Searched defs:psk (Results 1 - 25 of 74) sorted by relevance

123

/external/wpa_supplicant_6/wpa_supplicant/
H A Dwpa_passphrase.c23 unsigned char psk[32]; local
61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32);
65 printf("\t#psk=\"%s\"\n", passphrase);
68 printf("%02x", psk[i]);
H A Dconfig_ssid.h121 * psk - WPA pre-shared key (256 bits)
123 u8 psk[32]; member in struct:wpa_ssid
133 * If this is set, psk will be generated using the SSID and passphrase
278 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
H A Dwps_supplicant.c345 if (hexstr2bin((const char *) cred->key, ssid->psk,
619 static int wpas_wps_new_psk_cb(void *ctx, const u8 *mac_addr, const u8 *psk, argument
624 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len);
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpa_passphrase.c17 unsigned char psk[32]; local
55 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); local
59 printf("\t#psk=\"%s\"\n", passphrase);
62 printf("%02x", psk[i]);
H A Dibss_rsn.h32 u8 psk[PMK_LEN]; member in struct:ibss_rsn
42 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_psk_common.c25 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument
28 if (aes_128_encrypt_block(psk, ak, ak))
33 if (aes_128_encrypt_block(psk, ak, ak) ||
34 aes_128_encrypt_block(psk, kdk, kdk))
H A Deap_gpsk_common.c47 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */,
69 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash))
82 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */,
104 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash);
118 const u8 *psk, size_t psk_len,
155 os_memcpy(pos, psk, psk_len);
165 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
197 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument
226 psk, psk_len, seed, seed_len,
233 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_ argument
116 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument
287 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_psk_common.c19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument
22 if (aes_128_encrypt_block(psk, ak, ak))
27 if (aes_128_encrypt_block(psk, ak, ak) ||
28 aes_128_encrypt_block(psk, kdk, kdk))
H A Deap_gpsk_common.c38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */,
60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash))
73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */,
95 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash);
109 const u8 *psk, size_t psk_len,
146 os_memcpy(pos, psk, psk_len);
156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
188 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument
217 psk, psk_len, seed, seed_len,
224 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_ argument
107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument
278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_psk_common.c19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument
22 if (aes_128_encrypt_block(psk, ak, ak))
27 if (aes_128_encrypt_block(psk, ak, ak) ||
28 aes_128_encrypt_block(psk, kdk, kdk))
H A Deap_gpsk_common.c38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */,
60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash))
73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */,
95 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash);
109 const u8 *psk, size_t psk_len,
146 os_memcpy(pos, psk, psk_len);
156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
188 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument
217 psk, psk_len, seed, seed_len,
224 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_ argument
107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument
278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_psk_common.c19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument
22 if (aes_128_encrypt_block(psk, ak, ak))
27 if (aes_128_encrypt_block(psk, ak, ak) ||
28 aes_128_encrypt_block(psk, kdk, kdk))
H A Deap_gpsk_common.c38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */,
60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash))
73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */,
95 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash);
109 const u8 *psk, size_t psk_len,
146 os_memcpy(pos, psk, psk_len);
156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) {
188 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument
217 psk, psk_len, seed, seed_len,
224 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_ argument
107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument
278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/tests/
H A Dtest_sha1.c253 char psk[32]; member in struct:passphrase_test
333 u8 psk[32]; local
337 4096, psk, 32);
338 if (memcmp(psk, test->psk, 32) == 0)
H A Dtest_wpa.c33 u8 psk[PMK_LEN]; member in struct:wpa
