Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching full:passphrase

682 		if (ssid->passphrase && !s->passphrase)
684 else if (ssid->passphrase && s->passphrase &&
685 os_strcmp(ssid->passphrase, s->passphrase) != 0)
718 if (ssid->passphrase) {
719 os_free(s->passphrase);
720 s->passphrase = os_strdup(ssid->passphrase);
726 if (s->passphrase && !s->psk_set)
821 const u8 *psk, const char *passphrase,
838 if (passphrase && passphrase[0] == '\0')
839 passphrase = NULL;
842 * Include PSK/passphrase only in the control interface message and
851 passphrase ? " passphrase=\"" : "",
852 passphrase ? passphrase : "",
853 passphrase ? "\"" : "",
933 ssid && ssid->passphrase == NULL &&
935 ssid ? ssid->passphrase : NULL,
1255 params->passphrase[0] == '\0' ?
1257 params->passphrase,
1362 if (os_strlen(params->passphrase) > 0) {
1363 ssid->passphrase = os_strdup(params->passphrase);
1364 if (ssid->passphrase == NULL) {
1366 "P2P: Failed to copy passphrase for GO");
1371 ssid->passphrase = NULL;
1375 else if (ssid->passphrase)
1645 ssid->mode == WPAS_MODE_P2P_GO && ssid->passphrase) {
1646 size_t len = os_strlen(ssid->passphrase);
1647 wpa_printf(MSG_DEBUG, "P2P: Override passphrase based "
1649 os_memcpy(res->passphrase, ssid->passphrase, len);
1650 res->passphrase[len] = '\0';
4784 * parameters or -1 to generate new values (SSID/passphrase)
5396 if (params->passphrase)
5397 ssid->passphrase = os_strdup(params->passphrase);
5464 if (ssid->passphrase) {
5465 if (os_strlen(ssid->passphrase) >= sizeof(params.passphrase)) {
5466 wpa_printf(MSG_ERROR, "P2P: Invalid passphrase in "
5470 os_strlcpy(params.passphrase, ssid->passphrase,
5471 sizeof(params.passphrase));
6111 ssid->passphrase == NULL && ssid->psk_set ?
6113 ssid->passphrase, go_dev_addr, persistent,