/freebsd-9.3-release/contrib/wpa/wpa_supplicant/examples/ |
H A D | wpa-psk-tkip.conf | 6 ssid="example wpa-psk network" 11 psk="secret passphrase"
|
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/ |
H A D | wpa_passphrase.c | 23 unsigned char psk[32]; local 61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); 65 printf("\t#psk=\"%s\"\n", passphrase); 68 printf("%02x", psk[i]);
|
H A D | ibss_rsn.h | 38 u8 psk[PMK_LEN]; member in struct:ibss_rsn 47 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
|
H A D | wpa_supplicant.conf | 267 # both), and psk must also be set. 293 # WPA-PSK = WPA pre-shared key (this requires 'psk' field) 323 # psk: WPA preshared key; 256-bit pre-shared key 553 psk="very secret passphrase" 562 psk="very secret passphrase" 573 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 584 psk="not so secure passphrase" 672 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 679 psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f 695 ssid="eap-psk [all...] |
H A D | config_ssid.h | 121 * psk - WPA pre-shared key (256 bits) 123 u8 psk[32]; member in struct:wpa_ssid 133 * If this is set, psk will be generated using the SSID and passphrase 280 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
|
H A D | ibss_rsn.c | 157 const u8 *psk) 185 wpa_sm_set_pmk(peer->supp, psk, PMK_LEN); 219 return ibss_rsn->psk; 354 if (ibss_rsn_supp_init(peer, ibss_rsn->wpa_s->own_addr, ibss_rsn->psk) 507 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk) argument 509 os_memcpy(ibss_rsn->psk, psk, PMK_LEN); 156 ibss_rsn_supp_init(struct ibss_rsn_peer *peer, const u8 *own_addr, const u8 *psk) argument
|
H A D | ap.c | 90 os_memcpy(bss->ssid.wpa_psk->psk, ssid->psk, PMK_LEN);
|
H A D | wpa_supplicant.c | 167 os_memcpy(key, ssid->psk, 16); 173 os_memcpy(key, ssid->psk, 16 + 8); 174 os_memcpy(key + 16 + 8, ssid->psk + 16, 8); 972 wpa_sm_set_pmk(wpa_s->wpa, ssid->psk, PMK_LEN); 1207 params.psk = ssid->psk; 1252 ibss_rsn_set_psk(wpa_s->ibss_rsn, ssid->psk);
|
H A D | config.c | 362 if (hexstr2bin(value, ssid->psk, PMK_LEN) || 373 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN); 388 return wpa_config_write_string_hex(ssid->psk, PMK_LEN); 1438 { FUNC_KEY(psk) }, 2028 ssid->psk, PMK_LEN); 2030 ssid->psk, PMK_LEN);
|
H A D | wps_supplicant.c | 337 if (hexstr2bin((const char *) cred->key, ssid->psk, 766 static int wpas_wps_new_psk_cb(void *ctx, const u8 *mac_addr, const u8 *psk, argument 771 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len);
|
/freebsd-9.3-release/lib/libpam/modules/pam_ssh/ |
H A D | pam_ssh.c | 99 struct pam_ssh_key *psk; local 128 if ((psk = malloc(sizeof(*psk))) == NULL) { 133 psk->key = key; 134 psk->comment = comment; 135 return (psk); 145 struct pam_ssh_key *psk; local 147 psk = data; 148 key_free(psk->key); 149 free(psk 160 struct pam_ssh_key *psk; local 325 const struct pam_ssh_key *psk; local [all...] |
/freebsd-9.3-release/contrib/wpa/src/eap_common/ |
H A D | eap_psk_common.c | 25 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 28 if (aes_128_encrypt_block(psk, ak, ak)) 33 if (aes_128_encrypt_block(psk, ak, ak) || 34 aes_128_encrypt_block(psk, kdk, kdk))
|
H A D | eap_gpsk_common.c | 44 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, 66 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) 79 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, 101 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); 115 const u8 *psk, size_t psk_len, 152 os_memcpy(pos, psk, psk_len); 162 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 194 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument 223 psk, psk_len, seed, seed_len, 230 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_ argument 113 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 284 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_gpsk_common.h | 55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
