HomeSort by relevance Sort by last modified time
    Searched full:psk (Results 76 - 100 of 251) sorted by null

1 2 34 5 6 7 8 91011

  /external/wpa_supplicant_6/wpa_supplicant/
README 69 - WPA-PSK ("WPA-Personal")
90 * EAP-PSK
241 EAP-FAST support is enabled. WPA-PSK mode does not require this or EAPOL/EAP
344 - If WPA-PSK: wpa_supplicant uses PSK as the master session key
583 1) WPA-Personal (PSK) as home network and WPA-Enterprise with EAP-TLS as work
594 key_mgmt=WPA-PSK
595 psk="very secret passphrase"
679 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
682 psk="very secret passphrase
    [all...]
config.c 362 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)",
382 if (hexstr2bin(value, ssid->psk, PMK_LEN) ||
384 wpa_printf(MSG_ERROR, "Line %d: Invalid PSK '%s'.",
393 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN);
408 return wpa_config_write_string_hex(ssid->psk, PMK_LEN);
521 if (os_strcmp(start, "WPA-PSK") == 0)
532 else if (os_strcmp(start, "FT-PSK") == 0)
538 else if (os_strcmp(start, "WPA-PSK-SHA256") == 0)
584 ret = os_snprintf(pos, end - pos, "%sWPA-PSK",
    [all...]
eap_testing.txt 64 EAP-PEAPv0/PSK - - - - - - - - - - + -
75 EAP-PEAPv1/PSK - - - - - - - - - - + -
90 EAP-TTLS/EAP-PSK - - - - - - - - - - + -
98 EAP-PSK +7 - - - - + - - - - + -
129 7) tested only with an older (incompatible) draft of EAP-PSK; FreeRADIUS does
130 not support the current EAP-PSK (RFC) specification
279 - EAP-PSK
.config 153 # EAP-PSK (experimental; this is _not_ needed for WPA-PSK)
236 # converting ASCII passphrases into PSK. If this functionality is removed, the
237 # PSK can only be configured as the 64-octet hexstring (e.g., from
defconfig 156 # EAP-PSK (experimental; this is _not_ needed for WPA-PSK)
239 # converting ASCII passphrases into PSK. If this functionality is removed, the
240 # PSK can only be configured as the 64-octet hexstring (e.g., from
  /external/wpa_supplicant_8/wpa_supplicant/
README 69 - WPA-PSK ("WPA-Personal")
90 * EAP-PSK
225 EAP-FAST support is enabled. WPA-PSK mode does not require this or EAPOL/EAP
328 - If WPA-PSK: wpa_supplicant uses PSK as the master session key
561 1) WPA-Personal (PSK) as home network and WPA-Enterprise with EAP-TLS as work
572 key_mgmt=WPA-PSK
573 psk="very secret passphrase"
657 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
660 psk="very secret passphrase
    [all...]
config.c 369 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)",
389 if (hexstr2bin(value, ssid->psk, PMK_LEN) ||
391 wpa_printf(MSG_ERROR, "Line %d: Invalid PSK '%s'.",
400 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN);
415 return wpa_config_write_string_hex(ssid->psk, PMK_LEN);
528 if (os_strcmp(start, "WPA-PSK") == 0)
539 else if (os_strcmp(start, "FT-PSK") == 0)
545 else if (os_strcmp(start, "WPA-PSK-SHA256") == 0)
591 ret = os_snprintf(pos, end - pos, "%sWPA-PSK",
    [all...]
eap_testing.txt 64 EAP-PEAPv0/PSK - - - - - - - - - - + -
75 EAP-PEAPv1/PSK - - - - - - - - - - + -
90 EAP-TTLS/EAP-PSK - - - - - - - - - - + -
98 EAP-PSK +7 - - - - + - - - - + -
129 7) tested only with an older (incompatible) draft of EAP-PSK; FreeRADIUS does
130 not support the current EAP-PSK (RFC) specification
279 - EAP-PSK
.config 165 # EAP-PSK (experimental; this is _not_ needed for WPA-PSK)
250 # converting ASCII passphrases into PSK. If this functionality is removed, the
251 # PSK can only be configured as the 64-octet hexstring (e.g., from
  /external/openssl/include/openssl/
tls1.h 132 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
295 /* PSK ciphersuites from 4279 */
445 /* PSK ciphersuites from RFC 4279 */
