Searched refs:PSK (Results 1 – 25 of 27) sorted by relevance
12
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpa_supplicant.conf | 1161 key_mgmt=WPA-PSK 1172 key_mgmt=WPA-PSK 1260 key_mgmt=WPA-PSK WPA-EAP 1288 eap=PSK 1388 key_mgmt=WPA-PSK 1431 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
|
D | eap_testing.txt | 64 EAP-PEAPv0/PSK - - - - - - - - - - + - 75 EAP-PEAPv1/PSK - - - - - - - - - - + - 90 EAP-TTLS/EAP-PSK - - - - - - - - - - + - 98 EAP-PSK +7 - - - - + - - - - + - 129 7) tested only with an older (incompatible) draft of EAP-PSK; FreeRADIUS does 130 not support the current EAP-PSK (RFC) specification 279 - EAP-PSK
|
D | README-Windows.txt | 27 - WPA-PSK, TKIP, CCMP, TKIP+CCMP 29 - WPA2-PSK, TKIP, CCMP, TKIP+CCMP 174 Simple configuration example for WPA-PSK: 180 key_mgmt=WPA-PSK 295 key_mgmt=WPA-PSK
|
D | README | 54 - WPA-PSK ("WPA-Personal") 75 * EAP-PSK 179 EAP-FAST support is enabled. WPA-PSK mode does not require this or EAPOL/EAP 282 - If WPA-PSK: wpa_supplicant uses PSK as the master session key 509 1) WPA-Personal (PSK) as home network and WPA-Enterprise with EAP-TLS as work 520 key_mgmt=WPA-PSK 605 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE 886 wpa_cli -iwlan0 set_network 0 key_mgmt WPA-PSK 894 # with the WPA-PSK network using SSID test.
|
D | android.config | 106 # EAP-PSK (experimental; this is _not_ needed for WPA-PSK) 205 # converting ASCII passphrases into PSK. If this functionality is removed, the 206 # PSK can only be configured as the 64-octet hexstring (e.g., from
|
D | defconfig | 117 # EAP-PSK (experimental; this is _not_ needed for WPA-PSK) 221 # converting ASCII passphrases into PSK. If this functionality is removed, the 222 # PSK can only be configured as the 64-octet hexstring (e.g., from
|
D | README-P2P | 650 Disabled(default)/enables use of per-client PSK in the P2P groups. This 651 can be used to request GO to assign a unique PSK for each client during 654 PSK is removed at the same time to prevent it from connecting back using 655 the old PSK. When per-client PSK is not used, the client can still be 656 disconnected, but it will be able to re-join the group since the PSK it
|
D | ChangeLog | 283 * added support for optional per-device PSK assignment by P2P GO 551 - use OpenSSL function for PKBDF2 passphrase-to-PSK 593 * optimized PSK generation on P2P GO by caching results to avoid 921 * fixed PSK editing in wpa_gui 987 previously used for configuring user identity and key for EAP-PSK, 1086 * updated EAP-PSK to use the IANA-allocated EAP type 47 1088 * fixed EAP-PSK bit ordering of the Flags field 1233 * fixed WPA PSK update through ctrl_iface for the case where the old 1234 PSK was derived from an ASCII passphrase and the new PSK is set as 1235 a raw PSK (hex string) [all …]
|
/external/wpa_supplicant_8/hostapd/ |
D | hostapd.wpa_psk | 2 # with #, must contain a MAC address and PSK separated with a space. 4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63 5 # characters or as a 256-bit hex PSK (64 hex digits).
|
D | eap_testing.txt | 28 EAP-PEAPv0/PSK + - - - - 38 EAP-PEAPv1/PSK + - - - -
|
D | README | 232 - WPA-PSK ("WPA-Personal") 314 # WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either 315 # wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK. 325 # WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit 327 # (8..63 characters) that will be converted to PSK. This conversion uses SSID 328 # so the PSK changes when ASCII passphrase is used and the SSID is changed. 332 # Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The 334 #wpa_key_mgmt=WPA-PSK WPA-EAP
|
D | hostapd.eap_user | 21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a 66 "psk user" PSK "unknown" 67 "psk.user@example.com" PSK 0123456789abcdef0123456789abcdef
|
D | README-WPS | 14 passphrase/PSK) and configuration of an access point and client 82 wpa_key_mgmt=WPA-PSK 86 # Enable random per-device PSK generation for WPS clients 197 negotiation. At that point, a new, random WPA PSK is generated for the 211 which will generate a new WPA PSK in the same way as the PIN method
|
D | android.config | 87 # EAP-PSK for the integrated EAP server (this is _not_ needed for WPA-PSK)
|
D | ChangeLog | 127 * extended WPS per-station PSK to support ER case 212 * added support for getting per-device PSK from RADIUS Tunnel-Password 240 * fixed EAP/WPS to PSK transition on reassociation in cases where 433 PSK as an ASCII passphrase or PSK 625 * updated EAP-PSK to use the IANA-allocated EAP type 47 626 * fixed EAP-PSK bit ordering of the Flags field 704 this is using the same experimental type 255 as EAP-PSK) 787 * added experimental support for EAP-PSK 798 4-Way Handshake if WPA-PSK is used 867 incorrect PSK); previously, message 1/4 was not tried again if an [all …]
|
D | defconfig | 93 # EAP-PSK for the integrated EAP server (this is _not_ needed for WPA-PSK)
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_passphrase.sgml | 10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose> 23 <para><command>wpa_passphrase</command> pre-computes PSK entries for 26 and SSID are used to generate a 256-bit PSK.</para>
|
D | wpa_supplicant.conf.sgml | 44 <para>WPA-Personal (PSK) as home network and WPA-Enterprise with 55 key_mgmt=WPA-PSK 155 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
|
D | wpa_supplicant.sgml | 111 <para>If WPA-PSK: <command>wpa_supplicant</command> uses PSK 137 <para>WPA-PSK ("WPA-Personal")</para> 199 <listitem><para>EAP-PSK</para></listitem>
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
D | wpa-psk-tkip.conf | 7 key_mgmt=WPA-PSK
|
/external/ipsec-tools/src/racoon/ |
D | prsa_tok.l | 61 PSK { return TAG_PSK; }
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.ui | 80 <string>WPA-Personal (PSK)</string> 90 <string>WPA2-Personal (PSK)</string> 134 <string>PSK</string>
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/lang/ |
D | wpa_gui_de.ts | 125 <source>WPA-Personal (PSK)</source> 135 <source>WPA2-Personal (PSK)</source> 170 <source>PSK</source> 285 <source>WPA-PSK requires a passphrase of 8 to 63 characters 286 or 64 hex digit PSK</source> 287 <translation>WPA PSK benötigt ein Passphrase mit 8 bis 63 Zeichen 288 oder 64 hexadezimal stelligen PSK</translation>
|
/external/wpa_supplicant_8/src/pae/ |
D | ieee802_1x_kay.h | 49 PSK, enumerator
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.sample-natt | 64 # With NAT-T you shouldn't use PSK. Let's go on with certs.
|
12