219 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN);
285 return wpa->psk;
364 os_memset(wpa.psk, 0x44, PMK_LEN);
/external/ipsec-tools/src/racoon/
H A Dprivsep.c468 vchar_t *psk; local
486 if ((psk = getpsk(bufs[0], keylen)) == NULL) {
491 reply->bufs.buflen[0] = psk->l;
492 reply->hdr.ac_len = sizeof(*reply) + psk->l;
501 memcpy(reply + 1, psk->v, psk->l);
502 vfree(psk);
894 vchar_t *psk; local
932 if ((psk = vmalloc(len - sizeof(*msg))) == NULL)
935 memcpy(psk
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_psk.c65 struct eap_psk_hdr_1 *psk; local
78 sizeof(*psk) + data->id_s_len,
87 psk = wpabuf_put(req, sizeof(*psk));
88 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */
89 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN);
100 struct eap_psk_hdr_3 *psk; local
107 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id);
115 psk = wpabuf_put(req, sizeof(*psk));
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dieee802_11_auth.c40 u8 psk[PMK_LEN]; member in struct:hostapd_cached_radius_acl
80 u8 *psk, int *has_psk, char **identity,
102 if (psk)
103 os_memcpy(psk, entry->psk, PMK_LEN);
203 * @psk: Buffer for returning WPA PSK
204 * @has_psk: Buffer for indicating whether psk was filled
215 u8 *psk, int *has_psk, char **identity,
226 if (psk)
227 os_memset(psk,
77 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, u8 *psk, int *has_psk, char **identity, char **radius_cui) argument
212 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, u8 *psk, int *has_psk, char **identity, char **radius_cui) argument
[all...]
H A Dap_config.c185 struct hostapd_wpa_psk *psk; local
219 psk = os_zalloc(sizeof(*psk));
220 if (psk == NULL) {
226 psk->group = 1;
228 os_memcpy(psk->addr, addr, ETH_ALEN);
234 os_free(psk);
242 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0)
246 4096, psk
385 struct hostapd_wpa_psk *psk, *prev; local
608 struct hostapd_wpa_psk *psk; local
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_psk.c60 struct eap_psk_hdr_1 *psk; local
73 sizeof(*psk) + data->id_s_len,
82 psk = wpabuf_put(req, sizeof(*psk));
83 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */
84 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN);
95 struct eap_psk_hdr_3 *psk; local
102 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id);
110 psk = wpabuf_put(req, sizeof(*psk));
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dieee802_11_auth.c40 u8 psk[PMK_LEN]; member in struct:hostapd_cached_radius_acl
80 u8 *psk, int *has_psk, char **identity,
102 if (psk)
103 os_memcpy(psk, entry->psk, PMK_LEN);
203 * @psk: Buffer for returning WPA PSK
204 * @has_psk: Buffer for indicating whether psk was filled
215 u8 *psk, int *has_psk, char **identity,
226 if (psk)
227 os_memset(psk,
77 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, u8 *psk, int *has_psk, char **identity, char **radius_cui) argument
212 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, u8 *psk, int *has_psk, char **identity, char **radius_cui) argument
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_psk.c60 struct eap_psk_hdr_1 *psk; local
73 sizeof(*psk) + data->id_s_len,
82 psk = wpabuf_put(req, sizeof(*psk));
83 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */
84 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN);
95 struct eap_psk_hdr_3 *psk; local
102 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id);
110 psk = wpabuf_put(req, sizeof(*psk));
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dieee802_11_auth.c40 u8 psk[PMK_LEN]; member in struct:hostapd_cached_radius_acl
80 u8 *psk, int *has_psk, char **identity,
102 if (psk)
103 os_memcpy(psk, entry->psk, PMK_LEN);
203 * @psk: Buffer for returning WPA PSK
204 * @has_psk: Buffer for indicating whether psk was filled
215 u8 *psk, int *has_psk, char **identity,
226 if (psk)
227 os_memset(psk,
77 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, u8 *psk, int *has_psk, char **identity, char **radius_cui) argument
212 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, u8 *psk, int *has_psk, char **identity, char **radius_cui) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_psk.c60 struct eap_psk_hdr_1 *psk; local
73 sizeof(*psk) + data->id_s_len,
82 psk = wpabuf_put(req, sizeof(*psk));
83 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */
84 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN);
95 struct eap_psk_hdr_3 *psk; local
102 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id);
110 psk = wpabuf_put(req, sizeof(*psk));
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_gpsk.c39 u8 *psk; member in struct:eap_gpsk_data
111 data->psk = os_malloc(password_len);
112 if (data->psk == NULL) {
116 os_memcpy(data->psk, password, password_len);
128 os_free(data->psk);
348 if (eap_gpsk_derive_keys(data->psk, data->psk_len,

Completed in 349 milliseconds

123