| /netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
| H A D | SSL_CTX_use_psk_identity_hint.pod | 13 - set PSK identity hint to use 31 unsigned char *psk, 48 should identify an SSL_SESSION object that provides the PSK details and store it 53 It is also possible for the callback to succeed but not supply a PSK. In this 54 case no PSK will be used but the handshake will continue. To do this the 59 PSK ciphersuites for TLSv1.2 and below may call SSL_CTX_use_psk_identity_hint() 60 to set the given B<NUL>-terminated PSK identity hint B<hint> for SSL context 61 object B<ctx>. SSL_use_psk_identity_hint() sets the given B<NUL>-terminated PSK 65 In the case where PSK identity hint is B<NULL>, the server does not send the 71 is to validate the received PSK identity and to fetch the pre-shared key used [all …]
|
| H A D | SSL_CTX_set_psk_client_callback.pod | 11 - set PSK client callback 32 unsigned char *psk, 49 case the server will have specified a ciphersuite to use already and the PSK 51 given in B<md>. The PSK returned by the callback is allowed to be different 55 the PSK in B<*id>. The identifier length in bytes should be stored in B<*idlen>. 60 B<*sess>. This is used as the basis for the PSK, and should, at a minimum, have 72 PSK (the server may go on to negotiate any ciphersuite which is compatible with 87 L<SSL_SESSION_set_max_early_data(3)> if the PSK will be used for sending early 90 Alternatively an SSL_SESSION created from a previous non-PSK handshake may also 91 be used as the basis for a PSK. [all …]
|
| H A D | SSL_get_psk_identity.pod | 5 SSL_get_psk_identity, SSL_get_psk_identity_hint - get PSK client identity and hint 16 SSL_get_psk_identity_hint() is used to retrieve the PSK identity hint 18 B<ssl>. Similarly, SSL_get_psk_identity() is used to retrieve the PSK 24 If non-B<NULL>, SSL_get_psk_identity_hint() returns the PSK identity 25 hint and SSL_get_psk_identity() returns the PSK identity. Both are 26 B<NULL>-terminated. SSL_get_psk_identity_hint() may return B<NULL> if 27 no PSK identity hint was used during the connection setup. 34 Copyright 2006-2016 The OpenSSL Project Authors. All Rights Reserved.
|
| /netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
| H A D | SSL_CTX_use_psk_identity_hint.pod | 13 - set PSK identity hint to use 31 unsigned char *psk, 48 should identify an SSL_SESSION object that provides the PSK details and store it 53 It is also possible for the callback to succeed but not supply a PSK. In this 54 case no PSK will be used but the handshake will continue. To do this the 59 PSK ciphersuites for TLSv1.2 and below may call SSL_CTX_use_psk_identity_hint() 60 to set the given B<NUL>-terminated PSK identity hint B<hint> for SSL context 61 object B<ctx>. SSL_use_psk_identity_hint() sets the given B<NUL>-terminated PSK 65 In the case where PSK identity hint is B<NULL>, the server does not send the 71 is to validate the received PSK identity and to fetch the pre-shared key used [all …]
|
| H A D | SSL_CTX_set_psk_client_callback.pod | 11 - set PSK client callback 32 unsigned char *psk, 49 case the server will have specified a ciphersuite to use already and the PSK 51 given in B<md>. The PSK returned by the callback is allowed to be different 55 the PSK in B<*id>. The identifier length in bytes should be stored in B<*idlen>. 60 B<*sess>. This is used as the basis for the PSK, and should, at a minimum, have 72 PSK (the server may go on to negotiate any ciphersuite which is compatible with 87 L<SSL_SESSION_set_max_early_data(3)> if the PSK will be used for sending early 90 Alternatively an SSL_SESSION created from a previous non-PSK handshake may also 91 be used as the basis for a PSK. [all …]
|
| H A D | SSL_get_psk_identity.pod | 5 SSL_get_psk_identity, SSL_get_psk_identity_hint - get PSK client identity and hint 16 SSL_get_psk_identity_hint() is used to retrieve the PSK identity hint 18 B<ssl>. Similarly, SSL_get_psk_identity() is used to retrieve the PSK 24 If non-B<NULL>, SSL_get_psk_identity_hint() returns the PSK identity 25 hint and SSL_get_psk_identity() returns the PSK identity. Both are 26 B<NULL>-terminated. SSL_get_psk_identity_hint() may return B<NULL> if 27 no PSK identity hint was used during the connection setup. 38 Copyright 2006-2016 The OpenSSL Project Authors. All Rights Reserved.