446 #define TLS1_TXT_PSK_WITH_RC4_128_SHA "PSK-RC4-SHA"
447 #define TLS1_TXT_PSK_WITH_3DES_EDE_CBC_SHA "PSK-3DES-EDE-CBC-SHA"
448 #define TLS1_TXT_PSK_WITH_AES_128_CBC_SHA "PSK-AES128-CBC-SHA"
449 #define TLS1_TXT_PSK_WITH_AES_256_CBC_SHA "PSK-AES256-CBC-SHA"
  /external/openssl/ssl/
tls1.h 132 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
295 /* PSK ciphersuites from 4279 */
445 /* PSK ciphersuites from RFC 4279 */
446 #define TLS1_TXT_PSK_WITH_RC4_128_SHA "PSK-RC4-SHA"
447 #define TLS1_TXT_PSK_WITH_3DES_EDE_CBC_SHA "PSK-3DES-EDE-CBC-SHA"
448 #define TLS1_TXT_PSK_WITH_AES_128_CBC_SHA "PSK-AES128-CBC-SHA"
449 #define TLS1_TXT_PSK_WITH_AES_256_CBC_SHA "PSK-AES256-CBC-SHA"
ssl_txt.c 66 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
185 if (BIO_puts(bp,"\n PSK identity: ") <= 0) goto err;
187 if (BIO_puts(bp,"\n PSK identity hint: ") <= 0) goto err;
  /external/wpa_supplicant_8/src/common/
wpa_common.c 568 * XXKey is either the second 256 bits of MSK or PSK.
789 return "WPA2-PSK+WPA-PSK";
791 "WPA2-PSK" : "WPA-PSK";
800 return "FT-PSK";
806 return "WPA2-PSK-SHA256";
  /external/ipsec-tools/src/racoon/
privsep.c 504 vchar_t *psk; local
522 if ((psk = getpsk(bufs[0], keylen)) == NULL) {
527 reply->bufs.buflen[0] = psk->l;
528 reply->hdr.ac_len = sizeof(*reply) + psk->l;
537 memcpy(reply + 1, psk->v, psk->l);
538 vfree(psk);
1050 vchar_t *psk; local
1088 if ((psk = vmalloc(len - sizeof(*msg))) == NULL)
1091 memcpy(psk->v, msg + 1, psk->l)
    [all...]
prsa_tok.l 61 PSK { return TAG_PSK; }
  /external/wpa_supplicant/wpa_gui/
networkconfig.ui 84 <string>WPA-Personal (PSK)</string>
94 <string>WPA2-Personal (PSK)</string>
144 <string>PSK</string>
  /external/wpa_supplicant_6/wpa_supplicant/wpa_gui/
networkconfig.ui 103 <string>WPA-Personal (PSK)</string>
113 <string>WPA2-Personal (PSK)</string>
163 <string>PSK</string>
  /external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/
networkconfig.ui 70 <string>WPA-Personal (PSK)</string>
80 <string>WPA2-Personal (PSK)</string>
124 <string>PSK</string>
  /external/wpa_supplicant_8/hostapd/
ChangeLog 45 PSK as an ASCII passphrase or PSK
237 * updated EAP-PSK to use the IANA-allocated EAP type 47
238 * fixed EAP-PSK bit ordering of the Flags field
316 this is using the same experimental type 255 as EAP-PSK)
399 * added experimental support for EAP-PSK
410 4-Way Handshake if WPA-PSK is used
479 incorrect PSK); previously, message 1/4 was not tried again if an
604 * fixed mixed WPA-PSK and WPA-EAP mode to work with WPA-PSK (i.e., d
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui/
networkconfig.ui 103 <string>WPA-Personal (PSK)</string>
113 <string>WPA2-Personal (PSK)</string>
163 <string>PSK</string>
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
networkconfig.ui 80 <string>WPA-Personal (PSK)</string>
90 <string>WPA2-Personal (PSK)</string>
134 <string>PSK</string>
  /packages/apps/Settings/src/com/android/settings/wifi/
AccessPoint.java 89 } else if (result.capabilities.contains("PSK")) {
129 boolean wpa = result.capabilities.contains("WPA-PSK");
130 boolean wpa2 = result.capabilities.contains("WPA2-PSK");
  /external/ipsec-tools/src/racoon/samples/
racoon.conf.sample-natt 64 # With NAT-T you shouldn't use PSK. Let's go on with certs.
  /external/ipsec-tools/src/racoon/samples/roadwarrior/
README 55 The password can be stored in the psk.txt file. In that situation,
  /frameworks/base/media/libstagefright/codecs/amrwbenc/src/
c2t64fx.c 57 Word16 ps, psk, ps1, ps2, alpk, alp1, alp2, sq; local
227 psk = -1;
242 s = vo_L_mult(alpk, sq) - ((psk * alp2)<<1);
245 psk = sq;

Completed in 506 milliseconds

1 2 34 5 6 7 8 91011