Home
last modified time | relevance | path

Searched refs:psk (Results 1 – 24 of 24) sorted by relevance

/openbsd/usr.sbin/dhcpd/
H A Dpfutils.c170 struct pfioc_state_kill psk; in pf_kill_state() local
173 memset(&psk, 0, sizeof(psk)); in pf_kill_state()
177 psk.psk_af = AF_INET; in pf_kill_state()
180 memcpy(&psk.psk_src.addr.v.a.addr, &target, in pf_kill_state()
181 sizeof(psk.psk_src.addr.v.a.addr)); in pf_kill_state()
182 memset(&psk.psk_src.addr.v.a.mask, 0xff, in pf_kill_state()
183 sizeof(psk.psk_src.addr.v.a.mask)); in pf_kill_state()
189 memset(&psk.psk_src, 0, sizeof(psk.psk_src)); in pf_kill_state()
191 sizeof(psk.psk_dst.addr.v.a.addr)); in pf_kill_state()
192 memset(&psk.psk_dst.addr.v.a.mask, 0xff, in pf_kill_state()
[all …]
/openbsd/sbin/pfctl/
H A Dpfctl.c400 memset(&psk, 0, sizeof(psk)); in pfctl_clear_states()
402 sizeof(psk.psk_ifname)) >= sizeof(psk.psk_ifname)) in pfctl_clear_states()
549 memset(&psk, 0, sizeof(psk)); in pfctl_net_kill_states()
555 sizeof(psk.psk_ifname)) >= sizeof(psk.psk_ifname)) in pfctl_net_kill_states()
629 memset(&psk, 0, sizeof(psk)); in pfctl_label_kill_states()
631 sizeof(psk.psk_ifname)) >= sizeof(psk.psk_ifname)) in pfctl_label_kill_states()
657 memset(&psk, 0, sizeof(psk)); in pfctl_id_kill_states()
659 &psk.psk_pfcmp.id, &psk.psk_pfcmp.creatorid)) == 2) in pfctl_id_kill_states()
672 psk.psk_pfcmp.id = htobe64(psk.psk_pfcmp.id); in pfctl_id_kill_states()
692 memset(&psk, 0, sizeof(psk)); in pfctl_key_kill_states()
[all …]
/openbsd/usr.sbin/authpf/
H A Dauthpf.c893 struct pfioc_state_kill psk; in authpf_kill_states() local
896 memset(&psk, 0, sizeof(psk)); in authpf_kill_states()
900 psk.psk_af = AF_INET; in authpf_kill_states()
902 psk.psk_af = AF_INET6; in authpf_kill_states()
910 sizeof(psk.psk_src.addr.v.a.addr)); in authpf_kill_states()
911 memset(&psk.psk_src.addr.v.a.mask, 0xff, in authpf_kill_states()
912 sizeof(psk.psk_src.addr.v.a.mask)); in authpf_kill_states()
917 memset(&psk.psk_src, 0, sizeof(psk.psk_src)); in authpf_kill_states()
919 sizeof(psk.psk_dst.addr.v.a.addr)); in authpf_kill_states()
920 memset(&psk.psk_dst.addr.v.a.mask, 0xff, in authpf_kill_states()
[all …]
/openbsd/sys/net/
H A Dpf_ioctl.c990 if (!psk->psk_ifname[0] || !strcmp(psk->psk_ifname, in pf_states_clr()
1005 psk->psk_killed = killed; in pf_states_clr()
1778 if (psk->psk_pfcmp.id) { in pfioctl()
1786 psk->psk_killed = 1; in pfioctl()
1794 if (psk->psk_af && psk->psk_proto && in pfioctl()
1798 key.af = psk->psk_af; in pfioctl()
1872 if ((!psk->psk_af || sk->af == psk->psk_af) in pfioctl()
1873 && (!psk->psk_proto || psk->psk_proto == in pfioctl()
1885 psk->psk_src.port[0], psk->psk_src.port[1], in pfioctl()
1889 psk->psk_dst.port[0], psk->psk_dst.port[1], in pfioctl()
[all …]
H A Dwg_noise.c159 uint8_t psk[NOISE_SYMMETRIC_KEY_LEN]) in noise_remote_set_psk()
165 memcpy(r->r_psk, psk, NOISE_SYMMETRIC_KEY_LEN); in noise_remote_set_psk()
173 uint8_t psk[NOISE_SYMMETRIC_KEY_LEN]) in noise_remote_keys()
182 if (psk != NULL) in noise_remote_keys()
183 memcpy(psk, r->r_psk, NOISE_SYMMETRIC_KEY_LEN); in noise_remote_keys()
874 const uint8_t psk[NOISE_SYMMETRIC_KEY_LEN]) in noise_mix_psk()
878 noise_kdf(ck, tmp, key, psk, in noise_mix_psk()
1105 uint8_t psk[NOISE_SYMMETRIC_KEY_LEN]; in noise_handshake_init() local
1136 arc4random_buf(psk, NOISE_SYMMETRIC_KEY_LEN); in noise_handshake_init()
1137 noise_remote_set_psk(ar, psk); in noise_handshake_init()
[all …]
/openbsd/regress/sbin/ipsecctl/
H A Dikefail14.in5 psk secret
10 psk insecure
H A Dike49.in1 ike from 10.1.1.0/24 to 10.1.2.0/24 psk mekmitasdigoat
