/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | ieee802_11_auth.c | 38 struct hostapd_sta_wpa_psk_short *psk; member 59 hostapd_free_psk_list(e->psk); in hostapd_acl_cache_free_entry() 76 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk, in copy_psk_list() argument 79 if (!psk) in copy_psk_list() 85 *psk = src; in copy_psk_list() 93 struct hostapd_sta_wpa_psk_short **psk, in hostapd_acl_cache_get() argument 116 copy_psk_list(psk, entry->psk); in hostapd_acl_cache_get() 257 struct hostapd_sta_wpa_psk_short **psk, in hostapd_allowed_address() argument 269 if (psk) in hostapd_allowed_address() 270 *psk = NULL; in hostapd_allowed_address() [all …]
|
D | ap_config.c | 289 struct hostapd_wpa_psk *psk; in hostapd_config_read_wpa_psk() local 355 psk = os_zalloc(sizeof(*psk)); in hostapd_config_read_wpa_psk() 356 if (psk == NULL) { in hostapd_config_read_wpa_psk() 361 psk->vlan_id = vlan_id; in hostapd_config_read_wpa_psk() 363 psk->group = 1; in hostapd_config_read_wpa_psk() 365 os_memcpy(psk->addr, addr, ETH_ALEN); in hostapd_config_read_wpa_psk() 371 os_free(psk); in hostapd_config_read_wpa_psk() 378 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) in hostapd_config_read_wpa_psk() 382 4096, psk->psk, PMK_LEN); in hostapd_config_read_wpa_psk() 388 os_free(psk); in hostapd_config_read_wpa_psk() [all …]
|
D | ieee802_11_auth.h | 25 struct hostapd_sta_wpa_psk_short **psk, 30 void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | ieee802_11_auth.c | 38 struct hostapd_sta_wpa_psk_short *psk; member 59 hostapd_free_psk_list(e->psk); in hostapd_acl_cache_free_entry() 76 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk, in copy_psk_list() argument 79 if (!psk) in copy_psk_list() 85 *psk = src; in copy_psk_list() 93 struct hostapd_sta_wpa_psk_short **psk, in hostapd_acl_cache_get() argument 116 copy_psk_list(psk, entry->psk); in hostapd_acl_cache_get() 257 struct hostapd_sta_wpa_psk_short **psk, in hostapd_allowed_address() argument 269 if (psk) in hostapd_allowed_address() 270 *psk = NULL; in hostapd_allowed_address() [all …]
|
D | ap_config.c | 289 struct hostapd_wpa_psk *psk; in hostapd_config_read_wpa_psk() local 355 psk = os_zalloc(sizeof(*psk)); in hostapd_config_read_wpa_psk() 356 if (psk == NULL) { in hostapd_config_read_wpa_psk() 361 psk->vlan_id = vlan_id; in hostapd_config_read_wpa_psk() 363 psk->group = 1; in hostapd_config_read_wpa_psk() 365 os_memcpy(psk->addr, addr, ETH_ALEN); in hostapd_config_read_wpa_psk() 371 os_free(psk); in hostapd_config_read_wpa_psk() 378 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) in hostapd_config_read_wpa_psk() 382 4096, psk->psk, PMK_LEN); in hostapd_config_read_wpa_psk() 388 os_free(psk); in hostapd_config_read_wpa_psk() [all …]
|
D | ieee802_11_auth.h | 25 struct hostapd_sta_wpa_psk_short **psk, 30 void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk);
|
/third_party/node/test/parallel/ |
D | test-tls-psk-circuit.js | 63 test({ psk: USERS.UserA, identity: 'UserA' }); property 64 test({ psk: USERS.UserA, identity: 'UserA' }, { maxVersion: 'TLSv1.2' }); property 65 test({ psk: USERS.UserA, identity: 'UserA' }, { minVersion: 'TLSv1.3' }); property 66 test({ psk: USERS.UserB, identity: 'UserB' }); property 67 test({ psk: USERS.UserB, identity: 'UserB' }, { minVersion: 'TLSv1.3' }); property 69 test({ psk: USERS.UserB, identity: 'UserC' }, {}, DISCONNECT_MESSAGE); property 71 test({ psk: USERS.UserA, identity: 'UserB' }, {}, DISCONNECT_MESSAGE); property 72 test({ psk: USERS.UserB, identity: 'UserB' }); property
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | wpa_supplicant.conf | 1530 psk="very secret passphrase" 1539 psk="very secret passphrase" 1550 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 1561 psk="not so secure passphrase" 1649 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 1656 psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f 1776 psk="12345678" 1792 psk="secret passphrase" 1809 psk="very secret passphrase" 1820 psk="very secret passphrase" [all …]
|
D | wpa_passphrase.c | 17 unsigned char psk[32]; in main() local 61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main() 68 printf("%02x", psk[i]); in main()
|
D | ibss_rsn.h | 50 u8 psk[PMK_LEN]; member 61 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | wpa_supplicant.conf | 1530 psk="very secret passphrase" 1539 psk="very secret passphrase" 1550 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 1561 psk="not so secure passphrase" 1649 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 1656 psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f 1776 psk="12345678" 1792 psk="secret passphrase" 1809 psk="very secret passphrase" 1820 psk="very secret passphrase" [all …]