|
H A D | eap_psk_common.h | 74 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
|
/freebsd-9.3-release/contrib/wpa/src/ap/ |
H A D | ap_config.c | 166 struct hostapd_wpa_psk *psk; local 200 psk = os_zalloc(sizeof(*psk)); 201 if (psk == NULL) { 207 psk->group = 1; 209 os_memcpy(psk->addr, addr, ETH_ALEN); 215 os_free(psk); 223 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) 227 4096, psk 342 struct hostapd_wpa_psk *psk, *prev; local 538 struct hostapd_wpa_psk *psk; local [all...] |
H A D | wps_hostapd.c | 48 static int hostapd_wps_new_psk_cb(void *ctx, const u8 *mac_addr, const u8 *psk, argument 57 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); 70 os_memcpy(p->psk, psk, PMK_LEN); 86 wpa_snprintf_hex(hex, sizeof(hex), psk, psk_len); 610 conf->ssid.wpa_psk->psk, PMK_LEN); 624 os_memcpy(wps->psk, conf->ssid.wpa_psk->psk, PMK_LEN);
|
H A D | ap_config.h | 102 u8 psk[PMK_LEN]; member in struct:hostapd_wpa_psk
|
/freebsd-9.3-release/contrib/pf/authpf/ |
H A D | authpf.c | 892 struct pfioc_state_kill psk; local 895 memset(&psk, 0, sizeof(psk)); 899 psk.psk_af = AF_INET; 901 psk.psk_af = AF_INET6; 908 memcpy(&psk.psk_src.addr.v.a.addr, &target, 909 sizeof(psk.psk_src.addr.v.a.addr)); 910 memset(&psk.psk_src.addr.v.a.mask, 0xff, 911 sizeof(psk.psk_src.addr.v.a.mask)); 912 if (ioctl(dev, DIOCKILLSTATES, &psk)) [all...] |
/freebsd-9.3-release/contrib/pf/pfctl/ |
H A D | pfctl.c | 383 struct pfioc_state_kill psk; local 385 memset(&psk, 0, sizeof(psk)); 386 if (iface != NULL && strlcpy(psk.psk_ifname, iface, 387 sizeof(psk.psk_ifname)) >= sizeof(psk.psk_ifname)) 390 if (ioctl(dev, DIOCCLRSTATES, &psk)) 393 fprintf(stderr, "%d states cleared\n", psk.psk_killed); 553 struct pfioc_state_kill psk; local 561 memset(&psk, 659 struct pfioc_state_kill psk; local 686 struct pfioc_state_kill psk; local [all...] |
/freebsd-9.3-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_psk.c | 65 struct eap_psk_hdr_1 *psk; local 78 sizeof(*psk) + data->id_s_len, 87 psk = wpabuf_put(req, sizeof(*psk)); 88 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ 89 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); 100 struct eap_psk_hdr_3 *psk; local 107 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); 115 psk = wpabuf_put(req, sizeof(*psk)); [all...] |
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/tests/ |
H A D | test_wpa.c | 33 u8 psk[PMK_LEN]; member in struct:wpa 204 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN); 270 return wpa->psk; 349 os_memset(wpa.psk, 0x44, PMK_LEN);
|
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_gpsk.c | 39 u8 *psk; member in struct:eap_gpsk_data 111 data->psk = os_malloc(password_len); 112 if (data->psk == NULL) { 116 os_memcpy(data->psk, password, password_len); 128 os_free(data->psk); 348 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
|
/freebsd-9.3-release/sys/contrib/pf/net/ |
H A D | pf_ioctl.c | 2194 struct pfioc_state_kill *psk = (struct pfioc_state_kill *)addr; local 2205 if (!psk->psk_ifname[0] || !strcmp(psk->psk_ifname, 2215 psk->psk_killed = killed; 2219 pfsync_clear_states_ptr(V_pf_status.hostid, psk->psk_ifname); 2221 pfsync_clear_states(pf_status.hostid, psk->psk_ifname); 2232 struct pfioc_state_kill *psk = (struct pfioc_state_kill *)addr; local 2235 if (psk->psk_pfcmp.id) { 2236 if (psk->psk_pfcmp.creatorid == 0) 2238 psk [all...] |
/freebsd-9.3-release/contrib/wpa/src/wps/ |
H A D | wps.h | 156 * struct wpa_context::psk. 215 * @psk: The new PSK 216 * @psk_len: The length of psk in octets 221 int (*new_psk_cb)(void *ctx, const u8 *mac_addr, const u8 *psk, 586 * be provided in the psk buffer and used per-Enrollee to control which 599 * psk - The current network PSK 604 u8 psk[32]; member in struct:wps_context 607 * psk_set - Whether psk value is set
|