/openbmc/openbmc/poky/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/ |
H A D | wpa_supplicant.conf | 429 psk="very secret passphrase" 438 psk="very secret passphrase" 449 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 537 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 544 psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f 614 psk="secret passphrase" 625 psk="very secret passphrase"
|
/openbmc/linux/crypto/ |
H A D | algif_skcipher.c | 42 struct sock *psk = ask->parent; in skcipher_sendmsg() local 43 struct alg_sock *pask = alg_sk(psk); in skcipher_sendmsg() 55 struct sock *psk = ask->parent; in _skcipher_recvmsg() local 56 struct alg_sock *pask = alg_sk(psk); in _skcipher_recvmsg() 204 struct sock *psk; in skcipher_check_key() local 214 psk = ask->parent; in skcipher_check_key() 219 lock_sock_nested(psk, SINGLE_DEPTH_NESTING); in skcipher_check_key() 229 release_sock(psk); in skcipher_check_key() 298 struct sock *psk = ask->parent; in skcipher_sock_destruct() local 299 struct alg_sock *pask = alg_sk(psk); in skcipher_sock_destruct()
|
H A D | algif_aead.c | 47 struct sock *psk = ask->parent; in aead_sufficient_data() local 48 struct alg_sock *pask = alg_sk(psk); in aead_sufficient_data() 65 struct sock *psk = ask->parent; in aead_sendmsg() local 66 struct alg_sock *pask = alg_sk(psk); in aead_sendmsg() 93 struct sock *psk = ask->parent; in _aead_recvmsg() local 94 struct alg_sock *pask = alg_sk(psk); in _aead_recvmsg() 380 struct sock *psk; in aead_check_key() local 390 psk = ask->parent; in aead_check_key() 395 lock_sock_nested(psk, SINGLE_DEPTH_NESTING); in aead_check_key() 405 release_sock(psk); in aead_check_key() [all …]
|
H A D | algif_hash.c | 301 struct sock *psk; in hash_check_key() local 311 psk = ask->parent; in hash_check_key() 316 lock_sock_nested(psk, SINGLE_DEPTH_NESTING); in hash_check_key() 326 release_sock(psk); in hash_check_key()
|
/openbmc/linux/tools/testing/selftests/wireguard/ |
H A D | netns.sh | 90 psk="$(pp wg genpsk)" 91 [[ -n $key1 && -n $key2 && -n $psk ]] 104 preshared-key <(echo "$psk") \ 110 preshared-key <(echo "$psk") \ 245 n1 wg set wg0 private-key <(echo "$key1") peer "$pub2" preshared-key <(echo "$psk") allowed-ips 192… 246 n2 wg set wg0 private-key <(echo "$key2") listen-port 2 peer "$pub1" preshared-key <(echo "$psk") a… 249 n2 wg set wg0 peer "$pub3" preshared-key <(echo "$psk") allowed-ips 192.168.241.1/32 peer "$pub1" r… 258 n1 wg set wg0 private-key <(echo "$key1") peer "$pub2" preshared-key <(echo "$psk") allowed-ips fd0… 259 n2 wg set wg0 private-key <(echo "$key2") listen-port 2 peer "$pub1" preshared-key <(echo "$psk") a… 617 n0 wg set wg0 private-key <(echo "$key1") peer "$pub2" preshared-key <(echo "$psk") [all …]
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/vpnc/vpnc/ |
H A D | long-help | 146 --auth-mode <psk/cert/hybrid> 148 * psk: pre-shared key (default) 151 Default: psk 152 conf-variable: IKE Authmode <psk/cert/hybrid>
|
/openbmc/linux/Documentation/networking/mac80211_hwsim/ |
H A D | wpa_supplicant.conf | 5 psk="12345678"
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 233 | 202 --object tls-creds-psk,dir=${tls_dir}/psk1,endpoint=server,id=tls0,verify-peer=on \ 206 obj1=tls-creds-psk,dir=${tls_dir}/psk1,username=psk1,endpoint=client,id=tls0 215 obj1=tls-creds-psk,dir=${tls_dir}/psk2,username=psk2,endpoint=client,id=tls0
|
H A D | common.tls | 27 rm -f "${tls_dir}"/*/*.psk
|
/openbmc/linux/drivers/net/ethernet/toshiba/ |
H A D | ps3_gelic_wireless.h | 110 u8 psk[GELIC_WL_EURUS_PSK_MAX_LEN]; /* psk key; hex or passphrase */ member 270 u8 psk[GELIC_WL_EURUS_PSK_MAX_LEN]; member
|
H A D | ps3_gelic_wireless.c | 1263 memset(wl->psk, 0, sizeof(wl->psk)); in gelic_wl_set_encodeext() 1264 memcpy(wl->psk, ext->key, ext->key_len); in gelic_wl_set_encodeext() 1852 memcpy(wpa->psk, wl->psk, wl->psk_len); in gelic_wl_do_wpa_setup() 1893 "N/A" : wpa->psk); in gelic_wl_do_wpa_setup()
|
/openbmc/linux/net/core/ |
