Home
last modified time | relevance | path

Searched refs:PSK (Results 1 – 25 of 63) sorted by relevance

123

/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-ciphers.pod.in51 PSK and SRP ciphers are not enabled by default: they require B<-psk> or B<-srp>
64 When combined with B<-s> includes cipher suites which require PSK.
377 =item B<PSK>
379 All cipher suites using pre-shared keys (PSK).
383 Cipher suites using PSK key exchange, ECDHE_PSK, DHE_PSK or RSA_PSK.
387 Cipher suites using PSK authentication (currently all PSK modes apart from
628 TLS_PSK_WITH_ARIA_128_GCM_SHA256 PSK-ARIA128-GCM-SHA256
629 TLS_PSK_WITH_ARIA_256_GCM_SHA384 PSK-ARIA256-GCM-SHA384
630 TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256 DHE-PSK-ARIA128-GCM-SHA256
631 TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384 DHE-PSK-ARIA256-GCM-SHA384
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_use_psk_identity_hint.pod13 - set PSK identity hint to use
48 should identify an SSL_SESSION object that provides the PSK details and store it
53 It is also possible for the callback to succeed but not supply a PSK. In this
54 case no PSK will be used but the handshake will continue. To do this the
59 PSK ciphersuites for TLSv1.2 and below may call SSL_CTX_use_psk_identity_hint()
60 to set the given B<NUL>-terminated PSK identity hint B<hint> for SSL context
61 object B<ctx>. SSL_use_psk_identity_hint() sets the given B<NUL>-terminated PSK
65 In the case where PSK identity hint is B<NULL>, the server does not send the
71 is to validate the received PSK identity and to fetch the pre-shared key used
74 function is given the connection in parameter B<ssl>, B<NUL>-terminated PSK
[all …]
H A DSSL_CTX_set_psk_client_callback.pod11 - set PSK client callback
49 case the server will have specified a ciphersuite to use already and the PSK
51 given in B<md>. The PSK returned by the callback is allowed to be different
55 the PSK in B<*id>. The identifier length in bytes should be stored in B<*idlen>.
60 B<*sess>. This is used as the basis for the PSK, and should, at a minimum, have
72 PSK (the server may go on to negotiate any ciphersuite which is compatible with
87 L<SSL_SESSION_set_max_early_data(3)> if the PSK will be used for sending early
90 Alternatively an SSL_SESSION created from a previous non-PSK handshake may also
91 be used as the basis for a PSK.
96 It is also possible for the callback to succeed but not supply a PSK. In this
[all …]
H A DSSL_get_psk_identity.pod5 SSL_get_psk_identity, SSL_get_psk_identity_hint - get PSK client identity and hint
16 SSL_get_psk_identity_hint() is used to retrieve the PSK identity hint
18 B<ssl>. Similarly, SSL_get_psk_identity() is used to retrieve the PSK
24 If non-B<NULL>, SSL_get_psk_identity_hint() returns the PSK identity
25 hint and SSL_get_psk_identity() returns the PSK identity. Both are
27 no PSK identity hint was used during the connection setup.
/freebsd/contrib/wpa/hostapd/
H A Dhostapd.wpa_psk2 # with #, must contain a MAC address and PSK separated with a space.
4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
5 # characters or as a 256-bit hex PSK (64 hex digits).
12 # generating a PSK for a WPS Enrollee instead of generating a new random
13 # per-Enrollee PSK.
H A Deap_testing.txt28 EAP-PEAPv0/PSK + - - - -
38 EAP-PEAPv1/PSK + - - - -
H A DREADME221 - WPA-PSK ("WPA-Personal")
302 # WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either
303 # wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK.
