HomeSort by relevance Sort by last modified time
    Searched defs:psk (Results 1 - 25 of 28) sorted by null

1 2

  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
17 unsigned char psk[32]; local
55 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); local
59 printf("\t#psk=\"%s\"\n", passphrase);
62 printf("%02x", psk[i]);
ibss_rsn.h 32 u8 psk[PMK_LEN]; member in struct:ibss_rsn
42 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
config_ssid.h 126 * psk - WPA pre-shared key (256 bits)
128 u8 psk[32]; member in struct:wpa_ssid
131 * psk_set - Whether PSK field is configured
138 * If this is set, psk will be generated using the SSID and passphrase
145 * ext_psk - PSK/passphrase name in external storage
147 * If this is set, PSK/passphrase will be fetched from external storage
309 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
wpa_supplicant.c 147 wpa_msg(wpa_s, MSG_INFO, "WPA: No PSK configured for "
154 os_memcpy(key, ssid->psk, 16);
159 os_memcpy(key, ssid->psk, 16);
165 os_memcpy(key, ssid->psk, 16 + 8);
166 os_memcpy(key + 16 + 8, ssid->psk + 16, 8);
1049 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT FT/PSK");
1067 "WPA: using KEY_MGMT PSK with SHA256");
1074 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT WPA-PSK");
1120 u8 psk[PMK_LEN]; local
1133 u8 psk[PMK_LEN]; local
    [all...]
p2p_supplicant.c 545 os_memcpy(s->psk, ssid->psk, 32);
712 char psk[65]; local
713 wpa_snprintf_hex(psk, sizeof(psk), ssid->psk, 32);
715 "%s GO ssid=\"%s\" freq=%d psk=%s go_dev_addr=" MACSTR
717 wpa_s->ifname, ssid_txt, ssid->frequency, psk,
861 char psk[65]; local
862 wpa_snprintf_hex(psk, sizeof(psk), params->psk
5035 char psk[65]; local
    [all...]
  /system/netd/
SoftapController.cpp 119 ALOGE("Softap set is missing arguments. Please use: softap <wlan iface> <SSID> <wpa2?-psk|open> <passphrase>");
132 if (!strcmp(argv[4], "wpa-psk")) {
135 } else if (!strcmp(argv[4], "wpa2-psk")) {
215 unsigned char psk[SHA256_DIGEST_LENGTH]; local
220 4096, SHA256_DIGEST_LENGTH, psk);
222 sprintf(&psk_str[j*2], "%02x", psk[j]);
  /external/wpa_supplicant_8/wpa_supplicant/tests/
test_wpa.c 27 u8 psk[PMK_LEN]; member in struct:wpa
198 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN);
264 return wpa->psk;
343 os_memset(wpa.psk, 0x44, PMK_LEN);
  /frameworks/av/media/libstagefright/codecs/amrnb/enc/src/
s10_8pf.cpp 192 Word16 psk, ps, ps0, ps1, ps2, sq, sq2;
217 psk = -1;
494 s = L_msu (L_mult (alpk, sq), psk, alp);
498 psk = sq;
571 Word16 psk; local
608 psk = -1;
963 if (((Word32) alpk * sq) > ((Word32) psk * alp))
965 psk = sq;
c2_11pf.cpp 418 Word16 psk; local
435 psk = -1;
521 /* s = L_msu(s, psk, alp, pOverflow); */
522 s -= (((Word32) psk * alp) << 1);
526 psk = sq;
c2_9pf.cpp 482 Word16 psk, ps0, ps1, sq, sq1;
487 psk = -1;
550 s = L_msu(L_mult(alpk, sq), psk, alp);
553 psk = sq;
600 Word16 psk; local
617 psk = -1;
711 /* s = L_msu(L_temp, psk, alp, pOverflow); */
712 s = L_temp - (((Word32) psk * alp) << 1);
716 psk = sq;
    [all...]
c3_14pf.cpp 394 Word16 psk; local
409 psk = -1;
567 s = L_msu(s, psk, alp, pOverflow);
568 //s -= (((Word32) psk * alp) << 1);
572 psk = sq;
c4_17pf.cpp 407 Word16 psk; local
425 psk = -1;
632 /* s = L_msu(s, psk, alp, pOverflow); */
633 s -= (((Word32) psk * alp) << 1);
637 psk = sq;
  /external/ipsec-tools/src/racoon/
privsep.c 468 vchar_t *psk; local
486 if ((psk = getpsk(bufs[0], keylen)) == NULL) {
491 reply->bufs.buflen[0] = psk->l;
492 reply->hdr.ac_len = sizeof(*reply) + psk->l;
501 memcpy(reply + 1, psk->v, psk->l);
502 vfree(psk);
894 vchar_t *psk; local
932 if ((psk = vmalloc(len - sizeof(*msg))) == NULL)
935 memcpy(psk->v, msg + 1, psk->l)
    [all...]
