/external/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
racoon.conf | 2 path pre_shared_key "/etc/racoon/psk.txt";
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample-inherit | 6 path pre_shared_key "/etc/racoon/psk.txt";
|
racoon.conf.sample | 11 path pre_shared_key "/usr/local/v6/etc/psk.txt" ;
|
/external/wpa_supplicant_8/src/wps/ |
wps.h | 168 * use_psk_key - Use PSK format key in Credential 170 * Force PSK format to be used instead of ASCII passphrase when 171 * building Credential for an Enrollee. The PSK value is set in 172 * struct wpa_context::psk. 257 * new_psk_cb - Callback for new PSK 260 * @psk: The new PSK 261 * @psk_len: The length of psk in octets 264 * This callback is called when a new per-device PSK is provisioned. 266 int (*new_psk_cb)(void *ctx, const u8 *mac_addr, const u8 *psk, 683 u8 psk[32]; member in struct:wps_context [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_supplicant.conf.orig | 249 # both), and psk must also be set. 264 # WPA-PSK = WPA pre-shared key (this requires 'psk' field) 269 # WPA-PSK-SHA256 = Like WPA-PSK but using stronger SHA256-based algorithms 271 # If not set, this defaults to: WPA-PSK WPA-EAP 294 # psk: WPA preshared key; 256-bit pre-shared key 295 # The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e., 296 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be 302 # startup and reconfiguration time can be optimized by generating the PSK onl [all...] |
config_ssid.h | 121 * psk - WPA pre-shared key (256 bits) 123 u8 psk[32]; member in struct:wpa_ssid 126 * psk_set - Whether PSK field is configured 133 * If this is set, psk will be generated using the SSID and passphrase 278 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.conf.orig | 280 # both), and psk must also be set. 306 # WPA-PSK = WPA pre-shared key (this requires 'psk' field) 311 # WPA-PSK-SHA256 = Like WPA-PSK but using stronger SHA256-based algorithms 313 # If not set, this defaults to: WPA-PSK WPA-EAP 336 # psk: WPA preshared key; 256-bit pre-shared key 337 # The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e., 338 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be 344 # startup and reconfiguration time can be optimized by generating the PSK onl [all...] |
/external/wpa_supplicant/ |
wpa_supplicant.conf.orig | 193 # both), and psk must also be set. 208 # WPA-PSK = WPA pre-shared key (this requires 'psk' field) 214 # If not set, this defaults to: WPA-PSK WPA-EAP 237 # psk: WPA preshared key; 256-bit pre-shared key 238 # The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e., 239 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be 245 # startup and reconfiguration time can be optimized by generating the PSK only 405 # EAP-PSK variables: 439 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid cipher [all...] |
eap_gpsk_common.h | 55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps.h | 176 * new_psk_cb - Callback for new PSK 179 * @psk: The new PSK 180 * @psk_len: The length of psk in octets 183 * This callback is called when a new per-device PSK is provisioned. 185 int (*new_psk_cb)(void *ctx, const u8 *mac_addr, const u8 *psk, 262 * generate a random PSK and move to configured state when the first 433 * network_key - The current Network Key (PSK) or %NULL to generate new 435 * If %NULL, Registrar will generate per-device PSK. In addition, AP
|
/external/wpa_supplicant_8/hostapd/ |
hostapd.eap_user | 21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a 60 "psk user" PSK "unknown" 61 "psk.user@example.com" PSK 0123456789abcdef0123456789abcdef
|
/external/openssl/android.testssl/ |
testssl | 157 echo test tls1 with PSK 158 $ssltest -tls1 -cipher PSK -psk abc123 $extra || exit 1 160 echo test tls1 with PSK via BIO pair 161 $ssltest -bio_pair -tls1 -cipher PSK -psk abc123 $extra || exit 1
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_ps3.c | 32 if (!params->psk && !params->passphrase) { 33 wpa_printf(MSG_INFO, "%s:no PSK error", __func__); 38 if (params->psk) { 47 "%02x", params->psk[i]);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_gpsk_common.h | 55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_gpsk_common.h | 55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
|
/system/netd/ |
SoftapController.h | 48 void generatePsk(char *ssid, char *passphrase, char *psk);
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_supplicant.conf.sgml | 44 <para>WPA-Personal (PSK) as home network and WPA-Enterprise with 55 key_mgmt=WPA-PSK 56 psk="very secret passphrase" 155 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE 158 psk="very secret passphrase"
|
/external/wpa_supplicant/wpa_gui/ |
networkconfig.ui.h | 46 else if (flags.find("[WPA2-PSK") >= 0) 48 else if (flags.find("[WPA-PSK") >= 0) 108 QMessageBox::warning(this, "wpa_gui", "WPA-PSK requires a passphrase " 110 "or 64 hex digit PSK"); 144 key_mgmt = "WPA-PSK"; 152 key_mgmt = "WPA-PSK"; 180 setNetworkParam(id, "psk", pskEdit->text().ascii(), psklen != 64); 338 else if (strstr(reply, "WPA-PSK")) 360 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d psk", network_id);
|
/external/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 76 else if (flags.find("[WPA2-PSK") >= 0) 78 else if (flags.find("[WPA-PSK") >= 0) 139 "WPA-PSK requires a passphrase " 141 "or 64 hex digit PSK"); 175 key_mgmt = "WPA-PSK"; 183 key_mgmt = "WPA-PSK"; 211 setNetworkParam(id, "psk", pskEdit->text().ascii(), 377 else if (strstr(reply, "WPA-PSK")) 399 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d psk", network_id);
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui/ |
networkconfig.ui.h | 46 else if (flags.find("[WPA2-PSK") >= 0) 48 else if (flags.find("[WPA-PSK") >= 0) 108 QMessageBox::warning(this, "wpa_gui", "WPA-PSK requires a passphrase " 110 "or 64 hex digit PSK"); 147 key_mgmt = "WPA-PSK"; 155 key_mgmt = "WPA-PSK"; 183 setNetworkParam(id, "psk", pskEdit->text().ascii(), psklen != 64); 352 else if (strstr(reply, "WPA-PSK")) 374 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d psk", network_id);
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui/ |
networkconfig.ui.h | 46 else if (flags.find("[WPA2-PSK") >= 0) 48 else if (flags.find("[WPA-PSK") >= 0) 108 QMessageBox::warning(this, "wpa_gui", "WPA-PSK requires a passphrase " 110 "or 64 hex digit PSK"); 147 key_mgmt = "WPA-PSK"; 155 key_mgmt = "WPA-PSK"; 183 setNetworkParam(id, "psk", pskEdit->text().ascii(), psklen != 64); 352 else if (strstr(reply, "WPA-PSK")) 374 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d psk", network_id);
|
/external/wpa_supplicant_8/src/crypto/ |
sha1-pbkdf2.c | 76 * This function is used to derive PSK for WPA-PSK. For this protocol,
|
/external/ipsec-tools/src/racoon/ |
localconf.c | 126 * get PSK by string. 138 "failed to get psk buffer.\n"); 154 * get PSK by address. 222 "failed to get psk buffer.\n");
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_wpa.c | 33 u8 psk[PMK_LEN]; member in struct:wpa 219 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN); 285 return wpa->psk; 364 os_memset(wpa.psk, 0x44, PMK_LEN);
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
test_wpa.c | 33 u8 psk[PMK_LEN]; member in struct:wpa 204 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN); 270 return wpa->psk; 349 os_memset(wpa.psk, 0x44, PMK_LEN);
|