/external/wpa_supplicant_8/wpa_supplicant/ |
blacklist.h | 2 * wpa_supplicant - Temporary BSSID blacklist 14 u8 bssid[ETH_ALEN]; member in struct:wpa_blacklist 19 const u8 *bssid); 20 int wpa_blacklist_add(struct wpa_supplicant *wpa_s, const u8 *bssid); 21 int wpa_blacklist_del(struct wpa_supplicant *wpa_s, const u8 *bssid);
|
preauth_test.c | 123 static int wpa_supplicant_get_bssid(void *wpa_s, u8 *bssid) 150 const u8 *bssid, const u8 *pmkid) 158 const u8 *bssid, const u8 *pmkid) 279 u8 bssid[ETH_ALEN]; local 296 if (hwaddr_aton(argv[2], bssid)) { 338 if (rsn_preauth_init(wpa_s.wpa, bssid, &wpa_s.conf->ssid->eap)) 350 ret = pmksa_cache_set_current(wpa_s.wpa, NULL, bssid, NULL, 0)
|
bgscan_learn.c | 24 u8 bssid[ETH_ALEN]; member in struct:bgscan_learn_bss 52 static int bssid_in_array(u8 *array, size_t array_len, const u8 *bssid) 60 if (os_memcmp(array + i * ETH_ALEN, bssid, ETH_ALEN) == 0) 69 const u8 *bssid) 73 if (os_memcmp(bss->bssid, bssid, ETH_ALEN) == 0) 75 if (bssid_in_array(bss->neigh, bss->num_neigh, bssid)) 82 os_memcpy(n + bss->num_neigh * ETH_ALEN, bssid, ETH_ALEN); 89 struct bgscan_learn_data *data, const u8 *bssid) 94 if (os_memcmp(bss->bssid, bssid, ETH_ALEN) == 0 480 u8 bssid[MAX_BSS * ETH_ALEN]; local [all...] |
bss.h | 64 /** BSSID */ 65 u8 bssid[ETH_ALEN]; member in struct:wpa_bss 108 struct wpa_bss * wpa_bss_get(struct wpa_supplicant *wpa_s, const u8 *bssid, 111 const u8 *bssid); 113 const u8 *bssid);
|
wpa_priv.c | 180 u8 *bssid; local 198 bssid = assoc->bssid; 199 if (bssid[0] | bssid[1] | bssid[2] | bssid[3] | bssid[4] | bssid[5]) 200 params.bssid = bssid 224 u8 bssid[ETH_ALEN]; local [all...] |
wpas_glue.c | 124 u8 *msg, *dst, bssid[ETH_ALEN]; local 151 if (is_zero_ether_addr(wpa_s->bssid)) { 152 wpa_printf(MSG_DEBUG, "BSSID not set when trying to send an " 154 if (wpa_drv_get_bssid(wpa_s, bssid) == 0 && 155 !is_zero_ether_addr(bssid)) { 156 dst = bssid; 157 wpa_printf(MSG_DEBUG, "Using current BSSID " MACSTR 168 /* BSSID was already set (from (Re)Assoc event, so use it as 170 dst = wpa_s->bssid; 207 unicast ? wpa_s->bssid : NULL [all...] |
config_ssid.h | 110 * bssid - BSSID 113 * using the configured BSSID 118 u8 bssid[ETH_ALEN]; member in struct:wpa_ssid 121 * bssid_set - Whether BSSID is configured for this network
|
scan.c | 493 u8 bssid[ETH_ALEN]; local 516 if (wpa_drv_get_bssid(ifs, bssid) == 0) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.h | 49 QString bssid; member in class:NetworkConfig
|
scanresults.cpp | 77 QString ssid, bssid, freq, signal, flags; local 86 if ((*it).startsWith("bssid=")) 87 bssid = (*it).mid(pos); 101 item->setText(1, bssid); 107 if (bssid.isEmpty())
|
wpagui.cpp | 535 if (strcmp(start, "bssid") == 0) { 599 char buf[2048], *start, *end, *id, *ssid, *bssid, *flags; local 643 bssid = strchr(ssid, '\t'); 644 if (bssid == NULL) 646 *bssid++ = '\0'; 647 flags = strchr(bssid, '\t'); 1385 if ((*it).startsWith("bssid=")) 1386 msg.append("BSSID:\t" + (*it).mid(pos) + "\n"); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_old_handlers_wps.c | 32 u8 bssid[ETH_ALEN]; local 41 else if (!hwaddr_aton(arg_bssid, bssid)) 42 ret = wpas_wps_start_pbc(wpa_s, bssid, 0); 45 "Invalid BSSID"); 74 u8 bssid[ETH_ALEN], *_bssid = NULL; local 83 else if (!hwaddr_aton(arg_bssid, bssid)) 84 _bssid = bssid; 87 "Invalid BSSID"); 134 u8 bssid[ETH_ALEN]; local 143 else if (!hwaddr_aton(arg_bssid, bssid)) [all...] |
dbus_new_handlers_wps.c | 27 u8 *bssid; member in struct:wps_start_params 108 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Bssid type, " 111 message, "Bssid must be a byte array"); 115 dbus_message_iter_get_fixed_array(&array_iter, ¶ms->bssid, &len); 117 wpa_printf(MSG_DEBUG, "dbus: WPS.Stsrt - Wrong Bssid length " 120 "Bssid is wrong length"); 194 else if (os_strcmp(key, "Bssid") == 0) 220 * (pin or push button) and optionally pin and bssid. Returned message 268 ret = wpas_wps_start_reg(wpa_s, params.bssid, params.pin, 274 params.bssid, [all...] |
