| /linux/Documentation/driver-api/nvdimm/ |
| H A D | security.rst | 10 security DSMs: "get security state", "set passphrase", "disable passphrase", 28 update <old_keyid> <new_keyid> - enable or update passphrase. 33 master_update <keyid> <new_keyid> - enable or update master passphrase. 42 The DIMM id would be provided along with the key payload (passphrase) to 46 key "passphrase" is expected to be 32bytes long. This is similar to the ATA 66 the passphrase for the respective nvdimms. It is also recommended that the 93 An key with the current passphrase payload that is tied to the nvdimm should be 101 An key with the current passphrase payload that is tied to the nvdimm should be 115 An encrypted-key with the current user passphrase that is tied to the nvdimm 124 master passphrase key is passed to the kernel. The master passphrase key [all …]
|
| /linux/drivers/acpi/nfit/ |
| H A D | intel.h | 77 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member 82 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member 91 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member 96 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member 111 u8 passphrase[ND_INTEL_PASSPHRASE_SIZE]; member
|
| H A D | intel.c | 211 memcpy(nd_cmd.cmd.passphrase, key_data->data, in intel_security_unlock() 212 sizeof(nd_cmd.cmd.passphrase)); in intel_security_unlock() 248 memcpy(nd_cmd.cmd.passphrase, key_data->data, in intel_security_disable() 249 sizeof(nd_cmd.cmd.passphrase)); in intel_security_disable() 290 memcpy(nd_cmd.cmd.passphrase, key->data, in intel_security_erase() 291 sizeof(nd_cmd.cmd.passphrase)); in intel_security_erase() 365 memcpy(nd_cmd.cmd.passphrase, nkey->data, in intel_security_overwrite() 366 sizeof(nd_cmd.cmd.passphrase)); in intel_security_overwrite()
|
| /linux/drivers/char/tpm/ |
| H A D | tpm2-sessions.c | 127 u8 passphrase[SHA256_DIGEST_SIZE]; member 314 u8 *passphrase, int passphrase_len) in tpm_buf_append_auth() argument 335 tpm_buf_append(buf, passphrase, passphrase_len); in tpm_buf_append_auth() 365 u8 attributes, u8 *passphrase, in tpm_buf_append_hmac_session() argument 375 tpm_buf_append_auth(chip, buf, passphrase, passphrase_len); in tpm_buf_append_hmac_session() 387 while (passphrase && passphrase_len > 0 && passphrase[passphrase_len - 1] == '\0') in tpm_buf_append_hmac_session() 394 memcpy(auth->passphrase, passphrase, passphrase_len); in tpm_buf_append_hmac_session()
|
| /linux/drivers/net/wireless/marvell/mwifiex/ |
| H A D | uap_cmd.c | 296 struct host_cmd_tlv_passphrase *passphrase; in mwifiex_uap_bss_wpa() local 347 passphrase = (struct host_cmd_tlv_passphrase *)tlv; in mwifiex_uap_bss_wpa() 348 passphrase->header.type = in mwifiex_uap_bss_wpa() 350 passphrase->header.len = cpu_to_le16(bss_cfg->wpa_cfg.length); in mwifiex_uap_bss_wpa() 351 memcpy(passphrase->passphrase, bss_cfg->wpa_cfg.passphrase, in mwifiex_uap_bss_wpa()
|
| H A D | ioctl.h | 60 u8 passphrase[MWIFIEX_WPA_PASSHPHRASE_LEN]; member
|
| H A D | fw.h | 2002 u8 passphrase[]; member
|
| /linux/Documentation/translations/it_IT/process/ |
| H A D | maintainer-pgp-guide.rst | 89 individuare la passphrase. Ci sono due opzioni che dovreste conoscere 90 per personalizzare la scadenza della passphrase nella cache: 97 uso della chiave da quando avete inserito la passphrase, se il massimo 98 time-to-live è scaduto, dovrete reinserire nuovamente la passphrase. 189 Assicuratevi che la vostra passphrase sia forte 196 aver prima ottenuto la passphrase per decriptarle. 199 una passphrase forte. Per impostarla o cambiarla, usate:: 201 $ gpg --change-passphrase [fpr] 244 la passphrase, e se mai doveste cambiarla non vi ricorderete qual'era al 247 Mettete la copia cartacea e la passphrase scritta a mano in una busta e [all …]
|
| /linux/tools/testing/nvdimm/test/ |
| H A D | nfit.c | 140 u8 passphrase[32]; member 974 } else if (memcmp(nd_cmd->passphrase, sec->passphrase, in nd_intel_test_cmd_unlock_unit() 998 } else if (memcmp(nd_cmd->old_pass, sec->passphrase, in nd_intel_test_cmd_set_pass() 1003 memcpy(sec->passphrase, nd_cmd->new_pass, in nd_intel_test_cmd_set_pass() 1043 } else if (memcmp(nd_cmd->passphrase, sec->passphrase, in nd_intel_test_cmd_disable_pass() 1048 memset(sec->passphrase, 0, ND_INTEL_PASSPHRASE_SIZE); in nd_intel_test_cmd_disable_pass() 1066 } else if (memcmp(nd_cmd->passphrase, sec->passphrase, in nd_intel_test_cmd_secure_erase() 1072 && (memcmp(nd_cmd->passphrase, zero_key, in nd_intel_test_cmd_secure_erase() 1077 memset(sec->passphrase, 0, ND_INTEL_PASSPHRASE_SIZE); in nd_intel_test_cmd_secure_erase() 1095 memcmp(nd_cmd->passphrase, sec->passphrase, in nd_intel_test_cmd_overwrite() [all …]
|
| /linux/include/linux/ |
| H A D | tpm.h | 535 u8 attributes, u8 *passphrase, 538 u8 *passphrase, int passphraselen);
|
| /linux/Documentation/filesystems/ |
| H A D | ecryptfs.rst | 50 You should be prompted for a passphrase and a salt (the salt may be
|
| /linux/Documentation/security/keys/ |
| H A D | ecryptfs.rst | 11 using a key, the FEKEK, derived from a user prompted passphrase; in the latter
|
| /linux/Documentation/power/ |
| H A D | swsusp-dmcrypt.rst | 23 have to be able to either enter a passphrase or that you read
|
| /linux/Documentation/translations/zh_CN/process/ |
| H A D | maintainer-pgp-guide.rst | 166 $ gpg --change-passphrase [fpr]
|
| /linux/drivers/net/wireless/ath/wil6210/ |
| H A D | wmi.h | 405 u8 passphrase[WMI_PASSPHRASE_LEN]; member
|