/external/autotest/server/cros/ |
D | chaos_ap_list.conf | 25 psk = chromeos 40 psk = chromeos 55 psk = chromeos 83 psk = chromeos 179 psk = chromeos 194 psk = chromeos 209 psk = chromeos 224 psk = chromeos 239 psk = chromeos 254 psk = chromeos [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | ieee802_11_auth.c | 61 hostapd_free_psk_list(e->info.psk); in hostapd_acl_cache_free_entry() 416 struct hostapd_sta_wpa_psk_short *psk; in decode_tunnel_passwords() local 445 psk = os_zalloc(sizeof(struct hostapd_sta_wpa_psk_short)); in decode_tunnel_passwords() 446 if (psk) { in decode_tunnel_passwords() 448 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords() 456 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords() 458 psk->is_passphrase = 1; in decode_tunnel_passwords() 460 psk->next = cache->info.psk; in decode_tunnel_passwords() 461 cache->info.psk = psk; in decode_tunnel_passwords() 462 psk = NULL; in decode_tunnel_passwords() [all …]
|
D | ap_config.c | 321 struct hostapd_wpa_psk *psk; in hostapd_config_read_wpa_psk() local 391 psk = os_zalloc(sizeof(*psk)); in hostapd_config_read_wpa_psk() 392 if (psk == NULL) { in hostapd_config_read_wpa_psk() 397 psk->vlan_id = vlan_id; in hostapd_config_read_wpa_psk() 399 psk->group = 1; in hostapd_config_read_wpa_psk() 401 os_memcpy(psk->addr, addr, ETH_ALEN); in hostapd_config_read_wpa_psk() 407 os_free(psk); in hostapd_config_read_wpa_psk() 415 hexstr2bin(pos, psk->psk, PMK_LEN) == 0) in hostapd_config_read_wpa_psk() 419 4096, psk->psk, PMK_LEN) == 0) in hostapd_config_read_wpa_psk() 425 os_free(psk); in hostapd_config_read_wpa_psk() [all …]
|
D | ieee802_11_auth.h | 23 struct hostapd_sta_wpa_psk_short *psk; member 35 void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk); 37 void hostapd_copy_psk_list(struct hostapd_sta_wpa_psk_short **psk,
|
D | wps_hostapd.c | 96 const u8 *p2p_dev_addr, const u8 *psk, in hostapd_wps_new_psk_cb() argument 113 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); in hostapd_wps_new_psk_cb() 127 os_memcpy(p->psk, psk, PMK_LEN); in hostapd_wps_new_psk_cb() 132 psk, psk_len); in hostapd_wps_new_psk_cb() 150 wpa_snprintf_hex(hex, sizeof(hex), psk, psk_len); in hostapd_wps_new_psk_cb() 275 const u8 **psk) in hostapd_wps_lookup_pskfile_cb() argument 288 any_psk = wpa_psk->psk; in hostapd_wps_lookup_pskfile_cb() 292 dev_psk = wpa_psk->psk; in hostapd_wps_lookup_pskfile_cb() 298 *psk = dev_psk; in hostapd_wps_lookup_pskfile_cb() 300 *psk = any_psk; in hostapd_wps_lookup_pskfile_cb() [all …]
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, in eap_gpsk_gkdf_cmac() argument 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) in eap_gpsk_gkdf_cmac() 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, in eap_gpsk_gkdf_sha256() argument 95 if (hmac_sha256_vector(psk, 32, 2, addr, vlen, hash)) in eap_gpsk_gkdf_sha256() 110 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument 147 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper() 157 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { in eap_gpsk_derive_keys_helper() 189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument 218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument [all …]
|
D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument 22 if (aes_128_encrypt_block(psk, ak, ak)) in eap_psk_key_setup() 27 if (aes_128_encrypt_block(psk, ak, ak) || in eap_psk_key_setup() 28 aes_128_encrypt_block(psk, kdk, kdk)) in eap_psk_key_setup()
|
