/openbsd/usr.sbin/dhcpd/ |
H A D | pfutils.c | 170 struct pfioc_state_kill psk; in pf_kill_state() local 173 memset(&psk, 0, sizeof(psk)); in pf_kill_state() 177 psk.psk_af = AF_INET; in pf_kill_state() 180 memcpy(&psk.psk_src.addr.v.a.addr, &target, in pf_kill_state() 181 sizeof(psk.psk_src.addr.v.a.addr)); in pf_kill_state() 182 memset(&psk.psk_src.addr.v.a.mask, 0xff, in pf_kill_state() 183 sizeof(psk.psk_src.addr.v.a.mask)); in pf_kill_state() 189 memset(&psk.psk_src, 0, sizeof(psk.psk_src)); in pf_kill_state() 191 sizeof(psk.psk_dst.addr.v.a.addr)); in pf_kill_state() 192 memset(&psk.psk_dst.addr.v.a.mask, 0xff, in pf_kill_state() [all …]
|
/openbsd/sbin/pfctl/ |
H A D | pfctl.c | 400 memset(&psk, 0, sizeof(psk)); in pfctl_clear_states() 402 sizeof(psk.psk_ifname)) >= sizeof(psk.psk_ifname)) in pfctl_clear_states() 549 memset(&psk, 0, sizeof(psk)); in pfctl_net_kill_states() 555 sizeof(psk.psk_ifname)) >= sizeof(psk.psk_ifname)) in pfctl_net_kill_states() 629 memset(&psk, 0, sizeof(psk)); in pfctl_label_kill_states() 631 sizeof(psk.psk_ifname)) >= sizeof(psk.psk_ifname)) in pfctl_label_kill_states() 657 memset(&psk, 0, sizeof(psk)); in pfctl_id_kill_states() 659 &psk.psk_pfcmp.id, &psk.psk_pfcmp.creatorid)) == 2) in pfctl_id_kill_states() 672 psk.psk_pfcmp.id = htobe64(psk.psk_pfcmp.id); in pfctl_id_kill_states() 692 memset(&psk, 0, sizeof(psk)); in pfctl_key_kill_states() [all …]
|
/openbsd/usr.sbin/authpf/ |
H A D | authpf.c | 893 struct pfioc_state_kill psk; in authpf_kill_states() local 896 memset(&psk, 0, sizeof(psk)); in authpf_kill_states() 900 psk.psk_af = AF_INET; in authpf_kill_states() 902 psk.psk_af = AF_INET6; in authpf_kill_states() 910 sizeof(psk.psk_src.addr.v.a.addr)); in authpf_kill_states() 911 memset(&psk.psk_src.addr.v.a.mask, 0xff, in authpf_kill_states() 912 sizeof(psk.psk_src.addr.v.a.mask)); in authpf_kill_states() 917 memset(&psk.psk_src, 0, sizeof(psk.psk_src)); in authpf_kill_states() 919 sizeof(psk.psk_dst.addr.v.a.addr)); in authpf_kill_states() 920 memset(&psk.psk_dst.addr.v.a.mask, 0xff, in authpf_kill_states() [all …]
|
/openbsd/sys/net/ |
H A D | pf_ioctl.c | 990 if (!psk->psk_ifname[0] || !strcmp(psk->psk_ifname, in pf_states_clr() 1005 psk->psk_killed = killed; in pf_states_clr() 1778 if (psk->psk_pfcmp.id) { in pfioctl() 1786 psk->psk_killed = 1; in pfioctl() 1794 if (psk->psk_af && psk->psk_proto && in pfioctl() 1798 key.af = psk->psk_af; in pfioctl() 1872 if ((!psk->psk_af || sk->af == psk->psk_af) in pfioctl() 1873 && (!psk->psk_proto || psk->psk_proto == in pfioctl() 1885 psk->psk_src.port[0], psk->psk_src.port[1], in pfioctl() 1889 psk->psk_dst.port[0], psk->psk_dst.port[1], in pfioctl() [all …]
|
H A D | wg_noise.c | 159 uint8_t psk[NOISE_SYMMETRIC_KEY_LEN]) in noise_remote_set_psk() 165 memcpy(r->r_psk, psk, NOISE_SYMMETRIC_KEY_LEN); in noise_remote_set_psk() 173 uint8_t psk[NOISE_SYMMETRIC_KEY_LEN]) in noise_remote_keys() 182 if (psk != NULL) in noise_remote_keys() 183 memcpy(psk, r->r_psk, NOISE_SYMMETRIC_KEY_LEN); in noise_remote_keys() 874 const uint8_t psk[NOISE_SYMMETRIC_KEY_LEN]) in noise_mix_psk() 878 noise_kdf(ck, tmp, key, psk, in noise_mix_psk() 1105 uint8_t psk[NOISE_SYMMETRIC_KEY_LEN]; in noise_handshake_init() local 1136 arc4random_buf(psk, NOISE_SYMMETRIC_KEY_LEN); in noise_handshake_init() 1137 noise_remote_set_psk(ar, psk); in noise_handshake_init() [all …]
|
/openbsd/regress/sbin/ipsecctl/ |
H A D | ikefail14.in | 5 psk secret 10 psk insecure
|
H A D | ike49.in | 1 ike from 10.1.1.0/24 to 10.1.2.0/24 psk mekmitasdigoat
|
H A D | ike48.in | 1 ike from any to any psk mekmitasdigoat
|
H A D | ike51.in | 1 ike from 3ffe::1/24 to 3ffe:2::/24 psk mekmitasdigoat
