/external/chromium_org/third_party/openssl/openssl/ssl/ |
ssl_lib.c | 126 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites [all...] |
/external/openssl/ssl/ |
ssl_lib.c | 126 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_wext.c | [all...] |
driver.h | 522 * passphrase - RSN passphrase for PSK 524 * This value is made available only for WPA/WPA2-Personal (PSK) and 527 * this can be %NULL if passphrase was not used to generate the PSK. In 528 * that case, the psk field must be used to fetch the PSK. 533 * psk - RSN PSK (alternative for passphrase for PSK) 535 * This value is made available only for WPA/WPA2-Personal (PSK) and 537 * the 32-octet (256-bit) PSK, if available. The driver wrapper shoul 540 const u8 *psk; member in struct:wpa_driver_associate_params [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p.h | 91 * psk - WPA pre-shared key (256 bits) (GO only) 93 u8 psk[32]; member in struct:p2p_go_neg_results 96 * psk_set - Whether PSK field is configured (GO only) [all...] |
/external/chromium_org/third_party/openssl/openssl/apps/ |
s_client.c | 119 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 222 /* Default PSK identity and key */ 224 /*char *psk_key=NULL; by default PSK is not used */ 227 unsigned int max_identity_len, unsigned char *psk, 240 BIO_printf(bio_c_out,"NULL received PSK identity hint, continuing anyway\n"); 243 BIO_printf(bio_c_out, "Received PSK identity hint '%s'\n", hint); 245 /* lookup PSK identity and PSK key based on the given identity hint here */ 254 BIO_printf(bio_err,"Could not convert PSK key '%s' to BIGNUM\n", psk_key); 262 BIO_printf(bio_err,"psk buffer of callback is too small (%d) for key (%d)\n" [all...] |
s_server.c | 124 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 314 char *psk_key=NULL; /* by default PSK is not used */ 317 unsigned char *psk, unsigned int max_psk_len) 327 BIO_printf(bio_err,"Error: client did not send PSK identity\n"); 337 BIO_printf(bio_s_out, "PSK error: client identity not found" 343 BIO_printf(bio_s_out, "PSK client identity found\n"); 345 /* convert the PSK key to binary */ 349 BIO_printf(bio_err,"Could not convert PSK key '%s' to BIGNUM\n", psk_key); 356 BIO_printf(bio_err,"psk buffer of callback is too small (%d) for key (%d)\n", 362 ret = BN_bn2bin(bn, psk); [all...] |
/external/openssl/apps/ |
s_client.c | 119 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 222 /* Default PSK identity and key */ 224 /*char *psk_key=NULL; by default PSK is not used */ 227 unsigned int max_identity_len, unsigned char *psk, 240 BIO_printf(bio_c_out,"NULL received PSK identity hint, continuing anyway\n"); 243 BIO_printf(bio_c_out, "Received PSK identity hint '%s'\n", hint); 245 /* lookup PSK identity and PSK key based on the given identity hint here */ 254 BIO_printf(bio_err,"Could not convert PSK key '%s' to BIGNUM\n", psk_key); 262 BIO_printf(bio_err,"psk buffer of callback is too small (%d) for key (%d)\n" [all...] |
s_server.c | 124 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 314 char *psk_key=NULL; /* by default PSK is not used */ 317 unsigned char *psk, unsigned int max_psk_len) 327 BIO_printf(bio_err,"Error: client did not send PSK identity\n"); 337 BIO_printf(bio_s_out, "PSK error: client identity not found" 343 BIO_printf(bio_s_out, "PSK client identity found\n"); 345 /* convert the PSK key to binary */ 349 BIO_printf(bio_err,"Could not convert PSK key '%s' to BIGNUM\n", psk_key); 356 BIO_printf(bio_err,"psk buffer of callback is too small (%d) for key (%d)\n", 362 ret = BN_bn2bin(bn, psk); [all...] |
/external/chromium/chrome/browser/chromeos/cros/ |
network_library.h | [all...] |
network_library.cc | 226 const char* kSecurityPsk = "psk"; 233 const char* kL2TPIPSecPSKProperty = "L2TPIPsec.PSK"; [all...] |
/external/wpa_supplicant_8/src/ap/ |
sta_info.c | 264 hostapd_free_psk_list(sta->psk);
|
/external/wpa_supplicant_8/src/wps/ |
wps_registrar.c | 146 const u8 *psk, size_t psk_len); 1172 const u8 *p2p_dev_addr, const u8 *psk, size_t psk_len) 1177 return reg->new_psk_cb(reg->cb_ctx, mac_addr, p2p_dev_addr, psk, [all...] |
/external/chromium_org/chrome/browser/automation/ |
testing_automation_provider_chromeos.cc | [all...] |
/external/chromium_org/chrome/browser/chromeos/cros/ |
network_library.h | 629 // Returns true if a PSK passphrase is required to connect. 1479 std::string psk; member in struct:chromeos::NetworkLibrary::VPNConfigData [all...] |
network_library_impl_base.cc | 758 // 1. Connect to a virtual network with a PSK. 767 connect_data_.psk_key = config.psk; [all...] |
/external/wpa_supplicant_8/hostapd/ |
ctrl_iface.c | 746 hapd->conf->ssid.wpa_psk->psk, PMK_LEN); 747 ret = os_snprintf(pos, end - pos, "psk=%s\n", hex); 761 ret = os_snprintf(pos, end - pos, "WPA-PSK "); 774 ret = os_snprintf(pos, end - pos, "FT-PSK "); 788 ret = os_snprintf(pos, end - pos, "WPA-PSK-SHA256 "); [all...] |
config_file.c | 613 if (os_strcmp(start, "WPA-PSK") == 0) 618 else if (os_strcmp(start, "FT-PSK") == 0) 624 else if (os_strcmp(start, "WPA-PSK-SHA256") == 0) 1127 wpa_printf(MSG_ERROR, "WPA-PSK using RADIUS enabled, but no " 1137 wpa_printf(MSG_ERROR, "WPA-PSK enabled, but PSK or passphrase " [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers_p2p.c | [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
events.c | [all...] |