dbus_old.c | 27 * @bssid: (out) the scanned bssid this object path refers to, if any 31 * and BSSID parts, if those parts exist. 34 char **bssid) 68 } else if (bssid && bssid_part) { 69 /* Deal with a request for a scanned BSSID */ 73 *bssid = os_strdup(bssid_name); 75 *bssid = NULL; 116 * wpas_dbus_new_invalid_bssid_error - Return a new invalid bssid error message 120 * Convenience function to create and return an invalid bssid erro 174 u8 bssid[ETH_ALEN]; local 212 char *bssid = NULL; local [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_ndis.h | 22 u8 bssid[ETH_ALEN]; member in struct:ndis_pmkid_entry 40 u8 bssid[ETH_ALEN]; member in struct:wpa_driver_ndis_data
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_invitation.c | 161 u8 group_bssid[ETH_ALEN], *bssid; local 353 bssid = group_bssid; 355 bssid = NULL; 357 bssid, reg_class, channel, channels); 569 const u8 *bssid, const u8 *ssid, size_t ssid_len, 579 if (bssid) 581 "P2P: Invitation for BSSID " MACSTR, MAC2STR(bssid)); 627 p2p->inv_bssid_set = bssid != NULL; 628 if (bssid) [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
preauth.c | 28 u8 bssid[ETH_ALEN]; member in struct:rsn_pmksa_candidate 156 * @dst: Authenticator address (BSSID) with which to preauthenticate 308 p = pmksa_cache_get(sm->pmksa, candidate->bssid, NULL, NULL); 309 if (os_memcmp(sm->bssid, candidate->bssid, ETH_ALEN) != 0 && 314 MAC2STR(candidate->bssid)); 316 rsn_preauth_init(sm, candidate->bssid, 323 MAC2STR(candidate->bssid)); 327 wpa_sm_add_pmkid(sm, candidate->bssid, p->pmkid); 341 * @bssid: BSSID (authenticator address) of the candidat [all...] |
wpa_ft.c | 47 sm->bssid, sm->pmk_r1_name, 316 static int wpa_ft_install_ptk(struct wpa_sm *sm, const u8 *bssid) 333 if (wpa_sm_set_key(sm, alg, bssid, 0, 1, null_rsc, 361 NULL, sm->bssid, NULL, 0, mdie); 383 const u8 *bssid; local 477 bssid = target_ap; 480 bssid, sm->pmk_r1_name, 487 sm->pmk_r1_name, sm->ptk.kck, bssid, 496 wpa_sm_mark_authenticated(sm, bssid); 497 ret = wpa_ft_install_ptk(sm, bssid); [all...] |
peerkey.c | 995 u8 bssid[ETH_ALEN], *rbuf, *pos, *count_pos; local 1016 if (wpa_sm_get_bssid(sm, bssid) < 0) { 1017 wpa_printf(MSG_WARNING, "Failed to read BSSID for EAPOL-Key " 1099 wpa_eapol_key_send(sm, sm->ptk.kck, ver, bssid, ETH_P_EAPOL, [all...] |
wpa_i.h | 65 u8 bssid[ETH_ALEN]; member in struct:wpa_sm 162 static inline int wpa_sm_get_bssid(struct wpa_sm *sm, u8 *bssid) 165 return sm->ctx->get_bssid(sm->ctx->ctx, bssid); 196 static inline int wpa_sm_add_pmkid(struct wpa_sm *sm, const u8 *bssid, 200 return sm->ctx->add_pmkid(sm->ctx->ctx, bssid, pmkid); 203 static inline int wpa_sm_remove_pmkid(struct wpa_sm *sm, const u8 *bssid, 207 return sm->ctx->remove_pmkid(sm->ctx->ctx, bssid, pmkid);
|
/external/wpa_supplicant_8/src/ap/ |
drv_callbacks.c | 414 const u8 *bssid, const u8 *ie, size_t ie_len, 426 sa, da, bssid, ie, ie_len, 440 const u8 *bssid, 490 wpa_ft_process_auth(sta->wpa_sm, rx_auth->bssid, 547 const u8 *bssid) 551 if (bssid == NULL) 553 if (bssid[0] == 0xff && bssid[1] == 0xff && bssid[2] == 0xff && 554 bssid[3] == 0xff && bssid[4] == 0xff && bssid[5] == 0xff 582 const u8 *bssid; local [all...] |
/external/wpa_supplicant_8/src/common/ |
privsep_commands.h | 31 u8 bssid[ETH_ALEN]; member in struct:privsep_cmd_associate
|
/hardware/ti/wlan/mac80211/wpa_supplicant_lib/ |
driver_nl80211.h | 112 u8 bssid[ETH_ALEN]; member in struct:wpa_driver_nl80211_data
|
/packages/apps/Settings/src/com/android/settings/wifi/ |
AccessPoint.java | 61 String bssid; field in class:AccessPoint 187 bssid = config.BSSID; 196 bssid = result.BSSID;
|
/hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/ |
driver_nl80211.h | 132 u8 bssid[ETH_ALEN]; member in struct:wpa_driver_nl80211_data
|