Home
last modified time | relevance | path

Searched refs:psk (Results 1 – 25 of 154) sorted by relevance

1234567

/external/autotest/server/cros/
Dchaos_ap_list.conf25 psk = chromeos
40 psk = chromeos
55 psk = chromeos
83 psk = chromeos
179 psk = chromeos
194 psk = chromeos
209 psk = chromeos
224 psk = chromeos
239 psk = chromeos
254 psk = chromeos
[all …]
/external/wpa_supplicant_8/src/ap/
Dieee802_11_auth.c61 hostapd_free_psk_list(e->info.psk); in hostapd_acl_cache_free_entry()
416 struct hostapd_sta_wpa_psk_short *psk; in decode_tunnel_passwords() local
445 psk = os_zalloc(sizeof(struct hostapd_sta_wpa_psk_short)); in decode_tunnel_passwords()
446 if (psk) { in decode_tunnel_passwords()
448 (hexstr2bin(passphrase, psk->psk, PMK_LEN) < 0)) { in decode_tunnel_passwords()
456 os_memcpy(psk->passphrase, passphrase, in decode_tunnel_passwords()
458 psk->is_passphrase = 1; in decode_tunnel_passwords()
460 psk->next = cache->info.psk; in decode_tunnel_passwords()
461 cache->info.psk = psk; in decode_tunnel_passwords()
462 psk = NULL; in decode_tunnel_passwords()
[all …]
Dap_config.c321 struct hostapd_wpa_psk *psk; in hostapd_config_read_wpa_psk() local
391 psk = os_zalloc(sizeof(*psk)); in hostapd_config_read_wpa_psk()
392 if (psk == NULL) { in hostapd_config_read_wpa_psk()
397 psk->vlan_id = vlan_id; in hostapd_config_read_wpa_psk()
399 psk->group = 1; in hostapd_config_read_wpa_psk()
401 os_memcpy(psk->addr, addr, ETH_ALEN); in hostapd_config_read_wpa_psk()
407 os_free(psk); in hostapd_config_read_wpa_psk()
415 hexstr2bin(pos, psk->psk, PMK_LEN) == 0) in hostapd_config_read_wpa_psk()
419 4096, psk->psk, PMK_LEN) == 0) in hostapd_config_read_wpa_psk()
425 os_free(psk); in hostapd_config_read_wpa_psk()
[all …]
Dieee802_11_auth.h23 struct hostapd_sta_wpa_psk_short *psk; member
35 void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk);
37 void hostapd_copy_psk_list(struct hostapd_sta_wpa_psk_short **psk,
Dwps_hostapd.c96 const u8 *p2p_dev_addr, const u8 *psk, in hostapd_wps_new_psk_cb() argument
113 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); in hostapd_wps_new_psk_cb()
127 os_memcpy(p->psk, psk, PMK_LEN); in hostapd_wps_new_psk_cb()
132 psk, psk_len); in hostapd_wps_new_psk_cb()
150 wpa_snprintf_hex(hex, sizeof(hex), psk, psk_len); in hostapd_wps_new_psk_cb()
275 const u8 **psk) in hostapd_wps_lookup_pskfile_cb() argument
288 any_psk = wpa_psk->psk; in hostapd_wps_lookup_pskfile_cb()
292 dev_psk = wpa_psk->psk; in hostapd_wps_lookup_pskfile_cb()
298 *psk = dev_psk; in hostapd_wps_lookup_pskfile_cb()
300 *psk = any_psk; in hostapd_wps_lookup_pskfile_cb()
[all …]
/external/wpa_supplicant_8/src/eap_common/
Deap_gpsk_common.c38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, in eap_gpsk_gkdf_cmac() argument
60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) in eap_gpsk_gkdf_cmac()
73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, in eap_gpsk_gkdf_sha256() argument
95 if (hmac_sha256_vector(psk, 32, 2, addr, vlen, hash)) in eap_gpsk_gkdf_sha256()
110 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument
147 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper()
157 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { in eap_gpsk_derive_keys_helper()
189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument
218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes()
225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument
[all …]
Deap_psk_common.c19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument
22 if (aes_128_encrypt_block(psk, ak, ak)) in eap_psk_key_setup()
27 if (aes_128_encrypt_block(psk, ak, ak) || in eap_psk_key_setup()
28 aes_128_encrypt_block(psk, kdk, kdk)) in eap_psk_key_setup()
