HomeSort by relevance Sort by last modified time
    Searched refs:psk (Results 1 - 25 of 62) sorted by null

1 2 3

  /external/wpa_supplicant_8/wpa_supplicant/examples/
wpa-psk-tkip.conf 1 # WPA-PSK/TKIP
6 ssid="example wpa-psk network"
7 key_mgmt=WPA-PSK
11 psk="secret passphrase"
  /external/wpa_supplicant_8/src/ap/
ieee802_11_auth.h 22 struct hostapd_sta_wpa_psk_short **psk,
26 void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk);
ieee802_11_auth.c 39 struct hostapd_sta_wpa_psk_short *psk; member in struct:hostapd_cached_radius_acl
60 hostapd_free_psk_list(e->psk);
77 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk,
83 /* Copy PSK linked list */
84 copy_to = psk;
103 struct hostapd_sta_wpa_psk_short **psk,
126 copy_psk_list(psk, entry->psk);
224 * @psk: Linked list buffer for returning WPA PSK
428 struct hostapd_sta_wpa_psk_short *psk; local
    [all...]
ap_config.c 214 struct hostapd_wpa_psk *psk; local
221 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname);
248 psk = os_zalloc(sizeof(*psk));
249 if (psk == NULL) {
250 wpa_printf(MSG_ERROR, "WPA PSK allocation failed");
255 psk->group = 1;
257 os_memcpy(psk->addr, addr, ETH_ALEN);
261 wpa_printf(MSG_ERROR, "No PSK on line %d in '%s'",
263 os_free(psk);
401 struct hostapd_wpa_psk *psk, *tmp; local
673 struct hostapd_wpa_psk *psk; local
    [all...]
wpa_auth_glue.c 222 const u8 *psk; local
232 psk = hostapd_get_psk(hapd->conf, addr, p2p_dev_addr, prev_psk);
235 * returned psk which should not be returned again.
236 * logic list (all hostapd_get_psk; all sta->psk)
238 if (sta && sta->psk && !psk) {
240 psk = sta->psk->psk;
241 for (pos = sta->psk; pos; pos = pos->next)
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
17 unsigned char psk[32]; local
55 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); local
59 printf("\t#psk=\"%s\"\n", passphrase);
62 printf("%02x", psk[i]);
wpa_supplicant.conf 644 # WPA-PSK (with proto=RSN). In addition, key_mgmt=WPA-NONE (fixed group key
648 # both), and psk must also be set.
700 # WPA-PSK = WPA pre-shared key (this requires 'psk' field)
705 # WPA-PSK-SHA256 = Like WPA-PSK but using stronger SHA256-based algorithms
707 # If not set, this defaults to: WPA-PSK WPA-EAP
717 # (and similarly for WPA-PSK and WPA-WPSK-SHA256 if WPA2-Personal is used)
740 # psk: WPA preshared key; 256-bit pre-shared key
741 # The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e.
    [all...]
ibss_rsn.h 50 u8 psk[PMK_LEN]; member in struct:ibss_rsn
60 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
config_ssid.h 43 u8 psk[32]; member in struct:psk_list_entry
154 * psk - WPA pre-shared key (256 bits)
156 u8 psk[32]; member in struct:wpa_ssid
159 * psk_set - Whether PSK field is configured
166 * If this is set, psk will be generated using the SSID and passphrase
173 * ext_psk - PSK/passphrase name in external storage
175 * If this is set, PSK/passphrase will be fetched from external storage
181 * mem_only_psk - Whether to keep PSK/passphrase only in memory
183 * 0 = allow psk/passphrase to be stored to the configuration file
184 * 1 = do not store psk/passphrase to the configuration fil
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_psk_common.c 2 * EAP server/peer: EAP-PSK shared routines
19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk)
22 if (aes_128_encrypt_block(psk, ak, ak))
27 if (aes_128_encrypt_block(psk, ak, ak) ||
28 aes_128_encrypt_block(psk, kdk, kdk))
eap_gpsk_common.c 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */,
60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash))
73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */,
95 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash);
109 const u8 *psk, size_t psk_len,
146 os_memcpy(pos, psk, psk_len);
