Lines Matching refs:passphrase
1103 if (ssid->passphrase && !s->passphrase)
1105 else if (ssid->passphrase && s->passphrase &&
1106 os_strcmp(ssid->passphrase, s->passphrase) != 0)
1140 if (ssid->passphrase) {
1141 os_free(s->passphrase);
1142 s->passphrase = os_strdup(ssid->passphrase);
1148 if (s->passphrase && !s->psk_set)
1254 const u8 *psk, const char *passphrase,
1271 if (passphrase && passphrase[0] == '\0')
1272 passphrase = NULL;
1275 * Include PSK/passphrase only in the control interface message and
1284 passphrase ? " passphrase=\"" : "",
1285 passphrase ? passphrase : "",
1286 passphrase ? "\"" : "",
1370 ssid && ssid->passphrase == NULL &&
1372 ssid ? ssid->passphrase : NULL,
1773 params->passphrase[0] == '\0' ?
1775 params->passphrase,
1915 if (os_strlen(params->passphrase) > 0) {
1916 ssid->passphrase = os_strdup(params->passphrase);
1917 if (ssid->passphrase == NULL) {
1919 "P2P: Failed to copy passphrase for GO");
1924 ssid->passphrase = NULL;
1928 else if (ssid->passphrase)
2233 ssid->mode == WPAS_MODE_P2P_GO && ssid->passphrase) {
2234 size_t len = os_strlen(ssid->passphrase);
2235 wpa_printf(MSG_DEBUG, "P2P: Override passphrase based "
2237 os_memcpy(res->passphrase, ssid->passphrase, len);
2238 res->passphrase[len] = '\0';
5301 * parameters or -1 to generate new values (SSID/passphrase)
6129 if (params->passphrase)
6130 ssid->passphrase = os_strdup(params->passphrase);
6236 if (ssid->passphrase) {
6237 if (os_strlen(ssid->passphrase) >= sizeof(params.passphrase)) {
6238 wpa_printf(MSG_ERROR, "P2P: Invalid passphrase in "
6242 os_strlcpy(params.passphrase, ssid->passphrase,
6243 sizeof(params.passphrase));
6983 ssid->passphrase == NULL && ssid->psk_set ?
6985 ssid->passphrase, go_dev_addr, persistent,