Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching refs:passphrase

669 		if (ssid->passphrase && !s->passphrase)
671 else if (ssid->passphrase && s->passphrase &&
672 os_strcmp(ssid->passphrase, s->passphrase) != 0)
705 if (ssid->passphrase) {
706 os_free(s->passphrase);
707 s->passphrase = os_strdup(ssid->passphrase);
713 if (s->passphrase && !s->psk_set)
808 const u8 *psk, const char *passphrase,
825 if (passphrase && passphrase[0] == '\0')
826 passphrase = NULL;
829 * Include PSK/passphrase only in the control interface message and
838 passphrase ? " passphrase=\"" : "",
839 passphrase ? passphrase : "",
840 passphrase ? "\"" : "",
920 ssid && ssid->passphrase == NULL &&
922 ssid ? ssid->passphrase : NULL,
1242 params->passphrase[0] == '\0' ?
1244 params->passphrase,
1349 if (os_strlen(params->passphrase) > 0) {
1350 ssid->passphrase = os_strdup(params->passphrase);
1351 if (ssid->passphrase == NULL) {
1353 "P2P: Failed to copy passphrase for GO");
1358 ssid->passphrase = NULL;
1362 else if (ssid->passphrase)
1632 ssid->mode == WPAS_MODE_P2P_GO && ssid->passphrase) {
1633 size_t len = os_strlen(ssid->passphrase);
1634 wpa_printf(MSG_DEBUG, "P2P: Override passphrase based "
1636 os_memcpy(res->passphrase, ssid->passphrase, len);
1637 res->passphrase[len] = '\0';
4765 * parameters or -1 to generate new values (SSID/passphrase)
5356 if (params->passphrase)
5357 ssid->passphrase = os_strdup(params->passphrase);
5424 if (ssid->passphrase) {
5425 if (os_strlen(ssid->passphrase) >= sizeof(params.passphrase)) {
5426 wpa_printf(MSG_ERROR, "P2P: Invalid passphrase in "
5430 os_strlcpy(params.passphrase, ssid->passphrase,
5431 sizeof(params.passphrase));
6069 ssid->passphrase == NULL && ssid->psk_set ?
6071 ssid->passphrase, go_dev_addr, persistent,