Home
last modified time | relevance | path

Searched refs:PSK (Results 1 – 25 of 27) sorted by relevance

12

/external/wpa_supplicant_8/wpa_supplicant/
Dwpa_supplicant.conf1161 key_mgmt=WPA-PSK
1172 key_mgmt=WPA-PSK
1260 key_mgmt=WPA-PSK WPA-EAP
1288 eap=PSK
1388 key_mgmt=WPA-PSK
1431 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
Deap_testing.txt64 EAP-PEAPv0/PSK - - - - - - - - - - + -
75 EAP-PEAPv1/PSK - - - - - - - - - - + -
90 EAP-TTLS/EAP-PSK - - - - - - - - - - + -
98 EAP-PSK +7 - - - - + - - - - + -
129 7) tested only with an older (incompatible) draft of EAP-PSK; FreeRADIUS does
130 not support the current EAP-PSK (RFC) specification
279 - EAP-PSK
DREADME-Windows.txt27 - WPA-PSK, TKIP, CCMP, TKIP+CCMP
29 - WPA2-PSK, TKIP, CCMP, TKIP+CCMP
174 Simple configuration example for WPA-PSK:
180 key_mgmt=WPA-PSK
295 key_mgmt=WPA-PSK
DREADME54 - WPA-PSK ("WPA-Personal")
75 * EAP-PSK
179 EAP-FAST support is enabled. WPA-PSK mode does not require this or EAPOL/EAP
282 - If WPA-PSK: wpa_supplicant uses PSK as the master session key
509 1) WPA-Personal (PSK) as home network and WPA-Enterprise with EAP-TLS as work
520 key_mgmt=WPA-PSK
605 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
886 wpa_cli -iwlan0 set_network 0 key_mgmt WPA-PSK
894 # with the WPA-PSK network using SSID test.
Dandroid.config106 # EAP-PSK (experimental; this is _not_ needed for WPA-PSK)
205 # converting ASCII passphrases into PSK. If this functionality is removed, the
206 # PSK can only be configured as the 64-octet hexstring (e.g., from
Ddefconfig117 # EAP-PSK (experimental; this is _not_ needed for WPA-PSK)
221 # converting ASCII passphrases into PSK. If this functionality is removed, the
222 # PSK can only be configured as the 64-octet hexstring (e.g., from
DREADME-P2P650 Disabled(default)/enables use of per-client PSK in the P2P groups. This
651 can be used to request GO to assign a unique PSK for each client during
654 PSK is removed at the same time to prevent it from connecting back using
655 the old PSK. When per-client PSK is not used, the client can still be
656 disconnected, but it will be able to re-join the group since the PSK it
DChangeLog283 * added support for optional per-device PSK assignment by P2P GO
551 - use OpenSSL function for PKBDF2 passphrase-to-PSK
593 * optimized PSK generation on P2P GO by caching results to avoid
921 * fixed PSK editing in wpa_gui
987 previously used for configuring user identity and key for EAP-PSK,
1086 * updated EAP-PSK to use the IANA-allocated EAP type 47
1088 * fixed EAP-PSK bit ordering of the Flags field
1233 * fixed WPA PSK update through ctrl_iface for the case where the old
1234 PSK was derived from an ASCII passphrase and the new PSK is set as
1235 a raw PSK (hex string)
[all …]
/external/wpa_supplicant_8/hostapd/
Dhostapd.wpa_psk2 # with #, must contain a MAC address and PSK separated with a space.
4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
5 # characters or as a 256-bit hex PSK (64 hex digits).
Deap_testing.txt28 EAP-PEAPv0/PSK + - - - -
38 EAP-PEAPv1/PSK + - - - -
DREADME232 - WPA-PSK ("WPA-Personal")
314 # WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either
315 # wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK.
325 # WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit
327 # (8..63 characters) that will be converted to PSK. This conversion uses SSID
328 # so the PSK changes when ASCII passphrase is used and the SSID is changed.
332 # Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The
334 #wpa_key_mgmt=WPA-PSK WPA-EAP
Dhostapd.eap_user21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a
66 "psk user" PSK "unknown"
67 "psk.user@example.com" PSK 0123456789abcdef0123456789abcdef
DREADME-WPS14 passphrase/PSK) and configuration of an access point and client
82 wpa_key_mgmt=WPA-PSK
86 # Enable random per-device PSK generation for WPS clients
197 negotiation. At that point, a new, random WPA PSK is generated for the
211 which will generate a new WPA PSK in the same way as the PIN method
Dandroid.config87 # EAP-PSK for the integrated EAP server (this is _not_ needed for WPA-PSK)
DChangeLog127 * extended WPS per-station PSK to support ER case
212 * added support for getting per-device PSK from RADIUS Tunnel-Password
240 * fixed EAP/WPS to PSK transition on reassociation in cases where
433 PSK as an ASCII passphrase or PSK
625 * updated EAP-PSK to use the IANA-allocated EAP type 47
626 * fixed EAP-PSK bit ordering of the Flags field
704 this is using the same experimental type 255 as EAP-PSK)
787 * added experimental support for EAP-PSK
798 4-Way Handshake if WPA-PSK is used
867 incorrect PSK); previously, message 1/4 was not tried again if an
[all …]
Ddefconfig93 # EAP-PSK for the integrated EAP server (this is _not_ needed for WPA-PSK)
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_passphrase.sgml10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
23 <para><command>wpa_passphrase</command> pre-computes PSK entries for
26 and SSID are used to generate a 256-bit PSK.</para>
Dwpa_supplicant.conf.sgml44 <para>WPA-Personal (PSK) as home network and WPA-Enterprise with
55 key_mgmt=WPA-PSK
155 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
Dwpa_supplicant.sgml111 <para>If WPA-PSK: <command>wpa_supplicant</command> uses PSK
137 <para>WPA-PSK ("WPA-Personal")</para>
199 <listitem><para>EAP-PSK</para></listitem>
/external/wpa_supplicant_8/wpa_supplicant/examples/
Dwpa-psk-tkip.conf7 key_mgmt=WPA-PSK
/external/ipsec-tools/src/racoon/
Dprsa_tok.l61 PSK { return TAG_PSK; }
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.ui80 <string>WPA-Personal (PSK)</string>
90 <string>WPA2-Personal (PSK)</string>
134 <string>PSK</string>
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/lang/
Dwpa_gui_de.ts125 <source>WPA-Personal (PSK)</source>
135 <source>WPA2-Personal (PSK)</source>
170 <source>PSK</source>
285 <source>WPA-PSK requires a passphrase of 8 to 63 characters
286 or 64 hex digit PSK</source>
287 <translation>WPA PSK benötigt ein Passphrase mit 8 bis 63 Zeichen
288 oder 64 hexadezimal stelligen PSK</translation>
/external/wpa_supplicant_8/src/pae/
Dieee802_1x_kay.h49 PSK, enumerator
/external/ipsec-tools/src/racoon/samples/
Dracoon.conf.sample-natt64 # With NAT-T you shouldn't use PSK. Let's go on with certs.

12