/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-ciphers.pod.in | 51 PSK and SRP ciphers are not enabled by default: they require B<-psk> or B<-srp> 64 When combined with B<-s> includes cipher suites which require PSK. 377 =item B<PSK> 379 All cipher suites using pre-shared keys (PSK). 383 Cipher suites using PSK key exchange, ECDHE_PSK, DHE_PSK or RSA_PSK. 387 Cipher suites using PSK authentication (currently all PSK modes apart from 628 TLS_PSK_WITH_ARIA_128_GCM_SHA256 PSK-ARIA128-GCM-SHA256 629 TLS_PSK_WITH_ARIA_256_GCM_SHA384 PSK-ARIA256-GCM-SHA384 630 TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256 DHE-PSK-ARIA128-GCM-SHA256 631 TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384 DHE-PSK-ARIA256-GCM-SHA384 [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_use_psk_identity_hint.pod | 13 - set PSK identity hint to use 48 should identify an SSL_SESSION object that provides the PSK details and store it 53 It is also possible for the callback to succeed but not supply a PSK. In this 54 case no PSK will be used but the handshake will continue. To do this the 59 PSK ciphersuites for TLSv1.2 and below may call SSL_CTX_use_psk_identity_hint() 60 to set the given B<NUL>-terminated PSK identity hint B<hint> for SSL context 61 object B<ctx>. SSL_use_psk_identity_hint() sets the given B<NUL>-terminated PSK 65 In the case where PSK identity hint is B<NULL>, the server does not send the 71 is to validate the received PSK identity and to fetch the pre-shared key used 74 function is given the connection in parameter B<ssl>, B<NUL>-terminated PSK [all …]
|
H A D | SSL_CTX_set_psk_client_callback.pod | 11 - set PSK client callback 49 case the server will have specified a ciphersuite to use already and the PSK 51 given in B<md>. The PSK returned by the callback is allowed to be different 55 the PSK in B<*id>. The identifier length in bytes should be stored in B<*idlen>. 60 B<*sess>. This is used as the basis for the PSK, and should, at a minimum, have 72 PSK (the server may go on to negotiate any ciphersuite which is compatible with 87 L<SSL_SESSION_set_max_early_data(3)> if the PSK will be used for sending early 90 Alternatively an SSL_SESSION created from a previous non-PSK handshake may also 91 be used as the basis for a PSK. 96 It is also possible for the callback to succeed but not supply a PSK. In this [all …]
|
H A D | SSL_get_psk_identity.pod | 5 SSL_get_psk_identity, SSL_get_psk_identity_hint - get PSK client identity and hint 16 SSL_get_psk_identity_hint() is used to retrieve the PSK identity hint 18 B<ssl>. Similarly, SSL_get_psk_identity() is used to retrieve the PSK 24 If non-B<NULL>, SSL_get_psk_identity_hint() returns the PSK identity 25 hint and SSL_get_psk_identity() returns the PSK identity. Both are 27 no PSK identity hint was used during the connection setup.
|
/freebsd/contrib/wpa/hostapd/ |
H A D | hostapd.wpa_psk | 2 # with #, must contain a MAC address and PSK separated with a space. 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 5 # characters or as a 256-bit hex PSK (64 hex digits). 12 # generating a PSK for a WPS Enrollee instead of generating a new random 13 # per-Enrollee PSK.
