HomeSort by relevance Sort by last modified time
    Searched refs:psk (Results 26 - 50 of 76) sorted by null

12 3 4

  /external/wpa_supplicant_8/wpa_supplicant/tests/
test_wpa.c 23 u8 psk[PMK_LEN]; member in struct:wpa
194 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN);
260 return wpa->psk;
339 os_memset(wpa.psk, 0x44, PMK_LEN);
  /frameworks/av/media/libstagefright/codecs/amrnb/enc/src/
c3_14pf.cpp 394 Word16 psk; local
409 psk = -1;
567 s = L_msu(s, psk, alp, pOverflow);
568 //s -= (((Word32) psk * alp) << 1);
572 psk = sq;
c4_17pf.cpp 407 Word16 psk; local
425 psk = -1;
632 /* s = L_msu(s, psk, alp, pOverflow); */
633 s -= (((Word32) psk * alp) << 1);
637 psk = sq;
s10_8pf.cpp 192 Word16 psk, ps, ps0, ps1, ps2, sq, sq2;
217 psk = -1;
494 s = L_msu (L_mult (alpk, sq), psk, alp);
498 psk = sq;
571 Word16 psk; local
608 psk = -1;
963 if (((Word32) alpk * sq) > ((Word32) psk * alp))
965 psk = sq;
  /external/ipsec-tools/src/racoon/
privsep.c 468 vchar_t *psk; local
486 if ((psk = getpsk(bufs[0], keylen)) == NULL) {
491 reply->bufs.buflen[0] = psk->l;
492 reply->hdr.ac_len = sizeof(*reply) + psk->l;
501 memcpy(reply + 1, psk->v, psk->l);
502 vfree(psk);
894 vchar_t *psk; local
932 if ((psk = vmalloc(len - sizeof(*msg))) == NULL)
935 memcpy(psk->v, msg + 1, psk->l)
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_gpsk.c 34 u8 *psk; member in struct:eap_gpsk_data
120 data->psk = os_malloc(password_len);
121 if (data->psk == NULL) {
125 os_memcpy(data->psk, password, password_len);
137 if (data->psk) {
138 os_memset(data->psk, 0, data->psk_len);
139 os_free(data->psk);
367 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
381 if (eap_gpsk_derive_session_id(data->psk, data->psk_len,
  /external/wpa_supplicant_8/src/wps/
wps_enrollee.c 275 u8 psk[32]; local
276 /* Generate a random per-device PSK */
278 random_get_bytes(psk, sizeof(psk)) < 0) {
280 "WPS: Could not generate random PSK");
283 wpa_hexdump_key(MSG_DEBUG, "WPS: Generated per-device PSK",
284 psk, sizeof(psk));
287 wpa_snprintf_hex(hex, sizeof(hex), psk, sizeof(psk));
    [all...]
wps_i.h 216 const u8 *p2p_dev_addr, const u8 *psk, size_t psk_len);
wps.h 154 * use_psk_key - Use PSK format key in Credential
156 * Force PSK format to be used instead of ASCII passphrase when
157 * building Credential for an Enrollee. The PSK value is set in
158 * struct wpa_context::psk.
249 * new_psk_cb - Callback for new PSK
253 * @psk: The new PSK
254 * @psk_len: The length of psk in octets
257 * This callback is called when a new per-device PSK is provisioned.
260 const u8 *psk, size_t psk_len)
708 u8 psk[32]; member in struct:wps_context
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
p2p_supplicant.c 724 os_memcpy(s->psk, ssid->psk, 32);
821 const u8 *psk, const char *passphrase,
828 if (psk)
829 wpa_snprintf_hex(psk_txt, sizeof(psk_txt), psk, 32);
842 * Include PSK/passphrase only in the control interface message and
850 psk ? " psk=" : "", psk_txt,
934 ssid->psk_set ? ssid->psk : NULL,
1208 struct psk_list_entry *psk; local
6972 struct psk_list_entry *psk, *tmp; local
7107 struct hostapd_wpa_psk *psk, *prev, *rem; local
    [all...]
ibss_rsn.c 203 const u8 *psk)
233 wpa_sm_set_pmk(peer->supp, psk, PMK_LEN);
268 return ibss_rsn->psk;
540 ibss_rsn->psk) < 0) {
819 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk)
823 os_memcpy(ibss_rsn->psk, psk, PMK_LEN);
config_file.c 132 wpa_printf(MSG_ERROR, "Line %d: both PSK and "
495 char *value = wpa_config_get(ssid, "psk");
638 struct psk_list_entry *psk; local
641 dl_list_for_each(psk, &ssid->psk_list, struct psk_list_entry, list) {
642 wpa_snprintf_hex(hex, sizeof(hex), psk->psk, sizeof(psk->psk));
644 psk->p2p ? "P2P-" : "", MAC2STR(psk->addr), hex)
    [all...]
wpa_supplicant.c 148 wpa_msg(wpa_s, MSG_INFO, "WPA: No PSK configured for "
155 os_memcpy(key, ssid->psk, 16);
