Home
last modified time | relevance | path

Searched refs:psk (Results 1 – 25 of 181) sorted by relevance

12345678

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Dieee802_11_auth.c38 struct hostapd_sta_wpa_psk_short *psk; member
59 hostapd_free_psk_list(e->psk); in hostapd_acl_cache_free_entry()
76 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk, in copy_psk_list() argument
79 if (!psk) in copy_psk_list()
85 *psk = src; in copy_psk_list()
93 struct hostapd_sta_wpa_psk_short **psk, in hostapd_acl_cache_get() argument
116 copy_psk_list(psk, entry->psk); in hostapd_acl_cache_get()
257 struct hostapd_sta_wpa_psk_short **psk, in hostapd_allowed_address() argument
269 if (psk) in hostapd_allowed_address()
270 *psk = NULL; in hostapd_allowed_address()
[all …]
Dap_config.c289 struct hostapd_wpa_psk *psk; in hostapd_config_read_wpa_psk() local
355 psk = os_zalloc(sizeof(*psk)); in hostapd_config_read_wpa_psk()
356 if (psk == NULL) { in hostapd_config_read_wpa_psk()
361 psk->vlan_id = vlan_id; in hostapd_config_read_wpa_psk()
363 psk->group = 1; in hostapd_config_read_wpa_psk()
365 os_memcpy(psk->addr, addr, ETH_ALEN); in hostapd_config_read_wpa_psk()
371 os_free(psk); in hostapd_config_read_wpa_psk()
378 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) in hostapd_config_read_wpa_psk()
382 4096, psk->psk, PMK_LEN); in hostapd_config_read_wpa_psk()
388 os_free(psk); in hostapd_config_read_wpa_psk()
[all …]
Dieee802_11_auth.h25 struct hostapd_sta_wpa_psk_short **psk,
30 void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Dieee802_11_auth.c38 struct hostapd_sta_wpa_psk_short *psk; member
59 hostapd_free_psk_list(e->psk); in hostapd_acl_cache_free_entry()
76 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk, in copy_psk_list() argument
79 if (!psk) in copy_psk_list()
85 *psk = src; in copy_psk_list()
93 struct hostapd_sta_wpa_psk_short **psk, in hostapd_acl_cache_get() argument
116 copy_psk_list(psk, entry->psk); in hostapd_acl_cache_get()
257 struct hostapd_sta_wpa_psk_short **psk, in hostapd_allowed_address() argument
269 if (psk) in hostapd_allowed_address()
270 *psk = NULL; in hostapd_allowed_address()
[all …]
Dap_config.c289 struct hostapd_wpa_psk *psk; in hostapd_config_read_wpa_psk() local
355 psk = os_zalloc(sizeof(*psk)); in hostapd_config_read_wpa_psk()
356 if (psk == NULL) { in hostapd_config_read_wpa_psk()
361 psk->vlan_id = vlan_id; in hostapd_config_read_wpa_psk()
363 psk->group = 1; in hostapd_config_read_wpa_psk()
365 os_memcpy(psk->addr, addr, ETH_ALEN); in hostapd_config_read_wpa_psk()
371 os_free(psk); in hostapd_config_read_wpa_psk()
378 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) in hostapd_config_read_wpa_psk()
382 4096, psk->psk, PMK_LEN); in hostapd_config_read_wpa_psk()
388 os_free(psk); in hostapd_config_read_wpa_psk()
[all …]
Dieee802_11_auth.h25 struct hostapd_sta_wpa_psk_short **psk,
30 void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk);
/third_party/node/test/parallel/
Dtest-tls-psk-circuit.js63 test({ psk: USERS.UserA, identity: 'UserA' }); property
64 test({ psk: USERS.UserA, identity: 'UserA' }, { maxVersion: 'TLSv1.2' }); property
65 test({ psk: USERS.UserA, identity: 'UserA' }, { minVersion: 'TLSv1.3' }); property
66 test({ psk: USERS.UserB, identity: 'UserB' }); property
67 test({ psk: USERS.UserB, identity: 'UserB' }, { minVersion: 'TLSv1.3' }); property
69 test({ psk: USERS.UserB, identity: 'UserC' }, {}, DISCONNECT_MESSAGE); property
71 test({ psk: USERS.UserA, identity: 'UserB' }, {}, DISCONNECT_MESSAGE); property
72 test({ psk: USERS.UserB, identity: 'UserB' }); property
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Dwpa_supplicant.conf1530 psk="very secret passphrase"
1539 psk="very secret passphrase"
1550 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
1561 psk="not so secure passphrase"
1649 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
1656 psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
1776 psk="12345678"
1792 psk="secret passphrase"
1809 psk="very secret passphrase"
1820 psk="very secret passphrase"
[all …]
Dwpa_passphrase.c17 unsigned char psk[32]; in main() local
61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main()
68 printf("%02x", psk[i]); in main()
Dibss_rsn.h50 u8 psk[PMK_LEN]; member
61 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
Dwpa_supplicant.conf1530 psk="very secret passphrase"
1539 psk="very secret passphrase"
1550 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
1561 psk="not so secure passphrase"
1649 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
1656 psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
1776 psk="12345678"
1792 psk="secret passphrase"
1809 psk="very secret passphrase"
1820 psk="very secret passphrase"
