Home
last modified time | relevance | path

Searched +full:no +full:- +full:psk (Results 1 – 25 of 153) sorted by relevance

1234567

/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/
H A DSSL_CTX_use_psk_identity_hint.pod13 - set PSK identity hint to use
31 unsigned char *psk,
48 should identify an SSL_SESSION object that provides the PSK details and store it
53 It is also possible for the callback to succeed but not supply a PSK. In this
54 case no PSK will be used but the handshake will continue. To do this the
59 PSK ciphersuites for TLSv1.2 and below may call SSL_CTX_use_psk_identity_hint()
60 to set the given B<NUL>-terminated PSK identity hint B<hint> for SSL context
61 object B<ctx>. SSL_use_psk_identity_hint() sets the given B<NUL>-terminated PSK
65 In the case where PSK identity hint is B<NULL>, the server does not send the
71 is to validate the received PSK identity and to fetch the pre-shared key used
[all …]
H A DSSL_CTX_set_psk_client_callback.pod11 - set PSK client callback
32 unsigned char *psk,
49 case the server will have specified a ciphersuite to use already and the PSK
51 given in B<md>. The PSK returned by the callback is allowed to be different
55 the PSK in B<*id>. The identifier length in bytes should be stored in B<*idlen>.
60 B<*sess>. This is used as the basis for the PSK, and should, at a minimum, have
72 PSK (the server may go on to negotiate any ciphersuite which is compatible with
87 L<SSL_SESSION_set_max_early_data(3)> if the PSK will be used for sending early
90 Alternatively an SSL_SESSION created from a previous non-PSK handshake may also
91 be used as the basis for a PSK.
[all …]
H A DSSL_get_psk_identity.pod5 SSL_get_psk_identity, SSL_get_psk_identity_hint - get PSK client identity and hint
16 SSL_get_psk_identity_hint() is used to retrieve the PSK identity hint
18 B<ssl>. Similarly, SSL_get_psk_identity() is used to retrieve the PSK
24 If non-B<NULL>, SSL_get_psk_identity_hint() returns the PSK identity
25 hint and SSL_get_psk_identity() returns the PSK identity. Both are
26 B<NULL>-terminated. SSL_get_psk_identity_hint() may return B<NULL> if
27 no PSK identity hint was used during the connection setup.
34 Copyright 2006-2016 The OpenSSL Project Authors. All Rights Reserved.
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/
H A DSSL_CTX_use_psk_identity_hint.pod13 - set PSK identity hint to use
31 unsigned char *psk,
48 should identify an SSL_SESSION object that provides the PSK details and store it
53 It is also possible for the callback to succeed but not supply a PSK. In this
54 case no PSK will be used but the handshake will continue. To do this the
59 PSK ciphersuites for TLSv1.2 and below may call SSL_CTX_use_psk_identity_hint()
60 to set the given B<NUL>-terminated PSK identity hint B<hint> for SSL context
61 object B<ctx>. SSL_use_psk_identity_hint() sets the given B<NUL>-terminated PSK
65 In the case where PSK identity hint is B<NULL>, the server does not send the
71 is to validate the received PSK identity and to fetch the pre-shared key used
[all …]
H A DSSL_CTX_set_psk_client_callback.pod11 - set PSK client callback
32 unsigned char *psk,
49 case the server will have specified a ciphersuite to use already and the PSK
51 given in B<md>. The PSK returned by the callback is allowed to be different
55 the PSK in B<*id>. The identifier length in bytes should be stored in B<*idlen>.
60 B<*sess>. This is used as the basis for the PSK, and should, at a minimum, have
72 PSK (the server may go on to negotiate any ciphersuite which is compatible with
87 L<SSL_SESSION_set_max_early_data(3)> if the PSK will be used for sending early
90 Alternatively an SSL_SESSION created from a previous non-PSK handshake may also
91 be used as the basis for a PSK.
[all …]
H A DSSL_get_psk_identity.pod5 SSL_get_psk_identity, SSL_get_psk_identity_hint - get PSK client identity and hint
16 SSL_get_psk_identity_hint() is used to retrieve the PSK identity hint
18 B<ssl>. Similarly, SSL_get_psk_identity() is used to retrieve the PSK
24 If non-B<NULL>, SSL_get_psk_identity_hint() returns the PSK identity
25 hint and SSL_get_psk_identity() returns the PSK identity. Both are
26 B<NULL>-terminated. SSL_get_psk_identity_hint() may return B<NULL> if
27 no PSK identity hint was used during the connection setup.
