *)sec->param.passphrase.ssid.ssid, end, in woal_setget_priv_passphrase()
2027 sec->param.passphrase.ssid.ssid, in woal_setget_priv_passphrase()
2028 (int)sec->param.passphrase.ssid.ssid_len); in woal_setget_priv_passphrase()
2030 woal_mac2u8((t_u8 *)&sec->param.passphrase.bssid, end); in woal_setget_priv_passphrase()
2038 woal_ascii2hex((t_u8 *)(sec->param.passphrase.psk.pmk. in woal_setget_priv_passphrase()
2041 sec->param.passphrase.psk_type = MLAN_PSK_PMK; in woal_setget_priv_passphrase()
2051 sec->param.passphrase.psk_type = MLAN_PSK_PASSPHRASE; in woal_setget_priv_passphrase()
2052 memcpy(sec->param.passphrase.psk.passphrase.passphrase, in woal_setget_priv_passphrase()
2054 sizeof(sec->param.passphrase.psk.passphrase. in woal_setget_priv_passphrase()
[all …]
/OK3568_Linux_fs/kernel/tools/testing/nvdimm/test/
H A Dnfit.c143 u8 passphrase[32]; member
972 } else if (memcmp(nd_cmd->passphrase, sec->passphrase, in nd_intel_test_cmd_unlock_unit()
996 } else if (memcmp(nd_cmd->old_pass, sec->passphrase, in nd_intel_test_cmd_set_pass()
1001 memcpy(sec->passphrase, nd_cmd->new_pass, in nd_intel_test_cmd_set_pass()
1041 } else if (memcmp(nd_cmd->passphrase, sec->passphrase, in nd_intel_test_cmd_disable_pass()
1046 memset(sec->passphrase, 0, ND_INTEL_PASSPHRASE_SIZE); in nd_intel_test_cmd_disable_pass()
1064 } else if (memcmp(nd_cmd->passphrase, sec->passphrase, in nd_intel_test_cmd_secure_erase()
1070 && (memcmp(nd_cmd->passphrase, zero_key, in nd_intel_test_cmd_secure_erase()
1075 memset(sec->passphrase, 0, ND_INTEL_PASSPHRASE_SIZE); in nd_intel_test_cmd_secure_erase()
1093 memcmp(nd_cmd->passphrase, sec->passphrase, in nd_intel_test_cmd_overwrite()
[all …]
/OK3568_Linux_fs/buildroot/package/ecryptfs-utils/
H A DConfig.in26 Files are encrypted using a passphrase. Consider building
/OK3568_Linux_fs/yocto/poky/meta/classes/
H A Dsign_ipk.bbclass5 # Path to a file containing the passphrase of the signing key.
H A Dsign_package_feed.bbclass6 # Path to a file containing the passphrase of the signing key.
/OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/mvl88w8977/mlan/esa/
H A Dhostsa_ext_def.h393 t_u8 passphrase[64]; member
556 t_u8 passphrase[MLAN_MAX_PASSPHRASE_LENGTH]; member
581 mlan_passphrase_t passphrase; member
H A Dauthenticator_api.c229 memcpy(util_fns, bss_config->wpa_cfg.passphrase, in AuthenticatorGetBssConfig()
351 bss_config->wpa_cfg.passphrase, in AuthenticatorGetBssConfig()
359 bss_config->wpa_cfg.passphrase, in AuthenticatorGetBssConfig()

1234