HomeSort by relevance Sort by last modified time
    Searched defs:psk (Results 1 - 25 of 33) sorted by null

1 2

  /external/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
23 unsigned char psk[32]; local
61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32);
65 printf("\t#psk=\"%s\"\n", passphrase);
68 printf("%02x", psk[i]);
eap_gpsk.c 40 u8 *psk; member in struct:eap_gpsk_data
113 data->psk = os_malloc(config->eappsk_len);
114 if (data->psk == NULL) {
118 os_memcpy(data->psk, config->eappsk, config->eappsk_len);
130 os_free(data->psk);
363 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
  /external/wpa_supplicant_6/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
23 unsigned char psk[32]; local
61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32);
65 printf("\t#psk=\"%s\"\n", passphrase);
68 printf("%02x", psk[i]);
config_ssid.h 121 * psk - WPA pre-shared key (256 bits)
123 u8 psk[32]; member in struct:wpa_ssid
126 * psk_set - Whether PSK field is configured
133 * If this is set, psk will be generated using the SSID and passphrase
278 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
23 unsigned char psk[32]; local
61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32);
65 printf("\t#psk=\"%s\"\n", passphrase);
68 printf("%02x", psk[i]);
ibss_rsn.h 38 u8 psk[PMK_LEN]; member in struct:ibss_rsn
48 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
config_ssid.h 124 * psk - WPA pre-shared key (256 bits)
126 u8 psk[32]; member in struct:wpa_ssid
129 * psk_set - Whether PSK field is configured
136 * If this is set, psk will be generated using the SSID and passphrase
288 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
p2p_supplicant.c 446 os_memcpy(s->psk, ssid->psk, 32);
542 char psk[65]; local
543 wpa_snprintf_hex(psk, sizeof(psk), ssid->psk, 32);
545 "%s GO ssid=\"%s\" freq=%d psk=%s go_dev_addr=" MACSTR
547 wpa_s->ifname, ssid_txt, ssid->frequency, psk,
    [all...]
  /system/netd/
SoftapController.cpp 299 if (!strcmp(argv[5], "wpa-psk")) {
302 } else if (!strcmp(argv[5], "wpa2-psk")) {
397 unsigned char psk[SHA256_DIGEST_LENGTH]; local
402 4096, SHA256_DIGEST_LENGTH, psk);
404 sprintf(&psk_str[j<<1], "%02x", psk[j]);
  /external/wpa_supplicant/tests/
test_sha1.c 234 char psk[32]; member in struct:passphrase_test
314 u8 psk[32]; local
318 4096, psk, 32);
319 if (memcmp(psk, test->psk, 32) == 0)
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_sha1.c 253 char psk[32]; member in struct:passphrase_test
333 u8 psk[32]; local
337 4096, psk, 32);
338 if (memcmp(psk, test->psk, 32) == 0)
test_wpa.c 33 u8 psk[PMK_LEN]; member in struct:wpa
219 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN);
285 return wpa->psk;
364 os_memset(wpa.psk, 0x44, PMK_LEN);
  /external/wpa_supplicant_8/wpa_supplicant/tests/
test_wpa.c 33 u8 psk[PMK_LEN]; member in struct:wpa
204 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN);
270 return wpa->psk;
349 os_memset(wpa.psk, 0x44, PMK_LEN);
  /frameworks/base/media/libstagefright/codecs/amrnb/enc/src/
s10_8pf.cpp 192 Word16 psk, ps, ps0, ps1, ps2, sq, sq2;
217 psk = -1;
494 s = L_msu (L_mult (alpk, sq), psk, alp);
498 psk = sq;
571 Word16 psk; local
608 psk = -1;
963 if (((Word32) alpk * sq) > ((Word32) psk * alp))
965 psk = sq;
c2_11pf.cpp 418 Word16 psk; local
435 psk = -1;
521 /* s = L_msu(s, psk, alp, pOverflow); */
522 s -= (((Word32) psk * alp) << 1);
