/external/wpa_supplicant_6/wpa_supplicant/examples/ |
wpa-psk-tkip.conf | 1 # WPA-PSK/TKIP 6 ssid="example wpa-psk network" 7 key_mgmt=WPA-PSK 11 psk="secret passphrase"
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpa-psk-tkip.conf | 1 # WPA-PSK/TKIP 6 ssid="example wpa-psk network" 7 key_mgmt=WPA-PSK 11 psk="secret passphrase"
|
/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 23 unsigned char psk[32]; local 61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); 65 printf("\t#psk=\"%s\"\n", passphrase); 68 printf("%02x", psk[i]);
|
wpa_supplicant.conf.orig | 249 # both), and psk must also be set. 264 # WPA-PSK = WPA pre-shared key (this requires 'psk' field) 269 # WPA-PSK-SHA256 = Like WPA-PSK but using stronger SHA256-based algorithms 271 # If not set, this defaults to: WPA-PSK WPA-EAP 294 # psk: WPA preshared key; 256-bit pre-shared key 295 # The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e., 296 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be 302 # startup and reconfiguration time can be optimized by generating the PSK onl [all...] |
config_ssid.h | 121 * psk - WPA pre-shared key (256 bits) 123 u8 psk[32]; member in struct:wpa_ssid 126 * psk_set - Whether PSK field is configured 133 * If this is set, psk will be generated using the SSID and passphrase 278 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 17 unsigned char psk[32]; local 55 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); 59 printf("\t#psk=\"%s\"\n", passphrase); 62 printf("%02x", psk[i]);
|
ibss_rsn.h | 32 u8 psk[PMK_LEN]; member in struct:ibss_rsn 42 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
|
wpa_supplicant.conf | 309 # both), and psk must also be set. 335 # WPA-PSK = WPA pre-shared key (this requires 'psk' field) 340 # WPA-PSK-SHA256 = Like WPA-PSK but using stronger SHA256-based algorithms 342 # If not set, this defaults to: WPA-PSK WPA-EAP 365 # psk: WPA preshared key; 256-bit pre-shared key 366 # The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e., 367 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will be 373 # startup and reconfiguration time can be optimized by generating the PSK onl [all...] |
config_ssid.h | 124 * psk - WPA pre-shared key (256 bits) 126 u8 psk[32]; member in struct:wpa_ssid 129 * psk_set - Whether PSK field is configured 136 * If this is set, psk will be generated using the SSID and passphrase 288 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_psk_common.c | 2 * EAP server/peer: EAP-PSK shared routines 25 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) 28 if (aes_128_encrypt_block(psk, ak, ak)) 33 if (aes_128_encrypt_block(psk, ak, ak) || 34 aes_128_encrypt_block(psk, kdk, kdk))
|
eap_gpsk_common.c | 47 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, 69 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) 82 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, 104 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); 118 const u8 *psk, size_t psk_len, 155 os_memcpy(pos, psk, psk_len); 165 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 197 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, 211 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString [all...] |
eap_gpsk_common.h | 55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
|
eap_psk_common.h | 2 * EAP server/peer: EAP-PSK shared routines 38 /* EAP-PSK First Message (AS -> Supplicant) */ 45 /* EAP-PSK Second Message (Supplicant -> AS) */ 54 /* EAP-PSK Third Message (AS -> Supplicant) */ 62 /* EAP-PSK Fourth Message (Supplicant -> AS) */ 74 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.h | 22 u8 *psk, int *has_psk);
|
ap_config.c | 183 struct hostapd_wpa_psk *psk; local 190 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname); 217 psk = os_zalloc(sizeof(*psk)); 218 if (psk == NULL) { 219 wpa_printf(MSG_ERROR, "WPA PSK allocation failed"); 224 psk->group = 1; 226 os_memcpy(psk->addr, addr, ETH_ALEN); 230 wpa_printf(MSG_ERROR, "No PSK on line %d in '%s'", 232 os_free(psk); 359 struct hostapd_wpa_psk *psk, *prev; local 565 struct hostapd_wpa_psk *psk; local [all...] |
ieee802_11_auth.c | 39 u8 psk[PMK_LEN]; member in struct:hostapd_cached_radius_acl 69 u8 *psk, int *has_psk) 90 if (psk) 91 os_memcpy(psk, entry->psk, PMK_LEN); 215 * @psk: Buffer for returning WPA PSK 216 * @has_psk: Buffer for indicating whether psk was filled 222 u8 *psk, int *has_psk) 232 if (psk) [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_psk_common.c | 2 * EAP server/peer: EAP-PSK shared routines 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) 22 if (aes_128_encrypt_block(psk, ak, ak)) 27 if (aes_128_encrypt_block(psk, ak, ak) || 28 aes_128_encrypt_block(psk, kdk, kdk))
|
eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, 95 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); 109 const u8 *psk, size_t psk_len, 146 os_memcpy(pos, psk, psk_len); 156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 188 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, 202 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString [all...] |
eap_gpsk_common.h | 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
|
eap_psk_common.h | 2 * EAP server/peer: EAP-PSK shared routines 32 /* EAP-PSK First Message (AS -> Supplicant) */ 39 /* EAP-PSK Second Message (Supplicant -> AS) */ 48 /* EAP-PSK Third Message (AS -> Supplicant) */ 56 /* EAP-PSK Fourth Message (Supplicant -> AS) */ 68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
|
/system/netd/ |
SoftapController.h | 47 void generatePsk(char *ssid, char *passphrase, char *psk);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_psk.c | 2 * hostapd / EAP-PSK (RFC 4764) server 14 * Note: EAP-PSK is an EAP authentication method and as such, completely 15 * different from WPA-PSK. This file is not needed for WPA-PSK functionality. 65 struct eap_psk_hdr_1 *psk; local 67 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)"); 70 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data"); 74 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", 78 sizeof(*psk) + data->id_s_len 100 struct eap_psk_hdr_3 *psk; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 2 * hostapd / EAP-PSK (RFC 4764) server 8 * Note: EAP-PSK is an EAP authentication method and as such, completely 9 * different from WPA-PSK. This file is not needed for WPA-PSK functionality. 60 struct eap_psk_hdr_1 *psk; local 62 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)"); 65 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data"); 69 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", 73 sizeof(*psk) + data->id_s_len 95 struct eap_psk_hdr_3 *psk; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_ps3.c | 32 if (!params->psk && !params->passphrase) { 33 wpa_printf(MSG_INFO, "%s:no PSK error", __func__); 38 if (params->psk) { 47 "%02x", params->psk[i]);
|
/frameworks/av/media/libstagefright/codecs/amrnb/enc/src/ |
c2_11pf.cpp | 418 Word16 psk; local 435 psk = -1; 521 /* s = L_msu(s, psk, alp, pOverflow); */ 522 s -= (((Word32) psk * alp) << 1); 526 psk = sq;
|