/external/wpa_supplicant_8/src/ap/ |
D | ieee802_11_auth.c | 38 struct hostapd_sta_wpa_psk_short *psk; member 59 hostapd_free_psk_list(e->psk); in hostapd_acl_cache_free_entry() 76 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk, in copy_psk_list() argument 79 if (!psk) in copy_psk_list() 85 *psk = src; in copy_psk_list() 93 struct hostapd_sta_wpa_psk_short **psk, in hostapd_acl_cache_get() argument 116 copy_psk_list(psk, entry->psk); in hostapd_acl_cache_get() 256 struct hostapd_sta_wpa_psk_short **psk, in hostapd_allowed_address() argument 267 if (psk) in hostapd_allowed_address() 268 *psk = NULL; in hostapd_allowed_address() [all …]
|
D | ap_config.c | 212 struct hostapd_wpa_psk *psk; in hostapd_config_read_wpa_psk() local 246 psk = os_zalloc(sizeof(*psk)); in hostapd_config_read_wpa_psk() 247 if (psk == NULL) { in hostapd_config_read_wpa_psk() 253 psk->group = 1; in hostapd_config_read_wpa_psk() 255 os_memcpy(psk->addr, addr, ETH_ALEN); in hostapd_config_read_wpa_psk() 261 os_free(psk); in hostapd_config_read_wpa_psk() 269 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) in hostapd_config_read_wpa_psk() 273 4096, psk->psk, PMK_LEN); in hostapd_config_read_wpa_psk() 279 os_free(psk); in hostapd_config_read_wpa_psk() 284 psk->next = ssid->wpa_psk; in hostapd_config_read_wpa_psk() [all …]
|
D | wpa_auth_glue.c | 230 const u8 *psk; in hostapd_wpa_auth_get_psk() local 240 psk = hostapd_get_psk(hapd->conf, addr, p2p_dev_addr, prev_psk); in hostapd_wpa_auth_get_psk() 246 if (sta && sta->psk && !psk) { in hostapd_wpa_auth_get_psk() 248 psk = sta->psk->psk; in hostapd_wpa_auth_get_psk() 249 for (pos = sta->psk; pos; pos = pos->next) { in hostapd_wpa_auth_get_psk() 254 pos->psk, PMK_LEN); in hostapd_wpa_auth_get_psk() 257 if (pos->psk == prev_psk) { in hostapd_wpa_auth_get_psk() 258 psk = pos->next ? pos->next->psk : NULL; in hostapd_wpa_auth_get_psk() 263 return psk; in hostapd_wpa_auth_get_psk()
|
D | ieee802_11_auth.h | 25 struct hostapd_sta_wpa_psk_short **psk, 29 void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk);
|
/external/autotest/server/cros/ |
D | chaos_dynamic_ap_list.conf | 24 psk = chromeos 37 psk = chromeos 71 psk = chromeos 93 psk = chromeos 106 psk = chromeos 119 psk = chromeos 132 psk = chromeos 191 psk = chromeos 268 psk = chromeos 281 psk = chromeos [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpa_supplicant.conf | 1262 psk="very secret passphrase" 1271 psk="very secret passphrase" 1282 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 1293 psk="not so secure passphrase" 1381 psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 1388 psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f 1508 psk="12345678" 1524 psk="secret passphrase" 1541 psk="very secret passphrase" 1552 psk="very secret passphrase" [all …]
|
D | wpa_passphrase.c | 17 unsigned char psk[32]; in main() local 55 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); in main() 62 printf("%02x", psk[i]); in main()
|
D | ibss_rsn.h | 50 u8 psk[PMK_LEN]; member 60 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, in eap_gpsk_gkdf_cmac() argument 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) in eap_gpsk_gkdf_cmac() 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, in eap_gpsk_gkdf_sha256() argument 95 if (hmac_sha256_vector(psk, 32, 2, addr, vlen, hash)) in eap_gpsk_gkdf_sha256() 110 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument 147 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper() 157 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { in eap_gpsk_derive_keys_helper() 189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument 218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument [all …]
|
D | eap_psk_common.c | 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) in eap_psk_key_setup() argument 22 if (aes_128_encrypt_block(psk, ak, ak)) in eap_psk_key_setup() 27 if (aes_128_encrypt_block(psk, ak, ak) || in eap_psk_key_setup() 28 aes_128_encrypt_block(psk, kdk, kdk)) in eap_psk_key_setup()
