Searched refs:psk (Results 1 - 25 of 45) sorted by relevance

12

/freebsd-10.1-release/contrib/wpa/wpa_supplicant/examples/
H A Dwpa-psk-tkip.conf6 ssid="example wpa-psk network"
11 psk="secret passphrase"
/freebsd-10.1-release/contrib/wpa/src/ap/
H A Dieee802_11_auth.h22 struct hostapd_sta_wpa_psk_short **psk,
26 void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk);
H A Dap_config.c188 struct hostapd_wpa_psk *psk; local
222 psk = os_zalloc(sizeof(*psk));
223 if (psk == NULL) {
229 psk->group = 1;
231 os_memcpy(psk->addr, addr, ETH_ALEN);
237 os_free(psk);
245 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0)
249 4096, psk
388 struct hostapd_wpa_psk *psk, *prev; local
612 struct hostapd_wpa_psk *psk; local
[all...]
H A Dieee802_11_auth.c39 struct hostapd_sta_wpa_psk_short *psk; member in struct:hostapd_cached_radius_acl
60 hostapd_free_psk_list(e->psk);
77 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk, argument
84 copy_to = psk;
103 struct hostapd_sta_wpa_psk_short **psk,
125 copy_psk_list(psk, entry->psk);
223 * @psk: Linked list buffer for returning WPA PSK
234 struct hostapd_sta_wpa_psk_short **psk,
243 if (psk)
100 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument
231 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument
426 struct hostapd_sta_wpa_psk_short *psk; local
636 hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk) argument
[all...]
H A Dwpa_auth_glue.c187 const u8 *psk = hostapd_get_psk(hapd->conf, addr, prev_psk); local
190 * returned psk which should not be returned again.
191 * logic list (all hostapd_get_psk; all sta->psk)
193 if (sta && sta->psk && !psk) {
195 psk = sta->psk->psk;
196 for (pos = sta->psk; pos; pos = pos->next) {
197 if (pos->psk
[all...]
H A Dsta_info.h99 struct hostapd_sta_wpa_psk_short *psk; member in struct:sta_info
H A Dap_config.h102 u8 psk[PMK_LEN]; member in struct:hostapd_sta_wpa_psk_short
108 u8 psk[PMK_LEN]; member in struct:hostapd_wpa_psk
H A Dwps_hostapd.c85 static int hostapd_wps_new_psk_cb(void *ctx, const u8 *mac_addr, const u8 *psk, argument
94 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len);
107 os_memcpy(p->psk, psk, PMK_LEN);
123 wpa_snprintf_hex(hex, sizeof(hex), psk, psk_len);
919 conf->ssid.wpa_psk->psk, PMK_LEN);
933 os_memcpy(wps->psk, conf->ssid.wpa_psk->psk, PMK_LEN);
/freebsd-10.1-release/contrib/wpa/wpa_supplicant/
H A Dwpa_passphrase.c17 unsigned char psk[32]; local
55 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); local
59 printf("\t#psk=\"%s\"\n", passphrase);
62 printf("%02x", psk[i]);
H A Dibss_rsn.h32 u8 psk[PMK_LEN]; member in struct:ibss_rsn
42 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
H A Dwpa_supplicant.conf468 # both), and psk must also be set.
511 # WPA-PSK = WPA pre-shared key (this requires 'psk' field)
551 # psk: WPA preshared key; 256-bit pre-shared key
851 psk="very secret passphrase"
860 psk="very secret passphrase"
871 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
882 psk="not so secure passphrase"
970 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
977 psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
993 ssid="eap-psk
[all...]
H A Dconfig_ssid.h126 * psk - WPA pre-shared key (256 bits)
128 u8 psk[32]; member in struct:wpa_ssid
138 * If this is set, psk will be generated using the SSID and passphrase
309 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
H A Dibss_rsn.c178 const u8 *psk)
208 wpa_sm_set_pmk(peer->supp, psk, PMK_LEN);
242 return ibss_rsn->psk;
457 if (ibss_rsn_supp_init(peer, ibss_rsn->wpa_s->own_addr, ibss_rsn->psk)
651 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk) argument
655 os_memcpy(ibss_rsn->psk, psk, PMK_LEN);
177 ibss_rsn_supp_init(struct ibss_rsn_peer *peer, const u8 *own_addr, const u8 *psk) argument
H A Dp2p_supplicant.c500 os_memcpy(s->psk, ssid->psk, 32);
660 char psk[65]; local
661 wpa_snprintf_hex(psk, sizeof(psk), ssid->psk, 32);
663 "%s GO ssid=\"%s\" freq=%d psk=%s go_dev_addr=" MACSTR
665 wpa_s->ifname, ssid_txt, ssid->frequency, psk,