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man1/ |
| H A D | ciphers.pod | 5 openssl-ciphers, 6 ciphers - SSL cipher display and cipher list tool 11 [B<-help>] 12 [B<-s>] 13 [B<-v>] 14 [B<-V>] 15 [B<-ssl3>] 16 [B<-tls1>] 17 [B<-tls1_1>] 18 [B<-tls1_2>] [all …]
|
| H A D | s_server.pod | 5 openssl-s_server, 6 s_server - SSL/TLS server program 11 [B<-help>] 12 [B<-port +int>] 13 [B<-accept val>] 14 [B<-unix val>] 15 [B<-4>] 16 [B<-6>] 17 [B<-unlink>] 18 [B<-context val>] [all …]
|
| /netbsd-src/crypto/external/bsd/openssl/lib/libcrypto/man/ |
| H A D | openssl-ciphers.1 | 1 .\" $NetBSD: openssl-ciphers.1,v 1.1 2024/07/12 21:01:07 christos Exp $ 3 .\" -*- mode: troff; coding: utf-8 -*- 59 .IX Title "OPENSSL-CIPHERS 1" 60 .TH OPENSSL-CIPHERS 1 2024-07-11 3.0.14 OpenSSL 66 openssl\-ciphers \- SSL cipher display and cipher list command 70 [\fB\-help\fR] 71 [\fB\-s\fR] 72 [\fB\-v\fR] 73 [\fB\-V\fR] 74 [\fB\-ssl3\fR] [all …]
|
| H A D | openssl-s_server.1 | 1 .\" $NetBSD: openssl-s_server.1,v 1.1 2024/07/12 21:01:08 christos Exp $ 3 .\" -*- mode: troff; coding: utf-8 -*- 59 .IX Title "OPENSSL-S_SERVER 1" 60 .TH OPENSSL-S_SERVER 1 2024-07-11 3.0.14 OpenSSL 66 openssl\-s_server \- SSL/TLS server program 70 [\fB\-help\fR] 71 [\fB\-port\fR \fI+int\fR] 72 [\fB\-accept\fR \fIval\fR] 73 [\fB\-unix\fR \fIval\fR] 74 [\fB\-4\fR] [all …]
|
| /netbsd-src/crypto/external/bsd/openssl/dist/doc/man1/ |
| H A D | openssl-ciphers.pod.in | 2 {- OpenSSL::safe::output_do_not_edit_headers(); -} 6 openssl-ciphers - SSL cipher display and cipher list command 11 [B<-help>] 12 [B<-s>] 13 [B<-v>] 14 [B<-V>] 15 [B<-ssl3>] 16 [B<-tls1>] 17 [B<-tls1_1>] 18 [B<-tls1_2>] [all …]
|
| /netbsd-src/crypto/external/bsd/openssl.old/lib/libcrypto/man/ |
| H A D | SSL_CTX_use_psk_identity_hint.3 | 20 .\" Set up some character translations and predefined strings. \*(-- will 26 .tr \(*W- 29 . ds -- \(*W- 31 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 32 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 39 . ds -- \|\(em\| 75 .\" Fear. Run. Save yourself. No user-serviceable parts. 85 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 101 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 102 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
| H A D | openssl_ciphers.1 | 20 .\" Set up some character translations and predefined strings. \*(-- will 26 .tr \(*W- 29 . ds -- \(*W- 31 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 32 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 39 . ds -- \|\(em\| 75 .\" Fear. Run. Save yourself. No user-serviceable parts. 85 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 101 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 102 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
| H A D | SSL_CTX_set_psk_client_callback.3 | 20 .\" Set up some character translations and predefined strings. \*(-- will 26 .tr \(*W- 29 . ds -- \(*W- 31 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 32 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 39 . ds -- \|\(em\| 75 .\" Fear. Run. Save yourself. No user-serviceable parts. 85 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 101 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 102 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
