/external/wpa_supplicant_8/wpa_supplicant/tests/ |
test_wpa.c | 23 u8 psk[PMK_LEN]; member in struct:wpa 194 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN); 260 return wpa->psk; 339 os_memset(wpa.psk, 0x44, PMK_LEN);
|
/frameworks/av/media/libstagefright/codecs/amrnb/enc/src/ |
c3_14pf.cpp | 394 Word16 psk; local 409 psk = -1; 567 s = L_msu(s, psk, alp, pOverflow); 568 //s -= (((Word32) psk * alp) << 1); 572 psk = sq;
|
c4_17pf.cpp | 407 Word16 psk; local 425 psk = -1; 632 /* s = L_msu(s, psk, alp, pOverflow); */ 633 s -= (((Word32) psk * alp) << 1); 637 psk = sq;
|
s10_8pf.cpp | 192 Word16 psk, ps, ps0, ps1, ps2, sq, sq2; 217 psk = -1; 494 s = L_msu (L_mult (alpk, sq), psk, alp); 498 psk = sq; 571 Word16 psk; local 608 psk = -1; 963 if (((Word32) alpk * sq) > ((Word32) psk * alp)) 965 psk = sq;
|
/external/ipsec-tools/src/racoon/ |
privsep.c | 468 vchar_t *psk; local 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { 491 reply->bufs.buflen[0] = psk->l; 492 reply->hdr.ac_len = sizeof(*reply) + psk->l; 501 memcpy(reply + 1, psk->v, psk->l); 502 vfree(psk); 894 vchar_t *psk; local 932 if ((psk = vmalloc(len - sizeof(*msg))) == NULL) 935 memcpy(psk->v, msg + 1, psk->l) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gpsk.c | 34 u8 *psk; member in struct:eap_gpsk_data 120 data->psk = os_malloc(password_len); 121 if (data->psk == NULL) { 125 os_memcpy(data->psk, password, password_len); 137 if (data->psk) { 138 os_memset(data->psk, 0, data->psk_len); 139 os_free(data->psk); 367 if (eap_gpsk_derive_keys(data->psk, data->psk_len, 381 if (eap_gpsk_derive_session_id(data->psk, data->psk_len,
|
/external/wpa_supplicant_8/src/wps/ |
wps_enrollee.c | 275 u8 psk[32]; local 276 /* Generate a random per-device PSK */ 278 random_get_bytes(psk, sizeof(psk)) < 0) { 280 "WPS: Could not generate random PSK"); 283 wpa_hexdump_key(MSG_DEBUG, "WPS: Generated per-device PSK", 284 psk, sizeof(psk)); 287 wpa_snprintf_hex(hex, sizeof(hex), psk, sizeof(psk)); [all...] |
wps_i.h | 216 const u8 *p2p_dev_addr, const u8 *psk, size_t psk_len);
|
wps.h | 154 * use_psk_key - Use PSK format key in Credential 156 * Force PSK format to be used instead of ASCII passphrase when 157 * building Credential for an Enrollee. The PSK value is set in 158 * struct wpa_context::psk. 249 * new_psk_cb - Callback for new PSK 253 * @psk: The new PSK 254 * @psk_len: The length of psk in octets 257 * This callback is called when a new per-device PSK is provisioned. 260 const u8 *psk, size_t psk_len) 708 u8 psk[32]; member in struct:wps_context [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
p2p_supplicant.c | 724 os_memcpy(s->psk, ssid->psk, 32); 821 const u8 *psk, const char *passphrase, 828 if (psk) 829 wpa_snprintf_hex(psk_txt, sizeof(psk_txt), psk, 32); 842 * Include PSK/passphrase only in the control interface message and 850 psk ? " psk=" : "", psk_txt, 934 ssid->psk_set ? ssid->psk : NULL, 1208 struct psk_list_entry *psk; local 6972 struct psk_list_entry *psk, *tmp; local 7107 struct hostapd_wpa_psk *psk, *prev, *rem; local [all...] |
ibss_rsn.c | 203 const u8 *psk) 233 wpa_sm_set_pmk(peer->supp, psk, PMK_LEN); 268 return ibss_rsn->psk; 540 ibss_rsn->psk) < 0) { 819 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk) 823 os_memcpy(ibss_rsn->psk, psk, PMK_LEN);
|
config_file.c | 132 wpa_printf(MSG_ERROR, "Line %d: both PSK and " 495 char *value = wpa_config_get(ssid, "psk"); 638 struct psk_list_entry *psk; local 641 dl_list_for_each(psk, &ssid->psk_list, struct psk_list_entry, list) { 642 wpa_snprintf_hex(hex, sizeof(hex), psk->psk, sizeof(psk->psk)); 644 psk->p2p ? "P2P-" : "", MAC2STR(psk->addr), hex) [all...] |
