/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpa-psk-tkip.conf | 1 # WPA-PSK/TKIP 6 ssid="example wpa-psk network" 7 key_mgmt=WPA-PSK 11 psk="secret passphrase"
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 17 unsigned char psk[32]; local 55 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); local 59 printf("\t#psk=\"%s\"\n", passphrase); 62 printf("%02x", psk[i]);
|
wpa_supplicant.conf | 706 # WPA-PSK (with proto=RSN). In addition, key_mgmt=WPA-NONE (fixed group key 710 # both), and psk must also be set. [all...] |
ibss_rsn.h | 50 u8 psk[PMK_LEN]; member in struct:ibss_rsn 60 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
|
config_ssid.h | 43 u8 psk[32]; member in struct:psk_list_entry 154 * psk - WPA pre-shared key (256 bits) 156 u8 psk[32]; member in struct:wpa_ssid 159 * psk_set - Whether PSK field is configured 166 * If this is set, psk will be generated using the SSID and passphrase 173 * ext_psk - PSK/passphrase name in external storage 175 * If this is set, PSK/passphrase will be fetched from external storage 181 * mem_only_psk - Whether to keep PSK/passphrase only in memory 183 * 0 = allow psk/passphrase to be stored to the configuration file 184 * 1 = do not store psk/passphrase to the configuration fil [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.h | 25 struct hostapd_sta_wpa_psk_short **psk, 29 void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk);
|
ieee802_11_auth.c | 38 struct hostapd_sta_wpa_psk_short *psk; member in struct:hostapd_cached_radius_acl 59 hostapd_free_psk_list(e->psk); 76 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk, 79 if (!psk) 85 *psk = src; 93 struct hostapd_sta_wpa_psk_short **psk, 116 copy_psk_list(psk, entry->psk); 244 * @psk: Linked list buffer for returning WPA PSK 437 struct hostapd_sta_wpa_psk_short *psk; local [all...] |
ap_config.c | 212 struct hostapd_wpa_psk *psk; local 219 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname); 246 psk = os_zalloc(sizeof(*psk)); 247 if (psk == NULL) { 248 wpa_printf(MSG_ERROR, "WPA PSK allocation failed"); 253 psk->group = 1; 255 os_memcpy(psk->addr, addr, ETH_ALEN); 259 wpa_printf(MSG_ERROR, "No PSK on line %d in '%s'", 261 os_free(psk); 399 struct hostapd_wpa_psk *psk, *tmp; local 708 struct hostapd_wpa_psk *psk; local [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_psk_common.c | 2 * EAP server/peer: EAP-PSK shared routines 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) 22 if (aes_128_encrypt_block(psk, ak, ak)) 27 if (aes_128_encrypt_block(psk, ak, ak) || 28 aes_128_encrypt_block(psk, kdk, kdk))
|
eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, 95 if (hmac_sha256_vector(psk, 32, 2, addr, vlen, hash)) 110 const u8 *psk, size_t psk_len, 147 os_memcpy(pos, psk, psk_len); 157 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, 203 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString [all...] |
eap_gpsk_common.h | 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
|
/system/netd/server/ |
SoftapController.h | 42 bool generatePsk(char *ssid, char *passphrase, char *psk);
|
SoftapController.cpp | 129 ALOGE("softap <wlan iface> <SSID> <hidden/broadcast> <channel> <wpa2?-psk|open> <passphrase>"); 156 if (!strcmp(argv[6], "wpa-psk")) { 161 } else if (!strcmp(argv[6], "wpa2-psk")) { 222 unsigned char psk[SHA256_DIGEST_LENGTH]; local 228 psk) != 1) { 229 ALOGE("Cannot generate PSK using PKCS#5 PBKDF2"); 234 sprintf(&psk_str[j*2], "%02x", psk[j]);
