/external/chromium_org/chrome/browser/chromeos/login/easy_unlock/ |
H A D | easy_unlock_types.h | 29 std::string psk; member in struct:chromeos::EasyUnlockDeviceKeyData
|
H A D | easy_unlock_key_manager.cc | 23 const char kKeyPsk[] = "psk"; 111 dict->SetString(kKeyPsk, data.psk); 128 std::string psk; local 132 !dict.GetString(kKeyPsk, &psk)) { 138 data->psk.swap(psk);
|
/external/chromium_org/chrome/browser/local_discovery/wifi/ |
H A D | wifi_manager.cc | 29 WifiCredentials WifiCredentials::FromPSK(const std::string& psk) { argument 31 return_value.psk = psk;
|
H A D | wifi_manager.h | 28 static WifiCredentials FromPSK(const std::string& psk); 30 std::string psk; member in struct:local_discovery::wifi::WifiCredentials
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpa_passphrase.c | 17 unsigned char psk[32]; local 55 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); local 59 printf("\t#psk=\"%s\"\n", passphrase); 62 printf("%02x", psk[i]);
|
H A D | ibss_rsn.h | 50 u8 psk[PMK_LEN]; member in struct:ibss_rsn 60 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 22 if (aes_128_encrypt_block(psk, ak, ak)) 27 if (aes_128_encrypt_block(psk, ak, ak) || 28 aes_128_encrypt_block(psk, kdk, kdk))
|
H A D | eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, 95 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); 109 const u8 *psk, size_t psk_len, 146 os_memcpy(pos, psk, psk_len); 156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 188 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument 217 psk, psk_len, seed, seed_len, 224 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_ argument 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 342 eap_gpsk_derive_mid_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, const u8 *seed, size_t seed_len, u8 method_type) argument 416 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 22 if (aes_128_encrypt_block(psk, ak, ak)) 27 if (aes_128_encrypt_block(psk, ak, ak) || 28 aes_128_encrypt_block(psk, kdk, kdk))
|
H A D | eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, 95 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); 109 const u8 *psk, size_t psk_len, 146 os_memcpy(pos, psk, psk_len); 156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 188 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument 217 psk, psk_len, seed, seed_len, 224 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_ argument 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 342 eap_gpsk_derive_mid_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, const u8 *seed, size_t seed_len, u8 method_type) argument 416 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 22 if (aes_128_encrypt_block(psk, ak, ak)) 27 if (aes_128_encrypt_block(psk, ak, ak) || 28 aes_128_encrypt_block(psk, kdk, kdk))
|
H A D | eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, 95 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); 109 const u8 *psk, size_t psk_len, 146 os_memcpy(pos, psk, psk_len); 156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 188 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument 217 psk, psk_len, seed, seed_len, 224 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_ argument 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 342 eap_gpsk_derive_mid_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, const u8 *seed, size_t seed_len, u8 method_type) argument 416 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | privsep.c | 468 vchar_t *psk; local 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { 491 reply->bufs.buflen[0] = psk->l; 492 reply->hdr.ac_len = sizeof(*reply) + psk->l; 501 memcpy(reply + 1, psk->v, psk->l); 502 vfree(psk); 894 vchar_t *psk; local 932 if ((psk = vmalloc(len - sizeof(*msg))) == NULL) 935 memcpy(psk [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_11_auth.c | 39 struct hostapd_sta_wpa_psk_short *psk; member in struct:hostapd_cached_radius_acl 60 hostapd_free_psk_list(e->psk); 77 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk, argument 84 copy_to = psk; 103 struct hostapd_sta_wpa_psk_short **psk, 126 copy_psk_list(psk, entry->psk); 224 * @psk: Linked list buffer for returning WPA PSK 235 struct hostapd_sta_wpa_psk_short **psk, 244 if (psk) 100 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument 232 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument 428 struct hostapd_sta_wpa_psk_short *psk; local 636 hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk) argument [all...] |
