| /freebsd-src/lib/libpam/modules/pam_ssh/ |
| H A D | pam_ssh.c | 101 struct pam_ssh_key *psk; in pam_ssh_load_key() local 129 if ((psk = malloc(sizeof(*psk))) == NULL) { in pam_ssh_load_key() 134 psk->key = key; in pam_ssh_load_key() 135 psk->comment = comment; in pam_ssh_load_key() 136 return (psk); in pam_ssh_load_key() 146 struct pam_ssh_key *psk; in pam_ssh_free_key() local 148 psk = data; in pam_ssh_free_key() 149 sshkey_free(psk->key); in pam_ssh_free_key() 150 free(psk->comment); in pam_ssh_free_key() 151 free(psk); in pam_ssh_free_key() [all …]
|
| /freebsd-src/contrib/wpa/src/ap/ |
| H A D | ieee802_11_auth.c | 61 hostapd_free_psk_list(e->info.psk); in hostapd_acl_cache_free() 241 * @out.psk: Linked list buffer for returning WPA PSK in hostapd_allowed_address() 248 * out->radius_cui and out->psk values. in hostapd_allowed_address() 419 struct hostapd_sta_wpa_psk_short *psk; in decode_tunnel_passwords() 448 psk = os_zalloc(sizeof(struct hostapd_sta_wpa_psk_short)); 449 if (psk) { in hostapd_acl_recv_radius() 451 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in hostapd_acl_recv_radius() 459 os_memcpy(psk->passphrase, passphrase, in hostapd_acl_recv_radius() 461 psk in hostapd_acl_recv_radius() 382 struct hostapd_sta_wpa_psk_short *psk; decode_tunnel_passwords() local 625 hostapd_copy_psk_list(struct hostapd_sta_wpa_psk_short ** psk,struct hostapd_sta_wpa_psk_short * src) hostapd_copy_psk_list() argument 638 hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short * psk) hostapd_free_psk_list() argument [all...] |
| H A D | ap_config.c | 332 struct hostapd_wpa_psk *psk; in hostapd_config_read_wpa_psk() 402 psk = os_zalloc(sizeof(*psk)); in hostapd_config_read_wpa_psk() 403 if (psk == NULL) { in hostapd_config_read_wpa_psk() 408 psk->vlan_id = vlan_id; in hostapd_config_read_wpa_psk() 410 psk->group = 1; in hostapd_config_read_wpa_psk() 412 os_memcpy(psk->addr, addr, ETH_ALEN); in hostapd_config_read_wpa_psk() 418 os_free(psk); in hostapd_config_read_wpa_psk() 426 hexstr2bin(pos, psk->psk, PMK_LE in hostapd_config_read_wpa_psk() 319 struct hostapd_wpa_psk *psk; hostapd_config_read_wpa_psk() local 678 struct hostapd_wpa_psk *psk, *tmp; hostapd_config_clear_wpa_psk() local 1101 struct hostapd_wpa_psk *psk; hostapd_get_psk() local [all...] |
| H A D | ieee802_11_auth.h | 23 struct hostapd_sta_wpa_psk_short *psk; member 35 void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk); 37 void hostapd_copy_psk_list(struct hostapd_sta_wpa_psk_short **psk,
|
| H A D | wps_hostapd.c | 96 const u8 *p2p_dev_addr, const u8 *psk, in hostapd_wps_new_psk_cb() argument 113 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); in hostapd_wps_new_psk_cb() 127 os_memcpy(p->psk, psk, PMK_LEN); in hostapd_wps_new_psk_cb() 132 psk, psk_len); in hostapd_wps_new_psk_cb() 150 wpa_snprintf_hex(hex, sizeof(hex), psk, psk_len); in hostapd_wps_new_psk_cb() 275 const u8 **psk) in hostapd_wps_lookup_pskfile_cb() argument 288 any_psk = wpa_psk->psk; in hostapd_wps_lookup_pskfile_cb() 292 dev_psk = wpa_psk->psk; in hostapd_wps_lookup_pskfile_cb() 298 *psk in hostapd_wps_lookup_pskfile_cb() [all...] |
| H A D | sta_info.c | 418 hostapd_free_psk_list(sta->psk); 1443 struct hostapd_wpa_psk *psk; in ap_sta_clear_disconnect_timeouts() 1454 for (psk = ssid->wpa_psk; psk; psk = psk->next) in ap_sta_clear_disconnect_timeouts() 1455 if (os_memcmp(pmk, psk->psk, PMK_LEN) == 0) in ap_sta_clear_disconnect_timeouts() 1457 if (!psk || !psk 1240 struct hostapd_wpa_psk *psk; ap_sta_wpa_get_keyid() local [all...] |
| H A D | wpa_auth_glue.c | 351 const u8 *psk; in hostapd_wpa_auth_get_psk() 392 psk = hostapd_get_psk(hapd->conf, addr, p2p_dev_addr, prev_psk, in hostapd_wpa_auth_get_psk() 396 * returned psk which should not be returned again. in hostapd_wpa_auth_get_psk() 397 * logic list (all hostapd_get_psk; all sta->psk) in hostapd_wpa_auth_get_psk() 399 if (sta && sta->psk && !psk) { in hostapd_wpa_auth_get_psk() 404 psk = sta->psk->psk; in hostapd_wpa_auth_get_psk() 405 for (pos = sta->psk; po in hostapd_wpa_auth_get_psk() 337 const u8 *psk; hostapd_wpa_auth_get_psk() local [all...] |
