Home
last modified time | relevance | path

Searched refs:psk (Results 1 – 25 of 117) sorted by relevance

12345

/external/wpa_supplicant_8/src/ap/
Dieee802_11_auth.c38 struct hostapd_sta_wpa_psk_short *psk; member
59 hostapd_free_psk_list(e->psk); in hostapd_acl_cache_free_entry()
76 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk, in copy_psk_list() argument
79 if (!psk) in copy_psk_list()
85 *psk = src; in copy_psk_list()
93 struct hostapd_sta_wpa_psk_short **psk, in hostapd_acl_cache_get() argument
116 copy_psk_list(psk, entry->psk); in hostapd_acl_cache_get()
256 struct hostapd_sta_wpa_psk_short **psk, in hostapd_allowed_address() argument
267 if (psk) in hostapd_allowed_address()
268 *psk = NULL; in hostapd_allowed_address()
[all …]
Dap_config.c212 struct hostapd_wpa_psk *psk; in hostapd_config_read_wpa_psk() local
246 psk = os_zalloc(sizeof(*psk)); in hostapd_config_read_wpa_psk()
247 if (psk == NULL) { in hostapd_config_read_wpa_psk()
253 psk->group = 1; in hostapd_config_read_wpa_psk()
255 os_memcpy(psk->addr, addr, ETH_ALEN); in hostapd_config_read_wpa_psk()
261 os_free(psk); in hostapd_config_read_wpa_psk()
269 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) in hostapd_config_read_wpa_psk()
273 4096, psk->psk, PMK_LEN); in hostapd_config_read_wpa_psk()
279 os_free(psk); in hostapd_config_read_wpa_psk()
284 psk->next = ssid->wpa_psk; in hostapd_config_read_wpa_psk()
[all …]
Dwpa_auth_glue.c230 const u8 *psk; in hostapd_wpa_auth_get_psk() local
240 psk = hostapd_get_psk(hapd->conf, addr, p2p_dev_addr, prev_psk); in hostapd_wpa_auth_get_psk()
246 if (sta && sta->psk && !psk) { in hostapd_wpa_auth_get_psk()
248 psk = sta->psk->psk; in hostapd_wpa_auth_get_psk()
249 for (pos = sta->psk; pos; pos = pos->next) { in hostapd_wpa_auth_get_psk()
254 pos->psk, PMK_LEN); in hostapd_wpa_auth_get_psk()
257 if (pos->psk == prev_psk) { in hostapd_wpa_auth_get_psk()
258 psk = pos->next ? pos->next->psk : NULL; in hostapd_wpa_auth_get_psk()
263 return psk; in hostapd_wpa_auth_get_psk()
Dieee802_11_auth.h25 struct hostapd_sta_wpa_psk_short **psk,
29 void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk);
/external/autotest/server/cros/
Dchaos_dynamic_ap_list.conf24 psk = chromeos
37 psk = chromeos
71 psk = chromeos
93 psk = chromeos
106 psk = chromeos
119 psk = chromeos
132 psk = chromeos
191 psk = chromeos
268 psk = chromeos
281 psk = chromeos
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Dwpa_supplicant.conf1262 psk="very secret passphrase"
1271 psk="very secret passphrase"
1282 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
1293 psk="not so secure passphrase"
1381 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
1388 psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
1508 psk="12345678"
1524 psk="secret passphrase"
1541 psk="very secret passphrase"
1552 psk="very secret passphrase"
[all …]
Dwpa_passphrase.c17 unsigned char psk[32]; in main() local
55 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main()
62 printf("%02x", psk[i]); in main()
Dibss_rsn.h50 u8 psk[PMK_LEN]; member
60 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
/external/wpa_supplicant_8/src/eap_common/
Deap_gpsk_common.c38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, in eap_gpsk_gkdf_cmac() argument
60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) in eap_gpsk_gkdf_cmac()
73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, in eap_gpsk_gkdf_sha256() argument
95 if (hmac_sha256_vector(psk, 32, 2, addr, vlen, hash)) in eap_gpsk_gkdf_sha256()
110 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument
147 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper()
157 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { in eap_gpsk_derive_keys_helper()
189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument
218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes()
225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument
[all …]
