HomeSort by relevance Sort by last modified time
    Searched refs:psk (Results 1 - 25 of 86) sorted by null

1 2 3 4

  /external/wpa_supplicant_8/wpa_supplicant/examples/
wpa-psk-tkip.conf 1 # WPA-PSK/TKIP
6 ssid="example wpa-psk network"
7 key_mgmt=WPA-PSK
11 psk="secret passphrase"
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
17 unsigned char psk[32]; local
55 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); local
59 printf("\t#psk=\"%s\"\n", passphrase);
62 printf("%02x", psk[i]);
wpa_supplicant.conf 706 # WPA-PSK (with proto=RSN). In addition, key_mgmt=WPA-NONE (fixed group key
710 # both), and psk must also be set.
    [all...]
ibss_rsn.h 50 u8 psk[PMK_LEN]; member in struct:ibss_rsn
60 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
config_ssid.h 43 u8 psk[32]; member in struct:psk_list_entry
154 * psk - WPA pre-shared key (256 bits)
156 u8 psk[32]; member in struct:wpa_ssid
159 * psk_set - Whether PSK field is configured
166 * If this is set, psk will be generated using the SSID and passphrase
173 * ext_psk - PSK/passphrase name in external storage
175 * If this is set, PSK/passphrase will be fetched from external storage
181 * mem_only_psk - Whether to keep PSK/passphrase only in memory
183 * 0 = allow psk/passphrase to be stored to the configuration file
184 * 1 = do not store psk/passphrase to the configuration fil
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_11_auth.h 25 struct hostapd_sta_wpa_psk_short **psk,
29 void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk);
ieee802_11_auth.c 38 struct hostapd_sta_wpa_psk_short *psk; member in struct:hostapd_cached_radius_acl
59 hostapd_free_psk_list(e->psk);
76 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk,
79 if (!psk)
85 *psk = src;
93 struct hostapd_sta_wpa_psk_short **psk,
116 copy_psk_list(psk, entry->psk);
244 * @psk: Linked list buffer for returning WPA PSK
437 struct hostapd_sta_wpa_psk_short *psk; local
    [all...]
ap_config.c 212 struct hostapd_wpa_psk *psk; local
219 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname);
246 psk = os_zalloc(sizeof(*psk));
247 if (psk == NULL) {
248 wpa_printf(MSG_ERROR, "WPA PSK allocation failed");
253 psk->group = 1;
255 os_memcpy(psk->addr, addr, ETH_ALEN);
259 wpa_printf(MSG_ERROR, "No PSK on line %d in '%s'",
261 os_free(psk);
399 struct hostapd_wpa_psk *psk, *tmp; local
708 struct hostapd_wpa_psk *psk; local
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_psk_common.c 2 * EAP server/peer: EAP-PSK shared routines
19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk)
22 if (aes_128_encrypt_block(psk, ak, ak))
27 if (aes_128_encrypt_block(psk, ak, ak) ||
28 aes_128_encrypt_block(psk, kdk, kdk))
eap_gpsk_common.c 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */,
60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash))
73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */,
95 if (hmac_sha256_vector(psk, 32, 2, addr, vlen, hash))
110 const u8 *psk, size_t psk_len,
147 os_memcpy(pos, psk, psk_len);
157 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len,
203 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString
    [all...]
eap_gpsk_common.h 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
  /system/netd/server/
SoftapController.h 42 bool generatePsk(char *ssid, char *passphrase, char *psk);
SoftapController.cpp 129 ALOGE("softap <wlan iface> <SSID> <hidden/broadcast> <channel> <wpa2?-psk|open> <passphrase>");
156 if (!strcmp(argv[6], "wpa-psk")) {
