/external/wpa_supplicant/examples/ |
wpa-psk-tkip.conf | 1 # WPA-PSK/TKIP 6 ssid="example wpa-psk network" 7 key_mgmt=WPA-PSK 11 psk="secret passphrase"
|
/external/wpa_supplicant_6/wpa_supplicant/examples/ |
wpa-psk-tkip.conf | 1 # WPA-PSK/TKIP 6 ssid="example wpa-psk network" 7 key_mgmt=WPA-PSK 11 psk="secret passphrase"
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpa-psk-tkip.conf | 1 # WPA-PSK/TKIP 6 ssid="example wpa-psk network" 7 key_mgmt=WPA-PSK 11 psk="secret passphrase"
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_psk.c | 2 * hostapd / EAP-PSK (RFC 4764) server 14 * Note: EAP-PSK is an EAP authentication method and as such, completely 15 * different from WPA-PSK. This file is not needed for WPA-PSK functionality. 65 struct eap_psk_hdr_1 *psk; local 67 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)"); 70 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data"); 74 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", 78 sizeof(*psk) + data->id_s_len 100 struct eap_psk_hdr_3 *psk; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 2 * hostapd / EAP-PSK (RFC 4764) server 14 * Note: EAP-PSK is an EAP authentication method and as such, completely 15 * different from WPA-PSK. This file is not needed for WPA-PSK functionality. 66 struct eap_psk_hdr_1 *psk; local 68 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)"); 71 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data"); 75 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", 79 sizeof(*psk) + data->id_s_len 101 struct eap_psk_hdr_3 *psk; local [all...] |
/external/wpa_supplicant_8/hostapd/ |
hostapd.wpa_psk | 2 # with #, must contain a MAC address and PSK separated with a space. 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 5 # characters or as a 256-bit hex PSK (64 hex digits).
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_psk_common.h | 2 * EAP server/peer: EAP-PSK shared routines 38 /* EAP-PSK First Message (AS -> Supplicant) */ 45 /* EAP-PSK Second Message (Supplicant -> AS) */ 54 /* EAP-PSK Third Message (AS -> Supplicant) */ 62 /* EAP-PSK Fourth Message (Supplicant -> AS) */ 74 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
|
eap_psk_common.c | 2 * EAP server/peer: EAP-PSK shared routines 25 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) 28 if (aes_128_encrypt_block(psk, ak, ak)) 33 if (aes_128_encrypt_block(psk, ak, ak) || 34 aes_128_encrypt_block(psk, kdk, kdk))
|
eap_gpsk_common.c | 47 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, 69 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) 82 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, 104 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); 118 const u8 *psk, size_t psk_len, 155 os_memcpy(pos, psk, psk_len); 165 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 197 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, 211 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_psk_common.h | 2 * EAP server/peer: EAP-PSK shared routines 38 /* EAP-PSK First Message (AS -> Supplicant) */ 45 /* EAP-PSK Second Message (Supplicant -> AS) */ 54 /* EAP-PSK Third Message (AS -> Supplicant) */ 62 /* EAP-PSK Fourth Message (Supplicant -> AS) */ 74 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
|
eap_psk_common.c | 2 * EAP server/peer: EAP-PSK shared routines 25 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) 28 if (aes_128_encrypt_block(psk, ak, ak)) 33 if (aes_128_encrypt_block(psk, ak, ak) || 34 aes_128_encrypt_block(psk, kdk, kdk))
|
eap_gpsk_common.c | 44 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, 66 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) 79 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, 101 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); 115 const u8 *psk, size_t psk_len, 152 os_memcpy(pos, psk, psk_len); 162 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 194 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, 208 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString [all...] |
/external/wpa_supplicant/ |