156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
188 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len,
202 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString
    [all...]
eap_gpsk_common.h 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
eap_psk_common.h 2 * EAP server/peer: EAP-PSK shared routines
32 /* EAP-PSK First Message (AS -> Supplicant) */
39 /* EAP-PSK Second Message (Supplicant -> AS) */
48 /* EAP-PSK Third Message (AS -> Supplicant) */
56 /* EAP-PSK Fourth Message (Supplicant -> AS) */
68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
  /system/netd/server/
SoftapController.h 42 void generatePsk(char *ssid, char *passphrase, char *psk);
SoftapController.cpp 129 ALOGE("softap <wlan iface> <SSID> <hidden/broadcast> <channel> <wpa2?-psk|open> <passphrase>");
156 if (!strcmp(argv[6], "wpa-psk")) {
159 } else if (!strcmp(argv[6], "wpa2-psk")) {
214 unsigned char psk[SHA256_DIGEST_LENGTH]; local
219 4096, SHA256_DIGEST_LENGTH, psk);
221 sprintf(&psk_str[j*2], "%02x", psk[j]);
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 2 * hostapd / EAP-PSK (RFC 4764) server
8 * Note: EAP-PSK is an EAP authentication method and as such, completely
9 * different from WPA-PSK. This file is not needed for WPA-PSK functionality.
58 struct eap_psk_hdr_1 *psk; local
60 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
63 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data");
67 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)",
71 sizeof(*psk) + sm->server_id_len
93 struct eap_psk_hdr_3 *psk; local
    [all...]
  /external/boringssl/src/ssl/test/
test_config.h 55 std::string psk; member in struct:TestConfig
bssl_shim.cc 254 fprintf(stderr, "Server PSK hint did not match.\n");
260 config->psk.size() > max_psk_len) {
261 fprintf(stderr, "PSK buffers too small\n");
267 memcpy(out_psk, config->psk.data(), config->psk.size());
268 return config->psk.size();
276 fprintf(stderr, "Client PSK identity did not match.\n");
280 if (config->psk.size() > max_psk_len) {
281 fprintf(stderr, "PSK buffers too small\n");
285 memcpy(out_psk, config->psk.data(), config->psk.size())
    [all...]
  /frameworks/av/media/libstagefright/codecs/amrnb/enc/src/
c2_11pf.cpp 418 Word16 psk; local
435 psk = -1;
521 /* s = L_msu(s, psk, alp, pOverflow); */
522 s -= (((Word32) psk * alp) << 1);
526 psk = sq;
c2_9pf.cpp 482 Word16 psk, ps0, ps1, sq, sq1;
487 psk = -1;
550 s = L_msu(L_mult(alpk, sq), psk, alp);
553 psk = sq;
600 Word16 psk; local
617 psk = -1;
711 /* s = L_msu(L_temp, psk, alp, pOverflow); */
712 s = L_temp - (((Word32) psk * alp) << 1);
716 psk = sq;
    [all...]
c3_14pf.cpp 394 Word16 psk; local
409 psk = -1;
567 s = L_msu(s, psk, alp, pOverflow);
568 //s -= (((Word32) psk * alp) << 1);
572 psk = sq;
c4_17pf.cpp 407 Word16 psk; local
425 psk = -1;
632 /* s = L_msu(s, psk, alp, pOverflow); */
633 s -= (((Word32) psk * alp) << 1);
637 psk = sq;
  /frameworks/av/media/libstagefright/codecs/amrwbenc/src/
c2t64fx.c 57 Word16 ps, psk, ps1, ps2, alpk, alp1, alp2, sq; local
227 psk = -1;
242 s = vo_L_mult(alpk, sq) - ((psk * alp2)<<1);
245 psk = sq;
  /external/wpa_supplicant_8/wpa_supplicant/tests/
test_wpa.c 23 u8 psk[PMK_LEN]; member in struct:wpa
194 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN);
260 return wpa->psk;
339 os_memset(wpa.psk, 0x44, PMK_LEN);
  /external/ipsec-tools/src/racoon/
privsep.c 468 vchar_t *psk; local
486 if ((psk = getpsk(bufs[0], keylen)) == NULL) {
491 reply->bufs.buflen[0] = psk->l;
492 reply->hdr.ac_len = sizeof(*reply) + psk->l;
501 memcpy(reply + 1, psk->v, psk->l);
502 vfree(psk);
894 vchar_t *psk; local
932 if ((psk = vmalloc(len - sizeof(*msg))) == NULL)
935 memcpy(psk->v, msg + 1, psk->l)
    [all...]

Completed in 1095 milliseconds

1 2 3