313 # WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit
315 # (8..63 characters) that will be converted to PSK. This conversion uses SSID
316 # so the PSK changes when ASCII passphrase is used and the SSID is changed.
320 # Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The
322 #wpa_key_mgmt=WPA-PSK WPA-EAP
H A Dhostapd.eap_user21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a
66 "psk user" PSK "unknown"
67 "psk.user@example.com" PSK 0123456789abcdef0123456789abcdef
H A DChangeLog15 * support RADIUS ACL/PSK check during 4-way handshake (wpa_psk_radius=3)
97 * added support for MACsec Key Agreement using IEEE 802.1X/PSK
150 - add WPA/WPA2 passphrase/PSK -based VLAN assignment
154 for PSK (wps_cred_add_sae=1)
171 - added local generation of PMK-R0/PMK-R1 for FT-PSK
180 - fixed wpa_psk_file use for FT-PSK
188 WPA2 PSK/passphrase
256 - allow server to provide PSK instead of passphrase for WPA-PSK
450 * extended WPS per-station PSK to support ER case
535 * added support for getting per-device PSK from RADIUS Tunnel-Password
[all …]
/freebsd/contrib/wpa/wpa_supplicant/
H A Dwpa_supplicant.conf1787 key_mgmt=WPA-PSK
1798 key_mgmt=WPA-PSK
1886 key_mgmt=WPA-PSK WPA-EAP
1914 eap=PSK
2014 key_mgmt=WPA-PSK
2057 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
H A Deap_testing.txt64 EAP-PEAPv0/PSK - - - - - - - - - - + -
75 EAP-PEAPv1/PSK - - - - - - - - - - + -
90 EAP-TTLS/EAP-PSK - - - - - - - - - - + -
98 EAP-PSK +7 - - - - + - - - - + -
129 7) tested only with an older (incompatible) draft of EAP-PSK; FreeRADIUS does
130 not support the current EAP-PSK (RFC) specification
279 - EAP-PSK
H A DREADME-Windows.txt27 - WPA-PSK, TKIP, CCMP, TKIP+CCMP
29 - WPA2-PSK, TKIP, CCMP, TKIP+CCMP
174 Simple configuration example for WPA-PSK:
180 key_mgmt=WPA-PSK
295 key_mgmt=WPA-PSK
/freebsd/contrib/llvm-project/llvm/include/llvm/IR/
H A DProfileSummary.h50 const Kind PSK;
76 : PSK(K), DetailedSummary(DetailedSummary), TotalCount(TotalCount), in PSK() function
82 Kind getKind() const { return PSK; } in getKind()
/freebsd/contrib/wpa/wpa_supplicant/doc/docbook/
H A Dwpa_passphrase.sgml14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
27 <para><command>wpa_passphrase</command> pre-computes PSK entries for
30 and SSID are used to generate a 256-bit PSK.</para>
H A Dwpa_supplicant.conf.sgml48 <para>WPA-Personal (PSK) as home network and WPA-Enterprise with
59 key_mgmt=WPA-PSK
159 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
/freebsd/contrib/wpa/wpa_supplicant/examples/
H A Dwpa-psk-tkip.conf7 key_mgmt=WPA-PSK
/freebsd/crypto/openssl/util/
H A Dlibssl.num98 SSL_get_psk_identity 99 3_0_0 EXIST::FUNCTION:PSK
101 SSL_CTX_set_psk_server_callback 102 3_0_0 EXIST::FUNCTION:PSK
108 SSL_set_psk_client_callback 109 3_0_0 EXIST::FUNCTION:PSK
176 SSL_get_psk_identity_hint 177 3_0_0 EXIST::FUNCTION:PSK
248 SSL_CTX_set_psk_client_callback 249 3_0_0 EXIST::FUNCTION:PSK
297 SSL_use_psk_identity_hint 298 3_0_0 EXIST::FUNCTION:PSK
322 SSL_CTX_use_psk_identity_hint 323 3_0_0 EXIST::FUNCTION:PSK
333 SSL_set_psk_server_callback 334 3_0_0 EXIST::FUNCTION:PSK
/freebsd/tools/tools/net80211/scripts/
H A Dsetup.wpa1.aes27 wpa_key_mgmt=WPA-PSK
H A Dsetup.wpa1.tkip27 wpa_key_mgmt=WPA-PSK
H A Dsetup.wpa227 wpa_key_mgmt=WPA-PSK
H A Dsetup.wpa27 wpa_key_mgmt=WPA-PSK
H A Dsetup.wpa2.tkip27 wpa_key_mgmt=WPA-PSK
H A Dsetup.tsn27 wpa_key_mgmt=WPA-PSK
H A Dsetup.updown.wpa29 wpa_key_mgmt=WPA-PSK
H A Dsetup.mixed28 wpa_key_mgmt=WPA-PSK

123