H A D | ap_config.c | 212 struct hostapd_wpa_psk *psk; local 246 psk = os_zalloc(sizeof(*psk)); 247 if (psk == NULL) { 253 psk->group = 1; 255 os_memcpy(psk->addr, addr, ETH_ALEN); 261 os_free(psk); 269 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) 273 4096, psk 399 struct hostapd_wpa_psk *psk, *prev; local 653 struct hostapd_wpa_psk *psk; local [all...] |
H A D | wpa_auth_glue.c | 213 const u8 *psk; local 223 psk = hostapd_get_psk(hapd->conf, addr, p2p_dev_addr, prev_psk); 226 * returned psk which should not be returned again. 227 * logic list (all hostapd_get_psk; all sta->psk) 229 if (sta && sta->psk && !psk) { 231 psk = sta->psk->psk; 232 for (pos = sta->psk; po [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_psk.c | 58 struct eap_psk_hdr_1 *psk; local 71 sizeof(*psk) + sm->server_id_len, 80 psk = wpabuf_put(req, sizeof(*psk)); 81 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ 82 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); 93 struct eap_psk_hdr_3 *psk; local 100 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); 108 psk = wpabuf_put(req, sizeof(*psk)); [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_11_auth.c | 39 struct hostapd_sta_wpa_psk_short *psk; member in struct:hostapd_cached_radius_acl 60 hostapd_free_psk_list(e->psk); 77 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk, argument 84 copy_to = psk; 103 struct hostapd_sta_wpa_psk_short **psk, 126 copy_psk_list(psk, entry->psk); 224 * @psk: Linked list buffer for returning WPA PSK 235 struct hostapd_sta_wpa_psk_short **psk, 244 if (psk) 100 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument 232 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument 428 struct hostapd_sta_wpa_psk_short *psk; local 636 hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk) argument [all...] |
H A D | ap_config.c | 212 struct hostapd_wpa_psk *psk; local 246 psk = os_zalloc(sizeof(*psk)); 247 if (psk == NULL) { 253 psk->group = 1; 255 os_memcpy(psk->addr, addr, ETH_ALEN); 261 os_free(psk); 269 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) 273 4096, psk 399 struct hostapd_wpa_psk *psk, *prev; local 653 struct hostapd_wpa_psk *psk; local [all...] |
H A D | wpa_auth_glue.c | 213 const u8 *psk; local 223 psk = hostapd_get_psk(hapd->conf, addr, p2p_dev_addr, prev_psk); 226 * returned psk which should not be returned again. 227 * logic list (all hostapd_get_psk; all sta->psk) 229 if (sta && sta->psk && !psk) { 231 psk = sta->psk->psk; 232 for (pos = sta->psk; po [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_psk.c | 58 struct eap_psk_hdr_1 *psk; local 71 sizeof(*psk) + sm->server_id_len, 80 psk = wpabuf_put(req, sizeof(*psk)); 81 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ 82 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); 93 struct eap_psk_hdr_3 *psk; local 100 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); 108 psk = wpabuf_put(req, sizeof(*psk)); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_11_auth.c | 39 struct hostapd_sta_wpa_psk_short *psk; member in struct:hostapd_cached_radius_acl 60 hostapd_free_psk_list(e->psk); 77 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk, argument 84 copy_to = psk; 103 struct hostapd_sta_wpa_psk_short **psk, 126 copy_psk_list(psk, entry->psk); 224 * @psk: Linked list buffer for returning WPA PSK 235 struct hostapd_sta_wpa_psk_short **psk, 244 if (psk) 100 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument 232 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument 428 struct hostapd_sta_wpa_psk_short *psk; local 636 hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_psk.c | 58 struct eap_psk_hdr_1 *psk; local 71 sizeof(*psk) + sm->server_id_len, 80 psk = wpabuf_put(req, sizeof(*psk)); 81 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ 82 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); 93 struct eap_psk_hdr_3 *psk; local 100 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); 108 psk = wpabuf_put(req, sizeof(*psk)); [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_gpsk.c | 34 u8 *psk; member in struct:eap_gpsk_data 120 data->psk = os_malloc(password_len); 121 if (data->psk == NULL) { 125 os_memcpy(data->psk, password, password_len); 137 if (data->psk) { 138 os_memset(data->psk, 0, data->psk_len); 139 os_free(data->psk); 367 if (eap_gpsk_derive_keys(data->psk, data->psk_len, 381 if (eap_gpsk_derive_session_id(data->psk, data->psk_len,
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_enrollee.c | 275 u8 psk[32]; local 278 random_get_bytes(psk, sizeof(psk)) < 0) { 284 psk, sizeof(psk)); 287 wpa_snprintf_hex(hex, sizeof(hex), psk, sizeof(psk)); 289 wpabuf_put_be16(msg, sizeof(psk) * 2); 290 wpabuf_put_data(msg, hex, sizeof(psk) * 2); 294 wps->p2p_dev_addr, psk, sizeo [all...] |