HomeSort by relevance Sort by last modified time
    Searched full:psk (Results 151 - 175 of 251) sorted by null

1 2 3 4 5 67 8 91011

  /external/chromium/chrome/browser/chromeos/options/
vpn_config_view.cc 114 // TODO(kuan): differentiate between bad psk and user passphrases.
355 // PSK passphrase label, input and visible button.
  /external/wpa_supplicant/
defconfig 141 # EAP-PSK (experimental; this is _not_ needed for WPA-PSK)
ctrl_iface_dbus_handlers.c 600 "WPA-PSK", "WPA-EAP", "IEEE8021X", "WPA-NONE",
633 &iter_array, "WPA-PSK"))
964 if ((strcmp(entry.key, "psk") == 0 &&
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
README-WPS 15 passphrase/PSK) and configuration of an access point and client
140 negotiation which will generate a new WPA PSK in the same way as the
wpa_supplicant.c 163 wpa_msg(wpa_s, MSG_INFO, "WPA: No PSK configured for "
170 os_memcpy(key, ssid->psk, 16);
176 os_memcpy(key, ssid->psk, 16 + 8);
177 os_memcpy(key + 16 + 8, ssid->psk + 16, 8);
987 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT FT/PSK");
997 "WPA: using KEY_MGMT PSK with SHA256");
1004 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT WPA-PSK");
1044 wpa_sm_set_pmk(wpa_s->wpa, ssid->psk, PMK_LEN);
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_new_handlers.c 255 if ((os_strcmp(entry.key, "psk") == 0 &&
    [all...]
dbus_old_handlers.c 636 "WPA-PSK", "WPA-EAP", "IEEE8021X", "WPA-NONE",
669 &iter_array, "WPA-PSK"))
997 if ((os_strcmp(entry.key, "psk") == 0 &&
    [all...]
  /external/wpa_supplicant_8/src/ap/
ap_config.h 103 u8 psk[PMK_LEN]; member in struct:hostapd_wpa_psk
wpa_auth.c 1586 const u8 *psk; local
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_i.h 104 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */
  /frameworks/base/wifi/java/android/net/wifi/
SupplicantState.java 102 * case of WPA-PSK, this happens when receiving the first EAPOL-Key
  /packages/apps/Settings/res/values/
arrays.xml 296 <item>WPA PSK</item>
298 <item>WPA2 PSK</item>
675 <item>L2TP/IPSec PSK</item>
677 <item>IPSec Xauth PSK</item>
  /frameworks/base/media/libstagefright/codecs/amrnb/enc/src/
c2_11pf.cpp 418 Word16 psk; local
435 psk = -1;
521 /* s = L_msu(s, psk, alp, pOverflow); */
522 s -= (((Word32) psk * alp) << 1);
526 psk = sq;
c3_14pf.cpp 394 Word16 psk; local
409 psk = -1;
567 s = L_msu(s, psk, alp, pOverflow);
568 //s -= (((Word32) psk * alp) << 1);
572 psk = sq;
c2_9pf.cpp 482 Word16 psk, ps0, ps1, sq, sq1;
487 psk = -1;
550 s = L_msu(L_mult(alpk, sq), psk, alp);
553 psk = sq;
600 Word16 psk; local
617 psk = -1;
711 /* s = L_msu(L_temp, psk, alp, pOverflow); */
712 s = L_temp - (((Word32) psk * alp) << 1);
716 psk = sq;
    [all...]
  /external/openssl/ssl/
s3_srvr.c 132 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
348 /* normal PSK or KRB5 */
399 * PSK: may send PSK identity hints
408 /* PSK: send ServerKeyExchange if PSK identity
451 /* With normal PSK Certificates and
    [all...]
s3_clnt.c 132 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
318 /* or PSK */
    [all...]
ssl_stat.c 66 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
548 str="unknown PSK identity";
  /external/wpa_supplicant_8/src/drivers/
driver.h 445 * passphrase - RSN passphrase for PSK
447 * This value is made available only for WPA/WPA2-Personal (PSK) and
450 * this can be %NULL if passphrase was not used to generate the PSK. In
451 * that case, the psk field must be used to fetch the PSK.
456 * psk - RSN PSK (alternative for passphrase for PSK)
458 * This value is made available only for WPA/WPA2-Personal (PSK) and
460 * the 32-octet (256-bit) PSK, if available. The driver wrapper shoul
463 const u8 *psk; member in struct:wpa_driver_associate_params
    [all...]
  /external/wpa_supplicant_8/hostapd/
config_file.c 523 if (os_strcmp(start, "WPA-PSK") == 0)
528 else if (os_strcmp(start, "FT-PSK") == 0)
534 else if (os_strcmp(start, "WPA-PSK-SHA256") == 0)
1056 wpa_printf(MSG_ERROR, "WPA-PSK enabled, but PSK or passphrase "
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_registrar.c 87 int (*new_psk_cb)(void *ctx, const u8 *mac_addr, const u8 *psk,
728 const u8 *psk, size_t psk_len)
733 return reg->new_psk_cb(reg->cb_ctx, mac_addr, psk, psk_len);
1158 /* Generate a random per-device PSK */
1169 wpa_hexdump_key(MSG_DEBUG, "WPS: Generated per-device PSK",
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
ctrl_iface_dbus_handlers.c 658 "WPA-PSK", "WPA-EAP", "IEEE8021X", "WPA-NONE",
691 &iter_array, "WPA-PSK"))
1022 if ((strcmp(entry.key, "psk") == 0 &&
    [all...]
  /external/chromium/net/base/
ssl_cipher_suite_names.cc 252 {"PSK"}, // 15
  /frameworks/base/media/libstagefright/codecs/amrwbenc/src/
c4t64fx.c 137 Word16 psk, ps, alpk, alp, val, k_cn, k_dn, exp; local
545 psk = -1;
693 s = vo_L_msu(vo_L_mult(alpk, ps), psk, alp);
696 psk = ps;
    [all...]
  /external/ipsec-tools/src/racoon/
oakley.c 1009 * base:psk,rsa
1361 plog(LLV_DEBUG, LOCATION, NULL, "HASH for PSK validated.\n");
    [all...]

Completed in 1196 milliseconds

1 2 3 4 5 67 8 91011