/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pManager.java | [all...] |
/developers/samples/android/connectivity/wifidirect/DirectP2P/Application/src/main/java/com/example/android/wifidirectp2p/ |
DeviceDetailFragment.java | 75 config.wps.setup = WpsInfo.PBC;
|
/development/samples/WiFiDirectDemo/src/com/example/android/wifidirect/ |
DeviceDetailFragment.java | 76 config.wps.setup = WpsInfo.PBC;
|
/development/samples/WiFiDirectServiceDiscovery/src/com/example/android/wifidirect/discovery/ |
WiFiServiceDiscoveryActivity.java | 249 config.wps.setup = WpsInfo.PBC;
|
/external/wpa_supplicant_8/src/ap/ |
hostapd.h | 175 struct wps_context *wps; member in struct:hostapd_data
|
ieee802_11.c | 25 #include "wps/wps.h" 1637 struct wpabuf *wps = wps_build_assoc_resp_ie(); local [all...] |
ieee802_1x.c | 901 "802.1X not enabled and WPS not used"); 926 * possible WPS STA initiates the handshake 928 * skipped if the STA is known to support WPS 931 wpa_printf(MSG_DEBUG, "WPS: Do not start " 1030 * WPS handshake even if IEEE 802.1X/EAPOL is not used for 1039 "802.1X not enabled or forced for WPS"); 1042 * reassociation change from WPS to PSK. 1078 * Delay EAPOL frame transmission until a possible WPS STA 1080 * wait to be skipped if the STA is known to support WPS 2.0. 1082 wpa_printf(MSG_DEBUG, "WPS: Do not start EAPOL until [all...] |
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.c | 828 eap_conf.wps = eapol->conf.wps; 1138 dst->wps = src->wps;
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
wpagui.cpp | 68 * Disable WPS tab by default; it will be enabled if wpa_supplicant is 69 * built with WPS support. 441 bool wps = types.contains("WSC"); local 442 actionWPS->setEnabled(wps); 443 wpsTab->setEnabled(wps); 444 wpaguiTab->setTabEnabled(wpaguiTab->indexOf(wpsTab), wps); 973 wpsStatusText->setText(tr("WPS AP in active PBC mode found")); 980 wpsStatusText->setText(tr("WPS AP with recently selected " 987 "Wi-Fi Protected Setup (WPS) AP\n" 989 wpsStatusText->setText("WPS AP indicating this client is [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius_server.c | 269 * wps - Wi-Fi Protected Setup context 271 * If WPS is used with an external RADIUS server (which is quite 272 * unlikely configuration), this is used to provide a pointer to WPS 275 struct wps_context *wps; member in struct:radius_server_data 686 eap_conf.wps = data->wps; [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
p2p_supplicant.c | 17 #include "wps/wps_i.h" 61 * WPS provisioning step or after the re-invocation of a persistent group on a 70 * WPS provisioning step on the GO. This controls the extra time the P2P 72 * WPS provisioning has been completed on the GO during group formation. 342 wpa_s->wps->dev.p2p = 1; 343 wps_ie = wps_build_probe_req_ie(pw_id, &wpa_s->wps->dev, 344 wpa_s->wps->uuid, WPS_REQ_ENROLLEE, [all...] |
wpas_glue.c | 981 ctx->wps = wpa_s->wps;
|
wpa_supplicant_i.h | 16 #include "wps/wps_defs.h" 589 * a specific wpa_supplicant operation (e.g., WPS) requires scan 596 int scan_runs; /* number of scan runs since WPS was started */ 644 struct wps_context *wps; member in struct:wpa_supplicant 645 int wps_success; /* WPS success event received */ [all...] |
events.c | 836 wpa_bss_get_vendor_ie(bss, WPS_IE_VENDOR_TYPE) ? " wps" : "", 899 "(WPS)"); 909 * advertises active WPS operation that matches 1906 struct wpabuf *wps; local [all...] |
wpa_supplicant.c | 308 eapol_conf.wps |= EAPOL_LOCAL_WPS_IN_USE; 315 eapol_conf.wps |= [all...] |
ctrl_iface.c | 30 #include "wps/wps.h" 331 wpa_printf(MSG_DEBUG, "WPS: Invalid " 335 wpa_printf(MSG_DEBUG, "WPS: Testing - force WPS " 342 wpa_printf(MSG_DEBUG, "WPS: Testing - dummy_cred=%d", 346 wpa_printf(MSG_DEBUG, "WPS: Testing - wps_corrupt_pkhash=%d", 989 wpa_printf(MSG_DEBUG, "WPS: Too long PIN"); 994 wpa_printf(MSG_DEBUG, "WPS: Invalid PIN length %d", (int) len); 1003 wpa_printf(MSG_DEBUG, "WPS: Invalid checksum digit") 1731 int res, verbose, wps, ret; local [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_i.h | 89 * wps_prov_info - Stored provisioning WPS config method 91 * This is used to store pending WPS config method between Provisioning 473 * wps_vendor_ext - WPS Vendor Extensions to add 590 /* WPS IE */ 847 int p2p_match_dev_type(struct p2p_data *p2p, struct wpabuf *wps);
|
p2p.h | 13 #include "wps/wps.h" 132 * wps_method - WPS method to be used during provisioning 174 * method - WPS Method (to be) used to establish session 218 * config_methods - WPS Methods which are allowed for this service 300 * config_methods - WPS Configuration Methods 315 * wps_sec_dev_type_list - WPS secondary device type list 337 * This buffer includes any other vendor element than P2P, WPS, and WFD 438 * pri_dev_type - Primary Device Type (see WPS) 585 * pointer can be %NULL). The WPS and P2P IEs to be added for Prob [all...] |
p2p.c | 18 #include "wps/wps_i.h" 882 * know what WPS config methods it supports. Since some [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_ndis.c | 1113 if (params->wps == WPS_MODE_PRIVACY) { 1119 * matching one for WPS provisioning. 1123 "for WPS"); 1153 if (params->wps == WPS_MODE_PRIVACY) { 1167 if (params->wps == WPS_MODE_PRIVACY) { [all...] |
driver.h | 454 * enum wps_mode - WPS mode 458 * WPS_MODE_NONE - No WPS provisioning being used 463 * WPS_MODE_OPEN - WPS provisioning with AP that is in open mode 468 * WPS_MODE_PRIVACY - WPS provisioning with AP that is using protection 605 * When using WPS, wpa_ie is used for WPS IE instead of WPA/RSN IE. 747 * wps - WPS mode 749 * If the driver needs to do special configuration for WPS association, 753 enum wps_mode wps; member in struct:wpa_driver_associate_params [all...] |
driver_nl80211.c | [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server.c | [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap.c | [all...] |
/external/robolectric/lib/main/ |
android.jar | |