Home
last modified time | relevance | path

Searched refs:psk (Results 1 – 25 of 37) sorted by relevance

12

/openbmc/openbmc/poky/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/
H A Dwpa_supplicant.conf429 psk="very secret passphrase"
438 psk="very secret passphrase"
449 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
537 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
544 psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
614 psk="secret passphrase"
625 psk="very secret passphrase"
/openbmc/linux/crypto/
H A Dalgif_skcipher.c42 struct sock *psk = ask->parent; in skcipher_sendmsg() local
43 struct alg_sock *pask = alg_sk(psk); in skcipher_sendmsg()
55 struct sock *psk = ask->parent; in _skcipher_recvmsg() local
56 struct alg_sock *pask = alg_sk(psk); in _skcipher_recvmsg()
204 struct sock *psk; in skcipher_check_key() local
214 psk = ask->parent; in skcipher_check_key()
219 lock_sock_nested(psk, SINGLE_DEPTH_NESTING); in skcipher_check_key()
229 release_sock(psk); in skcipher_check_key()
298 struct sock *psk = ask->parent; in skcipher_sock_destruct() local
299 struct alg_sock *pask = alg_sk(psk); in skcipher_sock_destruct()
H A Dalgif_aead.c47 struct sock *psk = ask->parent; in aead_sufficient_data() local
48 struct alg_sock *pask = alg_sk(psk); in aead_sufficient_data()
65 struct sock *psk = ask->parent; in aead_sendmsg() local
66 struct alg_sock *pask = alg_sk(psk); in aead_sendmsg()
93 struct sock *psk = ask->parent; in _aead_recvmsg() local
94 struct alg_sock *pask = alg_sk(psk); in _aead_recvmsg()
380 struct sock *psk; in aead_check_key() local
390 psk = ask->parent; in aead_check_key()
395 lock_sock_nested(psk, SINGLE_DEPTH_NESTING); in aead_check_key()
405 release_sock(psk); in aead_check_key()
[all …]
H A Dalgif_hash.c301 struct sock *psk; in hash_check_key() local
311 psk = ask->parent; in hash_check_key()
316 lock_sock_nested(psk, SINGLE_DEPTH_NESTING); in hash_check_key()
326 release_sock(psk); in hash_check_key()
/openbmc/linux/tools/testing/selftests/wireguard/
H A Dnetns.sh90 psk="$(pp wg genpsk)"
91 [[ -n $key1 && -n $key2 && -n $psk ]]
104 preshared-key <(echo "$psk") \
110 preshared-key <(echo "$psk") \
245 n1 wg set wg0 private-key <(echo "$key1") peer "$pub2" preshared-key <(echo "$psk") allowed-ips 192…
246 n2 wg set wg0 private-key <(echo "$key2") listen-port 2 peer "$pub1" preshared-key <(echo "$psk") a…
249 n2 wg set wg0 peer "$pub3" preshared-key <(echo "$psk") allowed-ips 192.168.241.1/32 peer "$pub1" r…
258 n1 wg set wg0 private-key <(echo "$key1") peer "$pub2" preshared-key <(echo "$psk") allowed-ips fd0…
259 n2 wg set wg0 private-key <(echo "$key2") listen-port 2 peer "$pub1" preshared-key <(echo "$psk") a…
617 n0 wg set wg0 private-key <(echo "$key1") peer "$pub2" preshared-key <(echo "$psk")
[all …]
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/vpnc/vpnc/
H A Dlong-help146 --auth-mode <psk/cert/hybrid>
148 * psk: pre-shared key (default)
151 Default: psk
152 conf-variable: IKE Authmode <psk/cert/hybrid>
/openbmc/linux/Documentation/networking/mac80211_hwsim/
H A Dwpa_supplicant.conf5 psk="12345678"
/openbmc/qemu/tests/qemu-iotests/
H A D233202 --object tls-creds-psk,dir=${tls_dir}/psk1,endpoint=server,id=tls0,verify-peer=on \
206 obj1=tls-creds-psk,dir=${tls_dir}/psk1,username=psk1,endpoint=client,id=tls0
215 obj1=tls-creds-psk,dir=${tls_dir}/psk2,username=psk2,endpoint=client,id=tls0
H A Dcommon.tls27 rm -f "${tls_dir}"/*/*.psk
/openbmc/linux/drivers/net/ethernet/toshiba/
H A Dps3_gelic_wireless.h110 u8 psk[GELIC_WL_EURUS_PSK_MAX_LEN]; /* psk key; hex or passphrase */ member
270 u8 psk[GELIC_WL_EURUS_PSK_MAX_LEN]; member
H A Dps3_gelic_wireless.c1263 memset(wl->psk, 0, sizeof(wl->psk)); in gelic_wl_set_encodeext()
1264 memcpy(wl->psk, ext->key, ext->key_len); in gelic_wl_set_encodeext()
1852 memcpy(wpa->psk, wl->psk, wl->psk_len); in gelic_wl_do_wpa_setup()
1893 "N/A" : wpa->psk); in gelic_wl_do_wpa_setup()
/openbmc/linux/net/core/
