/external/wpa_supplicant_8/src/ap/ |
D | ap_config.c | 183 struct hostapd_wpa_psk *psk; in hostapd_config_read_wpa_psk() local 217 psk = os_zalloc(sizeof(*psk)); in hostapd_config_read_wpa_psk() 218 if (psk == NULL) { in hostapd_config_read_wpa_psk() 224 psk->group = 1; in hostapd_config_read_wpa_psk() 226 os_memcpy(psk->addr, addr, ETH_ALEN); in hostapd_config_read_wpa_psk() 232 os_free(psk); in hostapd_config_read_wpa_psk() 240 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) in hostapd_config_read_wpa_psk() 244 4096, psk->psk, PMK_LEN); in hostapd_config_read_wpa_psk() 250 os_free(psk); in hostapd_config_read_wpa_psk() 255 psk->next = ssid->wpa_psk; in hostapd_config_read_wpa_psk() [all …]
|
D | ieee802_11_auth.c | 39 u8 psk[PMK_LEN]; member 69 u8 *psk, int *has_psk) in hostapd_acl_cache_get() argument 90 if (psk) in hostapd_acl_cache_get() 91 os_memcpy(psk, entry->psk, PMK_LEN); in hostapd_acl_cache_get() 222 u8 *psk, int *has_psk) in hostapd_allowed_address() argument 232 if (psk) in hostapd_allowed_address() 233 os_memset(psk, 0, PMK_LEN); in hostapd_allowed_address() 258 vlan_id, psk, has_psk); in hostapd_allowed_address() 488 cache->psk, PMK_LEN); in hostapd_acl_recv_radius() 495 cache->psk == NULL) in hostapd_acl_recv_radius()
|
D | ieee802_11_auth.h | 22 u8 *psk, int *has_psk);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | eap_gpsk_common.c | 47 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, in eap_gpsk_gkdf_cmac() argument 69 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) in eap_gpsk_gkdf_cmac() 82 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, in eap_gpsk_gkdf_sha256() argument 104 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); in eap_gpsk_gkdf_sha256() 118 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument 155 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper() 165 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { in eap_gpsk_derive_keys_helper() 197 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument 226 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 233 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument [all …]
|
D | eap_psk_common.c | 25 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument 28 if (aes_128_encrypt_block(psk, ak, ak)) in eap_psk_key_setup() 33 if (aes_128_encrypt_block(psk, ak, ak) || in eap_psk_key_setup() 34 aes_128_encrypt_block(psk, kdk, kdk)) in eap_psk_key_setup()
|
D | eap_gpsk_common.h | 55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, in eap_gpsk_gkdf_cmac() argument 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) in eap_gpsk_gkdf_cmac() 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, in eap_gpsk_gkdf_sha256() argument 95 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); in eap_gpsk_gkdf_sha256() 109 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument 146 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper() 156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { in eap_gpsk_derive_keys_helper() 188 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument 217 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 224 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument [all …]
|
D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument 22 if (aes_128_encrypt_block(psk, ak, ak)) in eap_psk_key_setup() 27 if (aes_128_encrypt_block(psk, ak, ak) || in eap_psk_key_setup() 28 aes_128_encrypt_block(psk, kdk, kdk)) in eap_psk_key_setup()
|
D | eap_psk_common.h | 68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpa_supplicant.conf | 595 psk="very secret passphrase" 604 psk="very secret passphrase" 615 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 626 psk="not so secure passphrase" 714 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 721 psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f 845 psk="secret passphrase" 856 psk="very secret passphrase"
|
D | wpa_passphrase.c | 17 unsigned char psk[32]; in main() local 55 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); in main() 62 printf("%02x", psk[i]); in main()
|
D | ibss_rsn.h | 32 u8 psk[PMK_LEN]; member 42 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
|
