Home
last modified time | relevance | path

Searched refs:PSK (Results 1 – 25 of 63) sorted by relevance

123

/external/curl/docs/
DCIPHERS.md355 `DHE-PSK-AES256-GCM-SHA384`,
356 `DHE-PSK-AES128-GCM-SHA256`,
357 `PSK-AES256-GCM-SHA384`,
358 `PSK-AES128-GCM-SHA256`,
359 `DHE-PSK-AES256-CBC-SHA384`,
360 `DHE-PSK-AES128-CBC-SHA256`,
361 `PSK-AES256-CBC-SHA384`,
362 `PSK-AES128-CBC-SHA256`,
363 `PSK-AES128-CBC-SHA`,
364 `PSK-AES256-CBC-SHA`,
[all …]
/external/wpa_supplicant_8/hostapd/
Dhostapd.wpa_psk2 # with #, must contain a MAC address and PSK separated with a space.
4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
5 # characters or as a 256-bit hex PSK (64 hex digits).
12 # generating a PSK for a WPS Enrollee instead of generating a new random
13 # per-Enrollee PSK.
Deap_testing.txt28 EAP-PEAPv0/PSK + - - - -
38 EAP-PEAPv1/PSK + - - - -
DREADME221 - WPA-PSK ("WPA-Personal")
302 # WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either
303 # wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK.
313 # WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit
315 # (8..63 characters) that will be converted to PSK. This conversion uses SSID
316 # so the PSK changes when ASCII passphrase is used and the SSID is changed.
320 # Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The
322 #wpa_key_mgmt=WPA-PSK WPA-EAP
Dhostapd.eap_user21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a
66 "psk user" PSK "unknown"
67 "psk.user@example.com" PSK 0123456789abcdef0123456789abcdef
DChangeLog17 * added support for MACsec Key Agreement using IEEE 802.1X/PSK
70 - add WPA/WPA2 passphrase/PSK -based VLAN assignment
74 for PSK (wps_cred_add_sae=1)
91 - added local generation of PMK-R0/PMK-R1 for FT-PSK
100 - fixed wpa_psk_file use for FT-PSK
108 WPA2 PSK/passphrase
176 - allow server to provide PSK instead of passphrase for WPA-PSK
370 * extended WPS per-station PSK to support ER case
455 * added support for getting per-device PSK from RADIUS Tunnel-Password
483 * fixed EAP/WPS to PSK transition on reassociation in cases where
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Dwpa_supplicant.conf1701 key_mgmt=WPA-PSK
1712 key_mgmt=WPA-PSK
1800 key_mgmt=WPA-PSK WPA-EAP
1828 eap=PSK
1928 key_mgmt=WPA-PSK
1971 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
Deap_testing.txt64 EAP-PEAPv0/PSK - - - - - - - - - - + -
75 EAP-PEAPv1/PSK - - - - - - - - - - + -
90 EAP-TTLS/EAP-PSK - - - - - - - - - - + -
98 EAP-PSK +7 - - - - + - - - - + -
129 7) tested only with an older (incompatible) draft of EAP-PSK; FreeRADIUS does
130 not support the current EAP-PSK (RFC) specification
279 - EAP-PSK
DREADME-Windows.txt27 - WPA-PSK, TKIP, CCMP, TKIP+CCMP
29 - WPA2-PSK, TKIP, CCMP, TKIP+CCMP
174 Simple configuration example for WPA-PSK:
180 key_mgmt=WPA-PSK
295 key_mgmt=WPA-PSK
/external/autotest/server/site_tests/policy_WiFiPrecedenceServer/
Dcontrol.connectable_vs_not_connectable14 a WPA-PSK and Open network. The client test is given a network policy for
15 both networks with AutoConnect=True, but the PSK network is given the wrong
18 The open network should connect as the PSK network is inaccessible.
54 security='WPA-PSK',
Dcontrol.open_vs_psk13 'policy_WiFiPrecedenceServer' sets up both a WPA-PSK and Open network.
17 The PSK network should connect as it is more secure.
52 security='WPA-PSK',
/external/swiftshader/third_party/llvm-10.0/llvm/include/llvm/IR/
DProfileSummary.h48 const Kind PSK;
62 : PSK(K), DetailedSummary(std::move(DetailedSummary)), in ProfileSummary()
67 Kind getKind() const { return PSK; } in getKind()
/external/llvm/include/llvm/IR/
DProfileSummary.h52 const Kind PSK;
66 : PSK(K), DetailedSummary(std::move(DetailedSummary)), in ProfileSummary()
70 Kind getKind() const { return PSK; } in getKind()
/external/autotest/server/site_tests/network_WiFi_RoamFT/
Dcontrol.PSK7 NAME = 'network_WiFi_RoamFT.PSK'
13 This test attempts to verify that we can roam between two APs using the FT-PSK
14 key management suite (i.e. WPA-PSK with Fast BSS Transition) in full view of the
Dcontrol.mixedPSK14 that support FT mixed mode for PSK in full view of the DUT. This ensures that
/external/llvm-project/llvm/include/llvm/IR/
DProfileSummary.h50 const Kind PSK;
76 : PSK(K), DetailedSummary(std::move(DetailedSummary)), in PSK() function
82 Kind getKind() const { return PSK; } in getKind()
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_passphrase.sgml14 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
27 <para><command>wpa_passphrase</command> pre-computes PSK entries for
30 and SSID are used to generate a 256-bit PSK.</para>
Dwpa_supplicant.conf.sgml48 <para>WPA-Personal (PSK) as home network and WPA-Enterprise with
59 key_mgmt=WPA-PSK
159 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
/external/autotest/server/site_tests/policy_WiFiTypesServer/
Dcontrol.wpa_psk13 'policy_WiFiTypesServer.wpa_psk' test configures an WPA-PSK network and runs
34 network = NetworkConfig(password=password, security='WPA-PSK')
/external/boringssl/src/ssl/test/runner/hpke/
Dhpke_test.go78 PSK HexString `json:"psk"` member
150 …nderX25519(testVec.KDF, testVec.AEAD, testVec.PublicKeyR, testVec.Info, testVec.PSK, testVec.PSKID,
160 …25519(testVec.KDF, testVec.AEAD, enc, testVec.SecretKeyR, testVec.Info, testVec.PSK, testVec.PSKID)
/external/autotest/client/site_tests/network_VPNConnect/
Dcontrol.l2tpipsec_xauth12 Tests that we can complete L2TP/IPSec PSK VPN authentication with XAUTH.
20 L2TP/IPSec PSK VPN server runing at the other end of a virtual Ethernet
Dcontrol.l2tpipsec_psk12 Tests that we can complete L2TP/IPSec PSK VPN authentication.
20 L2TP/IPSec PSK VPN server runing at the other end of a virtual Ethernet
/external/wpa_supplicant_8/wpa_supplicant/examples/
Dwpa-psk-tkip.conf7 key_mgmt=WPA-PSK
/external/ipsec-tools/src/racoon/
Dprsa_tok.l61 PSK { return TAG_PSK; }
/external/autotest/server/site_tests/network_WiFi_ChaosConnectDisconnect/
Dcontrol.local21 # List of specific APs to debug. Please verify the APs indeed support PSK.

123