| packages/nixpkgs/passphrase2pgp | Predictable, passphrase-based PGP key generator |
| options/nixos/services.c2fmzq-server.passphraseFile | Path to file containing the database passphrase
|
| options/nixos/services.borgbackup.jobs.<name>.encryption.passphrase | The passphrase the backups are encrypted with
|
| options/nixos/boot.initrd.luks.reusePassphrases | When opening a new LUKS device try reusing last successful
passphrase
|
| packages/nixpkgs/perlPackages.CryptPassphraseArgon2 | Argon2 encoder for Crypt::Passphrase |
| packages/nixpkgs/perl5Packages.CryptPassphraseArgon2 | Argon2 encoder for Crypt::Passphrase |
| options/nixos/services.prometheus.exporters.mail.configuration.servers.*.passphrase | Password to use for SMTP authentication.
|
| packages/nixpkgs/perlPackages.CryptPassphraseBcrypt | Bcrypt encoder for Crypt::Passphrase |
| packages/nixpkgs/perlPackages.AuthenPassphrase | Hashed passwords/passphrases as objects |
| packages/nixpkgs/perl5Packages.CryptPassphraseBcrypt | Bcrypt encoder for Crypt::Passphrase |
| packages/nixpkgs/perl5Packages.AuthenPassphrase | Hashed passwords/passphrases as objects |
| options/nixos/services.duplicity.secretFile | Path of a file containing secrets (gpg passphrase, access key...) in
the format of EnvironmentFile as described by
systemd.exec(5)
|
| packages/nixpkgs/perl538Packages.CryptPassphraseArgon2 | Argon2 encoder for Crypt::Passphrase |
| packages/nixpkgs/perl540Packages.CryptPassphraseArgon2 | Argon2 encoder for Crypt::Passphrase |
| packages/nixpkgs/perlPackages.CryptPassphrase | Module for managing passwords in a cryptographically agile manner |
| packages/nixpkgs/perl538Packages.CryptPassphraseBcrypt | Bcrypt encoder for Crypt::Passphrase |
| packages/nixpkgs/perl540Packages.CryptPassphraseBcrypt | Bcrypt encoder for Crypt::Passphrase |
| packages/nixpkgs/perl5Packages.CryptPassphrase | Module for managing passwords in a cryptographically agile manner |
| packages/nixpkgs/perl540Packages.AuthenPassphrase | Hashed passwords/passphrases as objects |
| packages/nixpkgs/perl538Packages.AuthenPassphrase | Hashed passwords/passphrases as objects |
| packages/nixpkgs/perl540Packages.CryptPassphrase | Module for managing passwords in a cryptographically agile manner |
| packages/nixpkgs/perl538Packages.CryptPassphrase | Module for managing passwords in a cryptographically agile manner |
| packages/nixpkgs/bully | Retrieve WPA/WPA2 passphrase from a WPS enabled access point |
| options/nixos/services.borgbackup.jobs.<name>.encryption.passCommand | A command which prints the passphrase to stdout
|
| options/nixos/boot.initrd.luks.devices.<name>.keyFile | The name of the file (can be a raw device or a partition) that
should be used as the decryption key for the encrypted device
|
| options/home-manager/services.gpg-agent.maxCacheTtl | Set the maximum time a cache entry is valid to n seconds
|
| options/nixos/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/darwin/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/home-manager/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/home-manager/services.gpg-agent.maxCacheTtlSsh | Set the maximum time a cache entry used for SSH keys is valid to n
seconds
|
| options/home-manager/services.gpg-agent.noAllowExternalCache | Tell Pinentry not to enable features which use an external cache for
passphrases
|
| packages/nixpkgs/nasty | Recover the passphrase of your PGP or GPG-key |
| options/nixos/security.pam.services.<name>.gnupg.enable | If enabled, pam_gnupg will attempt to automatically unlock the
user's GPG keys with the login password via
gpg-agent
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.twoFactor | Whether to use a passphrase and a YubiKey (true), or only a YubiKey (false).
|
| packages/nixpkgs/openssh-askpass | A passphrase dialog for OpenSSH and GTK |
| options/nixos/boot.initrd.luks.devices.<name>.gpgCard.encryptedPass | Path to the GPG encrypted passphrase.
|
| options/nixos/boot.initrd.luks.devices.<name>.tryEmptyPassphrase | If keyFile fails then try an empty passphrase first before
prompting for password.
