/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man1/ |
H A D | ciphers.pod | 48 PSK and SRP ciphers are not enabled by default: they require B<-psk> or B<-srp> 61 When combined with B<-s> includes cipher suites which require PSK. 373 =item B<PSK> 375 All cipher suites using pre-shared keys (PSK). 379 Cipher suites using PSK key exchange, ECDHE_PSK, DHE_PSK or RSA_PSK. 383 Cipher suites using PSK authentication (currently all PSK modes apart from 603 TLS_PSK_WITH_ARIA_128_GCM_SHA256 PSK-ARIA128-GCM-SHA256 604 TLS_PSK_WITH_ARIA_256_GCM_SHA384 PSK-ARIA256-GCM-SHA384 605 TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256 DHE-PSK-ARIA128-GCM-SHA256 606 TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384 DHE-PSK-ARIA256-GCM-SHA384 [all …]
|
H A D | s_server.pod | 244 anonymous cipher suite or PSK) this option has no effect. 646 Expect the client to send PSK identity B<val> when using a PSK 647 cipher suite, and warn if they do not. By default, the expected PSK 652 Use the PSK identity hint B<val> when using a PSK cipher suite. 656 Use the PSK key B<val> when using a PSK cipher suite. The key is 659 This option must be provided in order to use a PSK cipher. 663 Use the pem encoded SSL_SESSION data stored in B<file> as the basis of a PSK.
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man1/ |
H A D | openssl-ciphers.pod.in | 51 PSK and SRP ciphers are not enabled by default: they require B<-psk> or B<-srp> 64 When combined with B<-s> includes cipher suites which require PSK. 377 =item B<PSK> 379 All cipher suites using pre-shared keys (PSK). 383 Cipher suites using PSK key exchange, ECDHE_PSK, DHE_PSK or RSA_PSK. 387 Cipher suites using PSK authentication (currently all PSK modes apart from 628 TLS_PSK_WITH_ARIA_128_GCM_SHA256 PSK-ARIA128-GCM-SHA256 629 TLS_PSK_WITH_ARIA_256_GCM_SHA384 PSK-ARIA256-GCM-SHA384 630 TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256 DHE-PSK-ARIA128-GCM-SHA256 631 TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384 DHE-PSK-ARIA256-GCM-SHA384 [all …]
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | SSL_CTX_use_psk_identity_hint.pod | 13 - set PSK identity hint to use 48 should identify an SSL_SESSION object that provides the PSK details and store it 53 It is also possible for the callback to succeed but not supply a PSK. In this 54 case no PSK will be used but the handshake will continue. To do this the 59 PSK ciphersuites for TLSv1.2 and below may call SSL_CTX_use_psk_identity_hint() 60 to set the given B<NUL>-terminated PSK identity hint B<hint> for SSL context 61 object B<ctx>. SSL_use_psk_identity_hint() sets the given B<NUL>-terminated PSK 65 In the case where PSK identity hint is B<NULL>, the server does not send the 71 is to validate the received PSK identity and to fetch the pre-shared key used 74 function is given the connection in parameter B<ssl>, B<NUL>-terminated PSK [all …]
|
H A D | SSL_CTX_set_psk_client_callback.pod | 11 - set PSK client callback 49 case the server will have specified a ciphersuite to use already and the PSK 51 given in B<md>. The PSK returned by the callback is allowed to be different 55 the PSK in B<*id>. The identifier length in bytes should be stored in B<*idlen>. 60 B<*sess>. This is used as the basis for the PSK, and should, at a minimum, have 72 PSK (the server may go on to negotiate any ciphersuite which is compatible with 87 L<SSL_SESSION_set_max_early_data(3)> if the PSK will be used for sending early 90 Alternatively an SSL_SESSION created from a previous non-PSK handshake may also 91 be used as the basis for a PSK. 96 It is also possible for the callback to succeed but not supply a PSK. In this [all …]
|
H A D | SSL_get_psk_identity.pod | 5 SSL_get_psk_identity, SSL_get_psk_identity_hint - get PSK client identity and hint 16 SSL_get_psk_identity_hint() is used to retrieve the PSK identity hint 18 B<ssl>. Similarly, SSL_get_psk_identity() is used to retrieve the PSK 24 If non-B<NULL>, SSL_get_psk_identity_hint() returns the PSK identity 25 hint and SSL_get_psk_identity() returns the PSK identity. Both are 27 no PSK identity hint was used during the connection setup.
|
H A D | SSL_SESSION_get_protocol_version.pod | 24 up a session based PSK (see L<SSL_CTX_set_psk_use_session_callback(3)>).
