/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver.h | 272 * passphrase - RSN passphrase for PSK 274 * This value is made available only for WPA/WPA2-Personal (PSK) and 277 * this can be %NULL if passphrase was not used to generate the PSK. In 278 * that case, the psk field must be used to fetch the PSK. 283 * psk - RSN PSK (alternative for passphrase for PSK) 285 * This value is made available only for WPA/WPA2-Personal (PSK) and 287 * the 32-octet (256-bit) PSK, if available. The driver wrapper shoul 290 const u8 *psk; member in struct:wpa_driver_associate_params [all...] |
/external/ipsec-tools/ |
NEWS | 38 o Xauth with pre-shared key PSK 155 o Install psk.txt mode 600, racoon.conf mode 644
|
/external/ipsec-tools/src/racoon/ |
Makefile.am | 94 samples/psk.txt.sample samples/racoon.conf.sample \ 95 samples/psk.txt.in samples/racoon.conf.in \
|
TODO | 42 o psk.txt should be a database? (psk.db?) psk_mkdb?
|
isakmp_base.c | 97 * psk: HDR, SA, Idii, Ni_b 286 * psk: HDR, SA, Idir, Nr_b 405 * psk: HDR, KE, HASH_I 576 * psk: HDR, KE, HASH_R 776 * psk: HDR, SA, Idii, Ni_b 894 * psk: HDR, SA, Idir, Nr_b 1057 * psk: HDR, KE, HASH_I 1205 * psk: HDR, KE, HASH_R [all...] |
isakmp_agg.c | 103 * psk: HDR, SA, KE, Ni, IDi1 316 * psk: HDR, SA, KE, Nr, IDr1, HASH_R 588 * psk: HDR, HASH_I 751 * psk: HDR, SA, KE, Ni, IDi1 906 * psk: HDR, SA, KE, Nr, IDr1, HASH_R 1275 * psk: HDR, HASH_I [all...] |
/external/wpa_supplicant_8/hostapd/ |
defconfig | 84 # EAP-PSK for the integrated EAP server (this is _not_ needed for WPA-PSK)
|
hostapd.conf | 674 # WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either 675 # wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK. 685 # WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit 687 # (8..63 characters) that will be converted to PSK. This conversion uses SSID 688 # so the PSK changes when ASCII passphrase is used and the SSID is changed. 695 # of (PSK,MAC address) pairs. This allows more than one PSK to be configured. 700 # Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The 701 # entries are separated with a space. WPA-PSK-SHA256 and WPA-EAP-SHA256 can b [all...] |
/system/core/nexus/ |
WifiNetwork.h | 225 * Pre-shared key for use with WPA-PSK 331 int setPsk(const char *psk);
|
/external/wpa_supplicant/ |
config_winreg.c | 29 * key_mgmt=WPA-PSK 260 wpa_printf(MSG_ERROR, "Both PSK and passphrase " 268 wpa_printf(MSG_ERROR, "WPA-PSK accepted for key management, " 269 "but no PSK configured for network '" TSTR "'.", 579 char *value = wpa_config_get(ssid, "psk"); 582 wpa_config_write_reg_string(hk, "psk", value);
|
eap_gpsk.c | 40 u8 *psk; member in struct:eap_gpsk_data 113 data->psk = os_malloc(config->eappsk_len); 114 if (data->psk == NULL) { 118 os_memcpy(data->psk, config->eappsk, config->eappsk_len); 130 os_free(data->psk); 363 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
|
ChangeLog | 67 * fixed a potential EAP state machine loop when mloving from PSK to EAP 83 * updated EAP-PSK to use the IANA-allocated EAP type 47 85 * fixed EAP-PSK bit ordering of the Flags field 211 * fixed WPA PSK update through ctrl_iface for the case where the old 212 PSK was derived from an ASCII passphrase and the new PSK is set as 213 a raw PSK (hex string) 278 this is using the same experimental type 255 as EAP-PSK) 418 * wpa_gui: do not display password/PSK field contents 479 * updated EAP-PSK to use draft 9 by default since this can now b [all...] |
config_file.c | 102 wpa_printf(MSG_ERROR, "Line %d: both PSK and " 110 wpa_printf(MSG_ERROR, "Line %d: WPA-PSK accepted for key " 111 "management, but no PSK configured.", line); 455 char *value = wpa_config_get(ssid, "psk");