38 Copyright 2006-2016 The OpenSSL Project Authors. All Rights Reserved.
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man1/
H A Dciphers.pod5 openssl-ciphers,
6 ciphers - SSL cipher display and cipher list tool
11 [B<-help>]
12 [B<-s>]
13 [B<-v>]
14 [B<-V>]
15 [B<-ssl3>]
16 [B<-tls1>]
17 [B<-tls1_1>]
18 [B<-tls1_2>]
[all …]
H A Ds_server.pod5 openssl-s_server,
6 s_server - SSL/TLS server program
11 [B<-help>]
12 [B<-port +int>]
13 [B<-accept val>]
14 [B<-unix val>]
15 [B<-4>]
16 [B<-6>]
17 [B<-unlink>]
18 [B<-context val>]
[all …]
/netbsd-src/crypto/external/bsd/openssl/lib/libcrypto/man/
H A Dopenssl-ciphers.11 .\" $NetBSD: openssl-ciphers.1,v 1.1 2024/07/12 21:01:07 christos Exp $
3 .\" -*- mode: troff; coding: utf-8 -*-
59 .IX Title "OPENSSL-CIPHERS 1"
60 .TH OPENSSL-CIPHERS 1 2024-07-11 3.0.14 OpenSSL
66 openssl\-ciphers \- SSL cipher display and cipher list command
70 [\fB\-help\fR]
71 [\fB\-s\fR]
72 [\fB\-v\fR]
73 [\fB\-V\fR]
74 [\fB\-ssl3\fR]
[all …]
H A Dopenssl-s_server.11 .\" $NetBSD: openssl-s_server.1,v 1.1 2024/07/12 21:01:08 christos Exp $
3 .\" -*- mode: troff; coding: utf-8 -*-
59 .IX Title "OPENSSL-S_SERVER 1"
60 .TH OPENSSL-S_SERVER 1 2024-07-11 3.0.14 OpenSSL
66 openssl\-s_server \- SSL/TLS server program
70 [\fB\-help\fR]
71 [\fB\-port\fR \fI+int\fR]
72 [\fB\-accept\fR \fIval\fR]
73 [\fB\-unix\fR \fIval\fR]
74 [\fB\-4\fR]
[all …]
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man1/
H A Dopenssl-ciphers.pod.in2 {- OpenSSL::safe::output_do_not_edit_headers(); -}
6 openssl-ciphers - SSL cipher display and cipher list command
11 [B<-help>]
12 [B<-s>]
13 [B<-v>]
14 [B<-V>]
15 [B<-ssl3>]
16 [B<-tls1>]
17 [B<-tls1_1>]
18 [B<-tls1_2>]
[all …]
/netbsd-src/crypto/external/bsd/openssl.old/lib/libcrypto/man/
H A DSSL_CTX_use_psk_identity_hint.320 .\" Set up some character translations and predefined strings. \*(-- will
26 .tr \(*W-
29 . ds -- \(*W-
31 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
32 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
39 . ds -- \|\(em\|
75 .\" Fear. Run. Save yourself. No user-serviceable parts.
85 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
101 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
102 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
[all …]
H A Dopenssl_ciphers.120 .\" Set up some character translations and predefined strings. \*(-- will
26 .tr \(*W-
29 . ds -- \(*W-
31 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
32 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
39 . ds -- \|\(em\|
75 .\" Fear. Run. Save yourself. No user-serviceable parts.
85 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
101 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
102 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
[all …]
H A DSSL_CTX_set_psk_client_callback.320 .\" Set up some character translations and predefined strings. \*(-- will
26 .tr \(*W-
29 . ds -- \(*W-
31 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
32 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
39 . ds -- \|\(em\|
75 .\" Fear. Run. Save yourself. No user-serviceable parts.
85 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
101 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
102 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
[all …]
H A Dopenssl_s_server.120 .\" Set up some character translations and predefined strings. \*(-- will
26 .tr \(*W-
29 . ds -- \(*W-
31 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
32 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
39 . ds -- \|\(em\|
75 .\" Fear. Run. Save yourself. No user-serviceable parts.
85 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
101 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
102 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
[all …]
H A DSSL_get_psk_identity.320 .\" Set up some character translations and predefined strings. \*(-- will
26 .tr \(*W-
29 . ds -- \(*W-
31 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
32 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
39 . ds -- \|\(em\|
75 .\" Fear. Run. Save yourself. No user-serviceable parts.
85 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
101 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
102 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
[all …]
/netbsd-src/lib/libpam/modules/pam_ssh/
H A Dpam_ssh.c3 /*-
9 * under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the
27 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
91 static const char *pam_ssh_agent = "/usr/bin/ssh-agent";
92 static const char *const pam_ssh_agent_argv[] = { "ssh_agent", "-s", NULL };
104 struct pam_ssh_key *psk; in pam_ssh_load_key() local
138 if ((psk = malloc(sizeof(*psk))) == NULL) { in pam_ssh_load_key()
143 psk->key = key; in pam_ssh_load_key()
144 psk->comment = comment; in pam_ssh_load_key()
145 return (psk); in pam_ssh_load_key()
[all …]
/netbsd-src/crypto/external/bsd/openssl/dist/test/recipes/
H A D80-test_ssl_old.t2 # Copyright 2015-2022 The OpenSSL Project Authors. All Rights Reserved.
