HomeSort by relevance Sort by last modified time
    Searched defs:psk (Results 1 - 25 of 46) sorted by null

1 2

  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool
17 unsigned char psk[32]; local
61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); local
65 printf("\t#psk=\"%s\"\n", passphrase);
68 printf("%02x", psk[i]);
ibss_rsn.h 50 u8 psk[PMK_LEN]; member in struct:ibss_rsn
61 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
config_file.c 133 wpa_printf(MSG_ERROR, "Line %d: both PSK and "
525 value = wpa_config_get(ssid, "psk");
684 struct psk_list_entry *psk; local
687 dl_list_for_each(psk, &ssid->psk_list, struct psk_list_entry, list) {
688 wpa_snprintf_hex(hex, sizeof(hex), psk->psk, sizeof(psk->psk));
690 psk->p2p ? "P2P-" : "", MAC2STR(psk->addr), hex)
    [all...]
  /frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/
ScanResultMatchInfoTest.java 72 WifiConfiguration psk = local
80 ScanDetail scanPsk = createScanDetailForNetwork(psk, "CC:CC:CC:CC:CC:CC");
  /frameworks/av/media/libstagefright/codecs/amrnb/enc/src/
s10_8pf.cpp 192 Word16 psk, ps, ps0, ps1, ps2, sq, sq2;
217 psk = -1;
494 s = L_msu (L_mult (alpk, sq), psk, alp);
498 psk = sq;
571 Word16 psk; local
608 psk = -1;
963 if (((Word32) alpk * sq) > ((Word32) psk * alp))
965 psk = sq;
c2_11pf.cpp 418 Word16 psk; local
435 psk = -1;
521 /* s = L_msu(s, psk, alp, pOverflow); */
522 s -= (((Word32) psk * alp) << 1);
526 psk = sq;
c2_9pf.cpp 482 Word16 psk, ps0, ps1, sq, sq1;
487 psk = -1;
550 s = L_msu(L_mult(alpk, sq), psk, alp);
553 psk = sq;
600 Word16 psk; local
617 psk = -1;
711 /* s = L_msu(L_temp, psk, alp, pOverflow); */
712 s = L_temp - (((Word32) psk * alp) << 1);
716 psk = sq;
    [all...]
c3_14pf.cpp 394 Word16 psk; local
409 psk = -1;
567 s = L_msu(s, psk, alp, pOverflow);
568 //s -= (((Word32) psk * alp) << 1);
572 psk = sq;
c4_17pf.cpp 407 Word16 psk; local
425 psk = -1;
632 /* s = L_msu(s, psk, alp, pOverflow); */
633 s -= (((Word32) psk * alp) << 1);
637 psk = sq;
  /external/ipsec-tools/src/racoon/
privsep.c 468 vchar_t *psk; local
486 if ((psk = getpsk(bufs[0], keylen)) == NULL) {
491 reply->bufs.buflen[0] = psk->l;
492 reply->hdr.ac_len = sizeof(*reply) + psk->l;
501 memcpy(reply + 1, psk->v, psk->l);
502 vfree(psk);
894 vchar_t *psk; local
932 if ((psk = vmalloc(len - sizeof(*msg))) == NULL)
935 memcpy(psk->v, msg + 1, psk->l)
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_11_auth.c 38 struct hostapd_sta_wpa_psk_short *psk; member in struct:hostapd_cached_radius_acl
59 hostapd_free_psk_list(e->psk);
76 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk,
79 if (!psk)
85 *psk = src;
93 struct hostapd_sta_wpa_psk_short **psk,
116 copy_psk_list(psk, entry->psk);
244 * @psk: Linked list buffer for returning WPA PSK
436 struct hostapd_sta_wpa_psk_short *psk; local
    [all...]
ap_config.c 245 struct hostapd_wpa_psk *psk; local
252 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname);
279 psk = os_zalloc(sizeof(*psk));
280 if (psk == NULL) {
281 wpa_printf(MSG_ERROR, "WPA PSK allocation failed");
286 psk->group = 1;
288 os_memcpy(psk->addr, addr, ETH_ALEN);
292 wpa_printf(MSG_ERROR, "No PSK on line %d in '%s'",
294 os_free(psk);
438 struct hostapd_wpa_psk *psk, *tmp; local
771 struct hostapd_wpa_psk *psk; local
    [all...]
wpa_auth_glue.c 247 const u8 *psk; local
260 "No PSK for STA trying to use SAE with PMKSA caching");
284 psk = hostapd_get_psk(hapd->conf, addr, p2p_dev_addr, prev_psk);
287 * returned psk which should not be returned again.
288 * logic list (all hostapd_get_psk; all sta->psk)
290 if (sta && sta->psk && !psk) {
292 psk = sta->psk->psk;
    [all...]
dpp_hostapd.c 331 u8 psk[PMK_LEN]; local
