/freebsd/lib/libpam/modules/pam_ssh/ |
H A D | pam_ssh.c | 101 struct pam_ssh_key *psk; in pam_ssh_load_key() local 129 if ((psk = malloc(sizeof(*psk))) == NULL) { in pam_ssh_load_key() 134 psk->key = key; in pam_ssh_load_key() 135 psk->comment = comment; in pam_ssh_load_key() 136 return (psk); in pam_ssh_load_key() 146 struct pam_ssh_key *psk; in pam_ssh_free_key() local 148 psk = data; in pam_ssh_free_key() 149 sshkey_free(psk->key); in pam_ssh_free_key() 150 free(psk->comment); in pam_ssh_free_key() 151 free(psk); in pam_ssh_free_key() [all …]
|
/freebsd/contrib/wpa/src/ap/ |
H A D | ieee802_11_auth.c | 61 hostapd_free_psk_list(e->info.psk); in hostapd_acl_cache_free_entry() 419 struct hostapd_sta_wpa_psk_short *psk; in decode_tunnel_passwords() local 448 psk = os_zalloc(sizeof(struct hostapd_sta_wpa_psk_short)); in decode_tunnel_passwords() 449 if (psk) { in decode_tunnel_passwords() 451 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords() 459 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords() 461 psk->is_passphrase = 1; in decode_tunnel_passwords() 463 psk->next = cache->info.psk; in decode_tunnel_passwords() 464 cache->info.psk = psk; in decode_tunnel_passwords() 465 psk = NULL; in decode_tunnel_passwords() [all …]
|
H A D | ap_config.c | 332 struct hostapd_wpa_psk *psk; in hostapd_config_read_wpa_psk() local 402 psk = os_zalloc(sizeof(*psk)); in hostapd_config_read_wpa_psk() 403 if (psk == NULL) { in hostapd_config_read_wpa_psk() 408 psk->vlan_id = vlan_id; in hostapd_config_read_wpa_psk() 410 psk->group = 1; in hostapd_config_read_wpa_psk() 412 os_memcpy(psk->addr, addr, ETH_ALEN); in hostapd_config_read_wpa_psk() 418 os_free(psk); in hostapd_config_read_wpa_psk() 426 hexstr2bin(pos, psk->psk, PMK_LEN) == 0) in hostapd_config_read_wpa_psk() 430 4096, psk->psk, PMK_LEN) == 0) in hostapd_config_read_wpa_psk() 436 os_free(psk); in hostapd_config_read_wpa_psk() [all …]
|
H A D | ieee802_11_auth.h | 23 struct hostapd_sta_wpa_psk_short *psk; member 35 void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk); 37 void hostapd_copy_psk_list(struct hostapd_sta_wpa_psk_short **psk,
|
H A D | wps_hostapd.c | 96 const u8 *p2p_dev_addr, const u8 *psk, in hostapd_wps_new_psk_cb() argument 113 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); in hostapd_wps_new_psk_cb() 127 os_memcpy(p->psk, psk, PMK_LEN); in hostapd_wps_new_psk_cb() 132 psk, psk_len); in hostapd_wps_new_psk_cb() 150 wpa_snprintf_hex(hex, sizeof(hex), psk, psk_len); in hostapd_wps_new_psk_cb() 275 const u8 **psk) in hostapd_wps_lookup_pskfile_cb() argument 288 any_psk = wpa_psk->psk; in hostapd_wps_lookup_pskfile_cb() 292 dev_psk = wpa_psk->psk; in hostapd_wps_lookup_pskfile_cb() 298 *psk = dev_psk; in hostapd_wps_lookup_pskfile_cb() 300 *psk = any_psk; in hostapd_wps_lookup_pskfile_cb() [all …]
|
H A D | wpa_auth_glue.c | 351 const u8 *psk; in hostapd_wpa_auth_get_psk() local 392 psk = hostapd_get_psk(hapd->conf, addr, p2p_dev_addr, prev_psk, in hostapd_wpa_auth_get_psk() 399 if (sta && sta->psk && !psk) { in hostapd_wpa_auth_get_psk() 404 psk = sta->psk->psk; in hostapd_wpa_auth_get_psk() 405 for (pos = sta->psk; pos; pos = pos->next) { in hostapd_wpa_auth_get_psk() 410 pos->psk, PMK_LEN) != 0) { in hostapd_wpa_auth_get_psk() 417 if (pos->psk == prev_psk) { in hostapd_wpa_auth_get_psk() 418 psk = pos->next ? pos->next->psk : NULL; in hostapd_wpa_auth_get_psk() 423 return psk; in hostapd_wpa_auth_get_psk()