|
D | wpa_passphrase.c | 17 unsigned char psk[32]; in main() local 61 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main() 68 printf("%02x", psk[i]); in main()
|
D | ibss_rsn.h | 50 u8 psk[PMK_LEN]; member 61 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, in eap_gpsk_gkdf_cmac() argument 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) in eap_gpsk_gkdf_cmac() 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, in eap_gpsk_gkdf_sha256() argument 95 if (hmac_sha256_vector(psk, 32, 2, addr, vlen, hash)) in eap_gpsk_gkdf_sha256() 110 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument 147 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper() 157 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { in eap_gpsk_derive_keys_helper() 189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument 218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument [all …]
|
D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument 22 if (aes_128_encrypt_block(psk, ak, ak)) in eap_psk_key_setup() 27 if (aes_128_encrypt_block(psk, ak, ak) || in eap_psk_key_setup() 28 aes_128_encrypt_block(psk, kdk, kdk)) in eap_psk_key_setup()
|
D | eap_gpsk_common.h | 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, in eap_gpsk_gkdf_cmac() argument 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) in eap_gpsk_gkdf_cmac() 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, in eap_gpsk_gkdf_sha256() argument 95 if (hmac_sha256_vector(psk, 32, 2, addr, vlen, hash)) in eap_gpsk_gkdf_sha256() 110 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument 147 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper() 157 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { in eap_gpsk_derive_keys_helper() 189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument 218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument [all …]
|
D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument 22 if (aes_128_encrypt_block(psk, ak, ak)) in eap_psk_key_setup() 27 if (aes_128_encrypt_block(psk, ak, ak) || in eap_psk_key_setup() 28 aes_128_encrypt_block(psk, kdk, kdk)) in eap_psk_key_setup()
|
D | eap_gpsk_common.h | 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_psk.c | 58 struct eap_psk_hdr_1 *psk; in eap_psk_build_1() local 71 sizeof(*psk) + sm->server_id_len, in eap_psk_build_1() 80 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_1() 81 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ in eap_psk_build_1() 82 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_1() 93 struct eap_psk_hdr_3 *psk; in eap_psk_build_3() local 100 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); in eap_psk_build_3() 108 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_3() 109 psk->flags = EAP_PSK_FLAGS_SET_T(2); /* T=2 */ in eap_psk_build_3() 110 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_3() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_psk.c | 58 struct eap_psk_hdr_1 *psk; in eap_psk_build_1() local 71 sizeof(*psk) + sm->server_id_len, in eap_psk_build_1() 80 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_1() 81 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ in eap_psk_build_1() 82 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_1() 93 struct eap_psk_hdr_3 *psk; in eap_psk_build_3() local 100 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); in eap_psk_build_3() 108 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_3() 109 psk->flags = EAP_PSK_FLAGS_SET_T(2); /* T=2 */ in eap_psk_build_3() 110 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_3() [all …]
|
/third_party/openssl/test/ |
D | dtls_mtu_test.c | 27 unsigned char *psk, in clnt_psk_callback() argument 34 memset(psk, 0x5a, max_psk_len); in clnt_psk_callback() 40 unsigned char *psk, in srvr_psk_callback() argument 45 memset(psk, 0x5a, max_psk_len); in srvr_psk_callback()
|
/third_party/openssl/apps/ |
D | ciphers.c | 69 unsigned char *psk, in dummy_psk() argument 91 int psk = 0; in ciphers_main() local 151 psk = 1; in ciphers_main() 187 if (psk) in ciphers_main()
|
/third_party/mbedtls/programs/ssl/ |
D | mini_client.c | 117 const unsigned char psk[] = { variable 240 mbedtls_ssl_conf_psk( &conf, psk, sizeof( psk ), in main()
|
/third_party/node/lib/ |
D | _tls_wrap.js | 327 let psk; 329 psk = ret; 338 psk = ret.psk; 339 validateBuffer(psk, 'psk'); 342 if (psk.length > maxPskLen) { 345 psk, 350 return psk; 362 validateBuffer(ret.psk, 'psk'); 363 if (ret.psk.length > maxPskLen) { 366 ret.psk, [all …]
|