HomeSort by relevance Sort by last modified time
    Searched refs:wps (Results 51 - 75 of 76) sorted by null

1 23 4

  /development/samples/WiFiDirectServiceDiscovery/src/com/example/android/wifidirect/discovery/
WiFiServiceDiscoveryActivity.java 249 config.wps.setup = WpsInfo.PBC;
  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm.c 826 eap_conf.wps = eapol->conf.wps;
1094 dst->wps = src->wps;
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
wpagui.cpp 67 * Disable WPS tab by default; it will be enabled if wpa_supplicant is
68 * built with WPS support.
427 bool wps = types.contains("WSC"); local
428 actionWPS->setEnabled(wps);
429 wpsTab->setEnabled(wps);
430 wpaguiTab->setTabEnabled(wpaguiTab->indexOf(wpsTab), wps);
883 wpsStatusText->setText(tr("WPS AP in active PBC mode found"));
890 wpsStatusText->setText(tr("WPS AP with recently selected "
897 "Wi-Fi Protected Setup (WPS) AP\n"
899 wpsStatusText->setText("WPS AP indicating this client is
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
ap.c 28 #include "wps/wps.h"
257 * Enable WPS by default for open and WPA/WPA2-Personal network, but
293 os_memcpy(bss->uuid, wpa_s->wps->uuid, WPS_UUID_LEN);
721 if (!wpa_s->ap_iface || !wpa_s->ap_iface->bss[0]->wps)
724 reg = wpa_s->ap_iface->bss[0]->wps->registrar;
730 wpa_printf(MSG_DEBUG, "No WPS operation in progress at this "
736 * There are 2 cases to return wps cancel as success:
737 * 1. When wps cancel was initiated but no connection has been
739 * 2. Client is in the middle of exchanging WPS messages
    [all...]
events.c 724 wpa_bss_get_vendor_ie(bss, WPS_IE_VENDOR_TYPE) ? " wps" : "");
783 "(WPS)");
793 * advertises active WPS operation that matches
1580 struct wpabuf *wps; local
    [all...]
wpa_supplicant_i.h 469 * a specific wpa_supplicant operation (e.g., WPS) requires scan
475 int scan_runs; /* number of scan runs since WPS was started */
506 struct wps_context *wps; member in struct:wpa_supplicant
507 int wps_success; /* WPS success event received */
wpas_glue.c 816 ctx->wps = wpa_s->wps;
p2p_supplicant.c 16 #include "wps/wps_i.h"
61 * WPS provisioning step.
69 * WPS provisioning step on the GO. This controls the extra time the P2P
71 * WPS provisioning has been completed on the GO during group formation.
248 wpa_s->wps->dev.p2p = 1;
249 wps_ie = wps_build_probe_req_ie(pw_id, &wpa_s->wps->dev,
250 wpa_s->wps->uuid, WPS_REQ_ENROLLEE,
904 wpa_printf(MSG_DEBUG, "P2P: Start WPS Enrollee for peer " MACSTR,
906 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Start WPS Enrollee for SSID",
1013 wpa_printf(MSG_DEBUG, "P2P: Setting up WPS for GO provisioning")
    [all...]
ctrl_iface.c 23 #include "wps/wps.h"
344 wpa_printf(MSG_DEBUG, "WPS: Invalid "
348 wpa_printf(MSG_DEBUG, "WPS: Testing - force WPS "
355 wpa_printf(MSG_DEBUG, "WPS: Testing - dummy_cred=%d",
766 wpa_printf(MSG_DEBUG, "WPS: Too long PIN");
771 wpa_printf(MSG_DEBUG, "WPS: Invalid PIN length %d", (int) len);
780 wpa_printf(MSG_DEBUG, "WPS: Invalid checksum digit");
823 if (os_strcmp(cmd, "WPS") == 0
1428 int res, verbose, wps, ret; local
    [all...]
wpa_supplicant.c     [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_11.c 26 #include "wps/wps.h"
943 wpa_printf(MSG_DEBUG, "STA included WPS IE in (Re)Association "
944 "Request - assume WPS is used");
