/external/curl/docs/ |
D | CIPHERS.md | 355 `DHE-PSK-AES256-GCM-SHA384`, 356 `DHE-PSK-AES128-GCM-SHA256`, 357 `PSK-AES256-GCM-SHA384`, 358 `PSK-AES128-GCM-SHA256`, 359 `DHE-PSK-AES256-CBC-SHA384`, 360 `DHE-PSK-AES128-CBC-SHA256`, 361 `PSK-AES256-CBC-SHA384`, 362 `PSK-AES128-CBC-SHA256`, 363 `PSK-AES128-CBC-SHA`, 364 `PSK-AES256-CBC-SHA`, [all …]
|
/external/wpa_supplicant_8/hostapd/ |
D | hostapd.wpa_psk | 2 # with #, must contain a MAC address and PSK separated with a space. 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 5 # characters or as a 256-bit hex PSK (64 hex digits). 12 # generating a PSK for a WPS Enrollee instead of generating a new random 13 # per-Enrollee PSK.
|
D | eap_testing.txt | 28 EAP-PEAPv0/PSK + - - - - 38 EAP-PEAPv1/PSK + - - - -
|
D | README | 221 - WPA-PSK ("WPA-Personal") 302 # WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either 303 # wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK. 313 # WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit 315 # (8..63 characters) that will be converted to PSK. This conversion uses SSID 316 # so the PSK changes when ASCII passphrase is used and the SSID is changed. 320 # Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The 322 #wpa_key_mgmt=WPA-PSK WPA-EAP
|
D | hostapd.eap_user | 21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a 66 "psk user" PSK "unknown" 67 "psk.user@example.com" PSK 0123456789abcdef0123456789abcdef
|
D | ChangeLog | 17 * added support for MACsec Key Agreement using IEEE 802.1X/PSK 70 - add WPA/WPA2 passphrase/PSK -based VLAN assignment 74 for PSK (wps_cred_add_sae=1) 91 - added local generation of PMK-R0/PMK-R1 for FT-PSK 100 - fixed wpa_psk_file use for FT-PSK 108 WPA2 PSK/passphrase 176 - allow server to provide PSK instead of passphrase for WPA-PSK 370 * extended WPS per-station PSK to support ER case 455 * added support for getting per-device PSK from RADIUS Tunnel-Password 483 * fixed EAP/WPS to PSK transition on reassociation in cases where [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpa_supplicant.conf | 1701 key_mgmt=WPA-PSK 1712 key_mgmt=WPA-PSK 1800 key_mgmt=WPA-PSK WPA-EAP 1828 eap=PSK 1928 key_mgmt=WPA-PSK 1971 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
|
D | eap_testing.txt | 64 EAP-PEAPv0/PSK - - - - - - - - - - + - 75 EAP-PEAPv1/PSK - - - - - - - - - - + - 90 EAP-TTLS/EAP-PSK - - - - - - - - - - + - 98 EAP-PSK +7 - - - - + - - - - + - 129 7) tested only with an older (incompatible) draft of EAP-PSK; FreeRADIUS does 130 not support the current EAP-PSK (RFC) specification 279 - EAP-PSK
|
D | README-Windows.txt | 27 - WPA-PSK, TKIP, CCMP, TKIP+CCMP 29 - WPA2-PSK, TKIP, CCMP, TKIP+CCMP 174 Simple configuration example for WPA-PSK: 180 key_mgmt=WPA-PSK 295 key_mgmt=WPA-PSK
|
/external/autotest/server/site_tests/policy_WiFiPrecedenceServer/ |
D | control.connectable_vs_not_connectable | 14 a WPA-PSK and Open network. The client test is given a network policy for 15 both networks with AutoConnect=True, but the PSK network is given the wrong 18 The open network should connect as the PSK network is inaccessible. 54 security='WPA-PSK',
|
D | control.open_vs_psk | 13 'policy_WiFiPrecedenceServer' sets up both a WPA-PSK and Open network. 17 The PSK network should connect as it is more secure. 52 security='WPA-PSK',
|
/external/swiftshader/third_party/llvm-10.0/llvm/include/llvm/IR/ |
D | ProfileSummary.h | 48 const Kind PSK; 62 : PSK(K), DetailedSummary(std::move(DetailedSummary)), in ProfileSummary() 67 Kind getKind() const { return PSK; } in getKind()
|
/external/llvm/include/llvm/IR/ |
D | ProfileSummary.h | 52 const Kind PSK; 66 : PSK(K), DetailedSummary(std::move(DetailedSummary)), in ProfileSummary() 70 Kind getKind() const { return PSK; } in getKind()
|
/external/autotest/server/site_tests/network_WiFi_RoamFT/ |
D | control.PSK | 7 NAME = 'network_WiFi_RoamFT.PSK' 13 This test attempts to verify that we can roam between two APs using the FT-PSK 14 key management suite (i.e. WPA-PSK with Fast BSS Transition) in full view of the
|
D | control.mixedPSK | 14 that support FT mixed mode for PSK in full view of the DUT. This ensures that
|
/external/llvm-project/llvm/include/llvm/IR/ |
D | ProfileSummary.h | 50 const Kind PSK; 76 : PSK(K), DetailedSummary(std::move(DetailedSummary)), in PSK() function 82 Kind getKind() const { return PSK; } in getKind()
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_passphrase.sgml | 14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 27 <para><command>wpa_passphrase</command> pre-computes PSK entries for 30 and SSID are used to generate a 256-bit PSK.</para>
|
D | wpa_supplicant.conf.sgml | 48 <para>WPA-Personal (PSK) as home network and WPA-Enterprise with 59 key_mgmt=WPA-PSK 159 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
|
/external/autotest/server/site_tests/policy_WiFiTypesServer/ |
D | control.wpa_psk | 13 'policy_WiFiTypesServer.wpa_psk' test configures an WPA-PSK network and runs 34 network = NetworkConfig(password=password, security='WPA-PSK')
|
/external/autotest/client/site_tests/network_VPNConnect/ |
D | control.l2tpipsec_xauth | 12 Tests that we can complete L2TP/IPSec PSK VPN authentication with XAUTH. 20 L2TP/IPSec PSK VPN server runing at the other end of a virtual Ethernet
|
D | control.l2tpipsec_psk | 12 Tests that we can complete L2TP/IPSec PSK VPN authentication. 20 L2TP/IPSec PSK VPN server runing at the other end of a virtual Ethernet
|
/external/boringssl/src/ssl/test/runner/hpke/ |
D | hpke_test.go | 78 PSK HexString `json:"psk"` member 150 …nderX25519(testVec.KDF, testVec.AEAD, testVec.PublicKeyR, testVec.Info, testVec.PSK, testVec.PSKID, 160 …25519(testVec.KDF, testVec.AEAD, enc, testVec.SecretKeyR, testVec.Info, testVec.PSK, testVec.PSKID)
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
D | wpa-psk-tkip.conf | 7 key_mgmt=WPA-PSK
|
/external/ipsec-tools/src/racoon/ |
D | prsa_tok.l | 61 PSK { return TAG_PSK; }
|
/external/autotest/server/site_tests/network_WiFi_ChaosConnectDisconnect/ |
D | control.local | 21 # List of specific APs to debug. Please verify the APs indeed support PSK.
|