H A Dsock_map.c344 struct sock **psk = &stab->sks[i]; in sock_map_free() local
347 sk = xchg(psk, NULL); in sock_map_free()
352 sock_map_unref(sk, psk); in sock_map_free()
410 struct sock **psk) in __sock_map_delete() argument
416 if (!sk_test || sk_test == *psk) in __sock_map_delete()
417 sk = xchg(psk, NULL); in __sock_map_delete()
420 sock_map_unref(sk, psk); in __sock_map_delete()
440 struct sock **psk; in sock_map_delete_elem() local
445 psk = &stab->sks[i]; in sock_map_delete_elem()
446 return __sock_map_delete(stab, NULL, psk); in sock_map_delete_elem()
/openbmc/openbmc/meta-phosphor/recipes-connectivity/openssl/
H A Dopenssl_%.bbappend2 EXTRA_OECONF:append:class-target = " shared no-hw no-err no-psk no-srp "
/openbmc/linux/net/vmw_vsock/
H A Daf_vsock.c441 int vsock_assign_transport(struct vsock_sock *vsk, struct vsock_sock *psk) in vsock_assign_transport() argument
454 * The flag is set on the (listen) receive path (psk is not NULL). On in vsock_assign_transport()
457 if (psk && vsk->local_addr.svm_cid > VMADDR_CID_HOST && in vsock_assign_transport()
518 ret = new_transport->init(vsk, psk); in vsock_assign_transport()
746 struct vsock_sock *psk; in __vsock_create()
782 psk = parent ? vsock_sk(parent) : NULL; in __vsock_create()
784 vsk->trusted = psk->trusted; in __vsock_create()
785 vsk->owner = get_cred(psk->owner); in __vsock_create()
786 vsk->connect_timeout = psk->connect_timeout; in __vsock_create()
787 vsk->buffer_size = psk in __vsock_create()
737 struct vsock_sock *psk; __vsock_create() local
[all...]
H A Dvirtio_transport_common.c713 struct vsock_sock *psk) in virtio_transport_do_socket_init()
723 if (psk && psk->trans) { in virtio_transport_do_socket_init()
724 struct virtio_vsock_sock *ptrans = psk->trans; in virtio_transport_do_socket_init()
710 virtio_transport_do_socket_init(struct vsock_sock * vsk,struct vsock_sock * psk) virtio_transport_do_socket_init() argument
/openbmc/qemu/docs/system/
H A Dtls.rst308 Use the GnuTLS ``psktool`` program to generate a ``keys.psk`` file
312 psktool -u rich -p /tmp/keys/keys.psk
318 --object tls-creds-psk,id=tls0,endpoint=server,dir=/tmp/keys \
323 containing ``keys.psk`` and an optional username (defaults to "qemu")::
326 --object tls-creds-psk,id=tls0,dir=/tmp/keys,username=rich,endpoint=client \
/openbmc/linux/net/phonet/
H A Dsocket.c754 struct sock **psk = v; in pn_res_seq_show() local
755 struct sock *sk = *psk; in pn_res_seq_show()
758 (int) (psk - pnres.sk), in pn_res_seq_show()
/openbmc/qemu/crypto/
H A Dtrace-events11 qcrypto_tls_creds_psk_load(void *creds, const char *dir) "TLS creds psk load creds=%p dir=%s"
/openbmc/linux/include/net/
H A Daf_vsock.h216 int vsock_assign_transport(struct vsock_sock *vsk, struct vsock_sock *psk);
/openbmc/linux/drivers/net/ethernet/chelsio/inline_crypto/chtls/
H A Dchtls_cm.c2075 struct sock *psk; in abort_syn_rcv() local
2090 psk = listen_ctx->lsk; in abort_syn_rcv()
2092 bh_lock_sock(psk); in abort_syn_rcv()
2093 if (!sock_owned_by_user(psk)) { in abort_syn_rcv()
2097 do_abort_syn_rcv(sk, psk); in abort_syn_rcv()
2101 __sk_add_backlog(psk, skb); in abort_syn_rcv()
2103 bh_unlock_sock(psk); in abort_syn_rcv()
/openbmc/linux/include/linux/
H A Dfilter.h1429 const int ifindex, struct sock **psk) in bpf_sk_lookup_run_v4() argument
1458 *psk = selected_sk; in bpf_sk_lookup_run_v4()
1468 const int ifindex, struct sock **psk) in bpf_sk_lookup_run_v6() argument
1497 *psk = selected_sk; in bpf_sk_lookup_run_v6()
H A Dvirtio_vsock.h187 struct vsock_sock *psk);
/openbmc/linux/drivers/net/wireguard/
H A Dnoise.c444 const u8 psk[NOISE_SYMMETRIC_KEY_LEN]) in mix_psk()
448 kdf(chaining_key, temp_hash, key, psk, NOISE_HASH_LEN, NOISE_HASH_LEN, in mix_psk()
/openbmc/qemu/tests/unit/
H A Dmeson.build105 'test-crypto-tlssession': ['crypto-tls-x509-helpers.c', 'crypto-tls-psk-helpers.c',
/openbmc/qemu/docs/tools/
H A Dqemu-nbd.rst273 --object tls-creds-psk,id=tls0,dir=/tmp/keys,username=eblake,endpoint=client \

12