/external/wpa_supplicant_6/wpa_supplicant/ |
blacklist.h | 2 * wpa_supplicant - Temporary BSSID blacklist 20 u8 bssid[ETH_ALEN]; member in struct:wpa_blacklist 25 const u8 *bssid); 26 int wpa_blacklist_add(struct wpa_supplicant *wpa_s, const u8 *bssid); 27 int wpa_blacklist_del(struct wpa_supplicant *wpa_s, const u8 *bssid);
|
preauth_test.c | 134 static int wpa_supplicant_get_bssid(void *wpa_s, u8 *bssid) 161 const u8 *bssid, const u8 *pmkid) 169 const u8 *bssid, const u8 *pmkid) 291 u8 bssid[ETH_ALEN]; local 308 if (hwaddr_aton(argv[2], bssid)) { 350 if (rsn_preauth_init(wpa_s.wpa, bssid, &wpa_s.conf->ssid->eap)) 362 ret = pmksa_cache_set_current(wpa_s.wpa, NULL, bssid, NULL, 0)
|
config_ssid.h | 108 * bssid - BSSID 111 * using the configured BSSID 113 u8 bssid[ETH_ALEN]; member in struct:wpa_ssid 116 * bssid_set - Whether BSSID is configured for this network
|
events.c | 101 os_memset(wpa_s->bssid, 0, ETH_ALEN); 143 wpa_printf(MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR 145 MAC2STR(data->pmkid_candidate.bssid), 149 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid, 409 (int) i, MAC2STR(bss->bssid), 413 e = wpa_blacklist_get(wpa_s, bss->bssid); 452 os_memcmp(bss->bssid, ssid->bssid, ETH_ALEN) != 0) 455 "BSSID mismatch"); 464 MAC2STR(bss->bssid), 837 u8 bssid[ETH_ALEN]; local 936 const u8 *bssid; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
blacklist.h | 2 * wpa_supplicant - Temporary BSSID blacklist 14 u8 bssid[ETH_ALEN]; member in struct:wpa_blacklist 19 const u8 *bssid); 20 int wpa_blacklist_add(struct wpa_supplicant *wpa_s, const u8 *bssid); 21 int wpa_blacklist_del(struct wpa_supplicant *wpa_s, const u8 *bssid);
|
preauth_test.c | 129 static int wpa_supplicant_get_bssid(void *wpa_s, u8 *bssid) 156 const u8 *bssid, const u8 *pmkid) 164 const u8 *bssid, const u8 *pmkid) 286 u8 bssid[ETH_ALEN]; local 303 if (hwaddr_aton(argv[2], bssid)) { 345 if (rsn_preauth_init(wpa_s.wpa, bssid, &wpa_s.conf->ssid->eap)) 357 ret = pmksa_cache_set_current(wpa_s.wpa, NULL, bssid, NULL, 0)
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.h | 55 QString bssid; member in class:NetworkConfig
|
scanresults.cpp | 81 QString ssid, bssid, freq, signal, flags; local 90 if ((*it).startsWith("bssid=")) 91 bssid = (*it).mid(pos); 105 item->setText(1, bssid); 111 if (bssid.isEmpty())
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.h | 49 QString bssid; member in class:NetworkConfig
|
scanresults.cpp | 77 QString ssid, bssid, freq, signal, flags; local 86 if ((*it).startsWith("bssid=")) 87 bssid = (*it).mid(pos); 101 item->setText(1, bssid); 107 if (bssid.isEmpty())
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_old_handlers_wps.c | 38 u8 bssid[ETH_ALEN]; local 47 else if (!hwaddr_aton(arg_bssid, bssid)) 48 ret = wpas_wps_start_pbc(wpa_s, bssid, 0); 51 "Invalid BSSID"); 80 u8 bssid[ETH_ALEN], *_bssid = NULL; local 89 else if (!hwaddr_aton(arg_bssid, bssid)) 90 _bssid = bssid; 93 "Invalid BSSID"); 140 u8 bssid[ETH_ALEN]; local 149 else if (!hwaddr_aton(arg_bssid, bssid)) [all...] |
dbus_new_handlers_wps.c | 33 u8 *bssid; member in struct:wps_start_params 114 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Bssid type, " 117 message, "Bssid must be a byte array"); 121 dbus_message_iter_get_fixed_array(&array_iter, ¶ms->bssid, &len); 123 wpa_printf(MSG_DEBUG, "dbus: WPS.Stsrt - Wrong Bssid length " 126 "Bssid is wrong length"); 200 else if (os_strcmp(key, "Bssid") == 0) 226 * (pin or push button) and optionally pin and bssid. Returned message 274 ret = wpas_wps_start_reg(wpa_s, params.bssid, params.pin, 280 params.bssid, [all...] |
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui/ |
scanresults.ui.h | 61 QString ssid, bssid, freq, signal, flags; local 62 bssid = cols.count() > 0 ? cols[0] : ""; 67 new Q3ListViewItem(scanResultsView, ssid, bssid, freq, signal, flags);
