/external/wpa_supplicant_6/wpa_supplicant/ |
H A D | wpa_passphrase.c | 23 unsigned char psk[32]; local 61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); 65 printf("\t#psk=\"%s\"\n", passphrase); 68 printf("%02x", psk[i]);
|
H A D | config_ssid.h | 121 * psk - WPA pre-shared key (256 bits) 123 u8 psk[32]; member in struct:wpa_ssid 133 * If this is set, psk will be generated using the SSID and passphrase 278 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
|
H A D | wps_supplicant.c | 345 if (hexstr2bin((const char *) cred->key, ssid->psk, 619 static int wpas_wps_new_psk_cb(void *ctx, const u8 *mac_addr, const u8 *psk, argument 624 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpa_passphrase.c | 17 unsigned char psk[32]; local 55 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); local 59 printf("\t#psk=\"%s\"\n", passphrase); 62 printf("%02x", psk[i]);
|
H A D | ibss_rsn.h | 32 u8 psk[PMK_LEN]; member in struct:ibss_rsn 42 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_psk_common.c | 25 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 28 if (aes_128_encrypt_block(psk, ak, ak)) 33 if (aes_128_encrypt_block(psk, ak, ak) || 34 aes_128_encrypt_block(psk, kdk, kdk))
|
H A D | eap_gpsk_common.c | 47 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, 69 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) 82 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, 104 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); 118 const u8 *psk, size_t psk_len, 155 os_memcpy(pos, psk, psk_len); 165 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 197 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument 226 psk, psk_len, seed, seed_len, 233 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_ argument 116 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 287 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 22 if (aes_128_encrypt_block(psk, ak, ak)) 27 if (aes_128_encrypt_block(psk, ak, ak) || 28 aes_128_encrypt_block(psk, kdk, kdk))
|
H A D | eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, 95 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); 109 const u8 *psk, size_t psk_len, 146 os_memcpy(pos, psk, psk_len); 156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 188 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument 217 psk, psk_len, seed, seed_len, 224 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_ argument 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 22 if (aes_128_encrypt_block(psk, ak, ak)) 27 if (aes_128_encrypt_block(psk, ak, ak) || 28 aes_128_encrypt_block(psk, kdk, kdk))
|
H A D | eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, 95 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); 109 const u8 *psk, size_t psk_len, 146 os_memcpy(pos, psk, psk_len); 156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 188 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument 217 psk, psk_len, seed, seed_len, 224 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_ argument 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 22 if (aes_128_encrypt_block(psk, ak, ak)) 27 if (aes_128_encrypt_block(psk, ak, ak) || 28 aes_128_encrypt_block(psk, kdk, kdk))
|
H A D | eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, 95 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); 109 const u8 *psk, size_t psk_len, 146 os_memcpy(pos, psk, psk_len); 156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 188 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument 217 psk, psk_len, seed, seed_len, 224 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_ argument 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
H A D | test_sha1.c | 253 char psk[32]; member in struct:passphrase_test 333 u8 psk[32]; local 337 4096, psk, 32); 338 if (memcmp(psk, test->psk, 32) == 0)
|
H A D | test_wpa.c | 33 u8 psk[PMK_LEN]; member in struct:wpa 219 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN); 285 return wpa->psk; 364 os_memset(wpa.psk, 0x44, PMK_LEN);
|
/external/ipsec-tools/src/racoon/ |