|
H A D | sta_info.c | 418 hostapd_free_psk_list(sta->psk); in ap_free_sta() 1443 struct hostapd_wpa_psk *psk; in ap_sta_wpa_get_keyid() local 1454 for (psk = ssid->wpa_psk; psk; psk = psk->next) in ap_sta_wpa_get_keyid() 1455 if (os_memcmp(pmk, psk->psk, PMK_LEN) == 0) in ap_sta_wpa_get_keyid() 1457 if (!psk || !psk->keyid[0]) in ap_sta_wpa_get_keyid() 1460 return psk->keyid; in ap_sta_wpa_get_keyid()
|
/freebsd/contrib/wpa/src/eap_common/ |
H A D | eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, in eap_gpsk_gkdf_cmac() argument 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) in eap_gpsk_gkdf_cmac() 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, in eap_gpsk_gkdf_sha256() argument 95 if (hmac_sha256_vector(psk, 32, 2, addr, vlen, hash)) in eap_gpsk_gkdf_sha256() 110 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument 147 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper() 157 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { in eap_gpsk_derive_keys_helper() 189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument 218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument [all …]
|
H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument 22 if (aes_128_encrypt_block(psk, ak, ak)) in eap_psk_key_setup() 27 if (aes_128_encrypt_block(psk, ak, ak) || in eap_psk_key_setup() 28 aes_128_encrypt_block(psk, kdk, kdk)) in eap_psk_key_setup()
|
H A D | eap_gpsk_common.h | 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
|
H A D | eap_psk_common.h | 68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 1770 psk="very secret passphrase" 1779 psk="very secret passphrase" 1790 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 1801 psk="not so secure passphrase" 1889 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 1896 psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f 2016 psk="12345678" 2032 psk="secret passphrase" 2049 psk="very secret passphrase" 2060 psk="very secret passphrase" [all …]
|
H A D | wpa_passphrase.c | 19 unsigned char psk[32]; in main() local 80 if (pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32) in main() 91 printf("%02x", psk[i]); in main()
|
H A D | ibss_rsn.h | 50 u8 psk[PMK_LEN]; member 62 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
|
H A D | ibss_rsn.c | 217 const u8 *psk) in ibss_rsn_supp_init() argument 249 wpa_sm_set_pmk(peer->supp, psk, PMK_LEN, NULL, NULL); in ibss_rsn_supp_init() 290 return ibss_rsn->psk; in auth_get_psk() 563 ibss_rsn->psk) < 0) { in ibss_rsn_peer_init() 849 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk) in ibss_rsn_set_psk() argument 853 os_memcpy(ibss_rsn->psk, psk, PMK_LEN); in ibss_rsn_set_psk()
|
H A D | config_ssid.h | 55 u8 psk[32]; member 219 u8 psk[32]; member
|
H A D | p2p_supplicant.c | 1241 os_memcpy(s->psk, ssid->psk, 32); in wpas_p2p_store_persistent_group() 1349 const u8 *psk, const char *passphrase, in wpas_p2p_group_started() argument 1356 if (psk) in wpas_p2p_group_started() 1357 wpa_snprintf_hex(psk_txt, sizeof(psk_txt), psk, 32); in wpas_p2p_group_started() 1378 psk ? " psk=" : "", psk_txt, in wpas_p2p_group_started() 1470 ssid->psk_set ? ssid->psk : NULL, in wpas_group_formation_completed() 1775 struct psk_list_entry *psk; in wpas_p2p_add_psk_list() local 1788 dl_list_for_each(psk, &persistent->psk_list, struct psk_list_entry, in wpas_p2p_add_psk_list() 1794 MAC2STR(psk->addr), psk->p2p); in wpas_p2p_add_psk_list() 1798 os_memcpy(hpsk->psk, psk->psk, PMK_LEN); in wpas_p2p_add_psk_list() [all …]
