/external/wpa_supplicant_8/hostapd/ |
config_file.c | 712 os_memcpy(bss->ssid.vlan, bss->iface, IFNAMSIZ + 1); 1055 bss->ssid.wpa_psk == NULL && bss->ssid.wpa_passphrase == NULL && 1056 bss->ssid.wpa_psk_file == NULL && 1094 bss->ssid.security_policy == SECURITY_STATIC_WEP) { 1117 if (bss->wps_state && bss->ssid.wep.keys_set && bss->wpa == 0) { 1286 } else if (os_strcmp(buf, "ssid") == 0) { 1287 bss->ssid.ssid_len = os_strlen(pos); 1288 if (bss->ssid.ssid_len > HOSTAPD_MAX_SSID_LEN || 1289 bss->ssid.ssid_len < 1) [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_wext.c | 130 * wpa_driver_wext_get_ssid - Get SSID, SIOCGIWESSID 132 * @ssid: Buffer for the SSID; must be at least 32 bytes long 133 * Returns: SSID length on success, -1 on failure 135 int wpa_driver_wext_get_ssid(void *priv, u8 *ssid) 143 iwr.u.essid.pointer = (caddr_t) ssid; 153 /* Some drivers include nul termination in the SSID, so let's 157 if (ret > 0 && ssid[ret - 1] == '\0' && 167 * wpa_driver_wext_set_ssid - Set SSID, SIOCSIWESSID 169 * @ssid: SSI 1007 const u8 *ssid = params->ssids[0].ssid; local 1120 u8 ssid[32]; member in struct:wext_scan_data 1869 u8 ssid[32]; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/examples/ |
openCryptoki.conf | 23 ssid="test network"
|
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
ieee802_11_common.h | 20 u8 *ssid; member in struct:ieee802_11_elems
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
sha1.h | 31 void pbkdf2_sha1(const char *passphrase, const char *ssid, size_t ssid_len,
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/ |
scanresults.ui | 32 <string>SSID</string>
|
/external/wpa_supplicant_8/src/ap/ |
wps_hostapd.h | 33 int hostapd_wps_config_ap(struct hostapd_data *hapd, const char *ssid,
|
/external/wpa_supplicant_8/src/common/ |
ieee802_11_common.h | 14 const u8 *ssid; member in struct:ieee802_11_elems
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
openCryptoki.conf | 23 ssid="test network"
|
/external/wpa_supplicant_8/wpa_supplicant/ |
p2p_supplicant.h | 36 struct wpa_ssid *ssid, int addr_allocated, 102 struct wpa_ssid *ssid, const u8 *go_dev_addr); 132 struct wpa_ssid *ssid); 134 const u8 *addr, const u8 *ssid,
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
scanresults.ui | 32 <string>SSID</string>
|
peers.cpp | 589 QString ssid, bssid, flags, wps_name, pri_dev_type; 605 else if ((*it).startsWith("ssid=")) 606 ssid = (*it).mid(pos); 615 name = ssid + "\n" + bssid; 640 if (!ssid.isEmpty()) 641 item->setData(ssid, peer_role_ssid); 674 void Peers::add_persistent(int id, const char *ssid, const char *bssid) 687 QString name = ssid; 701 item->setData(ssid, peer_role_ssid); 715 char buf[2048], *start, *end, *id, *ssid, *bssid, *flags local 754 add_persistent(atoi(id), ssid, bssid); local [all...] |
/system/netd/ |
SoftapController.h | 47 void generatePsk(char *ssid, char *passphrase, char *psk);
|
/external/wpa_supplicant_8/src/utils/ |
common.c | 348 * wpa_ssid_txt - Convert SSID to a printable string 349 * @ssid: SSID (32-octet string) 350 * @ssid_len: Length of ssid in octets 355 * does not limit the used character set, so anything could be used in an SSID. 361 const char * wpa_ssid_txt(const u8 *ssid, size_t ssid_len) 368 os_memcpy(ssid_txt, ssid, ssid_len);
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_cli.sgml | 91 CTRL-REQ-PASSWORD-1:Password needed for SSID foobar 98 CTRL-REQ-OTP-2:Challenge 1235663 needed for SSID foobar 268 <para>configure identity for an SSID</para> 275 <para>configure password for an SSID</para> 282 <para>configure pin for an SSID</para> 289 <para>configure one-time-password for an SSID</para> 296 <para>set preferred BSSID for an SSID</para>
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/stress/ |
WifiStressTest.java | 155 int ssidAppearInScanResultsCount = 0; // count times of given ssid appear in scan results. 165 writeOutput(String.format("ssid appear %d out of %d scan iterations", 199 log(String.format("scan result for %s is: %s", sr.SSID, sr.toString())); 200 log(String.format("signal level for %s is %d ", sr.SSID, sr.level)); 201 if (sr.SSID.equals(mSsid)) { 214 writeOutput(String.format("ssid appear %d out of %d scan iterations", 234 config.SSID = mSsid;
|
/hardware/broadcom/wlan/bcm4329/wpa_supplicant_8_lib/ |