360 pos = os_strstr(cmd, " psk=");
363 if (hexstr2bin(pos, psk, PMK_LEN) < 0)
374 if (os_strstr(cmd, " conf=sta-psk")) {
377 os_memcpy(conf_sta->psk, psk, PMK_LEN);
396 if (os_strstr(cmd, " conf=ap-psk")) {
399 os_memcpy(conf_ap->psk, psk, PMK_LEN);
699 wpa_snprintf_hex(hex, sizeof(hex), auth->psk, PMK_LEN)
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 2 * hostapd / EAP-PSK (RFC 4764) server
8 * Note: EAP-PSK is an EAP authentication method and as such, completely
9 * different from WPA-PSK. This file is not needed for WPA-PSK functionality.
58 struct eap_psk_hdr_1 *psk; local
60 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
63 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data");
67 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)",
71 sizeof(*psk) + sm->server_id_len
93 struct eap_psk_hdr_3 *psk; local
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_enrollee.c 302 u8 psk[32]; local
303 /* Generate a random per-device PSK */
305 random_get_bytes(psk, sizeof(psk)) < 0) {
307 "WPS: Could not generate random PSK");
310 wpa_hexdump_key(MSG_DEBUG, "WPS: Generated per-device PSK",
311 psk, sizeof(psk));
314 wpa_snprintf_hex(hex, sizeof(hex), psk, sizeof(psk));
    [all...]
  /frameworks/av/media/libstagefright/codecs/amrwbenc/src/
c2t64fx.c 57 Word16 ps, psk, ps1, ps2, alpk, alp1, alp2, sq; local
230 psk = -1;
245 s = vo_L_mult(alpk, sq) - ((psk * alp2)<<1);
248 psk = sq;
c4t64fx.c 137 Word16 psk, ps, alpk, alp, val, k_cn, k_dn, exp; local
545 psk = -1;
701 s = L_sub(vo_L_mult(alpk, ps), vo_L_mult(psk, alp));
704 psk = ps;
    [all...]
  /tools/tradefederation/core/util-apps/WifiUtil/src/com/android/tradefed/utils/wifi/
WifiConnector.java 119 * @param psk PSK(Pre-Shared Key) of a Wi-Fi network. This can be null if the given SSID is for
124 public int addNetwork(final String ssid, final String psk, final boolean scanSsid)
140 if (psk == null) {
146 config.preSharedKey = quote(psk);
210 * @param psk PSK of a Wi-Fi network
217 public void connectToNetwork(final String ssid, final String psk, final String urlToCheck,
224 updateLastNetwork(ssid, psk, scanSsid);
246 final int networkId = addNetwork(ssid, psk, scanSsid)
371 final String psk = prefs.getString("psk", null); local
    [all...]
WifiUtil.java 184 final String psk = expectString("psk"); local
186 result.putInt("result", connector.addNetwork(ssid, psk, scanSsid));
252 final String psk = getString("psk", null); local
255 connector.connectToNetwork(ssid, psk, pingUrl, connectTimeout, scanSsid);
  /external/wpa_supplicant_8/src/eap_peer/
eap_gpsk.c 34 u8 *psk; member in struct:eap_gpsk_data
119 data->psk = os_memdup(password, password_len);
120 if (data->psk == NULL) {
135 if (data->psk) {
136 os_memset(data->psk, 0, data->psk_len);
137 os_free(data->psk);
364 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
378 if (eap_gpsk_derive_session_id(data->psk, data->psk_len,
  /external/boringssl/src/ssl/
handshake_client.cc 131 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
207 // PSK requires a client callback.
333 // PSK binder.
927 // Some ciphers (pure PSK) have an optional ServerKeyExchange message.
1263 uint8_t psk[PSK_MAX_PSK_LEN]; local
    [all...]
handshake_server.cc 131 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
347 // PSK requires a server callback.
799 // PSK ciphers begin with an identity hint.
1214 uint8_t psk[PSK_MAX_PSK_LEN]; local
    [all...]
  /external/boringssl/src/ssl/test/
test_config.h 66 std::string psk; member in struct:TestConfig
  /external/wpa_supplicant_8/src/common/
dpp.h 137 u8 psk[32]; member in struct:dpp_configuration
178 u8 psk[PMK_LEN]; member in struct:dpp_authentication

Completed in 378 milliseconds

1 2