|
wpagui.ui.h | 324 if (strcmp(start, "bssid") == 0) { 384 char buf[2048], *start, *end, *id, *ssid, *bssid, *flags; local 423 bssid = strchr(ssid, '\t'); 424 if (bssid == NULL) 426 *bssid++ = '\0'; 427 flags = strchr(bssid, '\t');
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
Apple80211.h | 25 UInt8 bssID[6]; 39 UInt8 bssid[6]; member in struct:WirelessNetworkInfo 104 * BSSID: CFData buffer of the BSSID
|
driver_ndis.h | 28 u8 bssid[ETH_ALEN]; member in struct:ndis_pmkid_entry 46 u8 bssid[ETH_ALEN]; member in struct:wpa_driver_ndis_data
|
driver_ndiswrapper.c | 50 const u8 *bssid; member in struct:wpa_assoc_info 229 wpa_assoc_info.bssid = params->bssid; 263 static int wpa_ndiswrapper_get_bssid(void *priv, u8 *bssid) 266 return wpa_driver_wext_get_bssid(drv->wext, bssid);
|
/external/wpa_supplicant_8/src/drivers/ |
driver_ndis.h | 22 u8 bssid[ETH_ALEN]; member in struct:ndis_pmkid_entry 40 u8 bssid[ETH_ALEN]; member in struct:wpa_driver_ndis_data
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_invitation.c | 103 u8 group_bssid[ETH_ALEN], *bssid; local 227 bssid = group_bssid; 229 bssid = NULL; 231 bssid, reg_class, channel, channels); 407 const u8 *bssid, const u8 *ssid, size_t ssid_len, 417 if (bssid) 419 "P2P: Invitation for BSSID " MACSTR, MAC2STR(bssid)); 476 p2p->inv_bssid_set = bssid != NULL; 477 if (bssid) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
preauth.c | 36 u8 bssid[ETH_ALEN]; member in struct:rsn_pmksa_candidate 166 * @dst: Authenticator address (BSSID) with which to preauthenticate 318 p = pmksa_cache_get(sm->pmksa, candidate->bssid, NULL); 319 if (os_memcmp(sm->bssid, candidate->bssid, ETH_ALEN) != 0 && 324 MAC2STR(candidate->bssid)); 326 rsn_preauth_init(sm, candidate->bssid, 333 MAC2STR(candidate->bssid)); 337 wpa_sm_add_pmkid(sm, candidate->bssid, p->pmkid); 351 * @bssid: BSSID (authenticator address) of the candidat [all...] |
wpa_ft.c | 52 sm->bssid, pmk_r1_name, 393 static int wpa_ft_install_ptk(struct wpa_sm *sm, const u8 *bssid) 416 if (wpa_sm_set_key(sm, alg, bssid, 0, 1, null_rsc, 443 NULL, sm->bssid); 464 const u8 *bssid; local 547 bssid = target_ap; 550 bssid, sm->pmk_r1_name, 557 sm->pmk_r1_name, sm->ptk.kck, bssid); 564 ret = wpa_ft_install_ptk(sm, bssid); 572 os_memcpy(sm->bssid, target_ap, ETH_ALEN) [all...] |
/external/wpa_supplicant_8/src/ap/ |
drv_callbacks.c | 268 const u8 *bssid, const u8 *ie, size_t ie_len) 279 sa, da, bssid, ie, ie_len) > 0) { 295 const u8 *bssid) 299 if (bssid == NULL) 301 if (bssid[0] == 0xff && bssid[1] == 0xff && bssid[2] == 0xff && 302 bssid[3] == 0xff && bssid[4] == 0xff && bssid[5] == 0xff 330 const u8 *bssid; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
preauth.c | 28 u8 bssid[ETH_ALEN]; member in struct:rsn_pmksa_candidate 156 * @dst: Authenticator address (BSSID) with which to preauthenticate 308 p = pmksa_cache_get(sm->pmksa, candidate->bssid, NULL, NULL); 309 if (os_memcmp(sm->bssid, candidate->bssid, ETH_ALEN) != 0 && 314 MAC2STR(candidate->bssid)); 316 rsn_preauth_init(sm, candidate->bssid, 323 MAC2STR(candidate->bssid)); 327 wpa_sm_add_pmkid(sm, candidate->bssid, p->pmkid); 341 * @bssid: BSSID (authenticator address) of the candidat [all...] |
wpa_ft.c | 47 sm->bssid, sm->pmk_r1_name, 318 static int wpa_ft_install_ptk(struct wpa_sm *sm, const u8 *bssid) 341 if (wpa_sm_set_key(sm, alg, bssid, 0, 1, null_rsc, 369 NULL, sm->bssid, NULL, 0, mdie); 391 const u8 *bssid; local 485 bssid = target_ap; 488 bssid, sm->pmk_r1_name, 495 sm->pmk_r1_name, sm->ptk.kck, bssid, 504 wpa_sm_mark_authenticated(sm, bssid); 505 ret = wpa_ft_install_ptk(sm, bssid); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
privsep_commands.h | 39 u8 bssid[ETH_ALEN]; member in struct:privsep_cmd_associate
|