809 char psk[65]; local
810 wpa_snprintf_hex(psk, sizeo
4694 char psk[65]; local
[all...]
/freebsd-10.1-release/lib/libpam/modules/pam_ssh/
H A Dpam_ssh.c99 struct pam_ssh_key *psk; local
128 if ((psk = malloc(sizeof(*psk))) == NULL) {
133 psk->key = key;
134 psk->comment = comment;
135 return (psk);
145 struct pam_ssh_key *psk; local
147 psk = data;
148 key_free(psk->key);
149 free(psk
160 struct pam_ssh_key *psk; local
325 const struct pam_ssh_key *psk; local
[all...]
/freebsd-10.1-release/contrib/wpa/src/eap_common/
H A Deap_psk_common.c19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument
22 if (aes_128_encrypt_block(psk, ak, ak))
27 if (aes_128_encrypt_block(psk, ak, ak) ||
28 aes_128_encrypt_block(psk, kdk, kdk))
H A Deap_gpsk_common.c38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */,
60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash))
73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */,
95 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash);
109 const u8 *psk, size_t psk_len,
146 os_memcpy(pos, psk, psk_len);
156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
188 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument
217 psk, psk_len, seed, seed_len,
224 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_ argument
107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument
278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
[all...]
H A Deap_gpsk_common.h49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
H A Deap_psk_common.h68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
/freebsd-10.1-release/contrib/pf/authpf/
H A Dauthpf.c892 struct pfioc_state_kill psk; local
895 memset(&psk, 0, sizeof(psk));
899 psk.psk_af = AF_INET;
901 psk.psk_af = AF_INET6;
908 memcpy(&psk.psk_src.addr.v.a.addr, &target,
909 sizeof(psk.psk_src.addr.v.a.addr));
910 memset(&psk.psk_src.addr.v.a.mask, 0xff,
911 sizeof(psk.psk_src.addr.v.a.mask));
912 if (ioctl(dev, DIOCKILLSTATES, &psk))
[all...]
/freebsd-10.1-release/sbin/pfctl/
H A Dpfctl.c383 struct pfioc_state_kill psk; local
385 memset(&psk, 0, sizeof(psk));
386 if (iface != NULL && strlcpy(psk.psk_ifname, iface,
387 sizeof(psk.psk_ifname)) >= sizeof(psk.psk_ifname))
390 if (ioctl(dev, DIOCCLRSTATES, &psk))
393 fprintf(stderr, "%d states cleared\n", psk.psk_killed);
553 struct pfioc_state_kill psk; local
561 memset(&psk,
659 struct pfioc_state_kill psk; local
686 struct pfioc_state_kill psk; local
[all...]
/freebsd-10.1-release/contrib/wpa/src/eap_server/
H A Deap_server_psk.c60 struct eap_psk_hdr_1 *psk; local
73 sizeof(*psk) + data->id_s_len,
82 psk = wpabuf_put(req, sizeof(*psk));
83 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */
84 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN);
95 struct eap_psk_hdr_3 *psk; local
102 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id);
110 psk = wpabuf_put(req, sizeof(*psk));
[all...]
/freebsd-10.1-release/contrib/wpa/wpa_supplicant/tests/
H A Dtest_wpa.c27 u8 psk[PMK_LEN]; member in struct:wpa
198 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN);
264 return wpa->psk;
343 os_memset(wpa.psk, 0x44, PMK_LEN);
/freebsd-10.1-release/contrib/wpa/src/eap_peer/
H A Deap_gpsk.c34 u8 *psk; member in struct:eap_gpsk_data
106 data->psk = os_malloc(password_len);
107 if (data->psk == NULL) {
111 os_memcpy(data->psk, password, password_len);
123 os_free(data->psk);
343 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
/freebsd-10.1-release/sys/netpfil/pf/
H A Dpf_ioctl.c1608 struct pfioc_state_kill *psk = (struct pfioc_state_kill *)addr; local
1617 if (!psk->psk_ifname[0] ||
1618 !strcmp(psk->psk_ifname,
1631 psk->psk_killed = killed;
1633 pfsync_clear_states_ptr(V_pf_status.hostid, psk->psk_ifname);
1642 struct pfioc_state_kill *psk = (struct pfioc_state_kill *)addr; local
1645 if (psk->psk_pfcmp.id) {
1646 if (psk->psk_pfcmp.creatorid == 0)
1647 psk->psk_pfcmp.creatorid = V_pf_status.hostid;
1648 if ((s = pf_find_state_byid(psk
[all...]

Completed in 340 milliseconds

12