/external/wpa_supplicant_8/wpa_supplicant/ |
config_ssid.h | 124 * psk - WPA pre-shared key (256 bits) 126 u8 psk[32]; member in struct:wpa_ssid 129 * psk_set - Whether PSK field is configured 136 * If this is set, psk will be generated using the SSID and passphrase 288 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
|
ibss_rsn.c | 172 const u8 *psk) 202 wpa_sm_set_pmk(peer->supp, psk, PMK_LEN); 236 return ibss_rsn->psk; 403 if (ibss_rsn_supp_init(peer, ibss_rsn->wpa_s->own_addr, ibss_rsn->psk) 599 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk) 603 os_memcpy(ibss_rsn->psk, psk, PMK_LEN);
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
AccessPointParserHelper.java | 74 static final int PSK = 2; 84 } else if (security.equalsIgnoreCase("PSK")) { 85 return PSK; 208 case PSK: 240 } else if (securityType == PSK) {
|
/system/netd/ |
SoftapController.cpp | 299 if (!strcmp(argv[5], "wpa-psk")) { 302 } else if (!strcmp(argv[5], "wpa2-psk")) { 397 unsigned char psk[SHA256_DIGEST_LENGTH]; local 402 4096, SHA256_DIGEST_LENGTH, psk); 404 sprintf(&psk_str[j<<1], "%02x", psk[j]);
|
/external/openssl/ssl/ |
ssltest.c | 124 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 240 static char *psk_key=NULL; /* by default PSK is not used */ 243 unsigned int max_identity_len, unsigned char *psk, 245 static unsigned int psk_server_callback(SSL *ssl, const char *identity, unsigned char *psk, 290 fprintf(stderr," -psk arg - PSK in hex (without 0x)\n"); 568 else if (strcmp(*argv,"-psk") == 0) 960 /* Use PSK only if PSK key is given */ 963 /* no_psk is used to avoid putting psk command to openssl tool * [all...] |
/external/wpa_supplicant_8/src/ap/ |
wps_hostapd.c | 88 static int hostapd_wps_new_psk_cb(void *ctx, const u8 *mac_addr, const u8 *psk, 95 wpa_printf(MSG_DEBUG, "Received new WPA/WPA2-PSK from WPS for STA " 97 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); 100 wpa_printf(MSG_DEBUG, "Unexpected PSK length %lu", 105 /* Add the new PSK to runtime PSK list */ 110 os_memcpy(p->psk, psk, PMK_LEN); 118 /* Add the new PSK to PSK list file * [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gpsk.c | 39 u8 *psk; member in struct:eap_gpsk_data 111 data->psk = os_malloc(password_len); 112 if (data->psk == NULL) { 116 os_memcpy(data->psk, password, password_len); 128 os_free(data->psk); 348 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
|
/external/wpa_supplicant_8/hostapd/ |
README-WPS | 14 passphrase/PSK) and configuration of an access point and client 80 wpa_key_mgmt=WPA-PSK 84 # Enable random per-device PSK generation for WPS clients 87 wpa_psk_file=/etc/hostapd.psk 195 negotiation. At that point, a new, random WPA PSK is generated for the 209 which will generate a new WPA PSK in the same way as the PIN method
|
README | 253 - WPA-PSK ("WPA-Personal") 335 # WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either 336 # wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK. 346 # WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit 348 # (8..63 characters) that will be converted to PSK. This conversion uses SSID 349 # so the PSK changes when ASCII passphrase is used and the SSID is changed. 353 # Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The 355 #wpa_key_mgmt=WPA-PSK WPA-EAP
|
.config | 91 # EAP-PSK for the integrated EAP server (this is _not_ needed for WPA-PSK)
|
eap_testing.txt | 28 EAP-PEAPv0/PSK + - - - - 38 EAP-PEAPv1/PSK + - - - -
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gpsk.c | 40 u8 *psk; member in struct:eap_gpsk_data 112 data->psk = os_malloc(password_len); 113 if (data->psk == NULL) { 117 os_memcpy(data->psk, password, password_len); 129 os_free(data->psk); 349 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
|
/external/wpa_supplicant/ |
todo.txt | 46 * 'test' worked with WPA-PSK 88 FAST): SIM AKA PAX PSK LEAP; if these work, include in eap_testing.txt; if 121 - add support for encrypted configuration fields (e.g., password, psk,
|
