/external/wpa_supplicant/ |
D | eap_gpsk_common.c | 47 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, in eap_gpsk_gkdf_cmac() argument 69 omac1_aes_128_vector(psk, 2, addr, vlen, hash); in eap_gpsk_gkdf_cmac() 81 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, in eap_gpsk_gkdf_sha256() argument 103 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); in eap_gpsk_gkdf_sha256() 117 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument 125 int (*gkdf)(const u8 *psk, const u8 *data, size_t data_len, in eap_gpsk_derive_keys_helper() 154 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper() 164 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { in eap_gpsk_derive_keys_helper() 196 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument 225 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() [all …]
|
D | eap_psk_common.c | 25 void eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument 28 aes_128_encrypt_block(psk, ak, ak); in eap_psk_key_setup() 32 aes_128_encrypt_block(psk, ak, ak); in eap_psk_key_setup() 33 aes_128_encrypt_block(psk, kdk, kdk); in eap_psk_key_setup()
|
D | wpa_passphrase.c | 23 unsigned char psk[32]; in main() local 61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); in main() 68 printf("%02x", psk[i]); in main()
|
D | eap_gpsk.c | 40 u8 *psk; member 113 data->psk = os_malloc(config->eappsk_len); in eap_gpsk_init() 114 if (data->psk == NULL) { in eap_gpsk_init() 118 os_memcpy(data->psk, config->eappsk, config->eappsk_len); in eap_gpsk_init() 130 os_free(data->psk); in eap_gpsk_deinit() 363 if (eap_gpsk_derive_keys(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2()
|
D | eap_gpsk_common.h | 55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | eap_gpsk_common.c | 47 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, in eap_gpsk_gkdf_cmac() argument 69 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) in eap_gpsk_gkdf_cmac() 82 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, in eap_gpsk_gkdf_sha256() argument 104 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); in eap_gpsk_gkdf_sha256() 118 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument 155 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper() 165 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { in eap_gpsk_derive_keys_helper() 197 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument 226 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 233 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument [all …]
|
D | eap_psk_common.c | 25 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument 28 if (aes_128_encrypt_block(psk, ak, ak)) in eap_psk_key_setup() 33 if (aes_128_encrypt_block(psk, ak, ak) || in eap_psk_key_setup() 34 aes_128_encrypt_block(psk, kdk, kdk)) in eap_psk_key_setup()
|
D | eap_psk_common.h | 74 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
|
D | eap_gpsk_common.h | 55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
|
/external/wpa_supplicant_6/wpa_supplicant/ |
D | wpa_supplicant.conf | 514 psk="very secret passphrase" 523 psk="very secret passphrase" 534 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 545 psk="not so secure passphrase" 633 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 640 psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f 764 psk="secret passphrase" 775 psk="very secret passphrase"
|
D | wpa_passphrase.c | 23 unsigned char psk[32]; in main() local 61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); in main() 68 printf("%02x", psk[i]); in main()
|
D | config_ssid.h | 123 u8 psk[32]; member
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | eap_psk.c | 65 struct eap_psk_hdr_1 *psk; in eap_psk_build_1() local 78 sizeof(*psk) + data->id_s_len, in eap_psk_build_1() 87 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_1() 88 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ in eap_psk_build_1() 89 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_1() 100 struct eap_psk_hdr_3 *psk; in eap_psk_build_3() local 107 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); in eap_psk_build_3() 115 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_3() 116 psk->flags = EAP_PSK_FLAGS_SET_T(2); /* T=2 */ in eap_psk_build_3() 117 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_3() [all …]
|
/external/wpa_supplicant/tests/ |
D | test_sha1.c | 234 char psk[32]; member 314 u8 psk[32]; in main() local 318 4096, psk, 32); in main() 319 if (memcmp(psk, test->psk, 32) == 0) in main()
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
D | test_sha1.c | 253 char psk[32]; member 333 u8 psk[32]; in main() local 337 4096, psk, 32); in main() 338 if (memcmp(psk, test->psk, 32) == 0) in main()
|
D | test_wpa.c | 33 u8 psk[PMK_LEN]; member 219 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN); in supp_init() 285 return wpa->psk; in auth_get_psk() 364 os_memset(wpa.psk, 0x44, PMK_LEN); in main()
|
/external/ipsec-tools/src/racoon/ |
D | privsep.c | 468 vchar_t *psk; in privsep_init() local 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { in privsep_init() 491 reply->bufs.buflen[0] = psk->l; in privsep_init() 492 reply->hdr.ac_len = sizeof(*reply) + psk->l; in privsep_init() 501 memcpy(reply + 1, psk->v, psk->l); in privsep_init() 502 vfree(psk); in privsep_init() 894 vchar_t *psk; local 932 if ((psk = vmalloc(len - sizeof(*msg))) == NULL) 935 memcpy(psk->v, msg + 1, psk->l); 937 return psk;
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
D | driver_ps3.c | 32 if (!params->psk && !params->passphrase) { in wpa_driver_ps3_set_wpa_key() 38 if (params->psk) { in wpa_driver_ps3_set_wpa_key() 47 "%02x", params->psk[i]); in wpa_driver_ps3_set_wpa_key()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap_gpsk.c | 39 u8 *psk; member 111 data->psk = os_malloc(password_len); in eap_gpsk_init() 112 if (data->psk == NULL) { in eap_gpsk_init() 116 os_memcpy(data->psk, password, password_len); in eap_gpsk_init() 128 os_free(data->psk); in eap_gpsk_deinit() 348 if (eap_gpsk_derive_keys(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2()
|
/external/wpa_supplicant/examples/ |
D | wpa-psk-tkip.conf | 11 psk="secret passphrase"
|
/external/wpa_supplicant_6/wpa_supplicant/examples/ |
D | wpa-psk-tkip.conf | 11 psk="secret passphrase"
|
/external/openssl/ssl/ |
D | ssltest.c | 243 unsigned int max_identity_len, unsigned char *psk, 245 static unsigned int psk_server_callback(SSL *ssl, const char *identity, unsigned char *psk, 2390 static int psk_key2bn(const char *pskkey, unsigned char *psk, in psk_key2bn() argument 2411 ret = BN_bn2bin(bn, psk); in psk_key2bn() 2417 unsigned int max_identity_len, unsigned char *psk, in psk_client_callback() argument 2428 ret = psk_key2bn(psk_key, psk, max_psk_len); in psk_client_callback() 2437 unsigned char *psk, unsigned int max_psk_len) in psk_server_callback() argument 2446 psk_len=psk_key2bn(psk_key, psk, max_psk_len); in psk_server_callback()
|
D | ssl.h | 865 unsigned int max_identity_len, unsigned char *psk, 868 unsigned char *psk, unsigned int max_psk_len); 939 char *identity, unsigned int max_identity_len, unsigned char *psk, 943 char *identity, unsigned int max_identity_len, unsigned char *psk, 947 unsigned char *psk, unsigned int max_psk_len)); 950 unsigned char *psk, unsigned int max_psk_len)); 1115 unsigned int max_identity_len, unsigned char *psk, 1118 unsigned char *psk, unsigned int max_psk_len);
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.sample-inherit | 6 path pre_shared_key "/etc/racoon/psk.txt";
|
/external/openssl/android.testssl/ |
D | testssl | 158 $ssltest -tls1 -cipher PSK -psk abc123 $extra || exit 1 161 $ssltest -bio_pair -tls1 -cipher PSK -psk abc123 $extra || exit 1
|