[all …]
Dwpa_passphrase.c17 unsigned char psk[32]; in main() local
61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main()
68 printf("%02x", psk[i]); in main()
Dibss_rsn.h50 u8 psk[PMK_LEN]; member
61 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Deap_gpsk_common.c38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, in eap_gpsk_gkdf_cmac() argument
60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) in eap_gpsk_gkdf_cmac()
73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, in eap_gpsk_gkdf_sha256() argument
95 if (hmac_sha256_vector(psk, 32, 2, addr, vlen, hash)) in eap_gpsk_gkdf_sha256()
110 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument
147 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper()
157 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { in eap_gpsk_derive_keys_helper()
189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument
218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes()
225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument
[all …]
Deap_psk_common.c19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument
22 if (aes_128_encrypt_block(psk, ak, ak)) in eap_psk_key_setup()
27 if (aes_128_encrypt_block(psk, ak, ak) || in eap_psk_key_setup()
28 aes_128_encrypt_block(psk, kdk, kdk)) in eap_psk_key_setup()
Deap_gpsk_common.h49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Deap_gpsk_common.c38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, in eap_gpsk_gkdf_cmac() argument
60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) in eap_gpsk_gkdf_cmac()
73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, in eap_gpsk_gkdf_sha256() argument
95 if (hmac_sha256_vector(psk, 32, 2, addr, vlen, hash)) in eap_gpsk_gkdf_sha256()
110 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument
147 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper()
157 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { in eap_gpsk_derive_keys_helper()
189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument
218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes()
225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument
[all …]
Deap_psk_common.c19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument
22 if (aes_128_encrypt_block(psk, ak, ak)) in eap_psk_key_setup()
27 if (aes_128_encrypt_block(psk, ak, ak) || in eap_psk_key_setup()
28 aes_128_encrypt_block(psk, kdk, kdk)) in eap_psk_key_setup()
Deap_gpsk_common.h49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_psk.c58 struct eap_psk_hdr_1 *psk; in eap_psk_build_1() local
71 sizeof(*psk) + sm->server_id_len, in eap_psk_build_1()
80 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_1()
81 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ in eap_psk_build_1()
82 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_1()
93 struct eap_psk_hdr_3 *psk; in eap_psk_build_3() local
100 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); in eap_psk_build_3()
108 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_3()
109 psk->flags = EAP_PSK_FLAGS_SET_T(2); /* T=2 */ in eap_psk_build_3()
110 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_3()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_psk.c58 struct eap_psk_hdr_1 *psk; in eap_psk_build_1() local
71 sizeof(*psk) + sm->server_id_len, in eap_psk_build_1()
80 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_1()
81 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ in eap_psk_build_1()
82 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_1()
93 struct eap_psk_hdr_3 *psk; in eap_psk_build_3() local
100 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); in eap_psk_build_3()
108 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_3()
109 psk->flags = EAP_PSK_FLAGS_SET_T(2); /* T=2 */ in eap_psk_build_3()
110 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_3()
[all …]
/third_party/openssl/test/
Ddtls_mtu_test.c27 unsigned char *psk, in clnt_psk_callback() argument
34 memset(psk, 0x5a, max_psk_len); in clnt_psk_callback()
40 unsigned char *psk, in srvr_psk_callback() argument
45 memset(psk, 0x5a, max_psk_len); in srvr_psk_callback()
/third_party/openssl/apps/
Dciphers.c69 unsigned char *psk, in dummy_psk() argument
91 int psk = 0; in ciphers_main() local
151 psk = 1; in ciphers_main()
187 if (psk) in ciphers_main()
/third_party/mbedtls/programs/ssl/
Dmini_client.c117 const unsigned char psk[] = { variable
240 mbedtls_ssl_conf_psk( &conf, psk, sizeof( psk ), in main()
/third_party/node/lib/
D_tls_wrap.js327 let psk;
329 psk = ret;
338 psk = ret.psk;
339 validateBuffer(psk, 'psk');
342 if (psk.length > maxPskLen) {
345 psk,
350 return psk;
362 validateBuffer(ret.psk, 'psk');
363 if (ret.psk.length > maxPskLen) {
366 ret.psk,
[all …]

12345678