30 anydisabled qw/rsa dsa dh ec psk
38 plan skip_all => "No SSL/TLS/DTLS protocol is support by this OpenSSL build"
41 my $digest = "-sha1";
48 my $cnf = srctop_file("test", "ca-and-certs.cnf");
49 my $CAkey = srctop_file("test", "certs", "ca-key.pem"); # "keyCA.ss"
54 my $Ukey = srctop_file("test", "certs", "ee-key.pem"); # "keyU.ss";
65 my $P1key= srctop_file("test", "certs", "alt1-key.pem"); # "keyP1.ss";
69 my $P2key= srctop_file("test", "certs", "alt2-key.pem"); # "keyP2.ss";
79 # new format in ssl_test.c and add recipes to 80-test_ssl_new.t instead.
[all …]
/netbsd-src/crypto/external/bsd/openssl.old/dist/test/recipes/
H A D80-test_ssl_old.t2 # Copyright 2015-2022 The OpenSSL Project Authors. All Rights Reserved.
26 anydisabled qw/rsa dsa dh ec psk
32 plan skip_all => "No SSL/TLS/DTLS protocol is support by this OpenSSL build"
35 my $digest = "-sha1";
79 # new format in ssl_test.c and add recipes to 80-test_ssl_new.t instead.
97 note('test_ssl -- key U');
100 # -----------
107 my @req_dsa = ("-newkey",
114 @req_new = ("-new");
121 ok(run(app([@reqcmd, "-config", $CAconf,
[all …]
/netbsd-src/external/bsd/wpa/bin/hostapd/
H A Dhostapd.conf.519 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
51 .Bl -bullet -offset indent -compact
53 IEEE 802.1X-2004
58 .\" IEEE 802.11f - Inter-Access Point Protocol (IAPP)
68 .Bl -tag -width indent
75 Debugging mode: 0 = no, 1 = minimal, 2 = verbose, 3 = msg dumps, 4 =
90 This can be set to allow non-root users to access the
92 If no group is specified, the group ID of the control interface
96 .Sh IEEE 802.1X-2004 PARAMETERS
98 .Bl -tag -width indent
[all …]
/netbsd-src/share/examples/wpa_supplicant/
H A Dwpa_supplicant.conf7 # wpa_cli and dhcpcd won't work well if you have no ctrl_interface set
11 # if non-root should be allowed to send wpa_supplicant commands via wpa_cli
22 # simple WPA-PSK, a favourite with conferences and hotel networks
25 key_mgmt=WPA-PSK
26 psk="secretKey"
30 # a private WPA-PSK that doesn't broadcast its SSID
33 key_mgmt=WPA-PSK
34 psk="secretKey"
64 # ca_cert="/etc/openssl/certs/eduroam-CA-cert.pem"
69 # key_mgmt=WPA-EAP
[all …]
/netbsd-src/external/bsd/wpa/bin/wpa_supplicant/
H A Dwpa_supplicant.conf.518 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
66 in the configuration file (note no spaces are allowed).
70 .Bl -tag -width indent
82 This can be set to allow non-root users to access the
84 If no group is specified, the group ID of the control interface
92 is implemented according to IEEE 802-1X-REV-d8 which defines
107 EAP fast re-authentication; either 1 (default) or 0.
108 Control fast re-authentication support in EAP methods that support it.
120 .Bd -literal -offset indent
129 may have no spaces).
[all …]
/netbsd-src/share/man/man4/
H A Dupgt.45 .\" Copyright (c) 2005-2007
14 .\" MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
42 .\" FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
69 .Bl -tag -width "IBSS-masterXX"
78 .\" .Em IEEE ad-hoc
80 .\" .Em peer-to-peer
84 .\" However, actual connections between stations are peer-to-peer.
100 Wi-Fi Protected Access (WPA-PSK and WPA2-PSK).
121 .Bl -tag -width Ds -offset indent -compact
122 .It Pa /libdata/firmware/upgt/upgt-gw3887
[all …]
/netbsd-src/external/bsd/wpa/bin/wpa_cli/
H A Dwpa_cli.818 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
35 .Nd text-based frontend program for interacting with wpa_supplicant
43 is a text-based frontend program for interacting with
72 one-time passwords or generic token card
74 challenge-response that uses an external device for generating the
100 non-root user access by using the
121 .Dq Li CTRL-REQ- Ns Ao Ar type Ac Ns Li - Ns Ao Ar id Ac Ns Li : Ns Aq Ar text
128 (one-time password),
143 .Bd -literal -offset indent
144 CTRL-REQ-PASSWORD-1:Password needed for SSID foobar
[all …]
/netbsd-src/share/examples/hostapd/
H A Dhostapd.conf15 # Module bitfield (ORed bitfield of modules that will be logged; -1 = all
31 logger_syslog=-1
33 logger_stdout=-1
36 # Debugging: 0 = no, 1 = minimal, 2 = verbose, 3 = msg dumps, 4 = excessive
56 # run as non-root users. However, since the control interface can be used to
59 # want to allow non-root users to use the control interface, add a new group
72 # Station MAC address -based authentication
97 ##### IEEE 802.1X-2004 related configuration ##################################
102 # Optional displayable message sent with EAP Request-Identity. The first \0
103 # in this string will be converted to ASCII-
[all...]

1234567