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
H A D | SSL_CTX_use_psk_identity_hint.pod | 13 - set PSK identity hint to use 48 should identify an SSL_SESSION object that provides the PSK details and store it 53 It is also possible for the callback to succeed but not supply a PSK. In this 54 case no PSK will be used but the handshake will continue. To do this the 59 PSK ciphersuites for TLSv1.2 and below may call SSL_CTX_use_psk_identity_hint() 60 to set the given B<NUL>-terminated PSK identity hint B<hint> for SSL context 61 object B<ctx>. SSL_use_psk_identity_hint() sets the given B<NUL>-terminated PSK 65 In the case where PSK identity hint is B<NULL>, the server does not send the 71 is to validate the received PSK identity and to fetch the pre-shared key used 74 function is given the connection in parameter B<ssl>, B<NUL>-terminated PSK [all …]
|
H A D | SSL_CTX_set_psk_client_callback.pod | 11 - set PSK client callback 49 case the server will have specified a ciphersuite to use already and the PSK 51 given in B<md>. The PSK returned by the callback is allowed to be different 55 the PSK in B<*id>. The identifier length in bytes should be stored in B<*idlen>. 60 B<*sess>. This is used as the basis for the PSK, and should, at a minimum, have 72 PSK (the server may go on to negotiate any ciphersuite which is compatible with 87 L<SSL_SESSION_set_max_early_data(3)> if the PSK will be used for sending early 90 Alternatively an SSL_SESSION created from a previous non-PSK handshake may also 91 be used as the basis for a PSK. 96 It is also possible for the callback to succeed but not supply a PSK. In this [all …]
|
H A D | SSL_get_psk_identity.pod | 5 SSL_get_psk_identity, SSL_get_psk_identity_hint - get PSK client identity and hint 16 SSL_get_psk_identity_hint() is used to retrieve the PSK identity hint 18 B<ssl>. Similarly, SSL_get_psk_identity() is used to retrieve the PSK 24 If non-B<NULL>, SSL_get_psk_identity_hint() returns the PSK identity 25 hint and SSL_get_psk_identity() returns the PSK identity. Both are 27 no PSK identity hint was used during the connection setup.
|
H A D | SSL_SESSION_get_protocol_version.pod | 24 up a session based PSK (see L<SSL_CTX_set_psk_use_session_callback(3)>).
|
H A D | SSL_SESSION_get0_cipher.pod | 26 session based PSK (see L<SSL_CTX_set_psk_use_session_callback(3)>).
