Lines Matching refs:password
48 u8 password[];
132 u8 *password, consumer = PLPKS_OS_OWNER;
135 // If we booted from kexec, we could be reusing an existing password already
141 // The password must not cross a page boundary, so we align to the next power of 2
142 password = kzalloc(roundup_pow_of_two(maxpwsize), GFP_KERNEL);
143 if (!password)
147 virt_to_phys(password), maxpwsize);
153 kfree_sensitive(password);
156 memcpy(ospassword, password, ospasswordlength);
166 kfree_sensitive(password);
180 auth = kzalloc(roundup_pow_of_two(struct_size(auth, password, maxpwsize)), GFP_KERNEL);
190 memcpy(auth->password, ospassword, ospasswordlength);
650 // Once a password is registered with the hypervisor it cannot be cleared without
652 // recover the previous password from the FDT.
654 // There are a few challenges here. We don't want the password to be visible to
662 const u8 *password;
668 password = fdt_getprop(fdt, chosen_node, "ibm,plpks-pw", &len);
676 pr_err("Error allocating memory for password.\n");
680 memcpy(ospassword, password, len);
685 // Since we've cleared the password, we must update the FDT checksum