|
| packages/nixpkgs/pinentry-all | GnuPG’s interface to passphrase input |
| options/nixos/boot.initrd.luks.devices.<name>.fallbackToPassword | Whether to fallback to interactive passphrase prompt if the keyfile
cannot be found
|
| packages/nixpkgs/passwdqc | Passphrase strength checking and enforcement |
| options/nixos/services.znapzend.features.sendRaw | Whether to enable sendRaw feature which adds the options -w to the
zfs send command
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa | Private key decryption passphrase for a key in the rsa
folder.
|
| packages/nixpkgs/pinentry-gnome3 | GnuPG’s interface to passphrase input |
| options/nixos/services.borgbackup.jobs.<name>.encryption.mode | Encryption mode to use
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa | Private key decryption passphrase for a key in the
ecdsa folder.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8 | Private key decryption passphrase for a key in the
pkcs8 folder.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa.<name>.file | File name in the rsa folder for which this passphrase
should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs12 | PKCS#12 decryption passphrase for a container in the
pkcs12 folder.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.file | File name in the ecdsa folder for which this
passphrase should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private | Private key decryption passphrase for a key in the
private folder.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.file | File name in the pkcs8 folder for which this
passphrase should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa.<name>.secret | Value of decryption passphrase for RSA key.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs12.<name>.file | File name in the pkcs12 folder for which this
passphrase should be used.
|
| packages/nixpkgs/emacsPackages.dw | |
| options/nixos/networking.wireless.networks.<name>.pskRaw | Either the raw pre-shared key in hexadecimal format
or the name of the secret (as defined inside
networking.wireless.secretsFile and prefixed
with ext:) containing the network pre-shared key.
Be aware that this will be written to the Nix store
in plaintext! Always use an external reference.
The external secret can be either the plaintext
passphrase or the raw pre-shared key.
Mutually exclusive with psk and auth.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.secret | Value of decryption passphrase for ECDSA key.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.secret | Value of decryption passphrase for PKCS#8 key.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private.<name>.file | File name in the private folder for which this passphrase should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs12.<name>.secret | Value of decryption passphrase for PKCS#12 container.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private.<name>.secret | Value of decryption passphrase for private key.
|
| packages/nixpkgs/haskellPackages.alea | a diceware passphrase generator |
| packages/nixpkgs/pinentry-qt | GnuPG’s interface to passphrase input |
| packages/nixpkgs/pinentry-tty | GnuPG’s interface to passphrase input |
| packages/nixpkgs/pinentry-gtk2 | GnuPG’s interface to passphrase input |
| options/home-manager/programs.borgmatic.backups.<name>.storage.encryptionPasscommand | Command writing the passphrase to standard output.
|
| packages/nixpkgs/pinentry-emacs | GnuPG’s interface to passphrase input |
| packages/nixpkgs/pinentry-curses | GnuPG’s interface to passphrase input |
| packages/nixpkgs/x11_ssh_askpass | Lightweight passphrase dialog for OpenSSH or other open variants of SSH |
| packages/nixpkgs/haskellPackages.paphragen | A passphrase generator |
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPassword | Sets the password for WPA-PSK that will be converted to the pre-shared key
|
| options/nixos/programs.ssh.startAgent | Whether to start the OpenSSH agent when you log in
|
| packages/nixpkgs/phraze | Generate random passphrases |
| packages/nixpkgs/diceware | Generates passphrases by concatenating words randomly picked from wordlists |
| packages/nixpkgs/xkcdpass | Generate secure multiword passwords/passphrases, inspired by XKCD |
| packages/nixpkgs/volume_key | Library for manipulating storage volume encryption keys and storing them separately from volumes to handle forgotten passphrases, and the associated command-line tool |
| packages/nixpkgs/python313Packages.diceware | Generates passphrases by concatenating words randomly picked from wordlists |
| packages/nixpkgs/python314Packages.diceware | Generates passphrases by concatenating words randomly picked from wordlists |
| packages/nixpkgs/python313Packages.xkcdpass | Generate secure multiword passwords/passphrases, inspired by XKCD |
| packages/nixpkgs/python314Packages.xkcdpass | Generate secure multiword passwords/passphrases, inspired by XKCD |
| packages/nixpkgs/python312Packages.diceware | Generates passphrases by concatenating words randomly picked from wordlists |
| packages/nixpkgs/python312Packages.xkcdpass | Generate secure multiword passwords/passphrases, inspired by XKCD |