HomeSort by relevance Sort by last modified time
    Searched full:psk (Results 1 - 25 of 251) sorted by null

1 2 3 4 5 6 7 8 91011

  /external/wpa_supplicant/examples/
wpa-psk-tkip.conf 1 # WPA-PSK/TKIP
6 ssid="example wpa-psk network"
7 key_mgmt=WPA-PSK
11 psk="secret passphrase"
  /external/wpa_supplicant_6/wpa_supplicant/examples/
wpa-psk-tkip.conf 1 # WPA-PSK/TKIP
6 ssid="example wpa-psk network"
7 key_mgmt=WPA-PSK
11 psk="secret passphrase"
  /external/wpa_supplicant_8/wpa_supplicant/examples/
wpa-psk-tkip.conf 1 # WPA-PSK/TKIP
6 ssid="example wpa-psk network"
7 key_mgmt=WPA-PSK
11 psk="secret passphrase"
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_psk.c 2 * hostapd / EAP-PSK (RFC 4764) server
14 * Note: EAP-PSK is an EAP authentication method and as such, completely
15 * different from WPA-PSK. This file is not needed for WPA-PSK functionality.
65 struct eap_psk_hdr_1 *psk; local
67 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
70 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data");
74 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)",
78 sizeof(*psk) + data->id_s_len
100 struct eap_psk_hdr_3 *psk; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 2 * hostapd / EAP-PSK (RFC 4764) server
14 * Note: EAP-PSK is an EAP authentication method and as such, completely
15 * different from WPA-PSK. This file is not needed for WPA-PSK functionality.
66 struct eap_psk_hdr_1 *psk; local
68 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
71 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data");
75 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)",
79 sizeof(*psk) + data->id_s_len
101 struct eap_psk_hdr_3 *psk; local
    [all...]
  /external/wpa_supplicant_8/hostapd/
hostapd.wpa_psk 2 # with #, must contain a MAC address and PSK separated with a space.
4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
5 # characters or as a 256-bit hex PSK (64 hex digits).
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_psk_common.h 2 * EAP server/peer: EAP-PSK shared routines
38 /* EAP-PSK First Message (AS -> Supplicant) */
45 /* EAP-PSK Second Message (Supplicant -> AS) */
54 /* EAP-PSK Third Message (AS -> Supplicant) */
62 /* EAP-PSK Fourth Message (Supplicant -> AS) */
74 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
eap_psk_common.c 2 * EAP server/peer: EAP-PSK shared routines
25 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk)
28 if (aes_128_encrypt_block(psk, ak, ak))
33 if (aes_128_encrypt_block(psk, ak, ak) ||
34 aes_128_encrypt_block(psk, kdk, kdk))
eap_gpsk_common.c 47 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */,
69 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash))
82 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */,
104 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash);
118 const u8 *psk, size_t psk_len,
155 os_memcpy(pos, psk, psk_len);
165 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
197 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len,
211 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_psk_common.h 2 * EAP server/peer: EAP-PSK shared routines
38 /* EAP-PSK First Message (AS -> Supplicant) */
45 /* EAP-PSK Second Message (Supplicant -> AS) */
54 /* EAP-PSK Third Message (AS -> Supplicant) */
62 /* EAP-PSK Fourth Message (Supplicant -> AS) */
74 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
eap_psk_common.c 2 * EAP server/peer: EAP-PSK shared routines
25 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk)
28 if (aes_128_encrypt_block(psk, ak, ak))
33 if (aes_128_encrypt_block(psk, ak, ak) ||
34 aes_128_encrypt_block(psk, kdk, kdk))
eap_gpsk_common.c 44 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */,
66 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash))
79 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */,
101 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash);
115 const u8 *psk, size_t psk_len,
152 os_memcpy(pos, psk, psk_len);
162 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
194 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len,
208 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString
    [all...]
  /external/wpa_supplicant/
eap_psk.c 2 * EAP peer method: EAP-PSK (RFC 4764)
14 * Note: EAP-PSK is an EAP authentication method and as such, completely
15 * different from WPA-PSK. This file is not needed for WPA-PSK functionality.