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_psk.c | 58 struct eap_psk_hdr_1 *psk; in eap_psk_build_1() local 71 sizeof(*psk) + sm->cfg->server_id_len, in eap_psk_build_1() 80 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_1() 81 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ in eap_psk_build_1() 82 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_1() 93 struct eap_psk_hdr_3 *psk; in eap_psk_build_3() local 100 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); in eap_psk_build_3() 108 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_3() 109 psk->flags = EAP_PSK_FLAGS_SET_T(2); /* T=2 */ in eap_psk_build_3() 110 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_3() [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | dtls_mtu_test.c | 27 unsigned char *psk, in clnt_psk_callback() argument 34 memset(psk, 0x5a, max_psk_len); in clnt_psk_callback() 40 unsigned char *psk, in srvr_psk_callback() argument 45 memset(psk, 0x5a, max_psk_len); in srvr_psk_callback()
|
/freebsd/crypto/openssl/apps/ |
H A D | ciphers.c | 81 unsigned char *psk, in dummy_psk() argument 97 int psk = 0; in ciphers_main() local 157 psk = 1; in ciphers_main() 199 if (psk) in ciphers_main()
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | eap_gpsk.c | 34 u8 *psk; member 119 data->psk = os_memdup(password, password_len); in eap_gpsk_init() 120 if (data->psk == NULL) { in eap_gpsk_init() 135 if (data->psk) { in eap_gpsk_deinit() 136 os_memset(data->psk, 0, data->psk_len); in eap_gpsk_deinit() 137 os_free(data->psk); in eap_gpsk_deinit() 364 if (eap_gpsk_derive_keys(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2() 378 if (eap_gpsk_derive_session_id(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_use_psk_identity_hint.pod | 31 unsigned char *psk, 75 identity sent by the client in parameter B<identity>, and a buffer B<psk> of 111 successfully in parameter B<psk>. Return value is the length of 112 B<psk> in bytes. It is an error to return a value greater than 117 data to B<psk> and return the length of the random data, so the
|
/freebsd/contrib/wpa/src/wps/ |
H A D | wps_enrollee.c | 306 u8 psk[32]; in wps_build_cred_network_key() local 309 random_get_bytes(psk, sizeof(psk)) < 0) { in wps_build_cred_network_key() 315 psk, sizeof(psk)); in wps_build_cred_network_key() 318 wpa_snprintf_hex(hex, sizeof(hex), psk, sizeof(psk)); in wps_build_cred_network_key() 320 wpabuf_put_be16(msg, sizeof(psk) * 2); in wps_build_cred_network_key() 321 wpabuf_put_data(msg, hex, sizeof(psk) * 2); in wps_build_cred_network_key() 325 wps->p2p_dev_addr, psk, sizeof(psk)); in wps_build_cred_network_key()
|
/freebsd/sys/netinet/ |
H A D | tcp_fastopen.c | 237 uint8_t psk[TCP_FASTOPEN_MAX_PSKS][TCP_FASTOPEN_KEY_LEN]; member 500 tcp_fastopen_addpsk_locked(uint8_t *psk) in tcp_fastopen_addpsk_locked() argument 506 memcpy(V_tcp_fastopen_keys.psk[V_tcp_fastopen_keys.newest_psk], psk, in tcp_fastopen_addpsk_locked() 559 tcp_fastopen_make_psk_cookie(uint8_t *psk, uint8_t *cookie, uint8_t cookie_len) in tcp_fastopen_make_psk_cookie() argument 565 SipHash_SetKey(&ctx, psk); in tcp_fastopen_make_psk_cookie() 583 V_tcp_fastopen_keys.psk[psk_index], in tcp_fastopen_find_cookie_match_locked()
|
/freebsd/contrib/wpa/wpa_supplicant/examples/ |
H A D | wpa-psk-tkip.conf | 11 psk="secret passphrase"
|