|
/external/autotest/server/cros/ap_configurators/ |
belkinF5D8236_ap_configurator.py | 21 psk = '//select[@name="authentication"]' 22 self.select_item_from_popup_by_xpath('WPA/WPA2-Personal (PSK)', 26 selection = 'WPA2-PSK' 28 selection = 'WPA-PSK' 29 self.select_item_from_popup_by_xpath(selection, psk,
|
belkinF9k1002v4_ap_configurator.py | 21 psk = '//select[@name="authentication"]' 22 self.select_item_from_popup_by_xpath('WPA/WPA2-Personal (PSK)', 26 auth_type = 'WPA-PSK' 28 auth_type = 'WPA2-PSK' 29 self.select_item_from_popup_by_xpath(auth_type, psk,
|
belkinF7D_ap_configurator.py | 40 psk = '//select[@name="authentication"]' 41 self.select_item_from_popup_by_xpath('WPA/WPA2-Personal (PSK)', 45 auth_type = 'WPA2-PSK' 47 auth_type = 'WPA-PSK' 48 self.select_item_from_popup_by_xpath(auth_type, psk,
|
belkinF5D7234_ap_configurator.py | 72 psk = '//select[@name="authentication"]' 73 self.select_item_from_popup_by_xpath('WPA/WPA2-Personal (PSK)', 77 auth_type = 'WPA-PSK' 79 auth_type = 'WPA2-PSK' 80 self.select_item_from_popup_by_xpath(auth_type, psk,
|
belkinF6D4230_ap_configurator.py | 48 psk = '//select[@name="authentication"]' 49 self.select_item_from_popup_by_xpath('WPA/WPA2-Personal (PSK)', 53 auth_type = 'WPA-PSK' 55 auth_type = 'WPA2-PSK' 56 self.select_item_from_popup_by_xpath(auth_type, psk,
|
/external/autotest/server/cros/ |
chaos_shadow_ap_list.conf | 18 psk = chromeos
|
clique_ap_list.conf | 14 psk = chromeos
|
chaos_dynamic_ap_list.conf | 24 psk = chromeos 37 psk = chromeos 71 psk = chromeos 93 psk = chromeos 106 psk = chromeos 119 psk = chromeos 132 psk = chromeos 191 psk = chromeos 268 psk = chromeos 281 psk = chromeo [all...] |
/system/connectivity/shill/setup_wifi/ |
main.cc | 48 " Set the passphrase for PSK networks\n"; 55 MyClient(std::string ssid, bool is_hex_ssid, std::string psk) 56 : ssid_(ssid), is_hex_ssid_(is_hex_ssid), psk_(psk) {} 132 std::string psk; local 134 psk = cl->GetSwitchValueASCII(switches::kPassphrase); 138 MyClient client(ssid, hex_ssid, psk);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 2 * hostapd / EAP-PSK (RFC 4764) server 8 * Note: EAP-PSK is an EAP authentication method and as such, completely 9 * different from WPA-PSK. This file is not needed for WPA-PSK functionality. 58 struct eap_psk_hdr_1 *psk; local 60 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)"); 63 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data"); 67 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", 71 sizeof(*psk) + sm->server_id_len 93 struct eap_psk_hdr_3 *psk; local [all...] |
/external/autotest/client/common_lib/cros/network/ |
xmlrpc_security_types.py | 193 def __init__(self, psk='', wpa_mode=MODE_DEFAULT, wpa_ciphers=[], 199 @param psk string a passphrase (64 hex characters or an ASCII phrase up 215 super(WPAConfig, self).__init__(security='psk') 216 self.psk = psk 224 if len(psk) > 64: 228 if len(psk) == 64: 229 for c in psk: 231 raise error.TestFail('Invalid PMK: %r' % psk) 249 'wpa_key_mgmt': 'WPA-PSK'} [all...] |
/external/autotest/client/site_tests/network_WiFiInvalidParameters/ |
network_WiFiInvalidParameters.py | 143 for psk in bad_passphrases: 144 for security in ('rsn', 'wpa', 'psk'): 148 shill.SERVICE_PROPERTY_PASSPHRASE: psk, 164 '%s' % psk)
|