HomeSort by relevance Sort by last modified time
    Searched full:psk (Results 51 - 75 of 251) sorted by null

1 23 4 5 6 7 8 91011

  /external/wpa_supplicant_8/wpa_supplicant/
config_ssid.h 124 * psk - WPA pre-shared key (256 bits)
126 u8 psk[32]; member in struct:wpa_ssid
129 * psk_set - Whether PSK field is configured
136 * If this is set, psk will be generated using the SSID and passphrase
288 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
ibss_rsn.c 172 const u8 *psk)
202 wpa_sm_set_pmk(peer->supp, psk, PMK_LEN);
236 return ibss_rsn->psk;
403 if (ibss_rsn_supp_init(peer, ibss_rsn->wpa_s->own_addr, ibss_rsn->psk)
599 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk)
603 os_memcpy(ibss_rsn->psk, psk, PMK_LEN);
  /frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/
AccessPointParserHelper.java 74 static final int PSK = 2;
84 } else if (security.equalsIgnoreCase("PSK")) {
85 return PSK;
208 case PSK:
240 } else if (securityType == PSK) {
  /system/netd/
SoftapController.cpp 299 if (!strcmp(argv[5], "wpa-psk")) {
302 } else if (!strcmp(argv[5], "wpa2-psk")) {
397 unsigned char psk[SHA256_DIGEST_LENGTH]; local
402 4096, SHA256_DIGEST_LENGTH, psk);
404 sprintf(&psk_str[j<<1], "%02x", psk[j]);
  /external/openssl/ssl/
ssltest.c 124 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
240 static char *psk_key=NULL; /* by default PSK is not used */
243 unsigned int max_identity_len, unsigned char *psk,
245 static unsigned int psk_server_callback(SSL *ssl, const char *identity, unsigned char *psk,
290 fprintf(stderr," -psk arg - PSK in hex (without 0x)\n");
568 else if (strcmp(*argv,"-psk") == 0)
960 /* Use PSK only if PSK key is given */
963 /* no_psk is used to avoid putting psk command to openssl tool *
    [all...]
  /external/wpa_supplicant_8/src/ap/
wps_hostapd.c 88 static int hostapd_wps_new_psk_cb(void *ctx, const u8 *mac_addr, const u8 *psk,
95 wpa_printf(MSG_DEBUG, "Received new WPA/WPA2-PSK from WPS for STA "
97 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len);
100 wpa_printf(MSG_DEBUG, "Unexpected PSK length %lu",
105 /* Add the new PSK to runtime PSK list */
110 os_memcpy(p->psk, psk, PMK_LEN);
118 /* Add the new PSK to PSK list file *
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_gpsk.c 39 u8 *psk; member in struct:eap_gpsk_data
111 data->psk = os_malloc(password_len);
112 if (data->psk == NULL) {
116 os_memcpy(data->psk, password, password_len);
128 os_free(data->psk);
348 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
  /external/wpa_supplicant_8/hostapd/
README-WPS 14 passphrase/PSK) and configuration of an access point and client
80 wpa_key_mgmt=WPA-PSK
84 # Enable random per-device PSK generation for WPS clients
87 wpa_psk_file=/etc/hostapd.psk
195 negotiation. At that point, a new, random WPA PSK is generated for the
209 which will generate a new WPA PSK in the same way as the PIN method
README 253 - WPA-PSK ("WPA-Personal")
335 # WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either
336 # wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK.
346 # WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit
348 # (8..63 characters) that will be converted to PSK. This conversion uses SSID
349 # so the PSK changes when ASCII passphrase is used and the SSID is changed.
353 # Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The
355 #wpa_key_mgmt=WPA-PSK WPA-EAP
.config 91 # EAP-PSK for the integrated EAP server (this is _not_ needed for WPA-PSK)
eap_testing.txt 28 EAP-PEAPv0/PSK + - - - -
38 EAP-PEAPv1/PSK + - - - -
  /external/wpa_supplicant_8/src/eap_peer/
eap_gpsk.c 40 u8 *psk; member in struct:eap_gpsk_data
112 data->psk = os_malloc(password_len);
113 if (data->psk == NULL) {
117 os_memcpy(data->psk, password, password_len);
129 os_free(data->psk);
349 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
  /external/wpa_supplicant/
todo.txt 46 * 'test' worked with WPA-PSK
88 FAST): SIM AKA PAX PSK LEAP; if these work, include in eap_testing.txt; if
121 - add support for encrypted configuration fields (e.g., password, psk,
config_ssid.h 147 * psk - WPA pre-shared key (256 bits)
149 u8 psk[PMK_LEN]; member in struct:wpa_ssid