45 wpa_printf(MSG_INFO, "EAP-PSK: pre-shared key not configured");
53 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
54 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);
64 wpa_printf(MSG_INFO, "EAP-PSK: could not get own identity");
92 wpa_printf(MSG_DEBUG, "EAP-PSK: in INIT state");
98 wpa_printf(MSG_INFO, "EAP-PSK: Invalid first message
    [all...]
eap_psk_common.h 2 * EAP server/peer: EAP-PSK shared routines
38 /* Shared prefix for all EAP-PSK frames */
47 /* EAP-PSK First Message (AS -> Supplicant) */
58 /* EAP-PSK Second Message (Supplicant -> AS) */
71 /* EAP-PSK Third Message (AS -> Supplicant) */
83 /* EAP-PSK Fourth Message (Supplicant -> AS) */
99 void eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
eap_psk_common.c 2 * EAP server/peer: EAP-PSK shared routines
25 void eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk)
28 aes_128_encrypt_block(psk, ak, ak);
32 aes_128_encrypt_block(psk, ak, ak);
33 aes_128_encrypt_block(psk, kdk, kdk);
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
23 unsigned char psk[32]; local
61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32);
65 printf("\t#psk=\"%s\"\n", passphrase);
68 printf("%02x", psk[i]);
eap_gpsk_common.c 47 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */,
69 omac1_aes_128_vector(psk, 2, addr, vlen, hash);
81 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */,
103 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash);
117 const u8 *psk, size_t psk_len,
125 int (*gkdf)(const u8 *psk, const u8 *data, size_t data_len,
154 os_memcpy(pos, psk, psk_len);
164 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
196 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len,
210 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_psk.c 2 * EAP peer method: EAP-PSK (RFC 4764)
14 * Note: EAP-PSK is an EAP authentication method and as such, completely
15 * different from WPA-PSK. This file is not needed for WPA-PSK functionality.
45 wpa_printf(MSG_INFO, "EAP-PSK: 16-octet pre-shared key not "
57 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
58 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);
69 wpa_printf(MSG_INFO, "EAP-PSK: could not get own identity");
98 wpa_printf(MSG_DEBUG, "EAP-PSK: in INIT state");
103 wpa_printf(MSG_INFO, "EAP-PSK: Invalid first message
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 2 * EAP peer method: EAP-PSK (RFC 4764)
14 * Note: EAP-PSK is an EAP authentication method and as such, completely
15 * different from WPA-PSK. This file is not needed for WPA-PSK functionality.
46 wpa_printf(MSG_INFO, "EAP-PSK: 16-octet pre-shared key not "
58 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
59 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);
70 wpa_printf(MSG_INFO, "EAP-PSK: could not get own identity");
99 wpa_printf(MSG_DEBUG, "EAP-PSK: in INIT state");
104 wpa_printf(MSG_INFO, "EAP-PSK: Invalid first message
    [all...]
  /frameworks/base/core/tests/ConnectivityManagerTest/assets/
accesspoints.xml 13 <security>PSK</security>
18 <security>PSK</security>
  /external/wpa_supplicant_8/src/ap/
ap_config.c 189 struct hostapd_wpa_psk *psk; local
196 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname);
223 psk = os_zalloc(sizeof(*psk));
224 if (psk == NULL) {
225 wpa_printf(MSG_ERROR, "WPA PSK allocation failed");
230 psk->group = 1;
232 os_memcpy(psk->addr, addr, ETH_ALEN);
236 wpa_printf(MSG_ERROR, "No PSK on line %d in '%s'",
238 os_free(psk);
365 struct hostapd_wpa_psk *psk, *prev; local
560 struct hostapd_wpa_psk *psk; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
23 unsigned char psk[32]; local
61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32);
65 printf("\t#psk=\"%s\"\n", passphrase);
68 printf("%02x", psk[i]);
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
23 unsigned char psk[32]; local
61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32);
65 printf("\t#psk=\"%s\"\n", passphrase);
68 printf("%02x", psk[i]);
ibss_rsn.h 38 u8 psk[PMK_LEN]; member in struct:ibss_rsn
48 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_passphrase.sgml 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
23 <para><command>wpa_passphrase</command> pre-computes PSK entries for
26 and SSID are used to generate a 256-bit PSK.</para>

Completed in 527 milliseconds

1 2 3 4 5 6 7 8 91011