HomeSort by relevance Sort by last modified time
    Searched refs:psk (Results 1 - 25 of 77) sorted by null

1 2 3 4

  /external/wpa_supplicant_6/wpa_supplicant/examples/
wpa-psk-tkip.conf 1 # WPA-PSK/TKIP
6 ssid="example wpa-psk network"
7 key_mgmt=WPA-PSK
11 psk="secret passphrase"
  /external/wpa_supplicant_8/wpa_supplicant/examples/
wpa-psk-tkip.conf 1 # WPA-PSK/TKIP
6 ssid="example wpa-psk network"
7 key_mgmt=WPA-PSK
11 psk="secret passphrase"
  /external/wpa_supplicant_6/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
23 unsigned char psk[32]; local
61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32);
65 printf("\t#psk=\"%s\"\n", passphrase);
68 printf("%02x", psk[i]);
wpa_supplicant.conf.orig 249 # both), and psk must also be set.
264 # WPA-PSK = WPA pre-shared key (this requires 'psk' field)
269 # WPA-PSK-SHA256 = Like WPA-PSK but using stronger SHA256-based algorithms
271 # If not set, this defaults to: WPA-PSK WPA-EAP
294 # psk: WPA preshared key; 256-bit pre-shared key
295 # The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e.,
296 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be
302 # startup and reconfiguration time can be optimized by generating the PSK onl
    [all...]
config_ssid.h 121 * psk - WPA pre-shared key (256 bits)
123 u8 psk[32]; member in struct:wpa_ssid
126 * psk_set - Whether PSK field is configured
133 * If this is set, psk will be generated using the SSID and passphrase
278 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
17 unsigned char psk[32]; local
55 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32);
59 printf("\t#psk=\"%s\"\n", passphrase);
62 printf("%02x", psk[i]);
ibss_rsn.h 32 u8 psk[PMK_LEN]; member in struct:ibss_rsn
42 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
wpa_supplicant.conf 309 # both), and psk must also be set.
335 # WPA-PSK = WPA pre-shared key (this requires 'psk' field)
340 # WPA-PSK-SHA256 = Like WPA-PSK but using stronger SHA256-based algorithms
342 # If not set, this defaults to: WPA-PSK WPA-EAP
365 # psk: WPA preshared key; 256-bit pre-shared key
366 # The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e.,
367 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be
373 # startup and reconfiguration time can be optimized by generating the PSK onl
    [all...]
config_ssid.h 124 * psk - WPA pre-shared key (256 bits)
126 u8 psk[32]; member in struct:wpa_ssid
129 * psk_set - Whether PSK field is configured
136 * If this is set, psk will be generated using the SSID and passphrase
288 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_psk_common.c 2 * EAP server/peer: EAP-PSK shared routines
25 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk)
28 if (aes_128_encrypt_block(psk, ak, ak))
33 if (aes_128_encrypt_block(psk, ak, ak) ||
34 aes_128_encrypt_block(psk, kdk, kdk))
eap_gpsk_common.c 47 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */,
69 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash))
82 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */,
104 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash);
118 const u8 *psk, size_t psk_len,
155 os_memcpy(pos, psk, psk_len);
165 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
197 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len,
211 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString
    [all...]
eap_gpsk_common.h 55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
eap_psk_common.h 2 * EAP server/peer: EAP-PSK shared routines
38 /* EAP-PSK First Message (AS -> Supplicant) */
45 /* EAP-PSK Second Message (Supplicant -> AS) */
54 /* EAP-PSK Third Message (AS -> Supplicant) */
62 /* EAP-PSK Fourth Message (Supplicant -> AS) */
74 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
  /external/wpa_supplicant_8/src/ap/
ieee802_11_auth.h 22 u8 *psk, int *has_psk);
ap_config.c 183 struct hostapd_wpa_psk *psk; local
190 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname);
217 psk = os_zalloc(sizeof(*psk));
218 if (psk == NULL) {
219 wpa_printf(MSG_ERROR, "WPA PSK allocation failed");
224 psk->group = 1;
226 os_memcpy(psk->addr, addr, ETH_ALEN);
230 wpa_printf(MSG_ERROR, "No PSK on line %d in '%s'",
232 os_free(psk);
359 struct hostapd_wpa_psk *psk, *prev; local
565 struct hostapd_wpa_psk *psk; local
    [all...]
ieee802_11_auth.c 39 u8 psk[PMK_LEN]; member in struct:hostapd_cached_radius_acl
69 u8 *psk, int *has_psk)
90 if (psk)
91 os_memcpy(psk, entry->psk, PMK_LEN);
215 * @psk: Buffer for returning WPA PSK
216 * @has_psk: Buffer for indicating whether psk was filled
222 u8 *psk, int *has_psk)
232 if (psk)
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_psk_common.c 2 * EAP server/peer: EAP-PSK shared routines
19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk)
22 if (aes_128_encrypt_block(psk, ak, ak))
27 if (aes_128_encrypt_block(psk, ak, ak) ||
28 aes_128_encrypt_block(psk, kdk, kdk))
eap_gpsk_common.c 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */,
60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash))
73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */,
95 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash);
109 const u8 *psk, size_t psk_len,
146 os_memcpy(pos, psk, psk_len);
156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
188 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len,
202 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString
    [all...]
eap_gpsk_common.h 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
eap_psk_common.h 2 * EAP server/peer: EAP-PSK shared routines
32 /* EAP-PSK First Message (AS -> Supplicant) */
39 /* EAP-PSK Second Message (Supplicant -> AS) */
48 /* EAP-PSK Third Message (AS -> Supplicant) */
56 /* EAP-PSK Fourth Message (Supplicant -> AS) */
68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
  /system/netd/
SoftapController.h 47 void generatePsk(char *ssid, char *passphrase, char *psk);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_psk.c 2 * hostapd / EAP-PSK (RFC 4764) server
14 * Note: EAP-PSK is an EAP authentication method and as such, completely
15 * different from WPA-PSK. This file is not needed for WPA-PSK functionality.
65 struct eap_psk_hdr_1 *psk; local
67 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
70 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data");
74 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)",
78 sizeof(*psk) + data->id_s_len
100 struct eap_psk_hdr_3 *psk; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 2 * hostapd / EAP-PSK (RFC 4764) server
8 * Note: EAP-PSK is an EAP authentication method and as such, completely
9 * different from WPA-PSK. This file is not needed for WPA-PSK functionality.
60 struct eap_psk_hdr_1 *psk; local
62 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
65 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data");
69 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)",
73 sizeof(*psk) + data->id_s_len
95 struct eap_psk_hdr_3 *psk; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_ps3.c 32 if (!params->psk && !params->passphrase) {
33 wpa_printf(MSG_INFO, "%s:no PSK error", __func__);
38 if (params->psk) {
47 "%02x", params->psk[i]);
  /frameworks/av/media/libstagefright/codecs/amrnb/enc/src/
c2_11pf.cpp 418 Word16 psk; local
435 psk = -1;
521 /* s = L_msu(s, psk, alp, pOverflow); */
522 s -= (((Word32) psk * alp) << 1);
526 psk = sq;

Completed in 416 milliseconds

1 2 3 4