526 psk = sq;
c2_9pf.cpp 482 Word16 psk, ps0, ps1, sq, sq1;
487 psk = -1;
550 s = L_msu(L_mult(alpk, sq), psk, alp);
553 psk = sq;
600 Word16 psk; local
617 psk = -1;
711 /* s = L_msu(L_temp, psk, alp, pOverflow); */
712 s = L_temp - (((Word32) psk * alp) << 1);
716 psk = sq;
    [all...]
c3_14pf.cpp 394 Word16 psk; local
409 psk = -1;
567 s = L_msu(s, psk, alp, pOverflow);
568 //s -= (((Word32) psk * alp) << 1);
572 psk = sq;
c4_17pf.cpp 407 Word16 psk; local
425 psk = -1;
632 /* s = L_msu(s, psk, alp, pOverflow); */
633 s -= (((Word32) psk * alp) << 1);
637 psk = sq;
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_psk.c 2 * hostapd / EAP-PSK (RFC 4764) server
14 * Note: EAP-PSK is an EAP authentication method and as such, completely
15 * different from WPA-PSK. This file is not needed for WPA-PSK functionality.
65 struct eap_psk_hdr_1 *psk; local
67 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
70 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data");
74 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)",
78 sizeof(*psk) + data->id_s_len
100 struct eap_psk_hdr_3 *psk; local
    [all...]
  /external/wpa_supplicant_8/src/ap/
ap_config.c 189 struct hostapd_wpa_psk *psk; local
196 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname);
223 psk = os_zalloc(sizeof(*psk));
224 if (psk == NULL) {
225 wpa_printf(MSG_ERROR, "WPA PSK allocation failed");
230 psk->group = 1;
232 os_memcpy(psk->addr, addr, ETH_ALEN);
236 wpa_printf(MSG_ERROR, "No PSK on line %d in '%s'",
238 os_free(psk);
365 struct hostapd_wpa_psk *psk, *prev; local
560 struct hostapd_wpa_psk *psk; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 2 * hostapd / EAP-PSK (RFC 4764) server
14 * Note: EAP-PSK is an EAP authentication method and as such, completely
15 * different from WPA-PSK. This file is not needed for WPA-PSK functionality.
66 struct eap_psk_hdr_1 *psk; local
68 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
71 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data");
75 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)",
79 sizeof(*psk) + data->id_s_len
101 struct eap_psk_hdr_3 *psk; local
    [all...]
  /frameworks/base/media/libstagefright/codecs/amrwbenc/src/
c2t64fx.c 57 Word16 ps, psk, ps1, ps2, alpk, alp1, alp2, sq; local
227 psk = -1;
242 s = vo_L_mult(alpk, sq) - ((psk * alp2)<<1);
245 psk = sq;
  /external/ipsec-tools/src/racoon/
privsep.c 504 vchar_t *psk; local
522 if ((psk = getpsk(bufs[0], keylen)) == NULL) {
527 reply->bufs.buflen[0] = psk->l;
528 reply->hdr.ac_len = sizeof(*reply) + psk->l;
537 memcpy(reply + 1, psk->v, psk->l);
538 vfree(psk);
1050 vchar_t *psk; local
1088 if ((psk = vmalloc(len - sizeof(*msg))) == NULL)
1091 memcpy(psk->v, msg + 1, psk->l)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_gpsk.c 39 u8 *psk; member in struct:eap_gpsk_data
111 data->psk = os_malloc(password_len);
112 if (data->psk == NULL) {
116 os_memcpy(data->psk, password, password_len);
128 os_free(data->psk);
348 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
  /external/wpa_supplicant_8/src/eap_peer/
eap_gpsk.c 40 u8 *psk; member in struct:eap_gpsk_data
112 data->psk = os_malloc(password_len);
113 if (data->psk == NULL) {
117 os_memcpy(data->psk, password, password_len);
129 os_free(data->psk);
349 if (eap_gpsk_derive_keys(data->psk, data->psk_len,

Completed in 1603 milliseconds

1 2