|
/netbsd-src/external/apache2/llvm/dist/llvm/include/llvm/IR/ |
H A D | ProfileSummary.h | 50 const Kind PSK; 76 : PSK(K), DetailedSummary(std::move(DetailedSummary)), in PSK() function 82 Kind getKind() const { return PSK; } in getKind()
|
/netbsd-src/share/examples/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 25 key_mgmt=WPA-PSK 33 key_mgmt=WPA-PSK
|
/netbsd-src/external/bsd/wpa/dist/hostapd/ |
H A D | eap_testing.txt | 28 EAP-PEAPv0/PSK + - - - - 38 EAP-PEAPv1/PSK + - - - -
|
H A D | README-WPS | 14 passphrase/PSK) and configuration of an access point and client 82 wpa_key_mgmt=WPA-PSK 86 # Enable random per-device PSK generation for WPS clients 197 negotiation. At that point, a new, random WPA PSK is generated for the 211 which will generate a new WPA PSK in the same way as the PIN method
|
/netbsd-src/external/bsd/wpa/dist/wpa_supplicant/ |
H A D | eap_testing.txt | 64 EAP-PEAPv0/PSK - - - - - - - - - - + - 75 EAP-PEAPv1/PSK - - - - - - - - - - + - 90 EAP-TTLS/EAP-PSK - - - - - - - - - - + - 98 EAP-PSK +7 - - - - + - - - - + - 129 7) tested only with an older (incompatible) draft of EAP-PSK; FreeRADIUS does 130 not support the current EAP-PSK (RFC) specification 279 - EAP-PSK
|
H A D | win_example.reg | 29 "key_mgmt"="WPA-PSK"
|
H A D | README-Windows.txt | 27 - WPA-PSK, TKIP, CCMP, TKIP+CCMP 29 - WPA2-PSK, TKIP, CCMP, TKIP+CCMP 174 Simple configuration example for WPA-PSK: 180 key_mgmt=WPA-PSK 295 key_mgmt=WPA-PSK
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/util/ |
H A D | libssl.num | 98 SSL_get_psk_identity 99 1_1_0 EXIST::FUNCTION:PSK 101 SSL_CTX_set_psk_server_callback 102 1_1_0 EXIST::FUNCTION:PSK 108 SSL_set_psk_client_callback 109 1_1_0 EXIST::FUNCTION:PSK 176 SSL_get_psk_identity_hint 177 1_1_0 EXIST::FUNCTION:PSK 248 SSL_CTX_set_psk_client_callback 249 1_1_0 EXIST::FUNCTION:PSK 297 SSL_use_psk_identity_hint 298 1_1_0 EXIST::FUNCTION:PSK 322 SSL_CTX_use_psk_identity_hint 323 1_1_0 EXIST::FUNCTION:PSK 333 SSL_set_psk_server_callback 334 1_1_0 EXIST::FUNCTION:PSK
|
/netbsd-src/crypto/external/bsd/openssl/dist/util/ |
H A D | libssl.num | 98 SSL_get_psk_identity 99 3_0_0 EXIST::FUNCTION:PSK 101 SSL_CTX_set_psk_server_callback 102 3_0_0 EXIST::FUNCTION:PSK 108 SSL_set_psk_client_callback 109 3_0_0 EXIST::FUNCTION:PSK 176 SSL_get_psk_identity_hint 177 3_0_0 EXIST::FUNCTION:PSK 248 SSL_CTX_set_psk_client_callback 249 3_0_0 EXIST::FUNCTION:PSK 297 SSL_use_psk_identity_hint 298 3_0_0 EXIST::FUNCTION:PSK 322 SSL_CTX_use_psk_identity_hint 323 3_0_0 EXIST::FUNCTION:PSK 333 SSL_set_psk_server_callback 334 3_0_0 EXIST::FUNCTION:PSK
|
/netbsd-src/external/bsd/wpa/dist/wpa_supplicant/examples/ |
H A D | wpa-psk-tkip.conf | 7 key_mgmt=WPA-PSK
|
/netbsd-src/crypto/dist/ipsec-tools/src/racoon/ |
H A D | prsa_tok.l | 61 PSK { return TAG_PSK; }
|
/netbsd-src/external/bsd/wpa/dist/wpa_supplicant/wpa_gui-qt4/ |
H A D | networkconfig.ui | 80 <string>WPA-Personal (PSK)</string> 90 <string>WPA2-Personal (PSK)</string> 134 <string>PSK</string>
|
/netbsd-src/external/bsd/wpa/dist/wpa_supplicant/wpa_gui-qt4/lang/ |
H A D | wpa_gui_de.ts | 125 <source>WPA-Personal (PSK)</source> 135 <source>WPA2-Personal (PSK)</source> 170 <source>PSK</source> 285 <source>WPA-PSK requires a passphrase of 8 to 63 characters 286 or 64 hex digit PSK</source> 287 <translation>WPA PSK benötigt ein Passphrase mit 8 bis 63 Zeichen 288 oder 64 hexadezimal stelligen PSK</translation>
|