/external/iw/ |
ibss.c | 69 /* SSID */ 197 "<SSID> <freq in MHz> [HT20|HT40+|HT40-|NOHT|5MHZ|10MHZ] [fixed-freq] [<fixed bssid>] [beacon-interval <TU>]" 201 "Join the IBSS cell with the given SSID, if it doesn't exist create\n" 205 "if it has higher TSF and the same SSID. If an IBSS is created, create\n"
|
iw.h | 177 "[freqs <freq>+] [matches [ssid <ssid>]+]] [active [ssid <ssid>]+|passive] [randomise[=<addr>/<mask>]]"
|
/external/wpa_supplicant_8/wpa_supplicant/ |
bss.h | 78 /** SSID */ 79 u8 ssid[SSID_MAX_LEN]; member in struct:wpa_bss 80 /** Length of SSID */ 123 const u8 *ssid, size_t ssid_len);
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
openCryptoki.conf | 23 ssid="test network"
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
scanresults.ui | 32 <string>SSID</string>
|
/frameworks/base/packages/Osu/src/com/android/anqp/ |
HSOsuProvidersElement.java | 45 "SSID='" + mSSID + '\'' +
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
StateChangeResult.java | 46 sb.append(" SSID: ").append(wifiSsid.toString());
|
WifiNetworkScoreCache.java | 44 // The key is of the form "<ssid>"<bssid> 153 String key = network.networkKey.wifiKey.ssid; 164 if (result == null || result.SSID == null) { 168 key.append(result.SSID);
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/anqp/ |
HSOsuProvidersElement.java | 45 "SSID='" + mSSID + '\'' +
|
/packages/apps/ManagedProvisioning/tests/src/com/android/managedprovisioning/model/ |
WifiInfoTest.java | 55 assertEquals(TEST_SSID, wifiInfo.ssid); 68 // WHEN a WifiInfo object is constructed without Ssid. 78 fail("Ssid is mandatory."); 80 // THEN the WifiInfo object fails to construct due to missing ssid.
|
/platform_testing/tests/functional/settingstests/src/com/android/settings/functional/ |
WirelessNetworkSettingsTests.java | 91 private static final String ADD_NETWORK_MENU_SSID_RES_ID = "ssid"; 192 // Check that the SSID field is defaults to the hint. 193 assertEquals("Enter the SSID", mDevice.wait(Until.findObject(By 338 // Entering an SSID is enough to enable the submit button. // TODO THIS GUY 357 // Entering an SSID alone does not enable the submit button. 381 // Entering an SSID alone does not enable the submit button. 420 // Entering an SSID alone does not enable the submit button. 445 // Entering an SSID alone does not enable the submit button. 480 // Entering an SSID alone does not enable the submit button. 503 // Entering an SSID alone enables the submit button [all...] |
/system/connectivity/shill/test-rpc-proxy/ |
proxy_dbus_shill_wifi_client.cc | 74 const std::string& ssid, 89 shill::kSSIDProperty, brillo::Any(ssid))); 110 const std::string& ssid, 134 ssid, security, security_params, save_credentials, station_type, 136 *failure_reason = "FAIL(Failed to configure hidden SSID)"; 143 shill::kNameProperty, brillo::Any(ssid))); 219 const std::string& ssid, 231 shill::kNameProperty, brillo::Any(ssid))); 322 const std::string& ssid, 332 shill::kNameProperty, brillo::Any(ssid))); [all...] |
proxy_rpc_server.cc | 184 const std::string& ssid(params_in[0]); 185 return shill_wifi_client->DeleteEntriesForSsid(ssid); 229 const std::string& ssid = params_in[0]; local 230 return shill_wifi_client->Disconnect(ssid); 239 const std::string& ssid(params_in[0]); 250 ssid, states, GetMillisecondsFromSeconds(timeout), 288 const std::string& ssid(params_in[0]); 290 if (!shill_wifi_client->GetServiceProperties(ssid, &properties)) { 310 for (const auto& ssid : ssids) { 311 result[array_pos++] = ssid; [all...] |
/system/connectivity/shill/wifi/ |
mock_scan_session.h | 50 MOCK_METHOD1(AddSsid, void(const ByteString& ssid));
|
wifi_endpoint_unittest.cc | 195 const std::string& ssid, 200 control_interface, wifi, ssid, bssid, 207 const std::string& ssid, 210 control_interface, wifi, ssid, bssid, 284 const char kSSID[] = "The SSID"; 690 MakeOpenEndpoint(nullptr, wifi(), "ssid", "00:00:00:00:00:01"); 702 MakeOpenEndpoint(nullptr, wifi(), "ssid", "00:00:00:00:00:01"); 717 MakeOpenEndpoint(nullptr, wifi(), "ssid", "00:00:00:00:00:01"); 729 MakeOpenEndpoint(nullptr, wifi(), "ssid", "00:00:00:00:00:01"); 787 nullptr, wifi(), "ssid", "00:00:00:00:00:01", false, false) [all...] |
/system/netd/server/ |
SoftapController.h | 42 bool generatePsk(char *ssid, char *passphrase, char *psk);
|
/external/autotest/server/cros/ap_configurators/ |
belkinF9K1103_ap_configurator.py | 102 self.get_url(page_url, page_title='Channel and SSID') 164 def set_ssid(self, ssid): 165 self.add_item_to_command_list(self._set_ssid, (ssid,), 1, 900) 168 def _set_ssid(self, ssid): 172 self.set_content_of_text_field_by_xpath(ssid, xpath, abort_check=False) 173 self._ssid = ssid 293 Returns if AP supports setting the visibility (SSID broadcast).
