/external/wpa_supplicant_8/wpa_supplicant/examples/ |
H A D | wpa-psk-tkip.conf | 6 ssid="example wpa-psk network" 11 psk="secret passphrase"
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpa_passphrase.c | 17 unsigned char psk[32]; local 55 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); local 59 printf("\t#psk=\"%s\"\n", passphrase); 62 printf("%02x", psk[i]);
|
H A D | wpa_supplicant.conf | 710 # both), and psk must also be set. 769 # WPA-PSK = WPA pre-shared key (this requires 'psk' field) 820 # psk: WPA preshared key; 256-bit pre-shared key 833 # 0 = allow psk/passphrase to be stored to the configuration file 834 # 1 = do not store psk/passphrase to the configuration file 1262 psk="very secret passphrase" 1271 psk="very secret passphrase" 1282 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 1293 psk="not so secure passphrase" 1381 psk [all...] |
/external/autotest/server/cros/ap_configurators/ |
H A D | belkinF5D8236_ap_configurator.py | 21 psk = '//select[@name="authentication"]' 29 self.select_item_from_popup_by_xpath(selection, psk,
|
H A D | belkinF9k1002v4_ap_configurator.py | 21 psk = '//select[@name="authentication"]' 29 self.select_item_from_popup_by_xpath(auth_type, psk,
|
H A D | belkinF7D_ap_configurator.py | 40 psk = '//select[@name="authentication"]' 48 self.select_item_from_popup_by_xpath(auth_type, psk,
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_11_auth.h | 25 struct hostapd_sta_wpa_psk_short **psk, 29 void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk);
|
H A D | ieee802_11_auth.c | 38 struct hostapd_sta_wpa_psk_short *psk; member in struct:hostapd_cached_radius_acl 59 hostapd_free_psk_list(e->psk); 76 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk, argument 79 if (!psk) 85 *psk = src; 93 struct hostapd_sta_wpa_psk_short **psk, 116 copy_psk_list(psk, entry->psk); 244 * @psk: Linked list buffer for returning WPA PSK 256 struct hostapd_sta_wpa_psk_short **psk, 89 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, struct vlan_description *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument 252 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, struct vlan_description *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument 437 struct hostapd_sta_wpa_psk_short *psk; local 678 hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk) argument [all...] |
H A D | ap_config.c | 212 struct hostapd_wpa_psk *psk; local 246 psk = os_zalloc(sizeof(*psk)); 247 if (psk == NULL) { 253 psk->group = 1; 255 os_memcpy(psk->addr, addr, ETH_ALEN); 261 os_free(psk); 269 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) 273 4096, psk 399 struct hostapd_wpa_psk *psk, *tmp; local 708 struct hostapd_wpa_psk *psk; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_11_auth.h | 25 struct hostapd_sta_wpa_psk_short **psk, 29 void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk);
|
H A D | ieee802_11_auth.c | 38 struct hostapd_sta_wpa_psk_short *psk; member in struct:hostapd_cached_radius_acl 59 hostapd_free_psk_list(e->psk); 76 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk, argument 79 if (!psk) 85 *psk = src; 93 struct hostapd_sta_wpa_psk_short **psk, 116 copy_psk_list(psk, entry->psk); 244 * @psk: Linked list buffer for returning WPA PSK 256 struct hostapd_sta_wpa_psk_short **psk, 89 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, struct vlan_description *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument 252 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, struct vlan_description *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument 437 struct hostapd_sta_wpa_psk_short *psk; local 678 hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk) argument [all...] |
H A D | ap_config.c | 212 struct hostapd_wpa_psk *psk; local 246 psk = os_zalloc(sizeof(*psk)); 247 if (psk == NULL) { 253 psk->group = 1; 255 os_memcpy(psk->addr, addr, ETH_ALEN); 261 os_free(psk); 269 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) 273 4096, psk 399 struct hostapd_wpa_psk *psk, *tmp; local 708 struct hostapd_wpa_psk *psk; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_11_auth.h | 25 struct hostapd_sta_wpa_psk_short **psk, 29 void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk);
|
H A D | ieee802_11_auth.c | 38 struct hostapd_sta_wpa_psk_short *psk; member in struct:hostapd_cached_radius_acl 59 hostapd_free_psk_list(e->psk); 76 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk, argument 79 if (!psk) 85 *psk = src; 93 struct hostapd_sta_wpa_psk_short **psk, 116 copy_psk_list(psk, entry->psk); 244 * @psk: Linked list buffer for returning WPA PSK 256 struct hostapd_sta_wpa_psk_short **psk, 89 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, struct vlan_description *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument 252 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, struct vlan_description *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument 437 struct hostapd_sta_wpa_psk_short *psk; local 678 hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk) argument [all...] |
H A D | ap_config.c | 212 struct hostapd_wpa_psk *psk; local 246 psk = os_zalloc(sizeof(*psk)); 247 if (psk == NULL) { 253 psk->group = 1; 255 os_memcpy(psk->addr, addr, ETH_ALEN); 261 os_free(psk); 269 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) 273 4096, psk 399 struct hostapd_wpa_psk *psk, *tmp; local 708 struct hostapd_wpa_psk *psk; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 22 if (aes_128_encrypt_block(psk, ak, ak)) 27 if (aes_128_encrypt_block(psk, ak, ak) || 28 aes_128_encrypt_block(psk, kdk, kdk))
|
H A D | eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, 95 if (hmac_sha256_vector(psk, 32, 2, addr, vlen, hash)) 110 const u8 *psk, size_t psk_len, 147 os_memcpy(pos, psk, psk_len); 157 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument 218 psk, psk_len, seed, seed_len, 225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_ argument 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 343 eap_gpsk_derive_mid_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, const u8 *seed, size_t seed_len, u8 method_type) argument 417 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument [all...] |
H A D | eap_gpsk_common.h | 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 22 if (aes_128_encrypt_block(psk, ak, ak)) 27 if (aes_128_encrypt_block(psk, ak, ak) || 28 aes_128_encrypt_block(psk, kdk, kdk))
|
H A D | eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, 95 if (hmac_sha256_vector(psk, 32, 2, addr, vlen, hash)) 110 const u8 *psk, size_t psk_len, 147 os_memcpy(pos, psk, psk_len); 157 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument 218 psk, psk_len, seed, seed_len, 225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_ argument 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 343 eap_gpsk_derive_mid_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, const u8 *seed, size_t seed_len, u8 method_type) argument 417 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) argument 22 if (aes_128_encrypt_block(psk, ak, ak)) 27 if (aes_128_encrypt_block(psk, ak, ak) || 28 aes_128_encrypt_block(psk, kdk, kdk))
|
H A D | eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, 95 if (hmac_sha256_vector(psk, 32, 2, addr, vlen, hash)) 110 const u8 *psk, size_t psk_len, 147 os_memcpy(pos, psk, psk_len); 157 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument 218 psk, psk_len, seed, seed_len, 225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_ argument 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 343 eap_gpsk_derive_mid_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, const u8 *seed, size_t seed_len, u8 method_type) argument 417 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument [all...] |
/external/autotest/server/cros/ |
H A D | chaos_shadow_ap_list.conf | 18 psk = chromeos
|
H A D | clique_ap_list.conf | 14 psk = chromeos
|
H A D | chaos_dynamic_ap_list.conf | 24 psk = chromeos 37 psk = chromeos 71 psk = chromeos 93 psk = chromeos 106 psk = chromeos 119 psk = chromeos 132 psk = chromeos 191 psk = chromeos 268 psk = chromeos 281 psk [all...] |