HomeSort by relevance Sort by last modified time
    Searched full:psk (Results 26 - 50 of 251) sorted by null

12 3 4 5 6 7 8 91011

  /external/ipsec-tools/src/racoon/samples/roadwarrior/client/
racoon.conf 2 path pre_shared_key "/etc/racoon/psk.txt";
  /external/ipsec-tools/src/racoon/samples/
racoon.conf.sample-inherit 6 path pre_shared_key "/etc/racoon/psk.txt";
racoon.conf.sample 11 path pre_shared_key "/usr/local/v6/etc/psk.txt" ;
  /external/wpa_supplicant_8/src/wps/
wps.h 168 * use_psk_key - Use PSK format key in Credential
170 * Force PSK format to be used instead of ASCII passphrase when
171 * building Credential for an Enrollee. The PSK value is set in
172 * struct wpa_context::psk.
257 * new_psk_cb - Callback for new PSK
260 * @psk: The new PSK
261 * @psk_len: The length of psk in octets
264 * This callback is called when a new per-device PSK is provisioned.
266 int (*new_psk_cb)(void *ctx, const u8 *mac_addr, const u8 *psk,
683 u8 psk[32]; member in struct:wps_context
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
wpa_supplicant.conf.orig 249 # both), and psk must also be set.
264 # WPA-PSK = WPA pre-shared key (this requires 'psk' field)
269 # WPA-PSK-SHA256 = Like WPA-PSK but using stronger SHA256-based algorithms
271 # If not set, this defaults to: WPA-PSK WPA-EAP
294 # psk: WPA preshared key; 256-bit pre-shared key
295 # The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e.,
296 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be
302 # startup and reconfiguration time can be optimized by generating the PSK onl
    [all...]
config_ssid.h 121 * psk - WPA pre-shared key (256 bits)
123 u8 psk[32]; member in struct:wpa_ssid
126 * psk_set - Whether PSK field is configured
133 * If this is set, psk will be generated using the SSID and passphrase
278 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_supplicant.conf.orig 280 # both), and psk must also be set.
306 # WPA-PSK = WPA pre-shared key (this requires 'psk' field)
311 # WPA-PSK-SHA256 = Like WPA-PSK but using stronger SHA256-based algorithms
313 # If not set, this defaults to: WPA-PSK WPA-EAP
336 # psk: WPA preshared key; 256-bit pre-shared key
337 # The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e.,
338 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be
344 # startup and reconfiguration time can be optimized by generating the PSK onl
    [all...]
  /external/wpa_supplicant/
wpa_supplicant.conf.orig 193 # both), and psk must also be set.
208 # WPA-PSK = WPA pre-shared key (this requires 'psk' field)
214 # If not set, this defaults to: WPA-PSK WPA-EAP
237 # psk: WPA preshared key; 256-bit pre-shared key
238 # The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e.,
239 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be
245 # startup and reconfiguration time can be optimized by generating the PSK only
405 # EAP-PSK variables:
439 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid cipher
    [all...]
eap_gpsk_common.h 55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps.h 176 * new_psk_cb - Callback for new PSK
179 * @psk: The new PSK
180 * @psk_len: The length of psk in octets
183 * This callback is called when a new per-device PSK is provisioned.
185 int (*new_psk_cb)(void *ctx, const u8 *mac_addr, const u8 *psk,
262 * generate a random PSK and move to configured state when the first
433 * network_key - The current Network Key (PSK) or %NULL to generate new
435 * If %NULL, Registrar will generate per-device PSK. In addition, AP
  /external/wpa_supplicant_8/hostapd/
hostapd.eap_user 21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a
60 "psk user" PSK "unknown"
61 "psk.user@example.com" PSK 0123456789abcdef0123456789abcdef
  /external/openssl/android.testssl/