| H A D | openssl_s_server.1 | 20 .\" Set up some character translations and predefined strings. \*(-- will 26 .tr \(*W- 29 . ds -- \(*W- 31 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 32 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 39 . ds -- \|\(em\| 75 .\" Fear. Run. Save yourself. No user-serviceable parts. 85 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 101 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 102 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
| H A D | SSL_get_psk_identity.3 | 20 .\" Set up some character translations and predefined strings. \*(-- will 26 .tr \(*W- 29 . ds -- \(*W- 31 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 32 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 39 . ds -- \|\(em\| 75 .\" Fear. Run. Save yourself. No user-serviceable parts. 85 . ds #H ((1u-(\\\\n(.fu%2u))*.13m) 101 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" 102 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' [all …]
|
| /netbsd-src/lib/libpam/modules/pam_ssh/ |
| H A D | pam_ssh.c | 3 /*- 9 * under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the 27 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 91 static const char *pam_ssh_agent = "/usr/bin/ssh-agent"; 92 static const char *const pam_ssh_agent_argv[] = { "ssh_agent", "-s", NULL }; 104 struct pam_ssh_key *psk; in pam_ssh_load_key() local 138 if ((psk = malloc(sizeof(*psk))) == NULL) { in pam_ssh_load_key() 143 psk->key = key; in pam_ssh_load_key() 144 psk->comment = comment; in pam_ssh_load_key() 145 return (psk); in pam_ssh_load_key() [all …]
|
| /netbsd-src/crypto/external/bsd/openssl/dist/test/recipes/ |
| H A D | 80-test_ssl_old.t | 2 # Copyright 2015-2022 The OpenSSL Project Authors. All Rights Reserved. 30 anydisabled qw/rsa dsa dh ec psk 38 plan skip_all => "No SSL/TLS/DTLS protocol is support by this OpenSSL build" 41 my $digest = "-sha1"; 48 my $cnf = srctop_file("test", "ca-and-certs.cnf"); 49 my $CAkey = srctop_file("test", "certs", "ca-key.pem"); # "keyCA.ss" 54 my $Ukey = srctop_file("test", "certs", "ee-key.pem"); # "keyU.ss"; 65 my $P1key= srctop_file("test", "certs", "alt1-key.pem"); # "keyP1.ss"; 69 my $P2key= srctop_file("test", "certs", "alt2-key.pem"); # "keyP2.ss"; 79 # new format in ssl_test.c and add recipes to 80-test_ssl_new.t instead. [all …]
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
| H A D | 80-test_ssl_old.t | 2 # Copyright 2015-2022 The OpenSSL Project Authors. All Rights Reserved. 26 anydisabled qw/rsa dsa dh ec psk 32 plan skip_all => "No SSL/TLS/DTLS protocol is support by this OpenSSL build" 35 my $digest = "-sha1"; 79 # new format in ssl_test.c and add recipes to 80-test_ssl_new.t instead. 97 note('test_ssl -- key U'); 100 # ----------- 107 my @req_dsa = ("-newkey", 114 @req_new = ("-new"); 121 ok(run(app([@reqcmd, "-config", $CAconf, [all …]
|
| /netbsd-src/external/bsd/wpa/bin/hostapd/ |
