/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 17 unsigned char psk[32]; local 55 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); local 59 printf("\t#psk=\"%s\"\n", passphrase); 62 printf("%02x", psk[i]);
|
ibss_rsn.h | 50 u8 psk[PMK_LEN]; member in struct:ibss_rsn 60 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
|
config_file.c | 132 wpa_printf(MSG_ERROR, "Line %d: both PSK and " 509 value = wpa_config_get(ssid, "psk"); 652 struct psk_list_entry *psk; local 655 dl_list_for_each(psk, &ssid->psk_list, struct psk_list_entry, list) { 656 wpa_snprintf_hex(hex, sizeof(hex), psk->psk, sizeof(psk->psk)); 658 psk->p2p ? "P2P-" : "", MAC2STR(psk->addr), hex) [all...] |
/system/netd/server/ |
SoftapController.cpp | 129 ALOGE("softap <wlan iface> <SSID> <hidden/broadcast> <channel> <wpa2?-psk|open> <passphrase>"); 156 if (!strcmp(argv[6], "wpa-psk")) { 161 } else if (!strcmp(argv[6], "wpa2-psk")) { 222 unsigned char psk[SHA256_DIGEST_LENGTH]; local 228 psk) != 1) { 229 ALOGE("Cannot generate PSK using PKCS#5 PBKDF2"); 234 sprintf(&psk_str[j*2], "%02x", psk[j]);
|
/system/connectivity/shill/setup_wifi/ |
main.cc | 48 " Set the passphrase for PSK networks\n"; 55 MyClient(std::string ssid, bool is_hex_ssid, std::string psk) 56 : ssid_(ssid), is_hex_ssid_(is_hex_ssid), psk_(psk) {} 132 std::string psk; local 134 psk = cl->GetSwitchValueASCII(switches::kPassphrase); 138 MyClient client(ssid, hex_ssid, psk);
|
/frameworks/av/media/libstagefright/codecs/amrnb/enc/src/ |
s10_8pf.cpp | 192 Word16 psk, ps, ps0, ps1, ps2, sq, sq2; 217 psk = -1; 494 s = L_msu (L_mult (alpk, sq), psk, alp); 498 psk = sq; 571 Word16 psk; local 608 psk = -1; 963 if (((Word32) alpk * sq) > ((Word32) psk * alp)) 965 psk = sq;
|
c2_11pf.cpp | 418 Word16 psk; local 435 psk = -1; 521 /* s = L_msu(s, psk, alp, pOverflow); */ 522 s -= (((Word32) psk * alp) << 1); 526 psk = sq;
|
c2_9pf.cpp | 482 Word16 psk, ps0, ps1, sq, sq1; 487 psk = -1; 550 s = L_msu(L_mult(alpk, sq), psk, alp); 553 psk = sq; 600 Word16 psk; local 617 psk = -1; 711 /* s = L_msu(L_temp, psk, alp, pOverflow); */ 712 s = L_temp - (((Word32) psk * alp) << 1); 716 psk = sq; [all...] |
c3_14pf.cpp | 394 Word16 psk; local 409 psk = -1; 567 s = L_msu(s, psk, alp, pOverflow); 568 //s -= (((Word32) psk * alp) << 1); 572 psk = sq;
|
c4_17pf.cpp | 407 Word16 psk; local 425 psk = -1; 632 /* s = L_msu(s, psk, alp, pOverflow); */ 633 s -= (((Word32) psk * alp) << 1); 637 psk = sq;
|
/external/ipsec-tools/src/racoon/ |
privsep.c | 468 vchar_t *psk; local 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { 491 reply->bufs.buflen[0] = psk->l; 492 reply->hdr.ac_len = sizeof(*reply) + psk->l; 501 memcpy(reply + 1, psk->v, psk->l); 502 vfree(psk); 894 vchar_t *psk; local 932 if ((psk = vmalloc(len - sizeof(*msg))) == NULL) 935 memcpy(psk->v, msg + 1, psk->l) [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.c | 38 struct hostapd_sta_wpa_psk_short *psk; member in struct:hostapd_cached_radius_acl 59 hostapd_free_psk_list(e->psk); 76 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk, 79 if (!psk) 85 *psk = src; 93 struct hostapd_sta_wpa_psk_short **psk, 116 copy_psk_list(psk, entry->psk); 244 * @psk: Linked list buffer for returning WPA PSK 437 struct hostapd_sta_wpa_psk_short *psk; local [all...] |
wpa_auth_glue.c | 230 const u8 *psk; local 240 psk = hostapd_get_psk(hapd->conf, addr, p2p_dev_addr, prev_psk); 243 * returned psk which should not be returned again. 244 * logic list (all hostapd_get_psk; all sta->psk) 246 if (sta && sta->psk && !psk) { 248 psk = sta->psk->psk; 249 for (pos = sta->psk; pos; pos = pos->next) [all...] |