testssl 157 echo test tls1 with PSK
158 $ssltest -tls1 -cipher PSK -psk abc123 $extra || exit 1
160 echo test tls1 with PSK via BIO pair
161 $ssltest -bio_pair -tls1 -cipher PSK -psk abc123 $extra || exit 1
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_ps3.c 32 if (!params->psk && !params->passphrase) {
33 wpa_printf(MSG_INFO, "%s:no PSK error", __func__);
38 if (params->psk) {
47 "%02x", params->psk[i]);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_gpsk_common.h 55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
  /external/wpa_supplicant_8/src/eap_common/
eap_gpsk_common.h 55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
  /system/netd/
SoftapController.h 48 void generatePsk(char *ssid, char *passphrase, char *psk);
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_supplicant.conf.sgml 44 <para>WPA-Personal (PSK) as home network and WPA-Enterprise with
55 key_mgmt=WPA-PSK
56 psk="very secret passphrase"
155 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
158 psk="very secret passphrase"
  /external/wpa_supplicant/wpa_gui/
networkconfig.ui.h 46 else if (flags.find("[WPA2-PSK") >= 0)
48 else if (flags.find("[WPA-PSK") >= 0)
108 QMessageBox::warning(this, "wpa_gui", "WPA-PSK requires a passphrase "
110 "or 64 hex digit PSK");
144 key_mgmt = "WPA-PSK";
152 key_mgmt = "WPA-PSK";
180 setNetworkParam(id, "psk", pskEdit->text().ascii(), psklen != 64);
338 else if (strstr(reply, "WPA-PSK"))
360 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d psk", network_id);
  /external/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 76 else if (flags.find("[WPA2-PSK") >= 0)
78 else if (flags.find("[WPA-PSK") >= 0)
139 "WPA-PSK requires a passphrase "
141 "or 64 hex digit PSK");
175 key_mgmt = "WPA-PSK";
183 key_mgmt = "WPA-PSK";
211 setNetworkParam(id, "psk", pskEdit->text().ascii(),
377 else if (strstr(reply, "WPA-PSK"))
399 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d psk", network_id);
  /external/wpa_supplicant_6/wpa_supplicant/wpa_gui/
networkconfig.ui.h 46 else if (flags.find("[WPA2-PSK") >= 0)
48 else if (flags.find("[WPA-PSK") >= 0)
108 QMessageBox::warning(this, "wpa_gui", "WPA-PSK requires a passphrase "
110 "or 64 hex digit PSK");
147 key_mgmt = "WPA-PSK";
155 key_mgmt = "WPA-PSK";
183 setNetworkParam(id, "psk", pskEdit->text().ascii(), psklen != 64);
352 else if (strstr(reply, "WPA-PSK"))
374 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d psk", network_id);
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui/
networkconfig.ui.h 46 else if (flags.find("[WPA2-PSK") >= 0)
48 else if (flags.find("[WPA-PSK") >= 0)
108 QMessageBox::warning(this, "wpa_gui", "WPA-PSK requires a passphrase "
110 "or 64 hex digit PSK");
147 key_mgmt = "WPA-PSK";
155 key_mgmt = "WPA-PSK";
183 setNetworkParam(id, "psk", pskEdit->text().ascii(), psklen != 64);
352 else if (strstr(reply, "WPA-PSK"))
374 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d psk", network_id);
  /external/wpa_supplicant_8/src/crypto/
sha1-pbkdf2.c 76 * This function is used to derive PSK for WPA-PSK. For this protocol,
  /external/ipsec-tools/src/racoon/
localconf.c 126 * get PSK by string.
138 "failed to get psk buffer.\n");
154 * get PSK by address.
222 "failed to get psk buffer.\n");
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_wpa.c 33 u8 psk[PMK_LEN]; member in struct:wpa
219 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN);
285 return wpa->psk;
364 os_memset(wpa.psk, 0x44, PMK_LEN);
  /external/wpa_supplicant_8/wpa_supplicant/tests/
test_wpa.c 33 u8 psk[PMK_LEN]; member in struct:wpa
204 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN);
270 return wpa->psk;
349 os_memset(wpa.psk, 0x44, PMK_LEN);

Completed in 270 milliseconds

12 3 4 5 6 7 8 91011