| H A D | hostapd.conf.5 | 19 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 51 .Bl -bullet -offset indent -compact 53 IEEE 802.1X-2004 58 .\" IEEE 802.11f - Inter-Access Point Protocol (IAPP) 68 .Bl -tag -width indent 75 Debugging mode: 0 = no, 1 = minimal, 2 = verbose, 3 = msg dumps, 4 = 90 This can be set to allow non-root users to access the 92 If no group is specified, the group ID of the control interface 96 .Sh IEEE 802.1X-2004 PARAMETERS 98 .Bl -tag -width indent [all …]
|
| /netbsd-src/share/examples/wpa_supplicant/ |
| H A D | wpa_supplicant.conf | 7 # wpa_cli and dhcpcd won't work well if you have no ctrl_interface set 11 # if non-root should be allowed to send wpa_supplicant commands via wpa_cli 22 # simple WPA-PSK, a favourite with conferences and hotel networks 25 key_mgmt=WPA-PSK 26 psk="secretKey" 30 # a private WPA-PSK that doesn't broadcast its SSID 33 key_mgmt=WPA-PSK 34 psk="secretKey" 64 # ca_cert="/etc/openssl/certs/eduroam-CA-cert.pem" 69 # key_mgmt=WPA-EAP [all …]
|
| /netbsd-src/external/bsd/wpa/bin/wpa_supplicant/ |
| H A D | wpa_supplicant.conf.5 | 18 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 66 in the configuration file (note no spaces are allowed). 70 .Bl -tag -width indent 82 This can be set to allow non-root users to access the 84 If no group is specified, the group ID of the control interface 92 is implemented according to IEEE 802-1X-REV-d8 which defines 107 EAP fast re-authentication; either 1 (default) or 0. 108 Control fast re-authentication support in EAP methods that support it. 120 .Bd -literal -offset indent 129 may have no spaces). [all …]
|
| /netbsd-src/share/man/man4/ |
| H A D | upgt.4 | 5 .\" Copyright (c) 2005-2007 14 .\" MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 42 .\" FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE 69 .Bl -tag -width "IBSS-masterXX" 78 .\" .Em IEEE ad-hoc 80 .\" .Em peer-to-peer 84 .\" However, actual connections between stations are peer-to-peer. 100 Wi-Fi Protected Access (WPA-PSK and WPA2-PSK). 121 .Bl -tag -width Ds -offset indent -compact 122 .It Pa /libdata/firmware/upgt/upgt-gw3887 [all …]
|
| /netbsd-src/external/bsd/wpa/bin/wpa_cli/ |
| H A D | wpa_cli.8 | 18 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 35 .Nd text-based frontend program for interacting with wpa_supplicant 43 is a text-based frontend program for interacting with 72 one-time passwords or generic token card 74 challenge-response that uses an external device for generating the 100 non-root user access by using the 121 .Dq Li CTRL-REQ- Ns Ao Ar type Ac Ns Li - Ns Ao Ar id Ac Ns Li : Ns Aq Ar text 128 (one-time password), 143 .Bd -literal -offset indent 144 CTRL-REQ-PASSWORD-1:Password needed for SSID foobar [all …]
|
| /netbsd-src/share/examples/hostapd/ |
| H A D | hostapd.conf | 15 # Module bitfield (ORed bitfield of modules that will be logged; -1 = all 31 logger_syslog=-1 33 logger_stdout=-1 36 # Debugging: 0 = no, 1 = minimal, 2 = verbose, 3 = msg dumps, 4 = excessive 56 # run as non-root users. However, since the control interface can be used to 59 # want to allow non-root users to use the control interface, add a new group 72 # Station MAC address -based authentication 97 ##### IEEE 802.1X-2004 related configuration ################################## 102 # Optional displayable message sent with EAP Request-Identity. The first \0 103 # in this string will be converted to ASCII- [all...] |