/external/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 23 unsigned char psk[32]; local 61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); 65 printf("\t#psk=\"%s\"\n", passphrase); 68 printf("%02x", psk[i]);
|
eap_gpsk.c | 40 u8 *psk; member in struct:eap_gpsk_data 113 data->psk = os_malloc(config->eappsk_len); 114 if (data->psk == NULL) { 118 os_memcpy(data->psk, config->eappsk, config->eappsk_len); 130 os_free(data->psk); 363 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
|
/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 23 unsigned char psk[32]; local 61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); 65 printf("\t#psk=\"%s\"\n", passphrase); 68 printf("%02x", psk[i]);
|
config_ssid.h | 121 * psk - WPA pre-shared key (256 bits) 123 u8 psk[32]; member in struct:wpa_ssid 126 * psk_set - Whether PSK field is configured 133 * If this is set, psk will be generated using the SSID and passphrase 278 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 23 unsigned char psk[32]; local 61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); 65 printf("\t#psk=\"%s\"\n", passphrase); 68 printf("%02x", psk[i]);
|
ibss_rsn.h | 38 u8 psk[PMK_LEN]; member in struct:ibss_rsn 48 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
|
config_ssid.h | 124 * psk - WPA pre-shared key (256 bits) 126 u8 psk[32]; member in struct:wpa_ssid 129 * psk_set - Whether PSK field is configured 136 * If this is set, psk will be generated using the SSID and passphrase 288 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
|
p2p_supplicant.c | 446 os_memcpy(s->psk, ssid->psk, 32); 542 char psk[65]; local 543 wpa_snprintf_hex(psk, sizeof(psk), ssid->psk, 32); 545 "%s GO ssid=\"%s\" freq=%d psk=%s go_dev_addr=" MACSTR 547 wpa_s->ifname, ssid_txt, ssid->frequency, psk, [all...] |
/system/netd/ |
SoftapController.cpp | 299 if (!strcmp(argv[5], "wpa-psk")) { 302 } else if (!strcmp(argv[5], "wpa2-psk")) { 397 unsigned char psk[SHA256_DIGEST_LENGTH]; local 402 4096, SHA256_DIGEST_LENGTH, psk); 404 sprintf(&psk_str[j<<1], "%02x", psk[j]);
|
/external/wpa_supplicant/tests/ |
test_sha1.c | 234 char psk[32]; member in struct:passphrase_test 314 u8 psk[32]; local 318 4096, psk, 32); 319 if (memcmp(psk, test->psk, 32) == 0)
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_sha1.c | 253 char psk[32]; member in struct:passphrase_test 333 u8 psk[32]; local 337 4096, psk, 32); 338 if (memcmp(psk, test->psk, 32) == 0)
|
test_wpa.c | 33 u8 psk[PMK_LEN]; member in struct:wpa 219 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN); 285 return wpa->psk; 364 os_memset(wpa.psk, 0x44, PMK_LEN);
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
test_wpa.c | 33 u8 psk[PMK_LEN]; member in struct:wpa 204 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN); 270 return wpa->psk; 349 os_memset(wpa.psk, 0x44, PMK_LEN);
|
/frameworks/base/media/libstagefright/codecs/amrnb/enc/src/ |
s10_8pf.cpp | 192 Word16 psk, ps, ps0, ps1, ps2, sq, sq2; 217 psk = -1; 494 s = L_msu (L_mult (alpk, sq), psk, alp); 498 psk = sq; 571 Word16 psk; local 608 psk = -1; 963 if (((Word32) alpk * sq) > ((Word32) psk * alp)) 965 psk = sq;
|
c2_11pf.cpp | 418 Word16 psk; local 435 psk = -1; 521 /* s = L_msu(s, psk, alp, pOverflow); */ 522 s -= (((Word32) psk * alp) << 1); 526 psk = sq;
|
c2_9pf.cpp | 482 Word16 psk, ps0, ps1, sq, sq1; 487 psk = -1; 550 s = L_msu(L_mult(alpk, sq), psk, alp); 553 psk = sq; 600 Word16 psk; local 617 psk = -1; 711 /* s = L_msu(L_temp, psk, alp, pOverflow); */ 712 s = L_temp - (((Word32) psk * alp) << 1); 716 psk = sq; [all...] |
c3_14pf.cpp | 394 Word16 psk; local 409 psk = -1; 567 s = L_msu(s, psk, alp, pOverflow); 568 //s -= (((Word32) psk * alp) << 1); 572 psk = sq;
|
c4_17pf.cpp | 407 Word16 psk; local 425 psk = -1; 632 /* s = L_msu(s, psk, alp, pOverflow); */ 633 s -= (((Word32) psk * alp) << 1); 637 psk = sq;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_psk.c | 2 * hostapd / EAP-PSK (RFC 4764) server 14 * Note: EAP-PSK is an EAP authentication method and as such, completely 15 * different from WPA-PSK. This file is not needed for WPA-PSK functionality. 65 struct eap_psk_hdr_1 *psk; local 67 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)"); 70 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data"); 74 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", 78 sizeof(*psk) + data->id_s_len 100 struct eap_psk_hdr_3 *psk; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
ap_config.c | 189 struct hostapd_wpa_psk *psk; local 196 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname); 223 psk = os_zalloc(sizeof(*psk)); 224 if (psk == NULL) { 225 wpa_printf(MSG_ERROR, "WPA PSK allocation failed"); 230 psk->group = 1; 232 os_memcpy(psk->addr, addr, ETH_ALEN); 236 wpa_printf(MSG_ERROR, "No PSK on line %d in '%s'", 238 os_free(psk); 365 struct hostapd_wpa_psk *psk, *prev; local 560 struct hostapd_wpa_psk *psk; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 2 * hostapd / EAP-PSK (RFC 4764) server 14 * Note: EAP-PSK is an EAP authentication method and as such, completely 15 * different from WPA-PSK. This file is not needed for WPA-PSK functionality. 66 struct eap_psk_hdr_1 *psk; local 68 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)"); 71 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data"); 75 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", 79 sizeof(*psk) + data->id_s_len 101 struct eap_psk_hdr_3 *psk; local [all...] |
/frameworks/base/media/libstagefright/codecs/amrwbenc/src/ |
c2t64fx.c | 57 Word16 ps, psk, ps1, ps2, alpk, alp1, alp2, sq; local 227 psk = -1; 242 s = vo_L_mult(alpk, sq) - ((psk * alp2)<<1); 245 psk = sq;
|
/external/ipsec-tools/src/racoon/ |
privsep.c | 504 vchar_t *psk; local 522 if ((psk = getpsk(bufs[0], keylen)) == NULL) { 527 reply->bufs.buflen[0] = psk->l; 528 reply->hdr.ac_len = sizeof(*reply) + psk->l; 537 memcpy(reply + 1, psk->v, psk->l); 538 vfree(psk); 1050 vchar_t *psk; local 1088 if ((psk = vmalloc(len - sizeof(*msg))) == NULL) 1091 memcpy(psk->v, msg + 1, psk->l) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gpsk.c | 39 u8 *psk; member in struct:eap_gpsk_data 111 data->psk = os_malloc(password_len); 112 if (data->psk == NULL) { 116 os_memcpy(data->psk, password, password_len); 128 os_free(data->psk); 348 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gpsk.c | 40 u8 *psk; member in struct:eap_gpsk_data 112 data->psk = os_malloc(password_len); 113 if (data->psk == NULL) { 117 os_memcpy(data->psk, password, password_len); 129 os_free(data->psk); 349 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
|