D | eap_gpsk_common.h | 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpa_supplicant.conf | 1684 psk="very secret passphrase" 1693 psk="very secret passphrase" 1704 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 1715 psk="not so secure passphrase" 1803 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 1810 psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f 1930 psk="12345678" 1946 psk="secret passphrase" 1963 psk="very secret passphrase" 1974 psk="very secret passphrase" [all …]
|
D | wpa_passphrase.c | 17 unsigned char psk[32]; in main() local 61 if (pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32) in main() 72 printf("%02x", psk[i]); in main()
|
D | ibss_rsn.h | 50 u8 psk[PMK_LEN]; member 61 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
|
/external/boringssl/src/ssl/test/runner/hpke/ |
D | hpke.go | 110 func SetupPSKSenderX25519(kdfID, aeadID uint16, publicKeyR, info, psk, pskID []byte, ephemKeygen Ge… argument 115 …err = keySchedule(hpkeModePSK, X25519WithHKDFSHA256, kdfID, aeadID, sharedSecret, info, psk, pskID) 121 func SetupPSKReceiverX25519(kdfID, aeadID uint16, enc, secretKeyR, info, psk, pskID []byte) (contex… argument 126 …err = keySchedule(hpkeModePSK, X25519WithHKDFSHA256, kdfID, aeadID, sharedSecret, info, psk, pskID) 196 func keySchedule(mode uint8, kemID, kdfID, aeadID uint16, sharedSecret, info, psk, pskID []byte) (*… argument 200 if len(psk) > 0 || len(pskID) > 0 { 204 if len(psk) == 0 || len(pskID) == 0 { 221 secret := labeledExtract(kdfHash, sharedSecret, suiteID, []byte("secret"), psk)
|
/external/autotest/server/site_tests/network_WiFi_SimpleConnect/ |
D | control.wifi_checkOddWPAPassphrases | 27 for psk in psks: 29 psk=psk, 33 psk=psk,
|
D | control.wifi_checkHiddenWPA | 26 psk='chromeos', 30 psk='chromeos', 35 psk='chromeos', 39 psk='chromeos',
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_psk.c | 58 struct eap_psk_hdr_1 *psk; in eap_psk_build_1() local 71 sizeof(*psk) + sm->cfg->server_id_len, in eap_psk_build_1() 80 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_1() 81 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ in eap_psk_build_1() 82 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_1() 93 struct eap_psk_hdr_3 *psk; in eap_psk_build_3() local 100 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); in eap_psk_build_3() 108 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_3() 109 psk->flags = EAP_PSK_FLAGS_SET_T(2); /* T=2 */ in eap_psk_build_3() 110 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_3() [all …]
|
/external/autotest/client/common_lib/cros/network/ |
D | xmlrpc_security_types.py | 207 def __init__(self, psk='', wpa_mode=MODE_DEFAULT, wpa_ciphers=[], argument 231 self.psk = psk 240 if len(psk) > 64: 244 if len(psk) == 64: 245 for c in psk: 247 raise error.TestFail('Invalid PMK: %r' % psk) 270 if len(self.psk) == 64: 271 ret['wpa_psk'] = self.psk 273 ret['wpa_passphrase'] = self.psk 292 ret = {self.SERVICE_PROPERTY_PASSPHRASE: self.psk} [all …]
|
/external/autotest/client/site_tests/network_VPNConnect/ |
D | control.l2tpipsec_xauth | 26 vpn_types=[ 'l2tpipsec-psk-xauth', 27 'l2tpipsec-psk-xauth-incorrect_user', 28 'l2tpipsec-psk-xauth-incorrect_missing_user' ],
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/hpke/ |
D | hpke.c | 157 size_t info_len, const uint8_t *psk, in hpke_key_schedule() argument 225 kSecretExtractLabel, psk, psk_len)) { in hpke_key_schedule() 385 const uint8_t *info, size_t info_len, const uint8_t *psk, size_t psk_len, in EVP_HPKE_CTX_setup_psk_s_x25519() argument 393 hpke, kdf_id, aead_id, peer_public_value, info, info_len, psk, psk_len, in EVP_HPKE_CTX_setup_psk_s_x25519() 400 const uint8_t *info, size_t info_len, const uint8_t *psk, size_t psk_len, in EVP_HPKE_CTX_setup_psk_s_x25519_for_test() argument 415 sizeof(shared_secret), info, info_len, psk, psk_len, in EVP_HPKE_CTX_setup_psk_s_x25519_for_test() 427 size_t info_len, const uint8_t *psk, size_t psk_len, const uint8_t *psk_id, in EVP_HPKE_CTX_setup_psk_r_x25519() argument 439 sizeof(shared_secret), info, info_len, psk, psk_len, in EVP_HPKE_CTX_setup_psk_r_x25519()