|
H A D | eap_testing.txt | 28 EAP-PEAPv0/PSK + - - - - 38 EAP-PEAPv1/PSK + - - - -
|
H A D | README | 221 - WPA-PSK ("WPA-Personal") 302 # WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either 303 # wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK. 313 # WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit 315 # (8..63 characters) that will be converted to PSK. This conversion uses SSID 316 # so the PSK changes when ASCII passphrase is used and the SSID is changed. 320 # Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The 322 #wpa_key_mgmt=WPA-PSK WPA-EAP
|
H A D | hostapd.eap_user | 21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a 66 "psk user" PSK "unknown" 67 "psk.user@example.com" PSK 0123456789abcdef0123456789abcdef
|
H A D | ChangeLog | 15 * support RADIUS ACL/PSK check during 4-way handshake (wpa_psk_radius=3) 97 * added support for MACsec Key Agreement using IEEE 802.1X/PSK 150 - add WPA/WPA2 passphrase/PSK -based VLAN assignment 154 for PSK (wps_cred_add_sae=1) 171 - added local generation of PMK-R0/PMK-R1 for FT-PSK 180 - fixed wpa_psk_file use for FT-PSK 188 WPA2 PSK/passphrase 256 - allow server to provide PSK instead of passphrase for WPA-PSK 450 * extended WPS per-station PSK to support ER case 535 * added support for getting per-device PSK from RADIUS Tunnel-Password [all …]
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 1787 key_mgmt=WPA-PSK 1798 key_mgmt=WPA-PSK 1886 key_mgmt=WPA-PSK WPA-EAP 1914 eap=PSK 2014 key_mgmt=WPA-PSK 2057 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
|
H A D | eap_testing.txt | 64 EAP-PEAPv0/PSK - - - - - - - - - - + - 75 EAP-PEAPv1/PSK - - - - - - - - - - + - 90 EAP-TTLS/EAP-PSK - - - - - - - - - - + - 98 EAP-PSK +7 - - - - + - - - - + - 129 7) tested only with an older (incompatible) draft of EAP-PSK; FreeRADIUS does 130 not support the current EAP-PSK (RFC) specification 279 - EAP-PSK
|
H A D | README-Windows.txt | 27 - WPA-PSK, TKIP, CCMP, TKIP+CCMP 29 - WPA2-PSK, TKIP, CCMP, TKIP+CCMP 174 Simple configuration example for WPA-PSK: 180 key_mgmt=WPA-PSK 295 key_mgmt=WPA-PSK
|
/freebsd/contrib/llvm-project/llvm/include/llvm/IR/ |
H A D | ProfileSummary.h | 50 const Kind PSK; 76 : PSK(K), DetailedSummary(DetailedSummary), TotalCount(TotalCount), in PSK() function 82 Kind getKind() const { return PSK; } in getKind()
|
/freebsd/contrib/wpa/wpa_supplicant/doc/docbook/ |
H A D | wpa_passphrase.sgml | 14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 27 <para><command>wpa_passphrase</command> pre-computes PSK entries for 30 and SSID are used to generate a 256-bit PSK.</para>
|
H A D | wpa_supplicant.conf.sgml | 48 <para>WPA-Personal (PSK) as home network and WPA-Enterprise with 59 key_mgmt=WPA-PSK 159 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
|
/freebsd/contrib/wpa/wpa_supplicant/examples/ |
H A D | wpa-psk-tkip.conf | 7 key_mgmt=WPA-PSK
|
/freebsd/crypto/openssl/util/ |
H A D | libssl.num | 98 SSL_get_psk_identity 99 3_0_0 EXIST::FUNCTION:PSK 101 SSL_CTX_set_psk_server_callback 102 3_0_0 EXIST::FUNCTION:PSK 108 SSL_set_psk_client_callback 109 3_0_0 EXIST::FUNCTION:PSK 176 SSL_get_psk_identity_hint 177 3_0_0 EXIST::FUNCTION:PSK 248 SSL_CTX_set_psk_client_callback 249 3_0_0 EXIST::FUNCTION:PSK 297 SSL_use_psk_identity_hint 298 3_0_0 EXIST::FUNCTION:PSK 322 SSL_CTX_use_psk_identity_hint 323 3_0_0 EXIST::FUNCTION:PSK 333 SSL_set_psk_server_callback 334 3_0_0 EXIST::FUNCTION:PSK
|
/freebsd/tools/tools/net80211/scripts/ |
H A D | setup.wpa1.aes | 27 wpa_key_mgmt=WPA-PSK
|
H A D | setup.wpa1.tkip | 27 wpa_key_mgmt=WPA-PSK
|
H A D | setup.wpa2 | 27 wpa_key_mgmt=WPA-PSK
|
H A D | setup.wpa | 27 wpa_key_mgmt=WPA-PSK
|
H A D | setup.wpa2.tkip | 27 wpa_key_mgmt=WPA-PSK
|
H A D | setup.tsn | 27 wpa_key_mgmt=WPA-PSK
|
H A D | setup.updown.wpa | 29 wpa_key_mgmt=WPA-PSK
|
H A D | setup.mixed | 28 wpa_key_mgmt=WPA-PSK
|