/external/wpa_supplicant_8/wpa_supplicant/ |
blacklist.h | 2 * wpa_supplicant - Temporary BSSID blacklist 14 u8 bssid[ETH_ALEN]; member in struct:wpa_blacklist 19 const u8 *bssid); 20 int wpa_blacklist_add(struct wpa_supplicant *wpa_s, const u8 *bssid); 21 int wpa_blacklist_del(struct wpa_supplicant *wpa_s, const u8 *bssid);
|
blacklist.c | 2 * wpa_supplicant - Temporary BSSID blacklist 16 * wpa_blacklist_get - Get the blacklist entry for a BSSID 18 * @bssid: BSSID 19 * Returns: Matching blacklist entry for the BSSID or %NULL if not found 22 const u8 *bssid) 26 if (wpa_s == NULL || bssid == NULL) 31 if (os_memcmp(e->bssid, bssid, ETH_ALEN) == 0) 41 * wpa_blacklist_add - Add an BSSID to the blacklis [all...] |
offchannel.h | 14 const u8 *dst, const u8 *src, const u8 *bssid, 18 const u8 *src, const u8 *bssid,
|
/frameworks/base/core/java/android/net/ |
WifiKey.java | 49 * The basic service set identifier (BSSID) of an access point for this network. This will 53 public final String bssid; field in class:WifiKey 56 * Construct a new {@link WifiKey} for the given Wi-Fi SSID/BSSID pair. 61 * @param bssid the basic service set identifier (BSSID) of this network's access point. 64 * @throws IllegalArgumentException if either the SSID or BSSID is invalid. 66 public WifiKey(String ssid, String bssid) { 70 if (!BSSID_PATTERN.matcher(bssid).matches()) { 71 throw new IllegalArgumentException("Invalid bssid: " + bssid); [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/ |
IconEvent.java | 8 public IconEvent(long bssid, String fileName, int size) { 9 mBSSID = bssid; 29 "BSSID=" + String.format("%012x", mBSSID) +
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
StateChangeResult.java | 29 StateChangeResult(int networkId, WifiSsid wifiSsid, String BSSID, 33 this.BSSID = BSSID; 39 String BSSID; 47 sb.append(" BSSID: ").append(BSSID);
|
WifiLastResortWatchdog.java | 52 * Maximum number of scan results received since we last saw a BSSID. 57 * BSSID used to increment failure counts against ALL bssids associated with a particular SSID 66 * Key:BSSID, Value:Counters of failure types 106 String bssid = scanResult.BSSID; local 108 if (VDBG) Log.v(TAG, " " + bssid + ": " + scanDetail.getSSID()); 111 mRecentAvailableNetworks.get(bssid); 139 mRecentAvailableNetworks.put(bssid, availableNetworkFailureCount); 176 * Increments the failure reason count for the given bssid. Performs a check to see if we have 178 * @param bssid of the network that has failed connection, can be "any [all...] |
ScanDetailCache.java | 67 ScanResult get(String bssid) { 68 ScanDetail scanDetail = getScanDetail(bssid); 72 ScanDetail getScanDetail(String bssid) { 73 return mMap.get(bssid); 76 void remove(String bssid) { 77 mMap.remove(bssid); 157 return a.BSSID.compareTo(b.BSSID); 183 //number of known BSSID on 5GHz band 187 //number of known BSSID on 2.4Ghz ban [all...] |
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpas-test.py | 13 WPAS_DBUS_BSSID_INTERFACE = "fi.epitest.hostap.WPASupplicant.BSSID" 62 # Convert the byte-array for SSID and BSSID to printable strings 63 bssid = "" 64 for item in props["bssid"]: 65 bssid = bssid + ":%02x" % item 66 bssid = bssid[1:] 83 print " %s :: ssid='%s' wpa=%s wpa2=%s quality=%d%% rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, qual, maxrate, freq)
|
