/netbsd-src/lib/libpam/modules/pam_ssh/ |
H A D | pam_ssh.c | 104 struct pam_ssh_key *psk; in pam_ssh_load_key() local 138 if ((psk = malloc(sizeof(*psk))) == NULL) { in pam_ssh_load_key() 143 psk->key = key; in pam_ssh_load_key() 144 psk->comment = comment; in pam_ssh_load_key() 145 return (psk); in pam_ssh_load_key() 155 struct pam_ssh_key *psk; in pam_ssh_free_key() local 157 psk = data; in pam_ssh_free_key() 158 sshkey_free(psk->key); in pam_ssh_free_key() 159 free(psk->comment); in pam_ssh_free_key() 160 free(psk); in pam_ssh_free_key() [all …]
|
/netbsd-src/external/bsd/wpa/dist/src/eap_common/ |
H A D | eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, in eap_gpsk_gkdf_cmac() argument 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) in eap_gpsk_gkdf_cmac() 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, in eap_gpsk_gkdf_sha256() argument 95 if (hmac_sha256_vector(psk, 32, 2, addr, vlen, hash)) in eap_gpsk_gkdf_sha256() 110 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument 147 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper() 157 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { in eap_gpsk_derive_keys_helper() 189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument 218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument [all …]
|
H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument 22 if (aes_128_encrypt_block(psk, ak, ak)) in eap_psk_key_setup() 27 if (aes_128_encrypt_block(psk, ak, ak) || in eap_psk_key_setup() 28 aes_128_encrypt_block(psk, kdk, kdk)) in eap_psk_key_setup()
|
H A D | eap_gpsk_common.h | 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
|
H A D | eap_psk_common.h | 68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
|
/netbsd-src/dist/pf/usr.sbin/authpf/ |
H A D | authpf.c | 782 struct pfioc_state_kill psk; in authpf_kill_states() local 785 memset(&psk, 0, sizeof(psk)); in authpf_kill_states() 789 psk.psk_af = AF_INET; in authpf_kill_states() 791 psk.psk_af = AF_INET6; in authpf_kill_states() 798 memcpy(&psk.psk_src.addr.v.a.addr, &target, in authpf_kill_states() 799 sizeof(psk.psk_src.addr.v.a.addr)); in authpf_kill_states() 800 memset(&psk.psk_src.addr.v.a.mask, 0xff, in authpf_kill_states() 801 sizeof(psk.psk_src.addr.v.a.mask)); in authpf_kill_states() 802 if (ioctl(dev, DIOCKILLSTATES, &psk)) in authpf_kill_states() 806 memset(&psk.psk_src, 0, sizeof(psk.psk_src)); in authpf_kill_states() [all …]
|
/netbsd-src/dist/pf/sbin/pfctl/ |
H A D | pfctl.c | 372 struct pfioc_state_kill psk; in pfctl_clear_states() local 374 memset(&psk, 0, sizeof(psk)); in pfctl_clear_states() 375 if (iface != NULL && strlcpy(psk.psk_ifname, iface, in pfctl_clear_states() 376 sizeof(psk.psk_ifname)) >= sizeof(psk.psk_ifname)) in pfctl_clear_states() 379 if (ioctl(dev, DIOCCLRSTATES, &psk)) in pfctl_clear_states() 382 fprintf(stderr, "%d states cleared\n", psk.psk_af); in pfctl_clear_states() 546 struct pfioc_state_kill psk; in pfctl_kill_states() local 554 memset(&psk, 0, sizeof(psk)); in pfctl_kill_states() 555 memset(&psk.psk_src.addr.v.a.mask, 0xff, in pfctl_kill_states() 556 sizeof(psk.psk_src.addr.v.a.mask)); in pfctl_kill_states() [all …]
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/test/ |
H A D | dtls_mtu_test.c | 27 unsigned char *psk, in clnt_psk_callback() argument 34 memset(psk, 0x5a, max_psk_len); in clnt_psk_callback() 40 unsigned char *psk, in srvr_psk_callback() argument 45 memset(psk, 0x5a, max_psk_len); in srvr_psk_callback()
|
/netbsd-src/crypto/external/bsd/openssl/dist/test/ |
H A D | dtls_mtu_test.c | 27 unsigned char *psk, in clnt_psk_callback() argument 34 memset(psk, 0x5a, max_psk_len); in clnt_psk_callback() 40 unsigned char *psk, in srvr_psk_callback() argument 45 memset(psk, 0x5a, max_psk_len); in srvr_psk_callback()
|
/netbsd-src/crypto/external/bsd/openssl/dist/apps/ |
H A D | ciphers.c | 81 unsigned char *psk, in dummy_psk() argument 97 int psk = 0; in ciphers_main() local 157 psk = 1; in ciphers_main() 199 if (psk) in ciphers_main()
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/apps/ |
H A D | ciphers.c | 69 unsigned char *psk, in dummy_psk() argument 91 int psk = 0; in ciphers_main() local 151 psk = 1; in ciphers_main() 188 if (psk) in ciphers_main()
|
/netbsd-src/share/examples/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 26 psk="secretKey" 34 psk="secretKey"
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | SSL_CTX_use_psk_identity_hint.pod | 31 unsigned char *psk, 75 identity sent by the client in parameter B<identity>, and a buffer B<psk> of 111 successfully in parameter B<psk>. Return value is the length of 112 B<psk> in bytes. It is an error to return a value greater than 117 data to B<psk> and return the length of the random data, so the
|
H A D | SSL_CTX_set_psk_client_callback.pod | 32 unsigned char *psk, 113 resulting B<NUL>-terminated identity is to be stored, and a buffer B<psk> 151 the length (> 0) of B<psk> in bytes is returned.