Deap_psk_common.c19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument
22 if (aes_128_encrypt_block(psk, ak, ak)) in eap_psk_key_setup()
27 if (aes_128_encrypt_block(psk, ak, ak) || in eap_psk_key_setup()
28 aes_128_encrypt_block(psk, kdk, kdk)) in eap_psk_key_setup()
Deap_gpsk_common.h49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
/external/autotest/server/site_tests/network_WiFi_SimpleConnect/
Dcontrol.wifi_checkOddWPAPassphrases29 for psk in psks:
31 psk=psk,
35 psk=psk,
Dcontrol.wifi_checkHiddenWPA29 psk='chromeos',
33 psk='chromeos',
38 psk='chromeos',
42 psk='chromeos',
/external/autotest/client/common_lib/cros/network/
Dxmlrpc_security_types.py193 def __init__(self, psk='', wpa_mode=MODE_DEFAULT, wpa_ciphers=[], argument
216 self.psk = psk
224 if len(psk) > 64:
228 if len(psk) == 64:
229 for c in psk:
231 raise error.TestFail('Invalid PMK: %r' % psk)
250 if len(self.psk) == 64:
251 ret['wpa_psk'] = self.psk
253 ret['wpa_passphrase'] = self.psk
272 return {self.SERVICE_PROPERTY_PASSPHRASE: self.psk}
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_server_psk.c58 struct eap_psk_hdr_1 *psk; in eap_psk_build_1() local
71 sizeof(*psk) + sm->server_id_len, in eap_psk_build_1()
80 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_1()
81 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ in eap_psk_build_1()
82 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_1()
93 struct eap_psk_hdr_3 *psk; in eap_psk_build_3() local
100 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); in eap_psk_build_3()
108 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_3()
109 psk->flags = EAP_PSK_FLAGS_SET_T(2); /* T=2 */ in eap_psk_build_3()
110 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_3()
[all …]
/external/autotest/client/site_tests/network_VPNConnect/
Dcontrol.l2tpipsec_xauth27 vpn_types=[ 'l2tpipsec-psk-xauth',
28 'l2tpipsec-psk-xauth-incorrect_user',
29 'l2tpipsec-psk-xauth-incorrect_missing_user' ],
/external/autotest/server/cros/ap_configurators/
DbelkinF5D8236_ap_configurator.py21 psk = '//select[@name="authentication"]'
29 self.select_item_from_popup_by_xpath(selection, psk,
DbelkinF9k1002v4_ap_configurator.py21 psk = '//select[@name="authentication"]'
29 self.select_item_from_popup_by_xpath(auth_type, psk,
DbelkinF7D_ap_configurator.py40 psk = '//select[@name="authentication"]'
48 self.select_item_from_popup_by_xpath(auth_type, psk,
Dstatic_ap_configurator.py58 self.psk = ap_config.get_psk()
256 psk=self.psk,
/external/autotest/client/site_tests/network_WiFiInvalidParameters/
Dnetwork_WiFiInvalidParameters.py143 for psk in bad_passphrases:
148 shill.SERVICE_PROPERTY_PASSPHRASE: psk,
164 '%s' % psk)
/external/ipsec-tools/src/racoon/
Dprivsep.c468 vchar_t *psk; in privsep_init() local
486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { in privsep_init()
491 reply->bufs.buflen[0] = psk->l; in privsep_init()
492 reply->hdr.ac_len = sizeof(*reply) + psk->l; in privsep_init()
501 memcpy(reply + 1, psk->v, psk->l); in privsep_init()
502 vfree(psk); in privsep_init()
894 vchar_t *psk; local
932 if ((psk = vmalloc(len - sizeof(*msg))) == NULL)
935 memcpy(psk->v, msg + 1, psk->l);
937 return psk;
/external/wpa_supplicant_8/src/eap_peer/
Deap_gpsk.c34 u8 *psk; member
120 data->psk = os_malloc(password_len); in eap_gpsk_init()
121 if (data->psk == NULL) { in eap_gpsk_init()
125 os_memcpy(data->psk, password, password_len); in eap_gpsk_init()
137 if (data->psk) { in eap_gpsk_deinit()
138 os_memset(data->psk, 0, data->psk_len); in eap_gpsk_deinit()
139 os_free(data->psk); in eap_gpsk_deinit()
367 if (eap_gpsk_derive_keys(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2()
381 if (eap_gpsk_derive_session_id(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2()
/external/autotest/server/site_tests/network_WiFi_RoamSuspendSSID/
Dcontrol.rsn21 psk='chromeos0',
24 psk='chromeos1',
Dcontrol.wpa21 psk='chromeos0',
24 psk='chromeos1',

12345