/external/wpa_supplicant_6/wpa_supplicant/ |
README | 69 - WPA-PSK ("WPA-Personal") 90 * EAP-PSK 241 EAP-FAST support is enabled. WPA-PSK mode does not require this or EAPOL/EAP 344 - If WPA-PSK: wpa_supplicant uses PSK as the master session key 583 1) WPA-Personal (PSK) as home network and WPA-Enterprise with EAP-TLS as work 594 key_mgmt=WPA-PSK 595 psk="very secret passphrase" 679 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE 682 psk="very secret passphrase [all...] |
config.c | 362 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)", 382 if (hexstr2bin(value, ssid->psk, PMK_LEN) || 384 wpa_printf(MSG_ERROR, "Line %d: Invalid PSK '%s'.", 393 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN); 408 return wpa_config_write_string_hex(ssid->psk, PMK_LEN); 521 if (os_strcmp(start, "WPA-PSK") == 0) 532 else if (os_strcmp(start, "FT-PSK") == 0) 538 else if (os_strcmp(start, "WPA-PSK-SHA256") == 0) 584 ret = os_snprintf(pos, end - pos, "%sWPA-PSK", [all...] |
eap_testing.txt | 64 EAP-PEAPv0/PSK - - - - - - - - - - + - 75 EAP-PEAPv1/PSK - - - - - - - - - - + - 90 EAP-TTLS/EAP-PSK - - - - - - - - - - + - 98 EAP-PSK +7 - - - - + - - - - + - 129 7) tested only with an older (incompatible) draft of EAP-PSK; FreeRADIUS does 130 not support the current EAP-PSK (RFC) specification 279 - EAP-PSK
|
.config | 153 # EAP-PSK (experimental; this is _not_ needed for WPA-PSK) 236 # converting ASCII passphrases into PSK. If this functionality is removed, the 237 # PSK can only be configured as the 64-octet hexstring (e.g., from
|
defconfig | 156 # EAP-PSK (experimental; this is _not_ needed for WPA-PSK) 239 # converting ASCII passphrases into PSK. If this functionality is removed, the 240 # PSK can only be configured as the 64-octet hexstring (e.g., from
|
/external/wpa_supplicant_8/wpa_supplicant/ |
README | 69 - WPA-PSK ("WPA-Personal") 90 * EAP-PSK 225 EAP-FAST support is enabled. WPA-PSK mode does not require this or EAPOL/EAP 328 - If WPA-PSK: wpa_supplicant uses PSK as the master session key 561 1) WPA-Personal (PSK) as home network and WPA-Enterprise with EAP-TLS as work 572 key_mgmt=WPA-PSK 573 psk="very secret passphrase" 657 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE 660 psk="very secret passphrase [all...] |
config.c | 369 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)", 389 if (hexstr2bin(value, ssid->psk, PMK_LEN) || 391 wpa_printf(MSG_ERROR, "Line %d: Invalid PSK '%s'.", 400 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN); 415 return wpa_config_write_string_hex(ssid->psk, PMK_LEN); 528 if (os_strcmp(start, "WPA-PSK") == 0) 539 else if (os_strcmp(start, "FT-PSK") == 0) 545 else if (os_strcmp(start, "WPA-PSK-SHA256") == 0) 591 ret = os_snprintf(pos, end - pos, "%sWPA-PSK", [all...] |
eap_testing.txt | 64 EAP-PEAPv0/PSK - - - - - - - - - - + - 75 EAP-PEAPv1/PSK - - - - - - - - - - + - 90 EAP-TTLS/EAP-PSK - - - - - - - - - - + - 98 EAP-PSK +7 - - - - + - - - - + - 129 7) tested only with an older (incompatible) draft of EAP-PSK; FreeRADIUS does 130 not support the current EAP-PSK (RFC) specification 279 - EAP-PSK
|
.config | 165 # EAP-PSK (experimental; this is _not_ needed for WPA-PSK) 250 # converting ASCII passphrases into PSK. If this functionality is removed, the 251 # PSK can only be configured as the 64-octet hexstring (e.g., from
|
/external/openssl/include/openssl/ |
