Home
last modified time | relevance | path

Searched refs:PSK (Results 1 – 25 of 56) sorted by relevance

123

/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man1/
H A Dciphers.pod48 PSK and SRP ciphers are not enabled by default: they require B<-psk> or B<-srp>
61 When combined with B<-s> includes cipher suites which require PSK.
373 =item B<PSK>
375 All cipher suites using pre-shared keys (PSK).
379 Cipher suites using PSK key exchange, ECDHE_PSK, DHE_PSK or RSA_PSK.
383 Cipher suites using PSK authentication (currently all PSK modes apart from
603 TLS_PSK_WITH_ARIA_128_GCM_SHA256 PSK-ARIA128-GCM-SHA256
604 TLS_PSK_WITH_ARIA_256_GCM_SHA384 PSK-ARIA256-GCM-SHA384
605 TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256 DHE-PSK-ARIA128-GCM-SHA256
606 TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384 DHE-PSK-ARIA256-GCM-SHA384
[all …]
H A Ds_server.pod244 anonymous cipher suite or PSK) this option has no effect.
646 Expect the client to send PSK identity B<val> when using a PSK
647 cipher suite, and warn if they do not. By default, the expected PSK
652 Use the PSK identity hint B<val> when using a PSK cipher suite.
656 Use the PSK key B<val> when using a PSK cipher suite. The key is
659 This option must be provided in order to use a PSK cipher.
663 Use the pem encoded SSL_SESSION data stored in B<file> as the basis of a PSK.
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man1/
H A Dopenssl-ciphers.pod.in51 PSK and SRP ciphers are not enabled by default: they require B<-psk> or B<-srp>
64 When combined with B<-s> includes cipher suites which require PSK.
377 =item B<PSK>
379 All cipher suites using pre-shared keys (PSK).
383 Cipher suites using PSK key exchange, ECDHE_PSK, DHE_PSK or RSA_PSK.
387 Cipher suites using PSK authentication (currently all PSK modes apart from
628 TLS_PSK_WITH_ARIA_128_GCM_SHA256 PSK-ARIA128-GCM-SHA256
629 TLS_PSK_WITH_ARIA_256_GCM_SHA384 PSK-ARIA256-GCM-SHA384
630 TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256 DHE-PSK-ARIA128-GCM-SHA256
631 TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384 DHE-PSK-ARIA256-GCM-SHA384
[all …]
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/
H A DSSL_CTX_use_psk_identity_hint.pod13 - set PSK identity hint to use
48 should identify an SSL_SESSION object that provides the PSK details and store it
53 It is also possible for the callback to succeed but not supply a PSK. In this
54 case no PSK will be used but the handshake will continue. To do this the
59 PSK ciphersuites for TLSv1.2 and below may call SSL_CTX_use_psk_identity_hint()
60 to set the given B<NUL>-terminated PSK identity hint B<hint> for SSL context
61 object B<ctx>. SSL_use_psk_identity_hint() sets the given B<NUL>-terminated PSK
65 In the case where PSK identity hint is B<NULL>, the server does not send the
71 is to validate the received PSK identity and to fetch the pre-shared key used
74 function is given the connection in parameter B<ssl>, B<NUL>-terminated PSK
[all …]
H A DSSL_CTX_set_psk_client_callback.pod11 - set PSK client callback
49 case the server will have specified a ciphersuite to use already and the PSK
51 given in B<md>. The PSK returned by the callback is allowed to be different
55 the PSK in B<*id>. The identifier length in bytes should be stored in B<*idlen>.
60 B<*sess>. This is used as the basis for the PSK, and should, at a minimum, have
72 PSK (the server may go on to negotiate any ciphersuite which is compatible with
87 L<SSL_SESSION_set_max_early_data(3)> if the PSK will be used for sending early
90 Alternatively an SSL_SESSION created from a previous non-PSK handshake may also
91 be used as the basis for a PSK.