Deap_gpsk_common.h49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
/external/wpa_supplicant_8/wpa_supplicant/
Dwpa_supplicant.conf1684 psk="very secret passphrase"
1693 psk="very secret passphrase"
1704 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
1715 psk="not so secure passphrase"
1803 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
1810 psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
1930 psk="12345678"
1946 psk="secret passphrase"
1963 psk="very secret passphrase"
1974 psk="very secret passphrase"
[all …]
Dwpa_passphrase.c17 unsigned char psk[32]; in main() local
61 if (pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32) in main()
72 printf("%02x", psk[i]); in main()
Dibss_rsn.h50 u8 psk[PMK_LEN]; member
61 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
/external/boringssl/src/ssl/test/runner/hpke/
Dhpke.go110 func SetupPSKSenderX25519(kdfID, aeadID uint16, publicKeyR, info, psk, pskID []byte, ephemKeygen Ge… argument
115 …err = keySchedule(hpkeModePSK, X25519WithHKDFSHA256, kdfID, aeadID, sharedSecret, info, psk, pskID)
121 func SetupPSKReceiverX25519(kdfID, aeadID uint16, enc, secretKeyR, info, psk, pskID []byte) (contex… argument
126 …err = keySchedule(hpkeModePSK, X25519WithHKDFSHA256, kdfID, aeadID, sharedSecret, info, psk, pskID)
196 func keySchedule(mode uint8, kemID, kdfID, aeadID uint16, sharedSecret, info, psk, pskID []byte) (*… argument
200 if len(psk) > 0 || len(pskID) > 0 {
204 if len(psk) == 0 || len(pskID) == 0 {
221 secret := labeledExtract(kdfHash, sharedSecret, suiteID, []byte("secret"), psk)
/external/autotest/server/site_tests/network_WiFi_SimpleConnect/
Dcontrol.wifi_checkOddWPAPassphrases27 for psk in psks:
29 psk=psk,
33 psk=psk,
Dcontrol.wifi_checkHiddenWPA26 psk='chromeos',
30 psk='chromeos',
35 psk='chromeos',
39 psk='chromeos',
/external/wpa_supplicant_8/src/eap_server/
Deap_server_psk.c58 struct eap_psk_hdr_1 *psk; in eap_psk_build_1() local
71 sizeof(*psk) + sm->cfg->server_id_len, in eap_psk_build_1()
80 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_1()
81 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ in eap_psk_build_1()
82 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_1()
93 struct eap_psk_hdr_3 *psk; in eap_psk_build_3() local
100 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); in eap_psk_build_3()
108 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_3()
109 psk->flags = EAP_PSK_FLAGS_SET_T(2); /* T=2 */ in eap_psk_build_3()
110 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_3()
[all …]
/external/autotest/client/common_lib/cros/network/
Dxmlrpc_security_types.py207 def __init__(self, psk='', wpa_mode=MODE_DEFAULT, wpa_ciphers=[], argument
231 self.psk = psk
240 if len(psk) > 64:
244 if len(psk) == 64:
245 for c in psk:
247 raise error.TestFail('Invalid PMK: %r' % psk)
270 if len(self.psk) == 64:
271 ret['wpa_psk'] = self.psk
273 ret['wpa_passphrase'] = self.psk
292 ret = {self.SERVICE_PROPERTY_PASSPHRASE: self.psk}
[all …]
/external/autotest/client/site_tests/network_VPNConnect/
Dcontrol.l2tpipsec_xauth26 vpn_types=[ 'l2tpipsec-psk-xauth',
27 'l2tpipsec-psk-xauth-incorrect_user',
28 'l2tpipsec-psk-xauth-incorrect_missing_user' ],
/external/rust/crates/quiche/deps/boringssl/src/crypto/hpke/
Dhpke.c157 size_t info_len, const uint8_t *psk, in hpke_key_schedule() argument
225 kSecretExtractLabel, psk, psk_len)) { in hpke_key_schedule()
385 const uint8_t *info, size_t info_len, const uint8_t *psk, size_t psk_len, in EVP_HPKE_CTX_setup_psk_s_x25519() argument
393 hpke, kdf_id, aead_id, peer_public_value, info, info_len, psk, psk_len, in EVP_HPKE_CTX_setup_psk_s_x25519()
