/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpa-psk-tkip.conf | 1 # WPA-PSK/TKIP 6 ssid="example wpa-psk network" 7 key_mgmt=WPA-PSK 11 psk="secret passphrase"
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 17 unsigned char psk[32]; local 61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); local 65 printf("\t#psk=\"%s\"\n", passphrase); 68 printf("%02x", psk[i]);
|
wpa_supplicant.conf | [all...] |
ibss_rsn.h | 50 u8 psk[PMK_LEN]; member in struct:ibss_rsn 61 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.h | 25 struct hostapd_sta_wpa_psk_short **psk, 29 void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk);
|
ieee802_11_auth.c | 38 struct hostapd_sta_wpa_psk_short *psk; member in struct:hostapd_cached_radius_acl 59 hostapd_free_psk_list(e->psk); 76 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk, 79 if (!psk) 85 *psk = src; 93 struct hostapd_sta_wpa_psk_short **psk, 116 copy_psk_list(psk, entry->psk); 244 * @psk: Linked list buffer for returning WPA PSK 436 struct hostapd_sta_wpa_psk_short *psk; local [all...] |
ap_config.c | 245 struct hostapd_wpa_psk *psk; local 252 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname); 279 psk = os_zalloc(sizeof(*psk)); 280 if (psk == NULL) { 281 wpa_printf(MSG_ERROR, "WPA PSK allocation failed"); 286 psk->group = 1; 288 os_memcpy(psk->addr, addr, ETH_ALEN); 292 wpa_printf(MSG_ERROR, "No PSK on line %d in '%s'", 294 os_free(psk); 438 struct hostapd_wpa_psk *psk, *tmp; local 771 struct hostapd_wpa_psk *psk; local [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_psk_common.c | 2 * EAP server/peer: EAP-PSK shared routines 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) 22 if (aes_128_encrypt_block(psk, ak, ak)) 27 if (aes_128_encrypt_block(psk, ak, ak) || 28 aes_128_encrypt_block(psk, kdk, kdk))
|
eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, 95 if (hmac_sha256_vector(psk, 32, 2, addr, vlen, hash)) 110 const u8 *psk, size_t psk_len, 147 os_memcpy(pos, psk, psk_len); 157 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, 203 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString [all...] |
eap_gpsk_common.h | 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
|
/tools/tradefederation/core/src/com/android/tradefed/device/ |
IWifiHelper.java | 89 * Adds the WPA-PSK security network identified by ssid. 92 * @param psk the WPA-PSK passphrase to use 96 boolean addWpaPskNetwork(String ssid, String psk) throws DeviceNotAvailableException; 99 * Adds the WPA-PSK security network identified by ssid. 102 * @param psk the WPA-PSK passphrase to use 107 boolean addWpaPskNetwork(String ssid, String psk, boolean scanSsid) throws DeviceNotAvailableException; 219 * @param psk the WPA-PSK passphrase to use. This can be null [all...] |
/external/autotest/server/cros/ |
rf_switch_1_ap_box_1_ap_list.conf | 15 psk = chromeos 28 psk = chromeos 41 psk = chromeos 54 psk = chromeos 67 psk = chromeos 80 psk = chromeos 93 psk = chromeos 106 psk = chromeos 119 psk = chromeos 132 psk = chromeo [all...] |
casey_chromeos5_ap_list.conf | 16 psk = chromeos 29 psk = chromeos 46 psk = chromeos
|
rf_switch_1_ap_box_2_ap_list.conf | 15 psk = chromeos 28 psk = chromeos 41 psk = chromeos 54 psk = chromeos 67 psk = chromeos 80 psk = chromeos 93 psk = chromeos 106 psk = chromeos 119 psk = chromeos 132 psk = chromeo [all...] |
chaos_shadow_ap_list.conf | 18 psk = chromeos
|
clique_ap_list.conf | 14 psk = chromeos
|
rf_switch_1_ap_box_4_ap_list.conf | 15 psk = chromeos
|
rf_switch_1_ap_box_3_ap_list.conf | 15 psk = chromeos 28 psk = chromeos 41 psk = chromeos 54 psk = chromeos 67 psk = chromeos 80 psk = chromeos 93 psk = chromeos 106 psk = chromeos 119 psk = chromeos 132 psk = chromeo [all...] |
chaos_dynamic_ap_list.conf | 25 psk = chromeos 38 psk = chromeos 83 psk = chromeos 96 psk = chromeos 109 psk = chromeos 167 # psk = chromeos 246 psk = chromeos 259 psk = chromeos 272 psk = chromeos 285 psk = chromeo [all...] |
casey_chromeos7_ap_list.conf | 15 psk = chromeos 28 psk = chromeos 41 psk = chromeos 55 psk = chromeos 69 psk = chromeos 83 psk = chromeos 97 psk = chromeos 113 psk = chromeos 126 psk = chromeos 139 psk = chromeo [all...] |
/external/autotest/server/cros/ap_configurators/ |
belkinF5D8236_ap_configurator.py | 21 psk = '//select[@name="authentication"]' 22 self.select_item_from_popup_by_xpath('WPA/WPA2-Personal (PSK)', 26 selection = 'WPA2-PSK' 28 selection = 'WPA-PSK' 29 self.select_item_from_popup_by_xpath(selection, psk,
|
belkinF9k1002v4_ap_configurator.py | 21 psk = '//select[@name="authentication"]' 22 self.select_item_from_popup_by_xpath('WPA/WPA2-Personal (PSK)', 26 auth_type = 'WPA-PSK' 28 auth_type = 'WPA2-PSK' 29 self.select_item_from_popup_by_xpath(auth_type, psk,
|
belkinF7D_ap_configurator.py | 40 psk = '//select[@name="authentication"]' 41 self.select_item_from_popup_by_xpath('WPA/WPA2-Personal (PSK)', 45 auth_type = 'WPA2-PSK' 47 auth_type = 'WPA-PSK' 48 self.select_item_from_popup_by_xpath(auth_type, psk,
|
/tools/tradefederation/core/util-apps/WifiUtil/src/com/android/tradefed/utils/wifi/ |
WifiConnector.java | 119 * @param psk PSK(Pre-Shared Key) of a Wi-Fi network. This can be null if the given SSID is for 124 public int addNetwork(final String ssid, final String psk, final boolean scanSsid) 140 if (psk == null) { 146 config.preSharedKey = quote(psk); 210 * @param psk PSK of a Wi-Fi network 217 public void connectToNetwork(final String ssid, final String psk, final String urlToCheck, 224 updateLastNetwork(ssid, psk, scanSsid); 246 final int networkId = addNetwork(ssid, psk, scanSsid) 371 final String psk = prefs.getString("psk", null); local [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
WifiConfigurationUtil.java | 107 * Helper method to check if the provided |config| corresponds to a PSK network or not. 318 private static boolean validatePsk(String psk, boolean isAdd) { 320 if (psk == null) { 325 if (psk == null) { 326 // This is an update, so the psk can be null if that is not being changed. 328 } else if (psk.equals(PASSWORD_MASK)) { 334 if (psk.isEmpty()) { 338 if (psk.startsWith("\"")) { 339 // ASCII PSK string 340 byte[] pskBytes = psk.getBytes(StandardCharsets.US_ASCII) [all...] |