HomeSort by relevance Sort by last modified time
    Searched refs:psk (Results 26 - 50 of 86) sorted by null

12 3 4

  /external/autotest/server/site_tests/network_WiFi_MultiAuth/
network_WiFi_MultiAuth.py 26 psk='chromeos',
  /external/wpa_supplicant_8/src/eap_common/
eap_psk_common.h 2 * EAP server/peer: EAP-PSK shared routines
32 /* EAP-PSK First Message (AS -> Supplicant) */
39 /* EAP-PSK Second Message (Supplicant -> AS) */
48 /* EAP-PSK Third Message (AS -> Supplicant) */
56 /* EAP-PSK Fourth Message (Supplicant -> AS) */
68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
  /frameworks/av/media/libstagefright/codecs/amrnb/enc/src/
c2_11pf.cpp 418 Word16 psk; local
435 psk = -1;
521 /* s = L_msu(s, psk, alp, pOverflow); */
522 s -= (((Word32) psk * alp) << 1);
526 psk = sq;
c2_9pf.cpp 482 Word16 psk, ps0, ps1, sq, sq1;
487 psk = -1;
550 s = L_msu(L_mult(alpk, sq), psk, alp);
553 psk = sq;
600 Word16 psk; local
617 psk = -1;
711 /* s = L_msu(L_temp, psk, alp, pOverflow); */
712 s = L_temp - (((Word32) psk * alp) << 1);
716 psk = sq;
    [all...]
c3_14pf.cpp 394 Word16 psk; local
409 psk = -1;
567 s = L_msu(s, psk, alp, pOverflow);
568 //s -= (((Word32) psk * alp) << 1);
572 psk = sq;
c4_17pf.cpp 407 Word16 psk; local
425 psk = -1;
632 /* s = L_msu(s, psk, alp, pOverflow); */
633 s -= (((Word32) psk * alp) << 1);
637 psk = sq;
s10_8pf.cpp 192 Word16 psk, ps, ps0, ps1, ps2, sq, sq2;
217 psk = -1;
494 s = L_msu (L_mult (alpk, sq), psk, alp);
498 psk = sq;
571 Word16 psk; local
608 psk = -1;
963 if (((Word32) alpk * sq) > ((Word32) psk * alp))
965 psk = sq;
  /frameworks/av/media/libstagefright/codecs/amrwbenc/src/
c2t64fx.c 57 Word16 ps, psk, ps1, ps2, alpk, alp1, alp2, sq; local
230 psk = -1;
245 s = vo_L_mult(alpk, sq) - ((psk * alp2)<<1);
248 psk = sq;
  /external/wpa_supplicant_8/src/ap/
wpa_auth_glue.c 230 const u8 *psk; local
240 psk = hostapd_get_psk(hapd->conf, addr, p2p_dev_addr, prev_psk);
243 * returned psk which should not be returned again.
244 * logic list (all hostapd_get_psk; all sta->psk)
246 if (sta && sta->psk && !psk) {
248 psk = sta->psk->psk;
249 for (pos = sta->psk; pos; pos = pos->next)
    [all...]
wps_hostapd.c 96 const u8 *p2p_dev_addr, const u8 *psk,
105 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR,
109 "Received new WPA/WPA2-PSK from WPS for STA " MACSTR
113 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len);
116 wpa_printf(MSG_DEBUG, "Unexpected PSK length %lu",
121 /* Add the new PSK to runtime PSK list */
127 os_memcpy(p->psk, psk, PMK_LEN)
    [all...]
  /external/autotest/server/site_tests/network_WiFi_PTK/
network_WiFi_PTK.py 28 psk='chromeos',
  /external/autotest/server/site_tests/network_WiFi_SecChange/
network_WiFi_SecChange.py 22 psk='chromeos',
  /external/boringssl/src/ssl/test/
test_config.h 55 std::string psk; member in struct:TestConfig
bssl_shim.cc 471 fprintf(stderr, "Server PSK hint did not match.\n");
477 config->psk.size() > max_psk_len) {
478 fprintf(stderr, "PSK buffers too small\n");
484 memcpy(out_psk, config->psk.data(), config->psk.size());
485 return config->psk.size();
493 fprintf(stderr, "Client PSK identity did not match.\n");
497 if (config->psk.size() > max_psk_len) {
498 fprintf(stderr, "PSK buffers too small\n");