D | ibss_rsn.c | 178 const u8 *psk) in ibss_rsn_supp_init() argument 208 wpa_sm_set_pmk(peer->supp, psk, PMK_LEN); in ibss_rsn_supp_init() 242 return ibss_rsn->psk; in auth_get_psk() 457 if (ibss_rsn_supp_init(peer, ibss_rsn->wpa_s->own_addr, ibss_rsn->psk) in ibss_rsn_start() 651 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk) in ibss_rsn_set_psk() argument 655 os_memcpy(ibss_rsn->psk, psk, PMK_LEN); in ibss_rsn_set_psk()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | eap_psk.c | 65 struct eap_psk_hdr_1 *psk; in eap_psk_build_1() local 78 sizeof(*psk) + data->id_s_len, in eap_psk_build_1() 87 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_1() 88 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ in eap_psk_build_1() 89 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_1() 100 struct eap_psk_hdr_3 *psk; in eap_psk_build_3() local 107 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); in eap_psk_build_3() 115 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_3() 116 psk->flags = EAP_PSK_FLAGS_SET_T(2); /* T=2 */ in eap_psk_build_3() 117 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_3() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
D | test_sha1.c | 253 char psk[32]; member 333 u8 psk[32]; in main() local 337 4096, psk, 32); in main() 338 if (memcmp(psk, test->psk, 32) == 0) in main()
|
D | test_wpa.c | 33 u8 psk[PMK_LEN]; member 219 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN); in supp_init() 285 return wpa->psk; in auth_get_psk() 364 os_memset(wpa.psk, 0x44, PMK_LEN); in main()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_psk.c | 60 struct eap_psk_hdr_1 *psk; in eap_psk_build_1() local 73 sizeof(*psk) + data->id_s_len, in eap_psk_build_1() 82 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_1() 83 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ in eap_psk_build_1() 84 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_1() 95 struct eap_psk_hdr_3 *psk; in eap_psk_build_3() local 102 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); in eap_psk_build_3() 110 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_3() 111 psk->flags = EAP_PSK_FLAGS_SET_T(2); /* T=2 */ in eap_psk_build_3() 112 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_3() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/ |
D | wpa_passphrase.c | 23 unsigned char psk[32]; in main() local 61 pbkdf2_sha1(passphrase, ssid, os_strlen(ssid), 4096, psk, 32); in main() 68 printf("%02x", psk[i]); in main()
|
/external/ipsec-tools/src/racoon/ |
D | privsep.c | 468 vchar_t *psk; in privsep_init() local 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { in privsep_init() 491 reply->bufs.buflen[0] = psk->l; in privsep_init() 492 reply->hdr.ac_len = sizeof(*reply) + psk->l; in privsep_init() 501 memcpy(reply + 1, psk->v, psk->l); in privsep_init() 502 vfree(psk); in privsep_init() 894 vchar_t *psk; local 932 if ((psk = vmalloc(len - sizeof(*msg))) == NULL) 935 memcpy(psk->v, msg + 1, psk->l); 937 return psk;
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
D | driver_ps3.c | 32 if (!params->psk && !params->passphrase) { in wpa_driver_ps3_set_wpa_key() 38 if (params->psk) { in wpa_driver_ps3_set_wpa_key() 47 "%02x", params->psk[i]); in wpa_driver_ps3_set_wpa_key()
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
D | test_wpa.c | 27 u8 psk[PMK_LEN]; member 198 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN); in supp_init() 264 return wpa->psk; in auth_get_psk() 343 os_memset(wpa.psk, 0x44, PMK_LEN); in main()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_gpsk.c | 34 u8 *psk; member 106 data->psk = os_malloc(password_len); in eap_gpsk_init() 107 if (data->psk == NULL) { in eap_gpsk_init() 111 os_memcpy(data->psk, password, password_len); in eap_gpsk_init() 123 os_free(data->psk); in eap_gpsk_deinit() 343 if (eap_gpsk_derive_keys(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap_gpsk.c | 39 u8 *psk; member 111 data->psk = os_malloc(password_len); in eap_gpsk_init() 112 if (data->psk == NULL) { in eap_gpsk_init() 116 os_memcpy(data->psk, password, password_len); in eap_gpsk_init() 128 os_free(data->psk); in eap_gpsk_deinit() 348 if (eap_gpsk_derive_keys(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2()
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
D | wpa-psk-tkip.conf | 11 psk="secret passphrase"
|
/external/wpa_supplicant_6/wpa_supplicant/examples/ |
D | wpa-psk-tkip.conf | 11 psk="secret passphrase"
|