| /freebsd-src/contrib/wpa/wpa_supplicant/ |
| H A D | wpa_supplicant.conf | 943 # both), and psk must also be set. 1009 # WPA-PSK = WPA pre-shared key (this requires 'psk' field) 1085 # psk: WPA preshared key; 256-bit pre-shared key 1098 # 0 = allow psk/passphrase to be stored to the configuration file 1099 # 1 = do not store psk/passphrase to the configuration file 1104 # passphrase from the psk parameter is used if this separate parameter is not 1105 # used, but psk follows the WPA-PSK constraints (8..63 characters) even though 1770 psk="very secret passphrase" 1779 psk="very secret passphrase" 1790 psk [all...] |
| H A D | wpa_passphrase.c | 19 unsigned char psk[32]; in main() 80 if (pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32) 88 printf("\t#psk=\"%s\"\n", passphrase); 91 printf("%02x", psk[i]); 17 unsigned char psk[32]; main() local
|
| H A D | ibss_rsn.h | 50 u8 psk[PMK_LEN]; member 62 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
|
| H A D | ibss_rsn.c | 217 const u8 *psk) in ibss_rsn_supp_init() 249 wpa_sm_set_pmk(peer->supp, psk, PMK_LEN, NULL, NULL); in ibss_rsn_supp_init() 290 return ibss_rsn->psk; in auth_get_psk() 563 ibss_rsn->psk) < 0) { in ibss_rsn_peer_init() 849 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk) in ibss_rsn_set_psk() 853 os_memcpy(ibss_rsn->psk, psk, PMK_LEN); in ibss_rsn_handle_auth_1_of_2() 216 ibss_rsn_supp_init(struct ibss_rsn_peer * peer,const u8 * own_addr,const u8 * psk) ibss_rsn_supp_init() argument 845 ibss_rsn_set_psk(struct ibss_rsn * ibss_rsn,const u8 * psk) ibss_rsn_set_psk() argument
|
| H A D | config_ssid.h | 55 u8 psk[32]; member 217 * psk - WPA pre-shared key (256 bits) 219 u8 psk[32]; 229 * If this is set, psk will be generated using the SSID and passphrase 266 * 0 = allow psk/passphrase to be stored to the configuration file 267 * 1 = do not store psk/passphrase to the configuration file 444 * CCMP, but not both), and psk must also be set (either directly or 196 u8 psk[32]; global() member
|
| H A D | p2p_supplicant.c | 1241 os_memcpy(s->psk, ssid->psk, 32); in wpas_p2p_add_persistent_group_client() 1349 const u8 *psk, const char *passphrase, in wpas_p2p_group_started() 1356 if (psk) in wpas_p2p_group_started() 1357 wpa_snprintf_hex(psk_txt, sizeof(psk_txt), psk, 32); in wpas_p2p_group_started() 1378 psk ? " psk=" : "", psk_txt, in wpas_group_formation_completed() 1470 ssid->psk_set ? ssid->psk : NULL, 1775 struct psk_list_entry *psk; in wpas_p2p_add_psk_list() 1788 dl_list_for_each(psk, in p2p_go_dump_common_freqs() 1322 wpas_p2p_group_started(struct wpa_supplicant * wpa_s,int go,struct wpa_ssid * ssid,int freq,const u8 * psk,const char * passphrase,const u8 * go_dev_addr,int persistent,const char * extra) wpas_p2p_group_started() argument 1747 struct psk_list_entry *psk; wpas_p2p_add_psk_list() local 8669 struct psk_list_entry *psk, *tmp; wpas_p2p_remove_psk_entry() local 8694 wpas_p2p_new_psk_cb(struct wpa_supplicant * wpa_s,const u8 * mac_addr,const u8 * p2p_dev_addr,const u8 * psk,size_t psk_len) wpas_p2p_new_psk_cb() argument 8804 struct hostapd_wpa_psk *psk, *prev, *rem; wpas_p2p_remove_client_go() local [all...] |
| /freebsd-src/contrib/wpa/src/eap_common/ |
| H A D | eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, in eap_gpsk_gkdf_cmac() argument 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) in eap_gpsk_gkdf_cmac() 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, in eap_gpsk_gkdf_sha256() argument 95 if (hmac_sha256_vector(psk, 32, 2, addr, vlen, hash)) in eap_gpsk_gkdf_sha256() 110 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument 147 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper() 157 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { in eap_gpsk_derive_keys_helper() 189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument 218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument [all …]