|
D | eap_gpsk_common.h | 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
|
/external/autotest/server/site_tests/network_WiFi_SimpleConnect/ |
D | control.wifi_checkOddWPAPassphrases | 29 for psk in psks: 31 psk=psk, 35 psk=psk,
|
D | control.wifi_checkHiddenWPA | 29 psk='chromeos', 33 psk='chromeos', 38 psk='chromeos', 42 psk='chromeos',
|
/external/autotest/client/common_lib/cros/network/ |
D | xmlrpc_security_types.py | 193 def __init__(self, psk='', wpa_mode=MODE_DEFAULT, wpa_ciphers=[], argument 216 self.psk = psk 224 if len(psk) > 64: 228 if len(psk) == 64: 229 for c in psk: 231 raise error.TestFail('Invalid PMK: %r' % psk) 250 if len(self.psk) == 64: 251 ret['wpa_psk'] = self.psk 253 ret['wpa_passphrase'] = self.psk 272 return {self.SERVICE_PROPERTY_PASSPHRASE: self.psk} [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_psk.c | 58 struct eap_psk_hdr_1 *psk; in eap_psk_build_1() local 71 sizeof(*psk) + sm->server_id_len, in eap_psk_build_1() 80 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_1() 81 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */ in eap_psk_build_1() 82 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_1() 93 struct eap_psk_hdr_3 *psk; in eap_psk_build_3() local 100 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id); in eap_psk_build_3() 108 psk = wpabuf_put(req, sizeof(*psk)); in eap_psk_build_3() 109 psk->flags = EAP_PSK_FLAGS_SET_T(2); /* T=2 */ in eap_psk_build_3() 110 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); in eap_psk_build_3() [all …]
|
/external/autotest/client/site_tests/network_VPNConnect/ |
D | control.l2tpipsec_xauth | 27 vpn_types=[ 'l2tpipsec-psk-xauth', 28 'l2tpipsec-psk-xauth-incorrect_user', 29 'l2tpipsec-psk-xauth-incorrect_missing_user' ],
|
/external/autotest/server/cros/ap_configurators/ |
D | belkinF5D8236_ap_configurator.py | 21 psk = '//select[@name="authentication"]' 29 self.select_item_from_popup_by_xpath(selection, psk,
|
D | belkinF9k1002v4_ap_configurator.py | 21 psk = '//select[@name="authentication"]' 29 self.select_item_from_popup_by_xpath(auth_type, psk,
|
D | belkinF7D_ap_configurator.py | 40 psk = '//select[@name="authentication"]' 48 self.select_item_from_popup_by_xpath(auth_type, psk,
|
D | static_ap_configurator.py | 58 self.psk = ap_config.get_psk() 256 psk=self.psk,
|
/external/autotest/client/site_tests/network_WiFiInvalidParameters/ |
D | network_WiFiInvalidParameters.py | 143 for psk in bad_passphrases: 148 shill.SERVICE_PROPERTY_PASSPHRASE: psk, 164 '%s' % psk)
|
/external/ipsec-tools/src/racoon/ |
D | privsep.c | 468 vchar_t *psk; in privsep_init() local 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { in privsep_init() 491 reply->bufs.buflen[0] = psk->l; in privsep_init() 492 reply->hdr.ac_len = sizeof(*reply) + psk->l; in privsep_init() 501 memcpy(reply + 1, psk->v, psk->l); in privsep_init() 502 vfree(psk); in privsep_init() 894 vchar_t *psk; local 932 if ((psk = vmalloc(len - sizeof(*msg))) == NULL) 935 memcpy(psk->v, msg + 1, psk->l); 937 return psk;
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_gpsk.c | 34 u8 *psk; member 120 data->psk = os_malloc(password_len); in eap_gpsk_init() 121 if (data->psk == NULL) { in eap_gpsk_init() 125 os_memcpy(data->psk, password, password_len); in eap_gpsk_init() 137 if (data->psk) { in eap_gpsk_deinit() 138 os_memset(data->psk, 0, data->psk_len); in eap_gpsk_deinit() 139 os_free(data->psk); in eap_gpsk_deinit() 367 if (eap_gpsk_derive_keys(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2() 381 if (eap_gpsk_derive_session_id(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2()
|
/external/autotest/server/site_tests/network_WiFi_RoamSuspendSSID/ |
D | control.rsn | 21 psk='chromeos0', 24 psk='chromeos1',
|
D | control.wpa | 21 psk='chromeos0', 24 psk='chromeos1',
|