96 It is also possible for the callback to succeed but not supply a PSK. In this
[all …]
H A DSSL_get_psk_identity.pod5 SSL_get_psk_identity, SSL_get_psk_identity_hint - get PSK client identity and hint
16 SSL_get_psk_identity_hint() is used to retrieve the PSK identity hint
18 B<ssl>. Similarly, SSL_get_psk_identity() is used to retrieve the PSK
24 If non-B<NULL>, SSL_get_psk_identity_hint() returns the PSK identity
25 hint and SSL_get_psk_identity() returns the PSK identity. Both are
27 no PSK identity hint was used during the connection setup.
H A DSSL_SESSION_get_protocol_version.pod24 up a session based PSK (see L<SSL_CTX_set_psk_use_session_callback(3)>).
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/
H A DSSL_CTX_use_psk_identity_hint.pod13 - set PSK identity hint to use
48 should identify an SSL_SESSION object that provides the PSK details and store it
53 It is also possible for the callback to succeed but not supply a PSK. In this
54 case no PSK will be used but the handshake will continue. To do this the
59 PSK ciphersuites for TLSv1.2 and below may call SSL_CTX_use_psk_identity_hint()
60 to set the given B<NUL>-terminated PSK identity hint B<hint> for SSL context
61 object B<ctx>. SSL_use_psk_identity_hint() sets the given B<NUL>-terminated PSK
65 In the case where PSK identity hint is B<NULL>, the server does not send the
71 is to validate the received PSK identity and to fetch the pre-shared key used
74 function is given the connection in parameter B<ssl>, B<NUL>-terminated PSK
[all …]
H A DSSL_CTX_set_psk_client_callback.pod11 - set PSK client callback
49 case the server will have specified a ciphersuite to use already and the PSK
51 given in B<md>. The PSK returned by the callback is allowed to be different
55 the PSK in B<*id>. The identifier length in bytes should be stored in B<*idlen>.
60 B<*sess>. This is used as the basis for the PSK, and should, at a minimum, have
72 PSK (the server may go on to negotiate any ciphersuite which is compatible with
87 L<SSL_SESSION_set_max_early_data(3)> if the PSK will be used for sending early
90 Alternatively an SSL_SESSION created from a previous non-PSK handshake may also
91 be used as the basis for a PSK.
96 It is also possible for the callback to succeed but not supply a PSK. In this
[all …]
H A DSSL_get_psk_identity.pod5 SSL_get_psk_identity, SSL_get_psk_identity_hint - get PSK client identity and hint
16 SSL_get_psk_identity_hint() is used to retrieve the PSK identity hint
18 B<ssl>. Similarly, SSL_get_psk_identity() is used to retrieve the PSK
24 If non-B<NULL>, SSL_get_psk_identity_hint() returns the PSK identity
25 hint and SSL_get_psk_identity() returns the PSK identity. Both are
27 no PSK identity hint was used during the connection setup.
H A DSSL_SESSION_get_protocol_version.pod24 up a session based PSK (see L<SSL_CTX_set_psk_use_session_callback(3)>).
H A DSSL_SESSION_get0_cipher.pod26 session based PSK (see L<SSL_CTX_set_psk_use_session_callback(3)>).