|
| H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument 22 if (aes_128_encrypt_block(psk, ak, ak)) in eap_psk_key_setup() 27 if (aes_128_encrypt_block(psk, ak, ak) || in eap_psk_key_setup() 28 aes_128_encrypt_block(psk, kdk, kdk)) in eap_psk_key_setup()
|
| H A D | eap_gpsk_common.h | 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
|
| H A D | eap_psk_common.h | 68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
|
| /freebsd-src/contrib/wpa/src/eap_server/ |
| H A D | eap_server_psk.c | 58 struct eap_psk_hdr_1 *psk; in eap_psk_build_1() local 71 sizeof(*psk) + sm->cfg->server_id_len, in eap_psk_build_1() 80 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_1() 81 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ in eap_psk_build_1() 82 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_1() 93 struct eap_psk_hdr_3 *psk; in eap_psk_build_3() local 100 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); in eap_psk_build_3() 108 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_3() 109 psk->flags = EAP_PSK_FLAGS_SET_T(2); /* T=2 */ in eap_psk_build_3() 110 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_3() [all …]
|
| /freebsd-src/crypto/openssl/test/ |
| H A D | dtls_mtu_test.c | 27 unsigned char *psk, in clnt_psk_callback() argument 34 memset(psk, 0x5a, max_psk_len); in clnt_psk_callback() 40 unsigned char *psk, in srvr_psk_callback() argument 45 memset(psk, 0x5a, max_psk_len); in srvr_psk_callback()
|
| /freebsd-src/crypto/openssl/apps/ |
| H A D | ciphers.c | 81 unsigned char *psk, in dummy_psk() argument 97 int psk = 0; in ciphers_main() local 157 psk = 1; in ciphers_main() 199 if (psk) in ciphers_main()
|
| /freebsd-src/contrib/wpa/src/eap_peer/ |
| H A D | eap_gpsk.c | 34 u8 *psk; member 119 data->psk = os_memdup(password, password_len); in eap_gpsk_init() 120 if (data->psk == NULL) { in eap_gpsk_init() 135 if (data->psk) { in eap_gpsk_deinit() 136 os_memset(data->psk, 0, data->psk_len); in eap_gpsk_deinit() 137 os_free(data->psk); in eap_gpsk_deinit() 364 if (eap_gpsk_derive_keys(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2() 378 if (eap_gpsk_derive_session_id(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2()
|
| /freebsd-src/crypto/openssl/doc/man3/ |
| H A D | SSL_CTX_use_psk_identity_hint.pod | 31 unsigned char *psk, 75 identity sent by the client in parameter B<identity>, and a buffer B<psk> of 111 successfully in parameter B<psk>. Return value is the length of 112 B<psk> in bytes. It is an error to return a value greater than 117 data to B<psk> and return the length of the random data, so the
|
| /freebsd-src/contrib/wpa/src/wps/ |
| H A D | wps_enrollee.c | 306 u8 psk[32]; in wps_build_cred_network_key() local 309 random_get_bytes(psk, sizeof(psk)) < 0) { in wps_build_cred_network_key() 315 psk, sizeof(psk)); in wps_build_cred_network_key() 318 wpa_snprintf_hex(hex, sizeof(hex), psk, sizeof(psk)); in wps_build_cred_network_key() 320 wpabuf_put_be16(msg, sizeof(psk) * 2); in wps_build_cred_network_key() 321 wpabuf_put_data(msg, hex, sizeof(psk) * 2); in wps_build_cred_network_key() 325 wps->p2p_dev_addr, psk, sizeo in wps_build_cred_network_key() [all...] |
| /freebsd-src/sys/netinet/ |
| H A D | tcp_fastopen.c | 237 uint8_t psk[TCP_FASTOPEN_MAX_PSKS][TCP_FASTOPEN_KEY_LEN]; member 500 tcp_fastopen_addpsk_locked(uint8_t *psk) in tcp_fastopen_addpsk_locked() argument 506 memcpy(V_tcp_fastopen_keys.psk[V_tcp_fastopen_keys.newest_psk], psk, in tcp_fastopen_addpsk_locked() 559 tcp_fastopen_make_psk_cookie(uint8_t *psk, uint8_t *cookie, uint8_t cookie_len) in tcp_fastopen_make_psk_cookie() argument 565 SipHash_SetKey(&ctx, psk); in tcp_fastopen_make_psk_cookie() 583 V_tcp_fastopen_keys.psk[psk_index], in tcp_fastopen_find_cookie_match_locked()
|
| /freebsd-src/contrib/wpa/wpa_supplicant/examples/ |
| H A D | wpa-psk-tkip.conf | 11 psk="secret passphrase"
|