152 * psk_set - Whether PSK field is configured
159 * If this is set, psk will be generated using the SSID and passphrase
230 * eappsk - EAP-PSK/PAX/SAKE pre-shared key
235 * eappsk_len - EAP-PSK/PAX/SAKE pre-shared key length
237 * This field is always 16 for the current version of EAP-PSK/PAX and
243 * nai - User NAI (for EAP-PSK/PAX/SAKE)
766 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
config.c 336 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)",
351 if (hexstr2bin(value, ssid->psk, PMK_LEN) ||
353 wpa_printf(MSG_ERROR, "Line %d: Invalid PSK '%s'.",
362 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN);
376 return wpa_config_write_string_hex(ssid->psk, PMK_LEN);
486 if (os_strcmp(start, "WPA-PSK") == 0)
532 ret = os_snprintf(pos, end - pos, "%sWPA-PSK",
1147 { FUNC_KEY(psk) },
    [all...]
README 69 - WPA-PSK ("WPA-Personal")
90 * EAP-PSK
237 EAP-FAST support is enabled. WPA-PSK mode does not require this or EAPOL/EAP
340 - If WPA-PSK: wpa_supplicant uses PSK as the master session key
577 1) WPA-Personal (PSK) as home network and WPA-Enterprise with EAP-TLS as work
588 key_mgmt=WPA-PSK
589 psk="very secret passphrase"
673 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
676 psk="very secret passphrase
    [all...]
  /external/wpa_supplicant/wpa_gui-qt4/
networkconfig.ui 73 <string>WPA-Personal (PSK)</string>
83 <string>WPA2-Personal (PSK)</string>
127 <string>PSK</string>
  /external/ipsec-tools/src/racoon/
isakmp_ident.c 102 * psk: HDR, SA
247 * psk: HDR, SA
344 * psk: HDR, KE, Ni
415 * psk: HDR, KE, Nr
563 * psk: HDR*, IDi1, HASH_I
657 * psk: HDR*, IDr1, HASH_R
845 * psk: HDR, SA
948 * psk: HDR, SA
1102 * psk: HDR, KE, Ni
1241 * psk: HDR, KE, N
    [all...]
  /external/ipsec-tools/src/racoon/samples/
racoon.conf.in 11 path pre_shared_key "@sysconfdir_x@/racoon/psk.txt";
  /external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 79 else if (flags.indexOf("[WPA2-PSK") >= 0)
81 else if (flags.indexOf("[WPA-PSK") >= 0)
193 "WPA-PSK requires a passphrase "
195 "or 64 hex digit PSK");
246 key_mgmt = "WPA-PSK";
254 key_mgmt = "WPA-PSK";
283 setNetworkParam(id, "psk",
527 else if (strstr(reply, "WPA-PSK"))
549 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d psk", network_id);
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 82 else if (flags.indexOf("[WPA2-PSK") >= 0)
84 else if (flags.indexOf("[WPA-PSK") >= 0)
203 tr("WPA-PSK requires a passphrase of 8 to 63 "
205 "or 64 hex digit PSK"));
260 key_mgmt = "WPA-PSK";
268 key_mgmt = "WPA-PSK";
302 setNetworkParam(id, "psk",
546 else if (strstr(reply, "WPA-PSK"))
569 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d psk", network_id);
  /system/core/nexus/
WifiNetwork.cpp 190 if (mSuppl->getNetworkVar(mNetid, "psk", buffer, len))
286 int WifiNetwork::setPsk(const char *psk) {
288 snprintf(tmp, sizeof(tmp), "\"%s\"", psk);
289 if (mSuppl->setNetworkVar(mNetid, "psk", tmp))
294 mPsk = strdup(psk);
351 strcat(accum, "WPA-PSK");
522 if (!strcasecmp(v_token, "WPA-PSK"))
719 WifiNetworkStringProperty(wn, "Psk", false, 1) {
778 strcat(tmp, "WPA-PSK");
  /external/openssl/apps/
s_client.c 119 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
216 /* Default PSK identity and key */
218 /*char *psk_key=NULL; by default PSK is not used */
221 unsigned int max_identity_len, unsigned char *psk,
234 BIO_printf(bio_c_out,"NULL received PSK identity hint, continuing anyway\n");
237 BIO_printf(bio_c_out, "Received PSK identity hint '%s'\n", hint);
239 /* lookup PSK identity and PSK key based on the given identity hint here */
248 BIO_printf(bio_err,"Could not convert PSK key '%s' to BIGNUM\n", psk_key);
256 BIO_printf(bio_err,"psk buffer of callback is too small (%d) for key (%d)\n"
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/p2p/
WifiP2pGroup.java 46 /** The passphrase used for WPA2-PSK */
58 * [psk=2182b2e50e53f260d04f3c7b25ef33c965a3291b9b36b455a82d77fd82ca15bc|
  /external/wpa_supplicant/tests/
test_sha1.c 234 char psk[32]; member in struct:passphrase_test
314 u8 psk[32]; local
318 4096, psk, 32);
319 if (memcmp(psk, test->psk, 32) == 0)

Completed in 162 milliseconds

1 23 4 5 6 7 8 91011