H A Dike48.in1 ike from any to any psk mekmitasdigoat
H A Dike51.in1 ike from 3ffe::1/24 to 3ffe:2::/24 psk mekmitasdigoat
H A Dikefail8.in6 ike esp from $local_net to $remote_net peer $remote_gw psk "test123"
H A Dikefail9.in6 ike esp from $local_net to $remote_net peer $remote_gw psk "test123"
H A Dikefail11.in6 ike esp from $local_net to $remote_net peer $remote_gw psk "test123
H A Dikefail14.ok2 stdin: 10: default peer psk mismatch
/openbsd/regress/sbin/iked/live/
H A DMakefile104 authstr="psk $$psk"; \
164 psk=`openssl rand -hex 20`; \
483 REGRESS_TARGETS += run-psk-fail
484 run-psk-fail:
485 auth=psk; \
494 psk=`openssl rand -hex 20`; \
501 psk=`openssl rand -hex 20`; \
508 REGRESS_TARGETS += run-psk
509 run-psk:
510 auth=psk; \
/openbsd/sys/net80211/
H A Dieee80211_ioctl.c458 struct ieee80211_wpapsk *psk; in ieee80211_ioctl() local
638 psk = (struct ieee80211_wpapsk *)data; in ieee80211_ioctl()
639 if (psk->i_enabled) { in ieee80211_ioctl()
641 memcpy(ic->ic_psk, psk->i_psk, sizeof(ic->ic_psk)); in ieee80211_ioctl()
651 psk = (struct ieee80211_wpapsk *)data; in ieee80211_ioctl()
654 psk->i_enabled = 2; in ieee80211_ioctl()
655 memset(psk->i_psk, 0, sizeof(psk->i_psk)); in ieee80211_ioctl()
658 psk->i_enabled = 0; in ieee80211_ioctl()
H A Dieee80211_node.c357 explicit_bzero(ess->psk, sizeof(ess->psk)); in ieee80211_ess_clear_wpa()
404 explicit_bzero(ess->psk, sizeof(ess->psk)); in ieee80211_add_ess()
405 memcpy(ess->psk, &join->i_wpapsk.i_psk, in ieee80211_add_ess()
406 sizeof(ess->psk)); in ieee80211_add_ess()
663 memcpy(ic->ic_psk, ess->psk, sizeof(ic->ic_psk)); in ieee80211_set_ess()
H A Dieee80211_var.h406 u_int8_t psk[IEEE80211_PMK_LEN]; member
/openbsd/sbin/iked/
H A Dikev2_msg.c1003 uint8_t *key, *psk = NULL; in ikev2_msg_authverify() local
1027 auth->auth_length, &psk)) == -1) { in ikev2_msg_authverify()
1031 key = psk; in ikev2_msg_authverify()
1066 free(psk); in ikev2_msg_authverify()
1076 uint8_t *key, *psk = NULL; in ikev2_msg_authsign() local
1102 auth->auth_length, &psk)) == -1) { in ikev2_msg_authsign()
1106 key = psk; in ikev2_msg_authsign()
1154 free(psk); in ikev2_msg_authsign()
H A Dikev2.c5383 uint8_t *psk; in ikev2_psk() local
5389 if ((psk = calloc(1, hash_keylength(sa->sa_prf))) == NULL) in ikev2_psk()
5394 hash_final(sa->sa_prf, psk, &psklen); in ikev2_psk()
5396 *pskptr = psk; in ikev2_psk()
/openbsd/lib/libssl/test/
H A Dtestssl163 $ssltest -tls1 -cipher PSK -psk abc123 $extra || exit 1
166 $ssltest -bio_pair -tls1 -cipher PSK -psk abc123 $extra || exit 1
/openbsd/regress/lib/libcrypto/x509/bettertls/certificates/
H A D2458.chain19 J0CT1J6EObS29sQBZDZQ5I85D/psk+PuS+K6tqWXgeulpkS2nPFC5qJrkUOdGoEH
/openbsd/sbin/ifconfig/
H A Difconfig.c2216 struct ieee80211_wpapsk psk; in setifwpakey() local
2220 memset(&psk, 0, sizeof(psk)); in setifwpakey()
2244 passlen = sizeof(psk.i_psk); in setifwpakey()
2256 psk.i_psk, sizeof(psk.i_psk), 4096) != 0) in setifwpakey()
2259 psk.i_enabled = 1; in setifwpakey()
2261 psk.i_enabled = 0; in setifwpakey()
2263 (void)strlcpy(psk.i_name, ifname, sizeof(psk.i_name)); in setifwpakey()
2281 wpa.i_enabled = psk.i_enabled; in setifwpakey()
2423 struct ieee80211_wpapsk psk; in ieee80211_status() local
2446 memset(&psk, 0, sizeof(psk)); in ieee80211_status()
[all …]
/openbsd/lib/libssl/
H A Dtls13_key_schedule.c228 uint8_t *psk, size_t psk_len, const struct tls13_secret *context) in tls13_derive_early_secrets() argument
234 &secrets->extracted_early.len, secrets->digest, psk, psk_len, in tls13_derive_early_secrets()
H A Dtls13_internal.h164 int tls13_derive_early_secrets(struct tls13_secrets *secrets, uint8_t *psk,