161 } else if (!strcmp(argv[6], "wpa2-psk")) {
222 unsigned char psk[SHA256_DIGEST_LENGTH]; local
228 psk) != 1) {
229 ALOGE("Cannot generate PSK using PKCS#5 PBKDF2");
234 sprintf(&psk_str[j*2], "%02x", psk[j]);
  /external/autotest/server/cros/ap_configurators/
belkinF5D8236_ap_configurator.py 21 psk = '//select[@name="authentication"]'
22 self.select_item_from_popup_by_xpath('WPA/WPA2-Personal (PSK)',
26 selection = 'WPA2-PSK'
28 selection = 'WPA-PSK'
29 self.select_item_from_popup_by_xpath(selection, psk,
belkinF9k1002v4_ap_configurator.py 21 psk = '//select[@name="authentication"]'
22 self.select_item_from_popup_by_xpath('WPA/WPA2-Personal (PSK)',
26 auth_type = 'WPA-PSK'
28 auth_type = 'WPA2-PSK'
29 self.select_item_from_popup_by_xpath(auth_type, psk,
belkinF7D_ap_configurator.py 40 psk = '//select[@name="authentication"]'
41 self.select_item_from_popup_by_xpath('WPA/WPA2-Personal (PSK)',
45 auth_type = 'WPA2-PSK'
47 auth_type = 'WPA-PSK'
48 self.select_item_from_popup_by_xpath(auth_type, psk,
belkinF5D7234_ap_configurator.py 72 psk = '//select[@name="authentication"]'
73 self.select_item_from_popup_by_xpath('WPA/WPA2-Personal (PSK)',
77 auth_type = 'WPA-PSK'
79 auth_type = 'WPA2-PSK'
80 self.select_item_from_popup_by_xpath(auth_type, psk,
belkinF6D4230_ap_configurator.py 48 psk = '//select[@name="authentication"]'
49 self.select_item_from_popup_by_xpath('WPA/WPA2-Personal (PSK)',
53 auth_type = 'WPA-PSK'
55 auth_type = 'WPA2-PSK'
56 self.select_item_from_popup_by_xpath(auth_type, psk,
  /external/autotest/server/cros/
chaos_shadow_ap_list.conf 18 psk = chromeos
clique_ap_list.conf 14 psk = chromeos
chaos_dynamic_ap_list.conf 24 psk = chromeos
37 psk = chromeos
71 psk = chromeos
93 psk = chromeos
106 psk = chromeos
119 psk = chromeos
132 psk = chromeos
191 psk = chromeos
268 psk = chromeos
281 psk = chromeo
    [all...]
  /system/connectivity/shill/setup_wifi/
main.cc 48 " Set the passphrase for PSK networks\n";
55 MyClient(std::string ssid, bool is_hex_ssid, std::string psk)
56 : ssid_(ssid), is_hex_ssid_(is_hex_ssid), psk_(psk) {}
132 std::string psk; local
134 psk = cl->GetSwitchValueASCII(switches::kPassphrase);
138 MyClient client(ssid, hex_ssid, psk);
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 2 * hostapd / EAP-PSK (RFC 4764) server
8 * Note: EAP-PSK is an EAP authentication method and as such, completely
9 * different from WPA-PSK. This file is not needed for WPA-PSK functionality.
58 struct eap_psk_hdr_1 *psk; local
60 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
63 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data");
67 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)",
71 sizeof(*psk) + sm->server_id_len
93 struct eap_psk_hdr_3 *psk; local
    [all...]
  /external/autotest/client/common_lib/cros/network/
xmlrpc_security_types.py 193 def __init__(self, psk='', wpa_mode=MODE_DEFAULT, wpa_ciphers=[],
199 @param psk string a passphrase (64 hex characters or an ASCII phrase up
215 super(WPAConfig, self).__init__(security='psk')
216 self.psk = psk
224 if len(psk) > 64:
228 if len(psk) == 64:
229 for c in psk:
231 raise error.TestFail('Invalid PMK: %r' % psk)
249 'wpa_key_mgmt': 'WPA-PSK'}
    [all...]
  /external/autotest/client/site_tests/network_WiFiInvalidParameters/
network_WiFiInvalidParameters.py 143 for psk in bad_passphrases:
144 for security in ('rsn', 'wpa', 'psk'):
148 shill.SERVICE_PROPERTY_PASSPHRASE: psk,
164 '%s' % psk)

Completed in 513 milliseconds

1 2 3 4