502 memcpy(out_psk, config->psk.data(), config->psk.size())
    [all...]
  /external/autotest/server/cros/ap_configurators/
static_ap_configurator.py 58 self.psk = ap_config.get_psk()
256 psk=self.psk,
belkin_ap_configurator.py 227 psk = '//select[@name="wl_auth"]'
228 self.select_item_from_popup_by_xpath('WPA-PSK(no server)', popup,
230 self.select_item_from_popup_by_xpath('psk', psk)
246 Returns True if setting the PSK refresh interval is supported.
belkinF9K_ap_configurator.py 273 psk = '//select[@name="authentication"]'
274 self.select_item_from_popup_by_xpath('WPA/WPA2-Personal (PSK)',
278 auth_type = 'WPA-PSK'
280 auth_type = 'WPA2-PSK'
281 self.select_item_from_popup_by_xpath(auth_type, psk,
299 Returns True if setting the PSK refresh interval is supported.
  /external/ipsec-tools/src/racoon/
privsep.c 468 vchar_t *psk; local
486 if ((psk = getpsk(bufs[0], keylen)) == NULL) {
491 reply->bufs.buflen[0] = psk->l;
492 reply->hdr.ac_len = sizeof(*reply) + psk->l;
501 memcpy(reply + 1, psk->v, psk->l);
502 vfree(psk);
894 vchar_t *psk; local
932 if ((psk = vmalloc(len - sizeof(*msg))) == NULL)
935 memcpy(psk->v, msg + 1, psk->l)
    [all...]
  /system/connectivity/shill/vpn/
l2tp_ipsec_driver.cc 24 // (PSK) authentication. An optional outer IPSec authentication can also be
306 string psk = args()->LookupString(kL2tpIpsecPskProperty, ""); local
307 if (!psk.empty()) {
310 base::WriteFile(psk_file_, psk.data(), psk.size()) !=
311 static_cast<int>(psk.size())) {
313 FROM_HERE, error, Error::kInternalError, "Unable to setup psk file.");
  /external/autotest/server/site_tests/network_WiFi_GTK/
network_WiFi_GTK.py 32 psk='chromeos',
  /external/wpa_supplicant_8/src/eap_peer/
eap_gpsk.c 34 u8 *psk; member in struct:eap_gpsk_data
120 data->psk = os_malloc(password_len);
121 if (data->psk == NULL) {
125 os_memcpy(data->psk, password, password_len);
137 if (data->psk) {
138 os_memset(data->psk, 0, data->psk_len);
139 os_free(data->psk);
367 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
381 if (eap_gpsk_derive_session_id(data->psk, data->psk_len,
  /external/wpa_supplicant_8/src/wps/
wps_enrollee.c 301 u8 psk[32]; local
302 /* Generate a random per-device PSK */
304 random_get_bytes(psk, sizeof(psk)) < 0) {
306 "WPS: Could not generate random PSK");
309 wpa_hexdump_key(MSG_DEBUG, "WPS: Generated per-device PSK",
310 psk, sizeof(psk));
313 wpa_snprintf_hex(hex, sizeof(hex), psk, sizeof(psk));
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
ibss_rsn.c 203 const u8 *psk)
233 wpa_sm_set_pmk(peer->supp, psk, PMK_LEN, NULL, NULL);
268 return ibss_rsn->psk;
540 ibss_rsn->psk) < 0) {
823 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk)
827 os_memcpy(ibss_rsn->psk, psk, PMK_LEN);
config_file.c 132 wpa_printf(MSG_ERROR, "Line %d: both PSK and "
509 value = wpa_config_get(ssid, "psk");
652 struct psk_list_entry *psk; local
655 dl_list_for_each(psk, &ssid->psk_list, struct psk_list_entry, list) {
656 wpa_snprintf_hex(hex, sizeof(hex), psk->psk, sizeof(psk->psk));
658 psk->p2p ? "P2P-" : "", MAC2STR(psk->addr), hex)
    [all...]
  /external/autotest/server/site_tests/network_WiFi_ProfileGUID/
network_WiFi_ProfileGUID.py 70 psk=password,

Completed in 304 milliseconds

12 3 4