H A D | sock_map.c | 344 struct sock **psk = &stab->sks[i]; in sock_map_free() local 347 sk = xchg(psk, NULL); in sock_map_free() 352 sock_map_unref(sk, psk); in sock_map_free() 410 struct sock **psk) in __sock_map_delete() argument 416 if (!sk_test || sk_test == *psk) in __sock_map_delete() 417 sk = xchg(psk, NULL); in __sock_map_delete() 420 sock_map_unref(sk, psk); in __sock_map_delete() 440 struct sock **psk; in sock_map_delete_elem() local 445 psk = &stab->sks[i]; in sock_map_delete_elem() 446 return __sock_map_delete(stab, NULL, psk); in sock_map_delete_elem()
|
/openbmc/openbmc/meta-phosphor/recipes-connectivity/openssl/ |
H A D | openssl_%.bbappend | 2 EXTRA_OECONF:append:class-target = " shared no-hw no-err no-psk no-srp "
|
/openbmc/linux/net/vmw_vsock/ |
H A D | af_vsock.c | 441 int vsock_assign_transport(struct vsock_sock *vsk, struct vsock_sock *psk) in vsock_assign_transport() argument 454 * The flag is set on the (listen) receive path (psk is not NULL). On in vsock_assign_transport() 457 if (psk && vsk->local_addr.svm_cid > VMADDR_CID_HOST && in vsock_assign_transport() 518 ret = new_transport->init(vsk, psk); in vsock_assign_transport() 746 struct vsock_sock *psk; in __vsock_create() 782 psk = parent ? vsock_sk(parent) : NULL; in __vsock_create() 784 vsk->trusted = psk->trusted; in __vsock_create() 785 vsk->owner = get_cred(psk->owner); in __vsock_create() 786 vsk->connect_timeout = psk->connect_timeout; in __vsock_create() 787 vsk->buffer_size = psk in __vsock_create() 737 struct vsock_sock *psk; __vsock_create() local [all...] |
H A D | virtio_transport_common.c | 713 struct vsock_sock *psk) in virtio_transport_do_socket_init() 723 if (psk && psk->trans) { in virtio_transport_do_socket_init() 724 struct virtio_vsock_sock *ptrans = psk->trans; in virtio_transport_do_socket_init() 710 virtio_transport_do_socket_init(struct vsock_sock * vsk,struct vsock_sock * psk) virtio_transport_do_socket_init() argument
|
/openbmc/qemu/docs/system/ |
H A D | tls.rst | 308 Use the GnuTLS ``psktool`` program to generate a ``keys.psk`` file 312 psktool -u rich -p /tmp/keys/keys.psk 318 --object tls-creds-psk,id=tls0,endpoint=server,dir=/tmp/keys \ 323 containing ``keys.psk`` and an optional username (defaults to "qemu"):: 326 --object tls-creds-psk,id=tls0,dir=/tmp/keys,username=rich,endpoint=client \
|
/openbmc/linux/net/phonet/ |
H A D | socket.c | 754 struct sock **psk = v; in pn_res_seq_show() local 755 struct sock *sk = *psk; in pn_res_seq_show() 758 (int) (psk - pnres.sk), in pn_res_seq_show()
|
/openbmc/qemu/crypto/ |
H A D | trace-events | 11 qcrypto_tls_creds_psk_load(void *creds, const char *dir) "TLS creds psk load creds=%p dir=%s"
|
/openbmc/linux/include/net/ |
H A D | af_vsock.h | 216 int vsock_assign_transport(struct vsock_sock *vsk, struct vsock_sock *psk);
|
/openbmc/linux/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
H A D | chtls_cm.c | 2075 struct sock *psk; in abort_syn_rcv() local 2090 psk = listen_ctx->lsk; in abort_syn_rcv() 2092 bh_lock_sock(psk); in abort_syn_rcv() 2093 if (!sock_owned_by_user(psk)) { in abort_syn_rcv() 2097 do_abort_syn_rcv(sk, psk); in abort_syn_rcv() 2101 __sk_add_backlog(psk, skb); in abort_syn_rcv() 2103 bh_unlock_sock(psk); in abort_syn_rcv()
|
/openbmc/linux/include/linux/ |
H A D | filter.h | 1429 const int ifindex, struct sock **psk) in bpf_sk_lookup_run_v4() argument 1458 *psk = selected_sk; in bpf_sk_lookup_run_v4() 1468 const int ifindex, struct sock **psk) in bpf_sk_lookup_run_v6() argument 1497 *psk = selected_sk; in bpf_sk_lookup_run_v6()
|
H A D | virtio_vsock.h | 187 struct vsock_sock *psk);
|
/openbmc/linux/drivers/net/wireguard/ |
H A D | noise.c | 444 const u8 psk[NOISE_SYMMETRIC_KEY_LEN]) in mix_psk() 448 kdf(chaining_key, temp_hash, key, psk, NOISE_HASH_LEN, NOISE_HASH_LEN, in mix_psk()
|
/openbmc/qemu/tests/unit/ |
H A D | meson.build | 105 'test-crypto-tlssession': ['crypto-tls-x509-helpers.c', 'crypto-tls-psk-helpers.c',
|
/openbmc/qemu/docs/tools/ |
H A D | qemu-nbd.rst | 273 --object tls-creds-psk,id=tls0,dir=/tmp/keys,username=eblake,endpoint=client \
|