tls1.h | 132 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 295 /* PSK ciphersuites from 4279 */ 445 /* PSK ciphersuites from RFC 4279 */ 446 #define TLS1_TXT_PSK_WITH_RC4_128_SHA "PSK-RC4-SHA" 447 #define TLS1_TXT_PSK_WITH_3DES_EDE_CBC_SHA "PSK-3DES-EDE-CBC-SHA" 448 #define TLS1_TXT_PSK_WITH_AES_128_CBC_SHA "PSK-AES128-CBC-SHA" 449 #define TLS1_TXT_PSK_WITH_AES_256_CBC_SHA "PSK-AES256-CBC-SHA"
|
/external/openssl/ssl/ |
tls1.h | 132 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 295 /* PSK ciphersuites from 4279 */ 445 /* PSK ciphersuites from RFC 4279 */ 446 #define TLS1_TXT_PSK_WITH_RC4_128_SHA "PSK-RC4-SHA" 447 #define TLS1_TXT_PSK_WITH_3DES_EDE_CBC_SHA "PSK-3DES-EDE-CBC-SHA" 448 #define TLS1_TXT_PSK_WITH_AES_128_CBC_SHA "PSK-AES128-CBC-SHA" 449 #define TLS1_TXT_PSK_WITH_AES_256_CBC_SHA "PSK-AES256-CBC-SHA"
|
ssl_txt.c | 66 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 185 if (BIO_puts(bp,"\n PSK identity: ") <= 0) goto err; 187 if (BIO_puts(bp,"\n PSK identity hint: ") <= 0) goto err;
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 568 * XXKey is either the second 256 bits of MSK or PSK. 789 return "WPA2-PSK+WPA-PSK"; 791 "WPA2-PSK" : "WPA-PSK"; 800 return "FT-PSK"; 806 return "WPA2-PSK-SHA256";
|
/external/ipsec-tools/src/racoon/ |
privsep.c | 504 vchar_t *psk; local 522 if ((psk = getpsk(bufs[0], keylen)) == NULL) { 527 reply->bufs.buflen[0] = psk->l; 528 reply->hdr.ac_len = sizeof(*reply) + psk->l; 537 memcpy(reply + 1, psk->v, psk->l); 538 vfree(psk); 1050 vchar_t *psk; local 1088 if ((psk = vmalloc(len - sizeof(*msg))) == NULL) 1091 memcpy(psk->v, msg + 1, psk->l) [all...] |
prsa_tok.l | 61 PSK { return TAG_PSK; }
|
/external/wpa_supplicant/wpa_gui/ |
networkconfig.ui | 84 <string>WPA-Personal (PSK)</string> 94 <string>WPA2-Personal (PSK)</string> 144 <string>PSK</string>
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui/ |
networkconfig.ui | 103 <string>WPA-Personal (PSK)</string> 113 <string>WPA2-Personal (PSK)</string> 163 <string>PSK</string>
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.ui | 70 <string>WPA-Personal (PSK)</string> 80 <string>WPA2-Personal (PSK)</string> 124 <string>PSK</string>
|
/external/wpa_supplicant_8/hostapd/ |
ChangeLog | 45 PSK as an ASCII passphrase or PSK 237 * updated EAP-PSK to use the IANA-allocated EAP type 47 238 * fixed EAP-PSK bit ordering of the Flags field 316 this is using the same experimental type 255 as EAP-PSK) 399 * added experimental support for EAP-PSK 410 4-Way Handshake if WPA-PSK is used 479 incorrect PSK); previously, message 1/4 was not tried again if an 604 * fixed mixed WPA-PSK and WPA-EAP mode to work with WPA-PSK (i.e., d [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui/ |
networkconfig.ui | 103 <string>WPA-Personal (PSK)</string> 113 <string>WPA2-Personal (PSK)</string> 163 <string>PSK</string>
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.ui | 80 <string>WPA-Personal (PSK)</string> 90 <string>WPA2-Personal (PSK)</string> 134 <string>PSK</string>
|
/packages/apps/Settings/src/com/android/settings/wifi/ |
AccessPoint.java | 89 } else if (result.capabilities.contains("PSK")) { 129 boolean wpa = result.capabilities.contains("WPA-PSK"); 130 boolean wpa2 = result.capabilities.contains("WPA2-PSK");
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample-natt | 64 # With NAT-T you shouldn't use PSK. Let's go on with certs.
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/ |
README | 55 The password can be stored in the psk.txt file. In that situation,
|
/frameworks/base/media/libstagefright/codecs/amrwbenc/src/ |
c2t64fx.c | 57 Word16 ps, psk, ps1, ps2, alpk, alp1, alp2, sq; local 227 psk = -1; 242 s = vo_L_mult(alpk, sq) - ((psk * alp2)<<1); 245 psk = sq;
|