|
/external/autotest/server/cros/network/ |
wifi_test_context_manager.py | 232 connect_name = '%s (%s)' % (wifi_params.ssid, description) 234 connect_name = '%s' % wifi_params.ssid 302 def wait_for_connection(self, ssid, freq=None, ap_num=None, 304 """Verifies a connection to network ssid on frequency freq. 306 @param ssid string ssid of the network to check. 319 ssid, timeout_seconds=timeout_seconds, freq=freq,
|
/external/autotest/server/ |
site_linux_router.py | 25 ['ssid', 'interface', 'dev_type']) 27 ['ssid', 'conf_file', 'log_file', 150 @param test_name string name of this test. Used in SSID creation. 283 hostapd_conf_dict['ssid'], 402 @param suffix string to append to SSID 412 # And salt the SSID so that tests running in adjacent cells are unlikely 413 # to pick the same SSID and we're resistent to beacons leaking out of 456 ssid = (config.ssid or 460 self.iw_runner.ibss_join(interface, ssid, config.frequency [all...] |
/external/selinux/libselinux/src/ |
audit2why.c | 43 sepol_security_id_t ssid; member in struct:avc_t 111 rc = sepol_compute_av_reason(avc->ssid, avc->tsid, avc->tclass, 319 sepol_security_id_t ssid, tsid; local 338 rc = sepol_context_to_sid(scon, strlen(scon) + 1, &ssid); 376 rc = sepol_compute_av_reason_buffer(ssid, tsid, tclass, av, &avd, &reason, &reason_buf, 0); 384 avc->ssid = ssid;
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_cli.sgml | 93 CTRL-REQ-PASSWORD-1:Password needed for SSID foobar 100 CTRL-REQ-OTP-2:Challenge 1235663 needed for SSID foobar 285 <para>configure identity for an SSID</para> 292 <para>configure password for an SSID</para> 299 <para>configure pin for an SSID</para> 306 <para>configure one-time-password for an SSID</para> 313 <para>set preferred BSSID for an SSID</para>
|
/hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/ |
driver_cmd_wext.c | 96 wpa_printf(MSG_DEBUG, "For Scan: %s", params->ssids[i].ssid); 99 os_memcpy(&buf[bp], params->ssids[i].ssid, params->ssids[i].ssid_len); 224 ssid_conf = wpa_s->conf->ssid; 234 /* Check that there is enough space needed for 1 more SSID, the other sections and null termination */ 238 wpa_printf(MSG_DEBUG, "For PNO Scan: %s", ssid_conf->ssid); 241 os_memcpy(&buf[bp], ssid_conf->ssid, ssid_conf->ssid_len); 381 /* Answer: SSID rssi -Val */
|
/external/wpa_supplicant_8/src/drivers/ |
driver_wext.c | 121 * wpa_driver_wext_get_ssid - Get SSID, SIOCGIWESSID 123 * @ssid: Buffer for the SSID; must be at least 32 bytes long 124 * Returns: SSID length on success, -1 on failure 126 int wpa_driver_wext_get_ssid(void *priv, u8 *ssid) 134 iwr.u.essid.pointer = (caddr_t) ssid; 145 /* Some drivers include nul termination in the SSID, so let's 149 if (ret > 0 && ssid[ret - 1] == '\0' && 159 * wpa_driver_wext_set_ssid - Set SSID, SIOCSIWESSID 161 * @ssid: SSI 1097 const u8 *ssid = params->ssids[0].ssid; local 1202 u8 ssid[SSID_MAX_LEN]; member in struct:wext_scan_data 1955 u8 ssid[SSID_MAX_LEN]; local [all...] |
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
ConnectivityManagerTestBase.java | 315 * Associate the device to given SSID 319 protected boolean connectToWifi(String ssid, String password) { 322 config = WifiConfigurationHelper.createOpenConfig(ssid); 324 config = WifiConfigurationHelper.createPskConfig(ssid, password); 330 * Connect to Wi-Fi with the given configuration. Note the SSID in the configuration 481 assertTrue("failed to associate with " + config.SSID, 485 assertTrue("wifi state not connected with " + config.SSID, 489 // step 3: verify the current connected network is the given SSID 491 assertEquals("SSID mismatch", config.SSID, mWifiManager.getConnectionInfo().getSSID()) [all...] |
/hardware/libhardware_legacy/include/hardware_legacy/ |
gscan.h | 43 int max_number_epno_networks_by_ssid; // max number of epno entries if ssid is specified, 81 char ssid[32+1]; // null terminated member in struct:__anon31457 249 /* SSID Hotlist */ 258 char ssid[32+1]; // SSID member in struct:__anon31468 267 ssid_threshold_param ssid[MAX_HOTLIST_SSID]; // hotlist SSIDs member in struct:__anon31469 320 // Therefore, it is acceptable for firmware to store a crc24, crc32 or other short hash of the SSID, 360 // If required then the firmware must store the network's SSID and not just a hash 362 // If this SSID should be considered the same network as the currently connected one for scoring 371 char ssid[32+1]; // null terminate member in struct:__anon31474 [all...] |