400 const uint8_t *info, size_t info_len, const uint8_t *psk, size_t psk_len, in EVP_HPKE_CTX_setup_psk_s_x25519_for_test() argument
415 sizeof(shared_secret), info, info_len, psk, psk_len, in EVP_HPKE_CTX_setup_psk_s_x25519_for_test()
427 size_t info_len, const uint8_t *psk, size_t psk_len, const uint8_t *psk_id, in EVP_HPKE_CTX_setup_psk_r_x25519() argument
439 sizeof(shared_secret), info, info_len, psk, psk_len, in EVP_HPKE_CTX_setup_psk_r_x25519()
Dinternal.h132 const uint8_t *info, size_t info_len, const uint8_t *psk, size_t psk_len,
141 const uint8_t *info, size_t info_len, const uint8_t *psk, size_t psk_len,
160 size_t info_len, const uint8_t *psk, size_t psk_len, const uint8_t *psk_id,
Dhpke_test.cc427 for (const auto &psk : kPSKValues) { in TEST() local
429 const bool kExpectSuccess = psk.size() > 0 && psk_id.size() > 0; in TEST()
438 psk.data(), psk.size(), psk_id.data(), psk_id.size()), in TEST()
453 nullptr, 0, psk.data(), psk.size(), psk_id.data(), psk_id.size()), in TEST()
/external/wpa_supplicant_8/wpa_supplicant/aidl/
Dsta_network.cpp1013 std::string psk = rawPsk; in setPskPassphraseInternal() local
1017 psk = rawPsk.substr(1, rawPsk.size() - 2); in setPskPassphraseInternal()
1022 size_t len = psk.size() / 2; in setPskPassphraseInternal()
1024 if (hexstr2bin(psk.c_str(), buf, len) < 0) { in setPskPassphraseInternal()
1034 if (isPskPassphraseValid(psk)) { in setPskPassphraseInternal()
1038 os_strlen(wpa_ssid->passphrase) == psk.size() && in setPskPassphraseInternal()
1039 os_memcmp(wpa_ssid->passphrase, psk.c_str(), psk.size()) == 0) { in setPskPassphraseInternal()
1046 psk.c_str(), &(wpa_ssid->passphrase), "psk passphrase")) { in setPskPassphraseInternal()
1055 ndk::ScopedAStatus StaNetwork::setPskInternal(const std::vector<uint8_t> &psk) in setPskInternal() argument
1058 WPA_ASSERT(psk.size() == sizeof(wpa_ssid->psk)); in setPskInternal()
[all …]
/external/ipsec-tools/src/racoon/
Dprivsep.c468 vchar_t *psk; in privsep_init() local
486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { in privsep_init()
491 reply->bufs.buflen[0] = psk->l; in privsep_init()
492 reply->hdr.ac_len = sizeof(*reply) + psk->l; in privsep_init()
501 memcpy(reply + 1, psk->v, psk->l); in privsep_init()
502 vfree(psk); in privsep_init()
894 vchar_t *psk; local
932 if ((psk = vmalloc(len - sizeof(*msg))) == NULL)
935 memcpy(psk->v, msg + 1, psk->l);
937 return psk;
/external/rust/crates/quiche/deps/boringssl/src/ssl/
Dtls13_enc.cc60 bool tls13_init_key_schedule(SSL_HANDSHAKE *hs, Span<const uint8_t> psk) { in tls13_init_key_schedule() argument
70 return hkdf_extract_to_secret(hs, psk); in tls13_init_key_schedule()
73 bool tls13_init_early_key_schedule(SSL_HANDSHAKE *hs, Span<const uint8_t> psk) { in tls13_init_early_key_schedule() argument
77 hkdf_extract_to_secret(hs, psk); in tls13_init_early_key_schedule()
399 const EVP_MD *digest, Span<const uint8_t> psk, in tls13_psk_binder() argument
409 if (!HKDF_extract(early_secret, &early_secret_len, digest, psk.data(), in tls13_psk_binder()
410 psk.size(), NULL, 0)) { in tls13_psk_binder()
/external/autotest/server/cros/ap_configurators/
Dstatic_ap_configurator.py60 self.psk = ap_config.get_psk()
266 psk=self.psk,
/external/wpa_supplicant_8/src/eap_peer/
Deap_gpsk.c34 u8 *psk; member
119 data->psk = os_memdup(password, password_len); in eap_gpsk_init()
120 if (data->psk == NULL) { in eap_gpsk_init()
135 if (data->psk) { in eap_gpsk_deinit()
136 os_memset(data->psk, 0, data->psk_len); in eap_gpsk_deinit()
137 os_free(data->psk); in eap_gpsk_deinit()
364 if (eap_gpsk_derive_keys(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2()
378 if (eap_gpsk_derive_session_id(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2()

1234567