  /external/wpa_supplicant_8/src/ap/
ap_config.c 190 struct hostapd_wpa_psk *psk; local
197 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname);
224 psk = os_zalloc(sizeof(*psk));
225 if (psk == NULL) {
226 wpa_printf(MSG_ERROR, "WPA PSK allocation failed");
231 psk->group = 1;
233 os_memcpy(psk->addr, addr, ETH_ALEN);
237 wpa_printf(MSG_ERROR, "No PSK on line %d in '%s'",
239 os_free(psk);
390 struct hostapd_wpa_psk *psk, *prev; local
616 struct hostapd_wpa_psk *psk; local
    [all...]
ieee802_11_auth.c 39 struct hostapd_sta_wpa_psk_short *psk; member in struct:hostapd_cached_radius_acl
60 hostapd_free_psk_list(e->psk);
77 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk,
83 /* Copy PSK linked list */
84 copy_to = psk;
103 struct hostapd_sta_wpa_psk_short **psk,
125 copy_psk_list(psk, entry->psk);
223 * @psk: Linked list buffer for returning WPA PSK
426 struct hostapd_sta_wpa_psk_short *psk; local
    [all...]
wpa_auth_glue.c 188 const u8 *psk; local
198 psk = hostapd_get_psk(hapd->conf, addr, prev_psk);
201 * returned psk which should not be returned again.
202 * logic list (all hostapd_get_psk; all sta->psk)
204 if (sta && sta->psk && !psk) {
206 psk = sta->psk->psk;
207 for (pos = sta->psk; pos; pos = pos->next)
    [all...]
ieee802_11.c 548 struct hostapd_sta_wpa_psk_short *psk = NULL; local
618 &psk, &identity, &radius_cui);
657 hostapd_free_psk_list(sta->psk);
659 sta->psk = psk;
660 psk = NULL;
662 sta->psk = NULL;
738 hostapd_free_psk_list(psk);
    [all...]
sta_info.h 99 struct hostapd_sta_wpa_psk_short *psk; member in struct:sta_info
wpa_auth.c 1669 const u8 *psk; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 2 * hostapd / EAP-PSK (RFC 4764) server
8 * Note: EAP-PSK is an EAP authentication method and as such, completely
9 * different from WPA-PSK. This file is not needed for WPA-PSK functionality.
60 struct eap_psk_hdr_1 *psk; local
62 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
65 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data");
69 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)",
73 sizeof(*psk) + data->id_s_len
95 struct eap_psk_hdr_3 *psk; local
    [all...]
  /frameworks/av/media/libstagefright/codecs/amrwbenc/src/
c2t64fx.c 57 Word16 ps, psk, ps1, ps2, alpk, alp1, alp2, sq; local
227 psk = -1;
242 s = vo_L_mult(alpk, sq) - ((psk * alp2)<<1);
245 psk = sq;
c4t64fx.c 137 Word16 psk, ps, alpk, alp, val, k_cn, k_dn, exp; local
545 psk = -1;
693 s = vo_L_msu(vo_L_mult(alpk, ps), psk, alp);
696 psk = ps;
  /external/wpa_supplicant_8/src/eap_peer/
eap_gpsk.c 34 u8 *psk; member in struct:eap_gpsk_data
106 data->psk = os_malloc(password_len);
107 if (data->psk == NULL) {
111 os_memcpy(data->psk, password, password_len);
123 os_free(data->psk);
343 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
357 if (eap_gpsk_derive_session_id(data->psk, data->psk_len,
  /external/wpa_supplicant_8/src/p2p/
p2p.h 95 * psk - WPA pre-shared key (256 bits) (GO only)
97 u8 psk[32]; member in struct:p2p_go_neg_results
100 * psk_set - Whether PSK field is configured (GO only)
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps.h 156 * use_psk_key - Use PSK format key in Credential
158 * Force PSK format to be used instead of ASCII passphrase when
159 * building Credential for an Enrollee. The PSK value is set in
160 * struct wpa_context::psk.
246 * new_psk_cb - Callback for new PSK
249 * @psk: The new PSK
250 * @psk_len: The length of psk in octets
253 * This callback is called when a new per-device PSK is provisioned.
255 int (*new_psk_cb)(void *ctx, const u8 *mac_addr, const u8 *psk,
670 u8 psk[32]; member in struct:wps_context
    [all...]

Completed in 329 milliseconds

1 2