/netbsd-src/external/apache2/llvm/dist/llvm/include/llvm/IR/
H A DProfileSummary.h50 const Kind PSK;
76 : PSK(K), DetailedSummary(std::move(DetailedSummary)), in PSK() function
82 Kind getKind() const { return PSK; } in getKind()
/netbsd-src/share/examples/wpa_supplicant/
H A Dwpa_supplicant.conf25 key_mgmt=WPA-PSK
33 key_mgmt=WPA-PSK
/netbsd-src/external/bsd/wpa/dist/hostapd/
H A Deap_testing.txt28 EAP-PEAPv0/PSK + - - - -
38 EAP-PEAPv1/PSK + - - - -
H A DREADME-WPS14 passphrase/PSK) and configuration of an access point and client
82 wpa_key_mgmt=WPA-PSK
86 # Enable random per-device PSK generation for WPS clients
197 negotiation. At that point, a new, random WPA PSK is generated for the
211 which will generate a new WPA PSK in the same way as the PIN method
/netbsd-src/external/bsd/wpa/dist/wpa_supplicant/
H A Deap_testing.txt64 EAP-PEAPv0/PSK - - - - - - - - - - + -
75 EAP-PEAPv1/PSK - - - - - - - - - - + -
90 EAP-TTLS/EAP-PSK - - - - - - - - - - + -
98 EAP-PSK +7 - - - - + - - - - + -
129 7) tested only with an older (incompatible) draft of EAP-PSK; FreeRADIUS does
130 not support the current EAP-PSK (RFC) specification
279 - EAP-PSK
H A Dwin_example.reg29 "key_mgmt"="WPA-PSK"
H A DREADME-Windows.txt27 - WPA-PSK, TKIP, CCMP, TKIP+CCMP
29 - WPA2-PSK, TKIP, CCMP, TKIP+CCMP
174 Simple configuration example for WPA-PSK:
180 key_mgmt=WPA-PSK
295 key_mgmt=WPA-PSK
/netbsd-src/crypto/external/bsd/openssl.old/dist/util/
H A Dlibssl.num98 SSL_get_psk_identity 99 1_1_0 EXIST::FUNCTION:PSK
101 SSL_CTX_set_psk_server_callback 102 1_1_0 EXIST::FUNCTION:PSK
108 SSL_set_psk_client_callback 109 1_1_0 EXIST::FUNCTION:PSK
176 SSL_get_psk_identity_hint 177 1_1_0 EXIST::FUNCTION:PSK
248 SSL_CTX_set_psk_client_callback 249 1_1_0 EXIST::FUNCTION:PSK
297 SSL_use_psk_identity_hint 298 1_1_0 EXIST::FUNCTION:PSK
322 SSL_CTX_use_psk_identity_hint 323 1_1_0 EXIST::FUNCTION:PSK
333 SSL_set_psk_server_callback 334 1_1_0 EXIST::FUNCTION:PSK
/netbsd-src/crypto/external/bsd/openssl/dist/util/
H A Dlibssl.num98 SSL_get_psk_identity 99 3_0_0 EXIST::FUNCTION:PSK
101 SSL_CTX_set_psk_server_callback 102 3_0_0 EXIST::FUNCTION:PSK
108 SSL_set_psk_client_callback 109 3_0_0 EXIST::FUNCTION:PSK
176 SSL_get_psk_identity_hint 177 3_0_0 EXIST::FUNCTION:PSK
248 SSL_CTX_set_psk_client_callback 249 3_0_0 EXIST::FUNCTION:PSK
297 SSL_use_psk_identity_hint 298 3_0_0 EXIST::FUNCTION:PSK
322 SSL_CTX_use_psk_identity_hint 323 3_0_0 EXIST::FUNCTION:PSK
333 SSL_set_psk_server_callback 334 3_0_0 EXIST::FUNCTION:PSK
/netbsd-src/external/bsd/wpa/dist/wpa_supplicant/examples/
H A Dwpa-psk-tkip.conf7 key_mgmt=WPA-PSK
/netbsd-src/crypto/dist/ipsec-tools/src/racoon/
H A Dprsa_tok.l61 PSK { return TAG_PSK; }
/netbsd-src/external/bsd/wpa/dist/wpa_supplicant/wpa_gui-qt4/
H A Dnetworkconfig.ui80 <string>WPA-Personal (PSK)</string>
90 <string>WPA2-Personal (PSK)</string>
134 <string>PSK</string>
/netbsd-src/external/bsd/wpa/dist/wpa_supplicant/wpa_gui-qt4/lang/
H A Dwpa_gui_de.ts125 <source>WPA-Personal (PSK)</source>
135 <source>WPA2-Personal (PSK)</source>
170 <source>PSK</source>
285 <source>WPA-PSK requires a passphrase of 8 to 63 characters
286 or 64 hex digit PSK</source>
287 <translation>WPA PSK benötigt ein Passphrase mit 8 bis 63 Zeichen
288 oder 64 hexadezimal stelligen PSK</translation>

123