/external/chromium/chrome/browser/chromeos/options/ |
vpn_config_view.cc | 114 // TODO(kuan): differentiate between bad psk and user passphrases. 355 // PSK passphrase label, input and visible button.
|
/external/wpa_supplicant/ |
defconfig | 141 # EAP-PSK (experimental; this is _not_ needed for WPA-PSK)
|
ctrl_iface_dbus_handlers.c | 600 "WPA-PSK", "WPA-EAP", "IEEE8021X", "WPA-NONE", 633 &iter_array, "WPA-PSK")) 964 if ((strcmp(entry.key, "psk") == 0 && [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
README-WPS | 15 passphrase/PSK) and configuration of an access point and client 140 negotiation which will generate a new WPA PSK in the same way as the
|
wpa_supplicant.c | 163 wpa_msg(wpa_s, MSG_INFO, "WPA: No PSK configured for " 170 os_memcpy(key, ssid->psk, 16); 176 os_memcpy(key, ssid->psk, 16 + 8); 177 os_memcpy(key + 16 + 8, ssid->psk + 16, 8); 987 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT FT/PSK"); 997 "WPA: using KEY_MGMT PSK with SHA256"); 1004 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT WPA-PSK"); 1044 wpa_sm_set_pmk(wpa_s->wpa, ssid->psk, PMK_LEN); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers.c | 255 if ((os_strcmp(entry.key, "psk") == 0 && [all...] |
dbus_old_handlers.c | 636 "WPA-PSK", "WPA-EAP", "IEEE8021X", "WPA-NONE", 669 &iter_array, "WPA-PSK")) 997 if ((os_strcmp(entry.key, "psk") == 0 && [all...] |
/external/wpa_supplicant_8/src/ap/ |
ap_config.h | 103 u8 psk[PMK_LEN]; member in struct:hostapd_wpa_psk
|
wpa_auth.c | 1586 const u8 *psk; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_i.h | 104 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */
|
/frameworks/base/wifi/java/android/net/wifi/ |
SupplicantState.java | 102 * case of WPA-PSK, this happens when receiving the first EAPOL-Key
|
/packages/apps/Settings/res/values/ |
arrays.xml | 296 <item>WPA PSK</item> 298 <item>WPA2 PSK</item> 675 <item>L2TP/IPSec PSK</item> 677 <item>IPSec Xauth PSK</item>
|
/frameworks/base/media/libstagefright/codecs/amrnb/enc/src/ |
c2_11pf.cpp | 418 Word16 psk; local 435 psk = -1; 521 /* s = L_msu(s, psk, alp, pOverflow); */ 522 s -= (((Word32) psk * alp) << 1); 526 psk = sq;
|
c3_14pf.cpp | 394 Word16 psk; local 409 psk = -1; 567 s = L_msu(s, psk, alp, pOverflow); 568 //s -= (((Word32) psk * alp) << 1); 572 psk = sq;
|
c2_9pf.cpp | 482 Word16 psk, ps0, ps1, sq, sq1; 487 psk = -1; 550 s = L_msu(L_mult(alpk, sq), psk, alp); 553 psk = sq; 600 Word16 psk; local 617 psk = -1; 711 /* s = L_msu(L_temp, psk, alp, pOverflow); */ 712 s = L_temp - (((Word32) psk * alp) << 1); 716 psk = sq; [all...] |
/external/openssl/ssl/ |
s3_srvr.c | 132 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 348 /* normal PSK or KRB5 */ 399 * PSK: may send PSK identity hints 408 /* PSK: send ServerKeyExchange if PSK identity 451 /* With normal PSK Certificates and [all...] |
s3_clnt.c | 132 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 318 /* or PSK */ [all...] |
ssl_stat.c | 66 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 548 str="unknown PSK identity";
|
/external/wpa_supplicant_8/src/drivers/ |
driver.h | 445 * passphrase - RSN passphrase for PSK 447 * This value is made available only for WPA/WPA2-Personal (PSK) and 450 * this can be %NULL if passphrase was not used to generate the PSK. In 451 * that case, the psk field must be used to fetch the PSK. 456 * psk - RSN PSK (alternative for passphrase for PSK) 458 * This value is made available only for WPA/WPA2-Personal (PSK) and 460 * the 32-octet (256-bit) PSK, if available. The driver wrapper shoul 463 const u8 *psk; member in struct:wpa_driver_associate_params [all...] |
/external/wpa_supplicant_8/hostapd/ |
config_file.c | 523 if (os_strcmp(start, "WPA-PSK") == 0) 528 else if (os_strcmp(start, "FT-PSK") == 0) 534 else if (os_strcmp(start, "WPA-PSK-SHA256") == 0) 1056 wpa_printf(MSG_ERROR, "WPA-PSK enabled, but PSK or passphrase " [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_registrar.c | 87 int (*new_psk_cb)(void *ctx, const u8 *mac_addr, const u8 *psk, 728 const u8 *psk, size_t psk_len) 733 return reg->new_psk_cb(reg->cb_ctx, mac_addr, psk, psk_len); 1158 /* Generate a random per-device PSK */ 1169 wpa_hexdump_key(MSG_DEBUG, "WPS: Generated per-device PSK", [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
ctrl_iface_dbus_handlers.c | 658 "WPA-PSK", "WPA-EAP", "IEEE8021X", "WPA-NONE", 691 &iter_array, "WPA-PSK")) 1022 if ((strcmp(entry.key, "psk") == 0 && [all...] |
/external/chromium/net/base/ |
ssl_cipher_suite_names.cc | 252 {"PSK"}, // 15
|
/frameworks/base/media/libstagefright/codecs/amrwbenc/src/ |
c4t64fx.c | 137 Word16 psk, ps, alpk, alp, val, k_cn, k_dn, exp; local 545 psk = -1; 693 s = vo_L_msu(vo_L_mult(alpk, ps), psk, alp); 696 psk = ps; [all...] |
/external/ipsec-tools/src/racoon/ |
oakley.c | 1009 * base:psk,rsa 1361 plog(LLV_DEBUG, LOCATION, NULL, "HASH for PSK validated.\n"); [all...] |