|
D | internal.h | 132 const uint8_t *info, size_t info_len, const uint8_t *psk, size_t psk_len, 141 const uint8_t *info, size_t info_len, const uint8_t *psk, size_t psk_len, 160 size_t info_len, const uint8_t *psk, size_t psk_len, const uint8_t *psk_id,
|
D | hpke_test.cc | 427 for (const auto &psk : kPSKValues) { in TEST() local 429 const bool kExpectSuccess = psk.size() > 0 && psk_id.size() > 0; in TEST() 438 psk.data(), psk.size(), psk_id.data(), psk_id.size()), in TEST() 453 nullptr, 0, psk.data(), psk.size(), psk_id.data(), psk_id.size()), in TEST()
|
/external/wpa_supplicant_8/wpa_supplicant/aidl/ |
D | sta_network.cpp | 1013 std::string psk = rawPsk; in setPskPassphraseInternal() local 1017 psk = rawPsk.substr(1, rawPsk.size() - 2); in setPskPassphraseInternal() 1022 size_t len = psk.size() / 2; in setPskPassphraseInternal() 1024 if (hexstr2bin(psk.c_str(), buf, len) < 0) { in setPskPassphraseInternal() 1034 if (isPskPassphraseValid(psk)) { in setPskPassphraseInternal() 1038 os_strlen(wpa_ssid->passphrase) == psk.size() && in setPskPassphraseInternal() 1039 os_memcmp(wpa_ssid->passphrase, psk.c_str(), psk.size()) == 0) { in setPskPassphraseInternal() 1046 psk.c_str(), &(wpa_ssid->passphrase), "psk passphrase")) { in setPskPassphraseInternal() 1055 ndk::ScopedAStatus StaNetwork::setPskInternal(const std::vector<uint8_t> &psk) in setPskInternal() argument 1058 WPA_ASSERT(psk.size() == sizeof(wpa_ssid->psk)); in setPskInternal() [all …]
|
/external/ipsec-tools/src/racoon/ |
D | privsep.c | 468 vchar_t *psk; in privsep_init() local 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { in privsep_init() 491 reply->bufs.buflen[0] = psk->l; in privsep_init() 492 reply->hdr.ac_len = sizeof(*reply) + psk->l; in privsep_init() 501 memcpy(reply + 1, psk->v, psk->l); in privsep_init() 502 vfree(psk); in privsep_init() 894 vchar_t *psk; local 932 if ((psk = vmalloc(len - sizeof(*msg))) == NULL) 935 memcpy(psk->v, msg + 1, psk->l); 937 return psk;
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | tls13_enc.cc | 60 bool tls13_init_key_schedule(SSL_HANDSHAKE *hs, Span<const uint8_t> psk) { in tls13_init_key_schedule() argument 70 return hkdf_extract_to_secret(hs, psk); in tls13_init_key_schedule() 73 bool tls13_init_early_key_schedule(SSL_HANDSHAKE *hs, Span<const uint8_t> psk) { in tls13_init_early_key_schedule() argument 77 hkdf_extract_to_secret(hs, psk); in tls13_init_early_key_schedule() 399 const EVP_MD *digest, Span<const uint8_t> psk, in tls13_psk_binder() argument 409 if (!HKDF_extract(early_secret, &early_secret_len, digest, psk.data(), in tls13_psk_binder() 410 psk.size(), NULL, 0)) { in tls13_psk_binder()
|
/external/autotest/server/cros/ap_configurators/ |
D | static_ap_configurator.py | 60 self.psk = ap_config.get_psk() 266 psk=self.psk,
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_gpsk.c | 34 u8 *psk; member 119 data->psk = os_memdup(password, password_len); in eap_gpsk_init() 120 if (data->psk == NULL) { in eap_gpsk_init() 135 if (data->psk) { in eap_gpsk_deinit() 136 os_memset(data->psk, 0, data->psk_len); in eap_gpsk_deinit() 137 os_free(data->psk); in eap_gpsk_deinit() 364 if (eap_gpsk_derive_keys(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2() 378 if (eap_gpsk_derive_session_id(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2()
|