ap_config.c | 212 struct hostapd_wpa_psk *psk; local 219 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname); 246 psk = os_zalloc(sizeof(*psk)); 247 if (psk == NULL) { 248 wpa_printf(MSG_ERROR, "WPA PSK allocation failed"); 253 psk->group = 1; 255 os_memcpy(psk->addr, addr, ETH_ALEN); 259 wpa_printf(MSG_ERROR, "No PSK on line %d in '%s'", 261 os_free(psk); 399 struct hostapd_wpa_psk *psk, *tmp; local 708 struct hostapd_wpa_psk *psk; local [all...] |
ieee802_11.c | 936 struct hostapd_sta_wpa_psk_short *psk = NULL; local 1087 &psk, &identity, &radius_cui); 1173 hostapd_free_psk_list(sta->psk); 1175 sta->psk = psk; 1176 psk = NULL; 1178 sta->psk = NULL; [all...] |
sta_info.h | 145 struct hostapd_sta_wpa_psk_short *psk; member in struct:sta_info
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 2 * hostapd / EAP-PSK (RFC 4764) server 8 * Note: EAP-PSK is an EAP authentication method and as such, completely 9 * different from WPA-PSK. This file is not needed for WPA-PSK functionality. 58 struct eap_psk_hdr_1 *psk; local 60 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)"); 63 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data"); 67 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", 71 sizeof(*psk) + sm->server_id_len 93 struct eap_psk_hdr_3 *psk; local [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_enrollee.c | 301 u8 psk[32]; local 302 /* Generate a random per-device PSK */ 304 random_get_bytes(psk, sizeof(psk)) < 0) { 306 "WPS: Could not generate random PSK"); 309 wpa_hexdump_key(MSG_DEBUG, "WPS: Generated per-device PSK", 310 psk, sizeof(psk)); 313 wpa_snprintf_hex(hex, sizeof(hex), psk, sizeof(psk)); [all...] |
/frameworks/av/media/libstagefright/codecs/amrwbenc/src/ |
c2t64fx.c | 57 Word16 ps, psk, ps1, ps2, alpk, alp1, alp2, sq; local 230 psk = -1; 245 s = vo_L_mult(alpk, sq) - ((psk * alp2)<<1); 248 psk = sq;
|
c4t64fx.c | 137 Word16 psk, ps, alpk, alp, val, k_cn, k_dn, exp; local 545 psk = -1; 701 s = L_sub(vo_L_mult(alpk, ps), vo_L_mult(psk, alp)); 704 psk = ps; [all...] |
/system/connectivity/shill/vpn/ |
l2tp_ipsec_driver.cc | 24 // (PSK) authentication. An optional outer IPSec authentication can also be 306 string psk = args()->LookupString(kL2tpIpsecPskProperty, ""); local 307 if (!psk.empty()) { 310 base::WriteFile(psk_file_, psk.data(), psk.size()) != 311 static_cast<int>(psk.size())) { 313 FROM_HERE, error, Error::kInternalError, "Unable to setup psk file.");
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gpsk.c | 34 u8 *psk; member in struct:eap_gpsk_data 120 data->psk = os_malloc(password_len); 121 if (data->psk == NULL) { 125 os_memcpy(data->psk, password, password_len); 137 if (data->psk) { 138 os_memset(data->psk, 0, data->psk_len); 139 os_free(data->psk); 367 if (eap_gpsk_derive_keys(data->psk, data->psk_len, 381 if (eap_gpsk_derive_session_id(data->psk, data->psk_len,
|
/external/boringssl/src/ssl/test/ |
test_config.h | 55 std::string psk; member in struct:TestConfig
|
/external/boringssl/src/ssl/ |
s3_clnt.c | 131 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 1593 uint8_t psk[PSK_MAX_PSK_LEN]; local [all...] |
s3_srvr.c | 131 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 329 * - There is a PSK identity hint. 1466 uint8_t psk[PSK_MAX_PSK_LEN]; local [all...] |