/external/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 23 unsigned char psk[32]; local 61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); 65 printf("\t#psk=\"%s\"\n", passphrase); 68 printf("%02x", psk[i]);
|
eap_gpsk.c | 40 u8 *psk; member in struct:eap_gpsk_data 113 data->psk = os_malloc(config->eappsk_len); 114 if (data->psk == NULL) { 118 os_memcpy(data->psk, config->eappsk, config->eappsk_len); 130 os_free(data->psk); 363 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
|
config_ssid.h | 147 * psk - WPA pre-shared key (256 bits) 149 u8 psk[PMK_LEN]; member in struct:wpa_ssid 152 * psk_set - Whether PSK field is configured 159 * If this is set, psk will be generated using the SSID and passphrase 230 * eappsk - EAP-PSK/PAX/SAKE pre-shared key 235 * eappsk_len - EAP-PSK/PAX/SAKE pre-shared key length 237 * This field is always 16 for the current version of EAP-PSK/PAX and 243 * nai - User NAI (for EAP-PSK/PAX/SAKE) 766 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
|
/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 23 unsigned char psk[32]; local 61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); 65 printf("\t#psk=\"%s\"\n", passphrase); 68 printf("%02x", psk[i]);
|
config_ssid.h | 121 * psk - WPA pre-shared key (256 bits) 123 u8 psk[32]; member in struct:wpa_ssid 126 * psk_set - Whether PSK field is configured 133 * If this is set, psk will be generated using the SSID and passphrase 278 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
|
/system/netd/ |
SoftapController.cpp | 234 unsigned char psk[SHA256_DIGEST_LENGTH]; local 276 4096, SHA256_DIGEST_LENGTH, psk); 278 sprintf(&psk_str[j<<1], "%02x", psk[j]);
|
/frameworks/base/packages/VpnServices/src/com/android/server/vpn/ |
VpnServiceBinder.java | 171 L2tpIpsecPskService psk = new L2tpIpsecPskService(); local 172 psk.setContext(this, (L2tpIpsecPskProfile) p); 173 return psk;
|
/external/wpa_supplicant/tests/ |
test_sha1.c | 234 char psk[32]; member in struct:passphrase_test 314 u8 psk[32]; local 318 4096, psk, 32); 319 if (memcmp(psk, test->psk, 32) == 0)
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_sha1.c | 253 char psk[32]; member in struct:passphrase_test 333 u8 psk[32]; local 337 4096, psk, 32); 338 if (memcmp(psk, test->psk, 32) == 0)
|
test_wpa.c | 33 u8 psk[PMK_LEN]; member in struct:wpa 219 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN); 285 return wpa->psk; 364 os_memset(wpa.psk, 0x44, PMK_LEN);
|
/frameworks/base/media/libstagefright/codecs/amrnb/enc/src/ |
s10_8pf.cpp | 192 Word16 psk, ps, ps0, ps1, ps2, sq, sq2; 217 psk = -1; 494 s = L_msu (L_mult (alpk, sq), psk, alp); 498 psk = sq; 571 Word16 psk; local 608 psk = -1; 963 if (((Word32) alpk * sq) > ((Word32) psk * alp)) 965 psk = sq;
|
c2_11pf.cpp | 418 Word16 psk; local 435 psk = -1; 521 /* s = L_msu(s, psk, alp, pOverflow); */ 522 s -= (((Word32) psk * alp) << 1); 526 psk = sq;
|
c2_9pf.cpp | 482 Word16 psk, ps0, ps1, sq, sq1; 487 psk = -1; 550 s = L_msu(L_mult(alpk, sq), psk, alp); 553 psk = sq; 600 Word16 psk; local 617 psk = -1; 711 /* s = L_msu(L_temp, psk, alp, pOverflow); */ 712 s = L_temp - (((Word32) psk * alp) << 1); 716 psk = sq; [all...] |
c3_14pf.cpp | 394 Word16 psk; local 409 psk = -1; 567 s = L_msu(s, psk, alp, pOverflow); 568 //s -= (((Word32) psk * alp) << 1); 572 psk = sq;
|
c4_17pf.cpp | 407 Word16 psk; local 425 psk = -1; 632 /* s = L_msu(s, psk, alp, pOverflow); */ 633 s -= (((Word32) psk * alp) << 1); 637 psk = sq;
|
/external/ipsec-tools/src/racoon/ |
privsep.c | 468 vchar_t *psk; local 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { 491 reply->bufs.buflen[0] = psk->l; 492 reply->hdr.ac_len = sizeof(*reply) + psk->l; 501 memcpy(reply + 1, psk->v, psk->l); 502 vfree(psk); 894 vchar_t *psk; local 932 if ((psk = vmalloc(len - sizeof(*msg))) == NULL) 935 memcpy(psk->v, msg + 1, psk->l) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_psk.c | 2 * hostapd / EAP-PSK (RFC 4764) server 14 * Note: EAP-PSK is an EAP authentication method and as such, completely 15 * different from WPA-PSK. This file is not needed for WPA-PSK functionality. 65 struct eap_psk_hdr_1 *psk; local 67 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)"); 70 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data"); 74 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", 78 sizeof(*psk) + data->id_s_len 100 struct eap_psk_hdr_3 *psk; local [all...] |
/frameworks/base/media/libstagefright/codecs/amrwbenc/src/ |
c2t64fx.c | 57 Word16 ps, psk, ps1, ps2, alpk, alp1, alp2, sq;
local 227 psk = -1;
242 s = vo_L_mult(alpk, sq) - ((psk * alp2)<<1);
245 psk = sq;
|
c4t64fx.c | 137 Word16 psk, ps, alpk, alp, val, k_cn, k_dn, exp;
local 545 psk = -1;
693 s = vo_L_msu(vo_L_mult(alpk, ps), psk, alp);
696 psk = ps;
[all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gpsk.c | 39 u8 *psk; member in struct:eap_gpsk_data 111 data->psk = os_malloc(password_len); 112 if (data->psk == NULL) { 116 os_memcpy(data->psk, password, password_len); 128 os_free(data->psk); 348 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver.h | 272 * passphrase - RSN passphrase for PSK 274 * This value is made available only for WPA/WPA2-Personal (PSK) and 277 * this can be %NULL if passphrase was not used to generate the PSK. In 278 * that case, the psk field must be used to fetch the PSK. 283 * psk - RSN PSK (alternative for passphrase for PSK) 285 * This value is made available only for WPA/WPA2-Personal (PSK) and 287 * the 32-octet (256-bit) PSK, if available. The driver wrapper shoul 290 const u8 *psk; member in struct:wpa_driver_associate_params [all...] |
/hardware/broadcom/wlan/bcm4329/src/wl/sys/ |
wl_iw.c | 6101 wsec_pmk_t psk; local 6144 wsec_pmk_t psk; local [all...] |
/prebuilt/common/tradefed/ |
tradefed-prebuilt.jar | |