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
H A D | SSL_CTX_use_psk_identity_hint.pod | 31 unsigned char *psk, 75 identity sent by the client in parameter B<identity>, and a buffer B<psk> of 113 successfully in parameter B<psk>. Return value is the length of 114 B<psk> in bytes. It is an error to return a value greater than 119 data to B<psk> and return the length of the random data, so the
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/test/ossl_shim/ |
H A D | ossl_shim.cc | 286 config->psk.size() > max_psk_len) { in PskClientCallback() 293 memcpy(out_psk, config->psk.data(), config->psk.size()); in PskClientCallback() 294 return config->psk.size(); in PskClientCallback() 306 if (config->psk.size() > max_psk_len) { in PskServerCallback() 311 memcpy(out_psk, config->psk.data(), config->psk.size()); in PskServerCallback() 312 return config->psk.size(); in PskServerCallback() 880 if (!config->psk.empty()) { in CheckHandshakeProperties() 958 if (!config->psk.empty()) { in DoExchange()
|
H A D | test_config.h | 48 std::string psk; member
|
/netbsd-src/sys/dist/pf/net/ |
H A D | pf_ioctl.c | 1871 struct pfioc_state_kill *psk = (struct pfioc_state_kill *)addr; in pfioctl() local 1877 if (!psk->psk_ifname[0] || !strcmp(psk->psk_ifname, in pfioctl() 1887 psk->psk_af = killed; in pfioctl() 1889 pfsync_clear_states(pf_status.hostid, psk->psk_ifname); in pfioctl() 1898 struct pfioc_state_kill *psk = (struct pfioc_state_kill *)addr; in pfioctl() local 1913 if ((!psk->psk_af || sk->af == psk->psk_af) in pfioctl() 1914 && (!psk->psk_proto || psk->psk_proto == in pfioctl() 1916 PF_MATCHA(psk->psk_src.neg, in pfioctl() 1917 &psk->psk_src.addr.v.a.addr, in pfioctl() 1918 &psk->psk_src.addr.v.a.mask, in pfioctl() [all …]
|
/netbsd-src/crypto/dist/ipsec-tools/src/racoon/ |
H A D | privsep.c | 512 vchar_t *psk; in privsep_init() local 530 if ((psk = getpsk(bufs[0], keylen)) == NULL) { in privsep_init() 535 reply->bufs.buflen[0] = psk->l; in privsep_init() 536 reply->hdr.ac_len = sizeof(*reply) + psk->l; in privsep_init() 545 memcpy(reply + 1, psk->v, psk->l); in privsep_init() 546 vfree(psk); in privsep_init() 1058 vchar_t *psk; local 1095 if ((psk = vmalloc(len - sizeof(*msg))) == NULL) 1098 memcpy(psk->v, msg + 1, psk->l); 1100 return psk;
|
/netbsd-src/external/bsd/wpa/dist/wpa_supplicant/examples/ |
H A D | wpa-psk-tkip.conf | 11 psk="secret passphrase"
|
/netbsd-src/external/ibm-public/postfix/dist/src/tls/ |
H A D | rsaroot-cert.pem | 9 X8lMaz8ooT9OI/4ln/psk+jg90GTiMTAZFrKruHwBpNbVx0AyxuisiTqhv6M++fu
|
H A D | rsaroot-pkey.pem | 7 n/psk+jg90GTiMTAZFrKruHwBpNbVx0AyxuisiTqhv6M++fu1ViLHIsm+55CJj5O
|
/netbsd-src/share/examples/racoon/ |
H A D | Makefile | 10 FILES= psk.txt.sample racoon.conf.sample \
|
/netbsd-src/external/bsd/wpa/dist/wpa_supplicant/ |
H A D | win_example.reg | 30 "psk"="\"secret password\""
|
/netbsd-src/crypto/dist/ipsec-tools/src/racoon/samples/ |
H A D | racoon.conf.sample-inherit | 6 path pre_shared_key "/etc/racoon/psk.txt";
|