H A D | privsep.c | 468 vchar_t *psk; local 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { 491 reply->bufs.buflen[0] = psk->l; 492 reply->hdr.ac_len = sizeof(*reply) + psk->l; 501 memcpy(reply + 1, psk->v, psk->l); 502 vfree(psk); 894 vchar_t *psk; local 932 if ((psk = vmalloc(len - sizeof(*msg))) == NULL) 935 memcpy(psk [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_psk.c | 65 struct eap_psk_hdr_1 *psk; local 78 sizeof(*psk) + data->id_s_len, 87 psk = wpabuf_put(req, sizeof(*psk)); 88 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ 89 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); 100 struct eap_psk_hdr_3 *psk; local 107 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); 115 psk = wpabuf_put(req, sizeof(*psk)); [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_11_auth.c | 40 u8 psk[PMK_LEN]; member in struct:hostapd_cached_radius_acl 80 u8 *psk, int *has_psk, char **identity, 102 if (psk) 103 os_memcpy(psk, entry->psk, PMK_LEN); 203 * @psk: Buffer for returning WPA PSK 204 * @has_psk: Buffer for indicating whether psk was filled 215 u8 *psk, int *has_psk, char **identity, 226 if (psk) 227 os_memset(psk, 77 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, u8 *psk, int *has_psk, char **identity, char **radius_cui) argument 212 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, u8 *psk, int *has_psk, char **identity, char **radius_cui) argument [all...] |
H A D | ap_config.c | 185 struct hostapd_wpa_psk *psk; local 219 psk = os_zalloc(sizeof(*psk)); 220 if (psk == NULL) { 226 psk->group = 1; 228 os_memcpy(psk->addr, addr, ETH_ALEN); 234 os_free(psk); 242 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) 246 4096, psk 385 struct hostapd_wpa_psk *psk, *prev; local 608 struct hostapd_wpa_psk *psk; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_psk.c | 60 struct eap_psk_hdr_1 *psk; local 73 sizeof(*psk) + data->id_s_len, 82 psk = wpabuf_put(req, sizeof(*psk)); 83 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ 84 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); 95 struct eap_psk_hdr_3 *psk; local 102 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); 110 psk = wpabuf_put(req, sizeof(*psk)); [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_11_auth.c | 40 u8 psk[PMK_LEN]; member in struct:hostapd_cached_radius_acl 80 u8 *psk, int *has_psk, char **identity, 102 if (psk) 103 os_memcpy(psk, entry->psk, PMK_LEN); 203 * @psk: Buffer for returning WPA PSK 204 * @has_psk: Buffer for indicating whether psk was filled 215 u8 *psk, int *has_psk, char **identity, 226 if (psk) 227 os_memset(psk, 77 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, u8 *psk, int *has_psk, char **identity, char **radius_cui) argument 212 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, u8 *psk, int *has_psk, char **identity, char **radius_cui) argument [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_psk.c | 60 struct eap_psk_hdr_1 *psk; local 73 sizeof(*psk) + data->id_s_len, 82 psk = wpabuf_put(req, sizeof(*psk)); 83 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ 84 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); 95 struct eap_psk_hdr_3 *psk; local 102 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); 110 psk = wpabuf_put(req, sizeof(*psk)); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_11_auth.c | 40 u8 psk[PMK_LEN]; member in struct:hostapd_cached_radius_acl 80 u8 *psk, int *has_psk, char **identity, 102 if (psk) 103 os_memcpy(psk, entry->psk, PMK_LEN); 203 * @psk: Buffer for returning WPA PSK 204 * @has_psk: Buffer for indicating whether psk was filled 215 u8 *psk, int *has_psk, char **identity, 226 if (psk) 227 os_memset(psk, 77 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, u8 *psk, int *has_psk, char **identity, char **radius_cui) argument 212 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, u8 *psk, int *has_psk, char **identity, char **radius_cui) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_psk.c | 60 struct eap_psk_hdr_1 *psk; local 73 sizeof(*psk) + data->id_s_len, 82 psk = wpabuf_put(req, sizeof(*psk)); 83 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ 84 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); 95 struct eap_psk_hdr_3 *psk; local 102 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); 110 psk = wpabuf_put(req, sizeof(*psk)); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_gpsk.c | 39 u8 *psk; member in struct:eap_gpsk_data 111 data->psk = os_malloc(password_len); 112 if (data->psk == NULL) { 116 os_memcpy(data->psk, password, password_len); 128 os_free(data->psk); 348 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
|