driver_cmd_wext.c | 93 wpa_printf(MSG_DEBUG, "For Scan: %s", params->ssids[i].ssid); 96 os_memcpy(&buf[bp], params->ssids[i].ssid, params->ssids[i].ssid_len); 221 ssid_conf = wpa_s->conf->ssid; 231 /* Check that there is enough space needed for 1 more SSID, the other sections and null termination */ 235 wpa_printf(MSG_DEBUG, "For PNO Scan: %s", ssid_conf->ssid); 238 os_memcpy(&buf[bp], ssid_conf->ssid, ssid_conf->ssid_len); 378 /* Answer: SSID rssi -Val */
|
/hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/ |
driver_cmd_wext.c | 96 wpa_printf(MSG_DEBUG, "For Scan: %s", params->ssids[i].ssid); 99 os_memcpy(&buf[bp], params->ssids[i].ssid, params->ssids[i].ssid_len); 224 ssid_conf = wpa_s->conf->ssid; 234 /* Check that there is enough space needed for 1 more SSID, the other sections and null termination */ 238 wpa_printf(MSG_DEBUG, "For PNO Scan: %s", ssid_conf->ssid); 241 os_memcpy(&buf[bp], ssid_conf->ssid, ssid_conf->ssid_len); 381 /* Answer: SSID rssi -Val */
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_prism54.c | 253 if (wpa_driver_wext_set_ssid(drv->wext, params->ssid, 300 static int wpa_driver_prism54_get_ssid(void *priv, u8 *ssid) 303 return wpa_driver_wext_get_ssid(drv->wext, ssid); 307 static int wpa_driver_prism54_scan(void *priv, const u8 *ssid, size_t ssid_len) 310 return wpa_driver_wext_scan(drv->wext, ssid, ssid_len);
|
driver_wext.c | 184 * wpa_driver_wext_get_ssid - Get SSID, SIOCGIWESSID 186 * @ssid: Buffer for the SSID; must be at least 32 bytes long 187 * Returns: SSID length on success, -1 on failure 189 int wpa_driver_wext_get_ssid(void *priv, u8 *ssid) 197 iwr.u.essid.pointer = (caddr_t) ssid; 207 /* Some drivers include nul termination in the SSID, so let's 211 if (ret > 0 && ssid[ret - 1] == '\0' && 221 * wpa_driver_wext_set_ssid - Set SSID, SIOCSIWESSID 223 * @ssid: SSI 1202 struct wpa_ssid *ssid, *ssid_orig; local 1334 u8 ssid[32]; member in struct:wext_scan_data 2074 u8 ssid[32]; local [all...] |
driver_test.c | 56 u8 ssid[32]; member in struct:wpa_driver_test_data 154 static int wpa_driver_test_scan(void *priv, const u8 *ssid, size_t ssid_len) 252 if (params->ssid) { 253 wpa_hexdump_ascii(MSG_DEBUG, " ssid", 254 params->ssid, params->ssid_len); 289 pos += wpa_snprintf_hex(pos, end - pos, params->ssid, 314 os_memcpy(drv->ssid, params->ssid, params->ssid_len); 333 static int wpa_driver_test_get_ssid(void *priv, u8 *ssid) 336 os_memcpy(ssid, drv->ssid, 32) [all...] |
driver_hostap.c | 341 if (wpa_driver_wext_set_ssid(drv->wext, params->ssid, params->ssid_len) 368 static int wpa_driver_hostap_scan(void *priv, const u8 *ssid, size_t ssid_len) 374 if (ssid == NULL) { 377 * might not support Host AP specific scan request (with SSID 379 return wpa_driver_wext_scan(drv->wext, ssid, ssid_len); 388 os_memcpy(param.u.scan_req.ssid, ssid, ssid_len); 427 static int wpa_driver_hostap_get_ssid(void *priv, u8 *ssid) 430 return wpa_driver_wext_get_ssid(drv->wext, ssid);
|
driver_madwifi.c | 354 * the scanned node state which holds it. The ssid is 356 * ssid's but uses the same bssid. 385 if (wpa_driver_wext_set_ssid(drv->wext, params->ssid, 391 if (wpa_driver_wext_set_ssid(drv->wext, params->ssid, 426 wpa_driver_madwifi_scan(void *priv, const u8 *ssid, size_t ssid_len) 435 /* set desired ssid before scan */ 438 if (wpa_driver_wext_set_ssid(drv->wext, ssid, ssid_len) < 0) 468 static int wpa_driver_madwifi_get_ssid(void *priv, u8 *ssid) 471 return wpa_driver_wext_get_ssid(drv->wext, ssid);
|
/hardware/ti/wlan/wl1271/Test/ |
smeDebug.c | 187 WLAN_OS_REPORT((" MAC Privacy Rssi Mode Channel SSID\n")); 217 (pBssid->Ssid.Ssid[0] == '\0')?(TI_INT8*)"****":((TI_INT8*)pBssid->Ssid.Ssid) ));
|
/hardware/ti/wlan/wl1271/stad/src/Connection_Managment/ |
smeSelect.c | 65 * Connection candidate must match SSID, BSSID, BSS type, RSN and WSC settings, has the best 124 /* first check SSID match */ 125 if (TI_FALSE == sme_SelectSsidMatch (hSme, &(pCurrentSite->ssid), &(pSme->tSsid), pSme->eSsidType)) 128 TRACE6(pSme->hReport, REPORT_SEVERITY_INFORMATION , "sme_Select: BSSID: %02x:%02x:%02x:%02x:%02x:%02x doesn't match SSID\n", pCurrentSite->bssid[ 0 ], pCurrentSite->bssid[ 1 ], pCurrentSite->bssid[ 2 ], pCurrentSite->bssid[ 3 ], pCurrentSite->bssid[ 4 ], pCurrentSite->bssid[ 5 ]); 139 TRACE6(pSme->hReport, REPORT_SEVERITY_INFORMATION , "sme_Select: BSSID: %02x:%02x:%02x:%02x:%02x:%02x doesn't match SSID\n", pCurrentSite->bssid[ 0 ], pCurrentSite->bssid[ 1 ], pCurrentSite->bssid[ 2 ], pCurrentSite->bssid[ 3 ], pCurrentSite->bssid[ 4 ], pCurrentSite->bssid[ 5 ]); 263 * \brief Check if a site SSID matches the desired SSID for selection 265 * Check if a site SSID matches the desired SSID for selection 268 * \param pSiteSsid - the site SSID [all...] |