Lines Matching defs:ap
32 #include "ap.h"
66 "suitable AP", MAC2STR(bssid));
131 * TKIP+CCMP). Try to use scan results to figure out whether the AP
143 wpa_printf(MSG_DEBUG, "WPS: The AP was not found from BSS "
148 wpa_printf(MSG_DEBUG, "WPS: AP found from BSS table");
165 * TODO: This could be the initial AP configuration and the
170 wpa_printf(MSG_DEBUG, "WPS: The AP did not yet advertise WPA "
502 struct wps_event_er_ap *ap)
507 uuid_bin2str(ap->uuid, uuid_str, sizeof(uuid_str));
508 if (ap->pri_dev_type)
509 wps_dev_type_bin2str(ap->pri_dev_type, dev_type,
516 uuid_str, MAC2STR(ap->mac_addr), dev_type, ap->wps_state,
517 ap->friendly_name ? ap->friendly_name : "",
518 ap->manufacturer ? ap->manufacturer : "",
519 ap->model_description ? ap->model_description : "",
520 ap->model_name ? ap->model_name : "",
521 ap->manufacturer_url ? ap->manufacturer_url : "",
522 ap->model_url ? ap->model_url : "");
527 struct wps_event_er_ap *ap)
530 uuid_bin2str(ap->uuid, uuid_str, sizeof(uuid_str));
649 wpa_supplicant_wps_event_er_ap_add(wpa_s, &data->ap);
652 wpa_supplicant_wps_event_er_ap_remove(wpa_s, &data->ap);
765 * provisioning is started, so better not filter the AP based
787 "for the AP; use wildcard");
863 wpa_hexdump_ascii(MSG_DEBUG, "WPS: Use specific AP "
898 wpa_hexdump_ascii(MSG_DEBUG, "WPS: Use specific AP "
927 wpa_printf(MSG_DEBUG, "WPS: Cancelling in AP mode");
1283 wpa_printf(MSG_DEBUG, " skip - non-WPS AP");
1288 wpa_printf(MSG_DEBUG, " skip - WPS AP "
1303 wpa_printf(MSG_DEBUG, " skip - non-WPS AP");
1310 * allow any WPS AP after couple of scans since some APs do not
1316 wpa_printf(MSG_DEBUG, " skip - WPS AP "
1380 "missing from AP Beacon");
1412 /* Make sure that only one AP is in active PBC mode */
1952 struct wps_ap_info *ap = &wpa_s->wps_ap[i];
1953 struct wpa_blacklist *e = wpa_blacklist_get(wpa_s, ap->bssid);
1955 wpa_printf(MSG_DEBUG, "WPS: AP[%d] " MACSTR " type=%d "
1957 (int) i, MAC2STR(ap->bssid), ap->type, ap->tries,
1958 ap->last_attempt.sec > 0 ?
1959 (int) now.sec - (int) ap->last_attempt.sec : -1,
1974 struct wps_ap_info *ap = &wpa_s->wps_ap[i];
1975 if (os_memcmp(ap->bssid, bssid, ETH_ALEN) == 0)
1976 return ap;
1988 struct wps_ap_info *ap;
2008 ap = wpas_wps_get_ap_info(wpa_s, res->bssid);
2009 if (ap) {
2010 if (ap->type != type) {
2011 wpa_printf(MSG_DEBUG, "WPS: AP " MACSTR
2013 MAC2STR(res->bssid), ap->type, type);
2014 ap->type = type;
2016 wpa_blacklist_del(wpa_s, ap->bssid);
2021 ap = os_realloc_array(wpa_s->wps_ap, wpa_s->num_wps_ap + 1,
2023 if (ap == NULL)
2026 wpa_s->wps_ap = ap;
2027 ap = &wpa_s->wps_ap[wpa_s->num_wps_ap];
2030 os_memset(ap, 0, sizeof(*ap));
2031 os_memcpy(ap->bssid, res->bssid, ETH_ALEN);
2032 ap->type = type;
2033 wpa_printf(MSG_DEBUG, "WPS: AP " MACSTR " type %d added",
2034 MAC2STR(ap->bssid), ap->type);
2052 struct wps_ap_info *ap;
2055 ap = wpas_wps_get_ap_info(wpa_s, bssid);
2056 if (ap == NULL)
2058 ap->tries++;
2059 os_get_time(&ap->last_attempt);