config_ssid.h | 147 * psk - WPA pre-shared key (256 bits) 149 u8 psk[PMK_LEN]; member in struct:wpa_ssid 152 * psk_set - Whether PSK field is configured 159 * If this is set, psk will be generated using the SSID and passphrase 230 * eappsk - EAP-PSK/PAX/SAKE pre-shared key 235 * eappsk_len - EAP-PSK/PAX/SAKE pre-shared key length 237 * This field is always 16 for the current version of EAP-PSK/PAX and 243 * nai - User NAI (for EAP-PSK/PAX/SAKE) 766 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
|
config.c | 336 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)", 351 if (hexstr2bin(value, ssid->psk, PMK_LEN) || 353 wpa_printf(MSG_ERROR, "Line %d: Invalid PSK '%s'.", 362 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN); 376 return wpa_config_write_string_hex(ssid->psk, PMK_LEN); 486 if (os_strcmp(start, "WPA-PSK") == 0) 532 ret = os_snprintf(pos, end - pos, "%sWPA-PSK", 1147 { FUNC_KEY(psk) }, [all...] |
README | 69 - WPA-PSK ("WPA-Personal") 90 * EAP-PSK 237 EAP-FAST support is enabled. WPA-PSK mode does not require this or EAPOL/EAP 340 - If WPA-PSK: wpa_supplicant uses PSK as the master session key 577 1) WPA-Personal (PSK) as home network and WPA-Enterprise with EAP-TLS as work 588 key_mgmt=WPA-PSK 589 psk="very secret passphrase" 673 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE 676 psk="very secret passphrase [all...] |
/external/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.ui | 73 <string>WPA-Personal (PSK)</string> 83 <string>WPA2-Personal (PSK)</string> 127 <string>PSK</string>
|
/external/ipsec-tools/src/racoon/ |
isakmp_ident.c | 102 * psk: HDR, SA 247 * psk: HDR, SA 344 * psk: HDR, KE, Ni 415 * psk: HDR, KE, Nr 563 * psk: HDR*, IDi1, HASH_I 657 * psk: HDR*, IDr1, HASH_R 845 * psk: HDR, SA 948 * psk: HDR, SA 1102 * psk: HDR, KE, Ni 1241 * psk: HDR, KE, N [all...] |
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.in | 11 path pre_shared_key "@sysconfdir_x@/racoon/psk.txt";
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 79 else if (flags.indexOf("[WPA2-PSK") >= 0) 81 else if (flags.indexOf("[WPA-PSK") >= 0) 193 "WPA-PSK requires a passphrase " 195 "or 64 hex digit PSK"); 246 key_mgmt = "WPA-PSK"; 254 key_mgmt = "WPA-PSK"; 283 setNetworkParam(id, "psk", 527 else if (strstr(reply, "WPA-PSK")) 549 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d psk", network_id);
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 82 else if (flags.indexOf("[WPA2-PSK") >= 0) 84 else if (flags.indexOf("[WPA-PSK") >= 0) 203 tr("WPA-PSK requires a passphrase of 8 to 63 " 205 "or 64 hex digit PSK")); 260 key_mgmt = "WPA-PSK"; 268 key_mgmt = "WPA-PSK"; 302 setNetworkParam(id, "psk", 546 else if (strstr(reply, "WPA-PSK")) 569 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d psk", network_id);
|
/system/core/nexus/ |
WifiNetwork.cpp | 190 if (mSuppl->getNetworkVar(mNetid, "psk", buffer, len)) 286 int WifiNetwork::setPsk(const char *psk) { 288 snprintf(tmp, sizeof(tmp), "\"%s\"", psk); 289 if (mSuppl->setNetworkVar(mNetid, "psk", tmp)) 294 mPsk = strdup(psk); 351 strcat(accum, "WPA-PSK"); 522 if (!strcasecmp(v_token, "WPA-PSK")) 719 WifiNetworkStringProperty(wn, "Psk", false, 1) { 778 strcat(tmp, "WPA-PSK");
|
/external/openssl/apps/ |
s_client.c | 119 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 216 /* Default PSK identity and key */ 218 /*char *psk_key=NULL; by default PSK is not used */ 221 unsigned int max_identity_len, unsigned char *psk, 234 BIO_printf(bio_c_out,"NULL received PSK identity hint, continuing anyway\n"); 237 BIO_printf(bio_c_out, "Received PSK identity hint '%s'\n", hint); 239 /* lookup PSK identity and PSK key based on the given identity hint here */ 248 BIO_printf(bio_err,"Could not convert PSK key '%s' to BIGNUM\n", psk_key); 256 BIO_printf(bio_err,"psk buffer of callback is too small (%d) for key (%d)\n" [all...] |
/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pGroup.java | 46 /** The passphrase used for WPA2-PSK */ 58 * [psk=2182b2e50e53f260d04f3c7b25ef33c965a3291b9b36b455a82d77fd82ca15bc|
|
/external/wpa_supplicant/tests/ |
test_sha1.c | 234 char psk[32]; member in struct:passphrase_test 314 u8 psk[32]; local 318 4096, psk, 32); 319 if (memcmp(psk, test->psk, 32) == 0)
|