Home
last modified time | relevance | path

Searched refs:PSK (Results 1 – 25 of 36) sorted by relevance

12

/external/wpa_supplicant_8/wpa_supplicant/
Dwpa_supplicant.conf1358 key_mgmt=WPA-PSK
1369 key_mgmt=WPA-PSK
1457 key_mgmt=WPA-PSK WPA-EAP
1485 eap=PSK
1585 key_mgmt=WPA-PSK
1628 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
Deap_testing.txt64 EAP-PEAPv0/PSK - - - - - - - - - - + -
75 EAP-PEAPv1/PSK - - - - - - - - - - + -
90 EAP-TTLS/EAP-PSK - - - - - - - - - - + -
98 EAP-PSK +7 - - - - + - - - - + -
129 7) tested only with an older (incompatible) draft of EAP-PSK; FreeRADIUS does
130 not support the current EAP-PSK (RFC) specification
279 - EAP-PSK
DREADME-Windows.txt27 - WPA-PSK, TKIP, CCMP, TKIP+CCMP
29 - WPA2-PSK, TKIP, CCMP, TKIP+CCMP
174 Simple configuration example for WPA-PSK:
180 key_mgmt=WPA-PSK
295 key_mgmt=WPA-PSK
DREADME54 - WPA-PSK ("WPA-Personal")
76 * EAP-PSK
175 EAP-FAST support is enabled. WPA-PSK mode does not require this or EAPOL/EAP
278 - If WPA-PSK: wpa_supplicant uses PSK as the master session key
523 1) WPA-Personal (PSK) as home network and WPA-Enterprise with EAP-TLS as work
534 key_mgmt=WPA-PSK
619 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
900 wpa_cli -iwlan0 set_network 0 key_mgmt WPA-PSK
908 # with the WPA-PSK network using SSID test.
Ddefconfig120 # EAP-PSK (experimental; this is _not_ needed for WPA-PSK)
224 # converting ASCII passphrases into PSK. If this functionality is removed, the
225 # PSK can only be configured as the 64-octet hexstring (e.g., from
563 # key_mgmt=WPA-PSK (i.e., full key management instead of WPA-None).
Dandroid.config108 # EAP-PSK (experimental; this is _not_ needed for WPA-PSK)
212 # converting ASCII passphrases into PSK. If this functionality is removed, the
213 # PSK can only be configured as the 64-octet hexstring (e.g., from
523 # key_mgmt=WPA-PSK (i.e., full key management instead of WPA-None).
/external/wpa_supplicant_8/hostapd/
Dhostapd.wpa_psk2 # with #, must contain a MAC address and PSK separated with a space.
4 # anyone can use. PSK can be configured as an ASCII passphrase of 8..63
5 # characters or as a 256-bit hex PSK (64 hex digits).
Deap_testing.txt28 EAP-PEAPv0/PSK + - - - -
38 EAP-PEAPv1/PSK + - - - -
DREADME232 - WPA-PSK ("WPA-Personal")
314 # WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either
315 # wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK.
325 # WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit
327 # (8..63 characters) that will be converted to PSK. This conversion uses SSID
328 # so the PSK changes when ASCII passphrase is used and the SSID is changed.
332 # Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The
334 #wpa_key_mgmt=WPA-PSK WPA-EAP
Dhostapd.eap_user21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a
66 "psk user" PSK "unknown"
67 "psk.user@example.com" PSK 0123456789abcdef0123456789abcdef
DREADME-WPS14 passphrase/PSK) and configuration of an access point and client
82 wpa_key_mgmt=WPA-PSK
86 # Enable random per-device PSK generation for WPS clients
197 negotiation. At that point, a new, random WPA PSK is generated for the
211 which will generate a new WPA PSK in the same way as the PIN method
DChangeLog42 - allow server to provide PSK instead of passphrase for WPA-PSK
236 * extended WPS per-station PSK to support ER case
321 * added support for getting per-device PSK from RADIUS Tunnel-Password
349 * fixed EAP/WPS to PSK transition on reassociation in cases where
542 PSK as an ASCII passphrase or PSK
734 * updated EAP-PSK to use the IANA-allocated EAP type 47
735 * fixed EAP-PSK bit ordering of the Flags field
813 this is using the same experimental type 255 as EAP-PSK)
896 * added experimental support for EAP-PSK
907 4-Way Handshake if WPA-PSK is used
[all …]
Dandroid.config90 # EAP-PSK for the integrated EAP server (this is _not_ needed for WPA-PSK)
/external/llvm/include/llvm/IR/
DProfileSummary.h52 const Kind PSK;
66 : PSK(K), DetailedSummary(std::move(DetailedSummary)), in ProfileSummary()
70 Kind getKind() const { return PSK; } in getKind()
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_passphrase.sgml10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
23 <para><command>wpa_passphrase</command> pre-computes PSK entries for
26 and SSID are used to generate a 256-bit PSK.</para>
Dwpa_supplicant.conf.sgml44 <para>WPA-Personal (PSK) as home network and WPA-Enterprise with
55 key_mgmt=WPA-PSK
155 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
/external/autotest/client/site_tests/network_VPNConnect/
Dcontrol.l2tpipsec_psk12 Tests that we can complete L2TP/IPSec PSK VPN authentication.
20 L2TP/IPSec PSK VPN server runing at the other end of a virtual Ethernet
Dcontrol.l2tpipsec_xauth12 Tests that we can complete L2TP/IPSec PSK VPN authentication with XAUTH.
20 L2TP/IPSec PSK VPN server runing at the other end of a virtual Ethernet
/external/wpa_supplicant_8/wpa_supplicant/examples/
Dwpa-psk-tkip.conf7 key_mgmt=WPA-PSK
/external/ipsec-tools/src/racoon/
Dprsa_tok.l61 PSK { return TAG_PSK; }
/external/autotest/server/site_tests/network_WiFi_ChaosConnectDisconnect/
Dcontrol.local21 # List of specific APs to debug. Please verify the APs indeed support PSK.
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.ui80 <string>WPA-Personal (PSK)</string>
90 <string>WPA2-Personal (PSK)</string>
134 <string>PSK</string>
/external/autotest/server/site_tests/network_WiFi_ChaosLongConnect/
Dcontrol.debug23 # List of specific APs to debug. Please verify the APs indeed support PSK.
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/lang/
Dwpa_gui_de.ts125 <source>WPA-Personal (PSK)</source>
135 <source>WPA2-Personal (PSK)</source>
170 <source>PSK</source>
285 <source>WPA-PSK requires a passphrase of 8 to 63 characters
286 or 64 hex digit PSK</source>
287 <translation>WPA PSK benötigt ein Passphrase mit 8 bis 63 Zeichen
288 oder 64 hexadezimal stelligen PSK</translation>
/external/wpa_supplicant_8/src/pae/
Dieee802_1x_kay.h54 PSK, enumerator

12