950 wpa_printf(MSG_DEBUG, "WPS: STA supports WPS 2.0");
956 wpa_printf(MSG_DEBUG, "WPS: Invalid WPS IE in "
962 "(Re)Association Request - possible WPS use");
1179 struct wpabuf *wps = wps_build_assoc_resp_ie(); local
    [all...]
ieee802_1x.c 706 "802.1X not enabled and WPS not used");
731 * possible WPS STA initiates the handshake
733 * skipped if the STA is known to support WPS
736 wpa_printf(MSG_DEBUG, "WPS: Do not start "
834 * WPS handshake even if IEEE 802.1X/EAPOL is not used for
843 "802.1X not enabled or forced for WPS");
846 * reassociation change from WPS to PSK.
881 * Delay EAPOL frame transmission until a possible WPS STA
883 * wait to be skipped if the STA is known to support WPS 2.0.
885 wpa_printf(MSG_DEBUG, "WPS: Do not start EAPOL until
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p.h 116 * wps_method - WPS method to be used during provisioning
196 * config_methods - WPS Configuration Methods
211 * wps_sec_dev_type_list - WPS secondary device type list
300 * pri_dev_type - Primary Device Type (see WPS)
436 * pointer can be %NULL). The WPS and P2P IEs to be added for Probe
560 * @dev_passwd_id: WPS Device Password ID
582 * initializing WPS provisioning either as a Registrar (if GO) or as an
583 * Enrollee. Successful WPS provisioning must be indicated by calling
585 * formation if WPS provisioning cannot be completed successfully
631 * @config_methods: Requested WPS Config Metho
    [all...]
p2p_i.h 70 * wps_prov_info - Stored provisioning WPS config method
72 * This is used to store pending WPS config method between Provisioning
432 * wps_vendor_ext - WPS Vendor Extensions to add
523 /* WPS IE */
720 int p2p_match_dev_type(struct p2p_data *p2p, struct wpabuf *wps);
p2p.c 15 #include "wps/wps_i.h"
794 * know what WPS config methods it supports. Since some
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server.c 1271 sm->wps = conf->wps;
    [all...]
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.c 258 /* Reduce latency on starting WPS negotiation. */
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_ndis.c 1113 if (params->wps == WPS_MODE_PRIVACY) {
1119 * matching one for WPS provisioning.
1123 "for WPS");
1153 if (params->wps == WPS_MODE_PRIVACY) {
1167 if (params->wps == WPS_MODE_PRIVACY) {
    [all...]
driver.h 361 WPS_MODE_NONE /* no WPS provisioning being used */,
362 WPS_MODE_OPEN /* WPS provisioning with AP that is in open mode */,
363 WPS_MODE_PRIVACY /* WPS provisioning with AP that is using protection
418 * When using WPS, wpa_ie is used for WPS IE instead of WPA/RSN IE.
560 * wps - WPS mode
562 * If the driver needs to do special configuration for WPS association,
566 enum wps_mode wps; member in struct:wpa_driver_associate_params
719 * beacon_ies - WPS/P2P IE(s) for Beacon frame
    [all...]
driver_test.c 32 #include "wps/wps.h"
892 wpa_printf(MSG_DEBUG, "test_driver: Clear Beacon WPS IE");
894 wpa_hexdump_buf(MSG_DEBUG, "test_driver: Beacon WPS IE",
915 wpa_printf(MSG_DEBUG, "test_driver: Clear Probe Response WPS "
918 wpa_hexdump_buf(MSG_DEBUG, "test_driver: Probe Response WPS "
    [all...]
driver_nl80211.c     [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap.c     [all...]
  /prebuilts/sdk/14/
android.jar 
  /prebuilts/sdk/18/
android.jar 
  /prebuilts/sdk/19/
android.jar 

Completed in 496 milliseconds

1 23 4