wpa_supplicant.c | 148 wpa_msg(wpa_s, MSG_INFO, "WPA: No PSK configured for " 155 os_memcpy(key, ssid->psk, 16); 160 os_memcpy(key, ssid->psk, 16); 166 os_memcpy(key, ssid->psk, 16 + 8); 167 os_memcpy(key + 16 + 8, ssid->psk + 16, 8); 1082 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT FT/PSK"); 1100 "WPA: using KEY_MGMT PSK with SHA256"); 1107 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT WPA-PSK"); 1170 u8 psk[PMK_LEN]; local 1183 u8 psk[PMK_LEN]; local [all...] |
config.c | 296 wpa_printf(MSG_DEBUG, "PSK: External password '%s'", 319 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)", 337 if (hexstr2bin(value, ssid->psk, PMK_LEN) || 339 wpa_printf(MSG_ERROR, "Line %d: Invalid PSK '%s'.", 348 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN); 374 return wpa_config_write_string_hex(ssid->psk, PMK_LEN); 502 if (os_strcmp(start, "WPA-PSK") == 0) 513 else if (os_strcmp(start, "FT-PSK") == 0) 519 else if (os_strcmp(start, "WPA-PSK-SHA256") == 0 1919 struct psk_list_entry *psk; local [all...] |
/external/openssl/android.testssl/ |
testssl | 165 echo test tls1 with PSK 166 $ssltest -tls1 -cipher PSK -psk abc123 $extra || exit 1 168 echo test tls1 with PSK via BIO pair 169 $ssltest -bio_pair -tls1 -cipher PSK -psk abc123 $extra || exit 1
|
/external/wpa_supplicant_8/src/ap/ |
sta_info.h | 100 struct hostapd_sta_wpa_psk_short *psk; member in struct:sta_info
|
ap_config.h | 103 u8 psk[PMK_LEN]; member in struct:hostapd_sta_wpa_psk_short 109 u8 psk[PMK_LEN]; member in struct:hostapd_wpa_psk
|
wps_hostapd.c | 96 const u8 *p2p_dev_addr, const u8 *psk, 105 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR, 109 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR 113 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); 116 wpa_printf(MSG_DEBUG, "Unexpected PSK length %lu", 121 /* Add the new PSK to runtime PSK list */ 127 os_memcpy(p->psk, psk, PMK_LEN) [all...] |
ieee802_11.c | 554 struct hostapd_sta_wpa_psk_short *psk = NULL; local 634 &psk, &identity, &radius_cui); 672 hostapd_free_psk_list(sta->psk); 674 sta->psk = psk; 675 psk = NULL; 677 sta->psk = NULL; 748 hostapd_free_psk_list(psk); [all...] |
/external/chromium_org/chrome/browser/signin/ |
easy_unlock_service.cc | 381 paired_devices.insert(device_key_data.psk); 618 devices_in_cryptohome.insert(device_key_data.psk);
|
/external/openssl/ssl/ |
ssltest.c | 124 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 243 static char *psk_key=NULL; /* by default PSK is not used */ 246 unsigned int max_identity_len, unsigned char *psk, 248 static unsigned int psk_server_callback(SSL *ssl, const char *identity, unsigned char *psk, 339 fprintf(stderr," -psk arg - PSK in hex (without 0x)\n"); 634 else if (strcmp(*argv,"-psk") == 0) 1040 /* Use PSK only if PSK key is given */ 1043 /* no_psk is used to avoid putting psk command to openssl tool * [all...] |
ssl.h | 124 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 279 #define SSL_TXT_PSK "PSK" 460 * PSK_identity_hint [ 7 ] EXPLICIT OCTET STRING, -- optional PSK identity hint 461 * PSK_identity [ 8 ] EXPLICIT OCTET STRING, -- optional PSK identity [all...] |
/frameworks/av/media/libstagefright/codecs/amrwbenc/src/ |
c4t64fx.c | 137 Word16 psk, ps, alpk, alp, val, k_cn, k_dn, exp; local 545 psk = -1; 693 s = vo_L_msu(vo_L_mult(alpk, ps), psk, alp); 696 psk = ps;
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
ssl.h | 124 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 214 #define SSL_TXT_PSK "PSK" 376 * PSK_identity_hint [ 7 ] EXPLICIT OCTET STRING, -- optional PSK identity hint 377 * PSK_identity [ 8 ] EXPLICIT OCTET STRING, -- optional PSK identity [all...] |
/external/openssl/include/openssl/ |
ssl.h | 124 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 279 #define SSL_TXT_PSK "PSK" 460 * PSK_identity_hint [ 7 ] EXPLICIT OCTET STRING, -- optional PSK identity hint 461 * PSK_identity [ 8 ] EXPLICIT OCTET STRING, -- optional PSK identity [all...] |