Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching full:psk

362 		wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)",
382 if (hexstr2bin(value, ssid->psk, PMK_LEN) ||
384 wpa_printf(MSG_ERROR, "Line %d: Invalid PSK '%s'.",
393 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN);
408 return wpa_config_write_string_hex(ssid->psk, PMK_LEN);
521 if (os_strcmp(start, "WPA-PSK") == 0)
532 else if (os_strcmp(start, "FT-PSK") == 0)
538 else if (os_strcmp(start, "WPA-PSK-SHA256") == 0)
584 ret = os_snprintf(pos, end - pos, "%sWPA-PSK",
635 pos += os_snprintf(pos, end - pos, "%sFT-PSK",
645 pos += os_snprintf(pos, end - pos, "%sWPA-PSK-SHA256",
1347 { FUNC_KEY(psk) },
1871 * wpa_config_update_psk - Update WPA PSK based on passphrase and SSID
1874 * This function must be called to update WPA PSK when either SSID or the
1882 ssid->psk, PMK_LEN);
1883 wpa_hexdump_key(MSG_MSGDUMP, "PSK (from passphrase)",
1884 ssid->psk, PMK_LEN);