eap_psk.c | 2 * EAP peer method: EAP-PSK (RFC 4764) 14 * Note: EAP-PSK is an EAP authentication method and as such, completely 15 * different from WPA-PSK. This file is not needed for WPA-PSK functionality. 45 wpa_printf(MSG_INFO, "EAP-PSK: pre-shared key not configured"); 53 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 54 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN); 64 wpa_printf(MSG_INFO, "EAP-PSK: could not get own identity"); 92 wpa_printf(MSG_DEBUG, "EAP-PSK: in INIT state"); 98 wpa_printf(MSG_INFO, "EAP-PSK: Invalid first message [all...] |
eap_psk_common.h | 2 * EAP server/peer: EAP-PSK shared routines 38 /* Shared prefix for all EAP-PSK frames */ 47 /* EAP-PSK First Message (AS -> Supplicant) */ 58 /* EAP-PSK Second Message (Supplicant -> AS) */ 71 /* EAP-PSK Third Message (AS -> Supplicant) */ 83 /* EAP-PSK Fourth Message (Supplicant -> AS) */ 99 void eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
|
eap_psk_common.c | 2 * EAP server/peer: EAP-PSK shared routines 25 void eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) 28 aes_128_encrypt_block(psk, ak, ak); 32 aes_128_encrypt_block(psk, ak, ak); 33 aes_128_encrypt_block(psk, kdk, kdk);
|
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 23 unsigned char psk[32]; local 61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); 65 printf("\t#psk=\"%s\"\n", passphrase); 68 printf("%02x", psk[i]);
|
eap_gpsk_common.c | 47 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, 69 omac1_aes_128_vector(psk, 2, addr, vlen, hash); 81 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, 103 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); 117 const u8 *psk, size_t psk_len, 125 int (*gkdf)(const u8 *psk, const u8 *data, size_t data_len, 154 os_memcpy(pos, psk, psk_len); 164 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 196 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, 210 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_psk.c | 2 * EAP peer method: EAP-PSK (RFC 4764) 14 * Note: EAP-PSK is an EAP authentication method and as such, completely 15 * different from WPA-PSK. This file is not needed for WPA-PSK functionality. 45 wpa_printf(MSG_INFO, "EAP-PSK: 16-octet pre-shared key not " 57 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 58 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN); 69 wpa_printf(MSG_INFO, "EAP-PSK: could not get own identity"); 98 wpa_printf(MSG_DEBUG, "EAP-PSK: in INIT state"); 103 wpa_printf(MSG_INFO, "EAP-PSK: Invalid first message [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 2 * EAP peer method: EAP-PSK (RFC 4764) 14 * Note: EAP-PSK is an EAP authentication method and as such, completely 15 * different from WPA-PSK. This file is not needed for WPA-PSK functionality. 46 wpa_printf(MSG_INFO, "EAP-PSK: 16-octet pre-shared key not " 58 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 59 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN); 70 wpa_printf(MSG_INFO, "EAP-PSK: could not get own identity"); 99 wpa_printf(MSG_DEBUG, "EAP-PSK: in INIT state"); 104 wpa_printf(MSG_INFO, "EAP-PSK: Invalid first message [all...] |
/frameworks/base/core/tests/ConnectivityManagerTest/assets/ |
accesspoints.xml | 13 <security>PSK</security> 18 <security>PSK</security>
|
/external/wpa_supplicant_8/src/ap/ |
ap_config.c | 189 struct hostapd_wpa_psk *psk; local 196 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname); 223 psk = os_zalloc(sizeof(*psk)); 224 if (psk == NULL) { 225 wpa_printf(MSG_ERROR, "WPA PSK allocation failed"); 230 psk->group = 1; 232 os_memcpy(psk->addr, addr, ETH_ALEN); 236 wpa_printf(MSG_ERROR, "No PSK on line %d in '%s'", 238 os_free(psk); 365 struct hostapd_wpa_psk *psk, *prev; local 560 struct hostapd_wpa_psk *psk; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 23 unsigned char psk[32]; local 61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); 65 printf("\t#psk=\"%s\"\n", passphrase); 68 printf("%02x", psk[i]);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 23 unsigned char psk[32]; local 61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); 65 printf("\t#psk=\"%s\"\n", passphrase); 68 printf("%02x", psk[i]);
|
ibss_rsn.h | 38 u8 psk[PMK_LEN]; member in struct:ibss_rsn 48 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_passphrase.sgml | 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 23 <para><command>wpa_passphrase</command> pre-computes PSK entries for 26 and SSID are used to generate a 256-bit PSK.</para>
|