Home
last modified time | relevance | path

Searched refs:psk (Results 1 – 25 of 53) sorted by relevance

123

/external/wpa_supplicant/
Deap_gpsk_common.c47 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, in eap_gpsk_gkdf_cmac() argument
69 omac1_aes_128_vector(psk, 2, addr, vlen, hash); in eap_gpsk_gkdf_cmac()
81 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, in eap_gpsk_gkdf_sha256() argument
103 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); in eap_gpsk_gkdf_sha256()
117 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument
125 int (*gkdf)(const u8 *psk, const u8 *data, size_t data_len, in eap_gpsk_derive_keys_helper()
154 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper()
164 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { in eap_gpsk_derive_keys_helper()
196 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument
225 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes()
[all …]
Deap_psk_common.c25 void eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument
28 aes_128_encrypt_block(psk, ak, ak); in eap_psk_key_setup()
32 aes_128_encrypt_block(psk, ak, ak); in eap_psk_key_setup()
33 aes_128_encrypt_block(psk, kdk, kdk); in eap_psk_key_setup()
Dwpa_passphrase.c23 unsigned char psk[32]; in main() local
61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); in main()
68 printf("%02x", psk[i]); in main()
Deap_gpsk.c40 u8 *psk; member
113 data->psk = os_malloc(config->eappsk_len); in eap_gpsk_init()
114 if (data->psk == NULL) { in eap_gpsk_init()
118 os_memcpy(data->psk, config->eappsk, config->eappsk_len); in eap_gpsk_init()
130 os_free(data->psk); in eap_gpsk_deinit()
363 if (eap_gpsk_derive_keys(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2()
Deap_gpsk_common.h55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
Deap_gpsk_common.c47 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, in eap_gpsk_gkdf_cmac() argument
69 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) in eap_gpsk_gkdf_cmac()
82 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, in eap_gpsk_gkdf_sha256() argument
104 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); in eap_gpsk_gkdf_sha256()
118 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument
155 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper()
165 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { in eap_gpsk_derive_keys_helper()
197 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument
226 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes()
233 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument
[all …]
Deap_psk_common.c25 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument
28 if (aes_128_encrypt_block(psk, ak, ak)) in eap_psk_key_setup()
33 if (aes_128_encrypt_block(psk, ak, ak) || in eap_psk_key_setup()
34 aes_128_encrypt_block(psk, kdk, kdk)) in eap_psk_key_setup()
Deap_psk_common.h74 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
Deap_gpsk_common.h55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
/external/wpa_supplicant_6/wpa_supplicant/
Dwpa_supplicant.conf514 psk="very secret passphrase"
523 psk="very secret passphrase"
534 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
545 psk="not so secure passphrase"
633 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
640 psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
764 psk="secret passphrase"
775 psk="very secret passphrase"
Dwpa_passphrase.c23 unsigned char psk[32]; in main() local
61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); in main()
68 printf("%02x", psk[i]); in main()
Dconfig_ssid.h123 u8 psk[32]; member
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
Deap_psk.c65 struct eap_psk_hdr_1 *psk; in eap_psk_build_1() local
78 sizeof(*psk) + data->id_s_len, in eap_psk_build_1()
87 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_1()
88 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ in eap_psk_build_1()
89 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_1()
100 struct eap_psk_hdr_3 *psk; in eap_psk_build_3() local
107 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); in eap_psk_build_3()
115 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_3()
116 psk->flags = EAP_PSK_FLAGS_SET_T(2); /* T=2 */ in eap_psk_build_3()
117 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_3()
[all …]
/external/wpa_supplicant/tests/
Dtest_sha1.c234 char psk[32]; member
314 u8 psk[32]; in main() local
318 4096, psk, 32); in main()
319 if (memcmp(psk, test->psk, 32) == 0) in main()
/external/wpa_supplicant_6/wpa_supplicant/tests/
Dtest_sha1.c253 char psk[32]; member
333 u8 psk[32]; in main() local
337 4096, psk, 32); in main()
338 if (memcmp(psk, test->psk, 32) == 0) in main()
Dtest_wpa.c33 u8 psk[PMK_LEN]; member
219 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN); in supp_init()
285 return wpa->psk; in auth_get_psk()
364 os_memset(wpa.psk, 0x44, PMK_LEN); in main()
/external/ipsec-tools/src/racoon/
Dprivsep.c468 vchar_t *psk; in privsep_init() local
486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { in privsep_init()
491 reply->bufs.buflen[0] = psk->l; in privsep_init()
492 reply->hdr.ac_len = sizeof(*reply) + psk->l; in privsep_init()
501 memcpy(reply + 1, psk->v, psk->l); in privsep_init()
502 vfree(psk); in privsep_init()
894 vchar_t *psk; local
932 if ((psk = vmalloc(len - sizeof(*msg))) == NULL)
935 memcpy(psk->v, msg + 1, psk->l);
937 return psk;
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/
Ddriver_ps3.c32 if (!params->psk && !params->passphrase) { in wpa_driver_ps3_set_wpa_key()
38 if (params->psk) { in wpa_driver_ps3_set_wpa_key()
47 "%02x", params->psk[i]); in wpa_driver_ps3_set_wpa_key()
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
Deap_gpsk.c39 u8 *psk; member
111 data->psk = os_malloc(password_len); in eap_gpsk_init()
112 if (data->psk == NULL) { in eap_gpsk_init()
116 os_memcpy(data->psk, password, password_len); in eap_gpsk_init()
128 os_free(data->psk); in eap_gpsk_deinit()
348 if (eap_gpsk_derive_keys(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2()
/external/wpa_supplicant/examples/
Dwpa-psk-tkip.conf11 psk="secret passphrase"
/external/wpa_supplicant_6/wpa_supplicant/examples/
Dwpa-psk-tkip.conf11 psk="secret passphrase"
/external/openssl/ssl/
Dssltest.c243 unsigned int max_identity_len, unsigned char *psk,
245 static unsigned int psk_server_callback(SSL *ssl, const char *identity, unsigned char *psk,
2390 static int psk_key2bn(const char *pskkey, unsigned char *psk, in psk_key2bn() argument
2411 ret = BN_bn2bin(bn, psk); in psk_key2bn()
2417 unsigned int max_identity_len, unsigned char *psk, in psk_client_callback() argument
2428 ret = psk_key2bn(psk_key, psk, max_psk_len); in psk_client_callback()
2437 unsigned char *psk, unsigned int max_psk_len) in psk_server_callback() argument
2446 psk_len=psk_key2bn(psk_key, psk, max_psk_len); in psk_server_callback()
Dssl.h865 unsigned int max_identity_len, unsigned char *psk,
868 unsigned char *psk, unsigned int max_psk_len);
939 char *identity, unsigned int max_identity_len, unsigned char *psk,
943 char *identity, unsigned int max_identity_len, unsigned char *psk,
947 unsigned char *psk, unsigned int max_psk_len));
950 unsigned char *psk, unsigned int max_psk_len));
1115 unsigned int max_identity_len, unsigned char *psk,
1118 unsigned char *psk, unsigned int max_psk_len);
/external/ipsec-tools/src/racoon/samples/
Dracoon.conf.sample-inherit6 path pre_shared_key "/etc/racoon/psk.txt";
/external/openssl/android.testssl/
Dtestssl158 $ssltest -tls1 -cipher PSK -psk abc123 $extra || exit 1
161 $ssltest -bio_pair -tls1 -cipher PSK -psk abc123 $extra || exit 1

123