160 os_memcpy(key, ssid->psk, 16);
166 os_memcpy(key, ssid->psk, 16 + 8);
167 os_memcpy(key + 16 + 8, ssid->psk + 16, 8);
1082 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT FT/PSK");
1100 "WPA: using KEY_MGMT PSK with SHA256");
1107 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT WPA-PSK");
1170 u8 psk[PMK_LEN]; local
1183 u8 psk[PMK_LEN]; local
    [all...]
config.c 296 wpa_printf(MSG_DEBUG, "PSK: External password '%s'",
319 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)",
337 if (hexstr2bin(value, ssid->psk, PMK_LEN) ||
339 wpa_printf(MSG_ERROR, "Line %d: Invalid PSK '%s'.",
348 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN);
374 return wpa_config_write_string_hex(ssid->psk, PMK_LEN);
502 if (os_strcmp(start, "WPA-PSK") == 0)
513 else if (os_strcmp(start, "FT-PSK") == 0)
519 else if (os_strcmp(start, "WPA-PSK-SHA256") == 0
1919 struct psk_list_entry *psk; local
    [all...]
  /external/openssl/android.testssl/
testssl 165 echo test tls1 with PSK
166 $ssltest -tls1 -cipher PSK -psk abc123 $extra || exit 1
168 echo test tls1 with PSK via BIO pair
169 $ssltest -bio_pair -tls1 -cipher PSK -psk abc123 $extra || exit 1
  /external/wpa_supplicant_8/src/ap/
sta_info.h 100 struct hostapd_sta_wpa_psk_short *psk; member in struct:sta_info
ap_config.h 103 u8 psk[PMK_LEN]; member in struct:hostapd_sta_wpa_psk_short
109 u8 psk[PMK_LEN]; member in struct:hostapd_wpa_psk
wps_hostapd.c 96 const u8 *p2p_dev_addr, const u8 *psk,
105 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR,
109 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR
113 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len);
116 wpa_printf(MSG_DEBUG, "Unexpected PSK length %lu",
121 /* Add the new PSK to runtime PSK list */
127 os_memcpy(p->psk, psk, PMK_LEN)
    [all...]
ieee802_11.c 554 struct hostapd_sta_wpa_psk_short *psk = NULL; local
634 &psk, &identity, &radius_cui);
672 hostapd_free_psk_list(sta->psk);
674 sta->psk = psk;
675 psk = NULL;
677 sta->psk = NULL;
748 hostapd_free_psk_list(psk);
    [all...]
  /external/chromium_org/chrome/browser/signin/
easy_unlock_service.cc 381 paired_devices.insert(device_key_data.psk);
618 devices_in_cryptohome.insert(device_key_data.psk);
  /external/openssl/ssl/
ssltest.c 124 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
243 static char *psk_key=NULL; /* by default PSK is not used */
246 unsigned int max_identity_len, unsigned char *psk,
248 static unsigned int psk_server_callback(SSL *ssl, const char *identity, unsigned char *psk,
339 fprintf(stderr," -psk arg - PSK in hex (without 0x)\n");
634 else if (strcmp(*argv,"-psk") == 0)
1040 /* Use PSK only if PSK key is given */
1043 /* no_psk is used to avoid putting psk command to openssl tool *
    [all...]
ssl.h 124 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
279 #define SSL_TXT_PSK "PSK"
460 * PSK_identity_hint [ 7 ] EXPLICIT OCTET STRING, -- optional PSK identity hint
461 * PSK_identity [ 8 ] EXPLICIT OCTET STRING, -- optional PSK identity
    [all...]
  /frameworks/av/media/libstagefright/codecs/amrwbenc/src/
c4t64fx.c 137 Word16 psk, ps, alpk, alp, val, k_cn, k_dn, exp; local
545 psk = -1;
693 s = vo_L_msu(vo_L_mult(alpk, ps), psk, alp);
696 psk = ps;
  /external/chromium_org/third_party/boringssl/src/include/openssl/
ssl.h 124 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
214 #define SSL_TXT_PSK "PSK"
376 * PSK_identity_hint [ 7 ] EXPLICIT OCTET STRING, -- optional PSK identity hint
377 * PSK_identity [ 8 ] EXPLICIT OCTET STRING, -- optional PSK identity
    [all...]
  /external/openssl/include/openssl/
ssl.h 124 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
279 #define SSL_TXT_PSK "PSK"
460 * PSK_identity_hint [ 7 ] EXPLICIT OCTET STRING, -- optional PSK identity hint
461 * PSK_identity [ 8 ] EXPLICIT OCTET STRING, -- optional PSK identity
    [all...]

Completed in 542 milliseconds

12 3 4