|
H A D | ikefail8.in | 6 ike esp from $local_net to $remote_net peer $remote_gw psk "test123"
|
H A D | ikefail9.in | 6 ike esp from $local_net to $remote_net peer $remote_gw psk "test123"
|
H A D | ikefail11.in | 6 ike esp from $local_net to $remote_net peer $remote_gw psk "test123
|
H A D | ikefail14.ok | 2 stdin: 10: default peer psk mismatch
|
/openbsd/regress/sbin/iked/live/ |
H A D | Makefile | 104 authstr="psk $$psk"; \ 164 psk=`openssl rand -hex 20`; \ 483 REGRESS_TARGETS += run-psk-fail 484 run-psk-fail: 485 auth=psk; \ 494 psk=`openssl rand -hex 20`; \ 501 psk=`openssl rand -hex 20`; \ 508 REGRESS_TARGETS += run-psk 509 run-psk: 510 auth=psk; \
|
/openbsd/sys/net80211/ |
H A D | ieee80211_ioctl.c | 458 struct ieee80211_wpapsk *psk; in ieee80211_ioctl() local 638 psk = (struct ieee80211_wpapsk *)data; in ieee80211_ioctl() 639 if (psk->i_enabled) { in ieee80211_ioctl() 641 memcpy(ic->ic_psk, psk->i_psk, sizeof(ic->ic_psk)); in ieee80211_ioctl() 651 psk = (struct ieee80211_wpapsk *)data; in ieee80211_ioctl() 654 psk->i_enabled = 2; in ieee80211_ioctl() 655 memset(psk->i_psk, 0, sizeof(psk->i_psk)); in ieee80211_ioctl() 658 psk->i_enabled = 0; in ieee80211_ioctl()
|
H A D | ieee80211_node.c | 357 explicit_bzero(ess->psk, sizeof(ess->psk)); in ieee80211_ess_clear_wpa() 404 explicit_bzero(ess->psk, sizeof(ess->psk)); in ieee80211_add_ess() 405 memcpy(ess->psk, &join->i_wpapsk.i_psk, in ieee80211_add_ess() 406 sizeof(ess->psk)); in ieee80211_add_ess() 663 memcpy(ic->ic_psk, ess->psk, sizeof(ic->ic_psk)); in ieee80211_set_ess()
|
H A D | ieee80211_var.h | 406 u_int8_t psk[IEEE80211_PMK_LEN]; member
|
/openbsd/sbin/iked/ |
H A D | ikev2_msg.c | 1003 uint8_t *key, *psk = NULL; in ikev2_msg_authverify() local 1027 auth->auth_length, &psk)) == -1) { in ikev2_msg_authverify() 1031 key = psk; in ikev2_msg_authverify() 1066 free(psk); in ikev2_msg_authverify() 1076 uint8_t *key, *psk = NULL; in ikev2_msg_authsign() local 1102 auth->auth_length, &psk)) == -1) { in ikev2_msg_authsign() 1106 key = psk; in ikev2_msg_authsign() 1154 free(psk); in ikev2_msg_authsign()
|
H A D | ikev2.c | 5383 uint8_t *psk; in ikev2_psk() local 5389 if ((psk = calloc(1, hash_keylength(sa->sa_prf))) == NULL) in ikev2_psk() 5394 hash_final(sa->sa_prf, psk, &psklen); in ikev2_psk() 5396 *pskptr = psk; in ikev2_psk()
|
/openbsd/lib/libssl/test/ |
H A D | testssl | 163 $ssltest -tls1 -cipher PSK -psk abc123 $extra || exit 1 166 $ssltest -bio_pair -tls1 -cipher PSK -psk abc123 $extra || exit 1
|
/openbsd/regress/lib/libcrypto/x509/bettertls/certificates/ |
H A D | 2458.chain | 19 J0CT1J6EObS29sQBZDZQ5I85D/psk+PuS+K6tqWXgeulpkS2nPFC5qJrkUOdGoEH
|
/openbsd/sbin/ifconfig/ |
H A D | ifconfig.c | 2216 struct ieee80211_wpapsk psk; in setifwpakey() local 2220 memset(&psk, 0, sizeof(psk)); in setifwpakey() 2244 passlen = sizeof(psk.i_psk); in setifwpakey() 2256 psk.i_psk, sizeof(psk.i_psk), 4096) != 0) in setifwpakey() 2259 psk.i_enabled = 1; in setifwpakey() 2261 psk.i_enabled = 0; in setifwpakey() 2263 (void)strlcpy(psk.i_name, ifname, sizeof(psk.i_name)); in setifwpakey() 2281 wpa.i_enabled = psk.i_enabled; in setifwpakey() 2423 struct ieee80211_wpapsk psk; in ieee80211_status() local 2446 memset(&psk, 0, sizeof(psk)); in ieee80211_status() [all …]
|
/openbsd/lib/libssl/ |
H A D | tls13_key_schedule.c | 228 uint8_t *psk, size_t psk_len, const struct tls13_secret *context) in tls13_derive_early_secrets() argument 234 &secrets->extracted_early.len, secrets->digest, psk, psk_len, in tls13_derive_early_secrets()
|
H A D | tls13_internal.h | 164 int tls13_derive_early_secrets(struct tls13_secrets *secrets, uint8_t *psk,
|