|
/external/wpa_supplicant_6/wpa_supplicant/ |
config_winreg.c | 32 key_mgmt=WPA-PSK 324 wpa_printf(MSG_ERROR, "Both PSK and passphrase " 334 wpa_printf(MSG_ERROR, "WPA-PSK accepted for key management, " 335 "but no PSK configured for network '" TSTR "'.", 667 char *value = wpa_config_get(ssid, "psk"); 670 wpa_config_write_reg_string(hk, "psk", value);
|
wps_supplicant.c | 345 if (hexstr2bin((const char *) cred->key, ssid->psk, 619 static int wpas_wps_new_psk_cb(void *ctx, const u8 *mac_addr, const u8 *psk, 622 wpa_printf(MSG_DEBUG, "WPS: Received new WPA/WPA2-PSK from WPS for " 624 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len);
|
README-WPS | 15 passphrase/PSK) and configuration of an access point and client 130 negotiation which will generate a new WPA PSK in the same way as the
|
/external/wpa_supplicant_8/wpa_supplicant/ |
README-Windows.txt | 32 - WPA-PSK, TKIP, CCMP, TKIP+CCMP 34 - WPA2-PSK, TKIP, CCMP, TKIP+CCMP 193 Simple configuration example for WPA-PSK: 199 key_mgmt=WPA-PSK 202 psk="secret passphrase" 314 key_mgmt=WPA-PSK
|
config_winreg.c | 32 key_mgmt=WPA-PSK 346 wpa_printf(MSG_ERROR, "Both PSK and passphrase " 356 wpa_printf(MSG_ERROR, "WPA-PSK accepted for key management, " 357 "but no PSK configured for network '" TSTR "'.", 712 char *value = wpa_config_get(ssid, "psk"); 715 wpa_config_write_reg_string(hk, "psk", value);
|
/external/openssl/apps/ |
s_server.c | 124 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 307 char *psk_key=NULL; /* by default PSK is not used */ 310 unsigned char *psk, unsigned int max_psk_len) 320 BIO_printf(bio_err,"Error: client did not send PSK identity\n"); 330 BIO_printf(bio_s_out, "PSK error: client identity not found" 336 BIO_printf(bio_s_out, "PSK client identity found\n"); 338 /* convert the PSK key to binary */ 342 BIO_printf(bio_err,"Could not convert PSK key '%s' to BIGNUM\n", psk_key); 349 BIO_printf(bio_err,"psk buffer of callback is too small (%d) for key (%d)\n", 355 ret = BN_bn2bin(bn, psk); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_config.h | 26 * EAP-PSK/PAX/SAKE/GPSK). 64 * EAP-PSK/PAX/SAKE/GPSK. The length of the PSK must be 16 for EAP-PSK 66 * PSK.
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_sha1.c | 253 char psk[32]; member in struct:passphrase_test 333 u8 psk[32]; local 337 4096, psk, 32); 338 if (memcmp(psk, test->psk, 32) == 0)
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 26 * EAP-PSK/PAX/SAKE/GPSK). 64 * EAP-PSK/PAX/SAKE/GPSK. The length of the PSK must be 16 for EAP-PSK 66 * PSK.
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
NativeCrypto.java | 235 // PSK is Private Shared Key - didn't exist in Froyo's openssl - no JSSE equivalent 236 // add(null, "PSK-3DES-EDE-CBC-SHA"); 237 // add(null, "PSK-AES128-CBC-SHA"); 238 // add(null, "PSK-AES256-CBC-SHA"); 239 // add(null, "PSK-RC4-SHA");
|
/frameworks/base/media/libstagefright/codecs/amrnb/enc/src/ |
s10_8pf.cpp | 192 Word16 psk, ps, ps0, ps1, ps2, sq, sq2; 217 psk = -1; 494 s = L_msu (L_mult (alpk, sq), psk, alp); 498 psk = sq; 571 Word16 psk; local 608 psk = -1; 963 if (((Word32) alpk * sq) > ((Word32) psk * alp)) 965 psk = sq;
|
/external/openssl/ssl/ |
ssl_err.c | 307 {ERR_REASON(SSL_R_BAD_PSK_IDENTITY_HINT_LENGTH),"bad psk identity hint length"}, 445 {ERR_REASON(SSL_R_PSK_IDENTITY_NOT_FOUND),"psk identity not found"}, 446 {ERR_REASON(SSL_R_PSK_NO_CLIENT_CB) ,"psk no client cb"}, 447 {ERR_REASON(SSL_R_PSK_NO_SERVER_CB) ,"psk no server cb"}, [all...] |