/external/robolectric/v1/src/main/java/com/xtremelabs/robolectric/shadows/ |
ShadowScanResult.java | 14 public static ScanResult newInstance(String SSID, String BSSID, String caps, int level, int frequency) { 17 scanResult.BSSID = BSSID; 28 .append(", BSSID: ").append(valueOrNone(realObject.BSSID))
|
/system/connectivity/shill/ |
tethering.cc | 33 bool Tethering::IsAndroidBSSID(const vector<uint8_t>& bssid) { 34 vector<uint8_t> truncated_bssid = bssid; 42 bool Tethering::IsLocallyAdministeredBSSID(const vector<uint8_t>& bssid) { 43 return bssid.size() > 0 && (bssid[0] & kLocallyAdministratedMACBit);
|
tethering.h | 45 // Returns whether an 802.11 BSSID is likely to be owned by an Android device. 46 static bool IsAndroidBSSID(const std::vector<uint8_t>& bssid); 48 // Returns whether an 802.11 BSSID is a locally-administered address, as 50 static bool IsLocallyAdministeredBSSID(const std::vector<uint8_t>& bssid);
|
/external/robolectric/v1/src/test/java/com/xtremelabs/robolectric/shadows/ |
ScanResultTest.java | 18 ScanResult scanResult = ShadowScanResult.newInstance("SSID", "BSSID", "Caps", 11, 42); 20 assertThat(scanResult.BSSID, equalTo("BSSID"));
|
WifiConfigurationTest.java | 27 wifiConfiguration.BSSID = "BSSID"; 47 assertThat(copy.BSSID, equalTo("BSSID"));
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_old_handlers_wps.c | 32 u8 bssid[ETH_ALEN]; local 41 else if (!hwaddr_aton(arg_bssid, bssid)) 42 ret = wpas_wps_start_pbc(wpa_s, bssid, 0); 45 "Invalid BSSID"); 73 u8 bssid[ETH_ALEN], *_bssid = NULL; local 83 else if (!hwaddr_aton(arg_bssid, bssid)) 84 _bssid = bssid; 87 "Invalid BSSID"); 131 u8 bssid[ETH_ALEN]; local 138 if (!hwaddr_aton(arg_bssid, bssid)) [all...] |
/frameworks/base/wifi/java/android/net/wifi/ |
WpsInfo.java | 44 public String BSSID; 51 BSSID = null; 59 sbuf.append(" BSSID: ").append(BSSID); 75 BSSID = source.BSSID; 83 dest.writeString(BSSID); 93 config.BSSID = in.readString();
|
/external/wpa_supplicant_8/src/rsn_supp/ |
preauth.h | 21 void rsn_preauth_scan_result(struct wpa_sm *sm, const u8 *bssid, 23 void pmksa_candidate_add(struct wpa_sm *sm, const u8 *bssid, 55 static inline void rsn_preauth_scan_result(struct wpa_sm *sm, const u8 *bssid, 61 const u8 *bssid,
|
/external/autotest/server/site_tests/network_WiFi_MaskedBSSID/ |
network_WiFi_MaskedBSSID.py | 18 Set up two APs on the same channel/bssid but with different SSIDs. 28 bssid='00:11:22:33:44:55', 31 # Create an AP, manually specifying both the SSID and BSSID. 33 # Create a second AP that responds to probe requests with the same BSSID 39 # respond to the same BSSID, but we can test to make sure both SSIDs
|
control.wifi_masked_bssid | 15 different SSIDs which respond with the same BSSID. Some client 16 firmwares may hold only one scan entry per BSSID and will foil attempts
|
/tools/test/connectivity/acts/tests/google/wifi/ |
WifiAutoJoinTest.py | 123 network_bssid: Network bssid to which connection. 135 def set_attn_and_validate_connection(self, attn_value, bssid): 140 bssid: Bssid of excepted network. 143 True if bssid of current network match, else false. 151 asserts.assert_true(self.check_connection(bssid), 152 "Device is not connected to required bssid {}".format(bssid)) 155 "Error, No Internet connection for current bssid {}". 156 format(bssid)) [all...] |
/external/wpa_supplicant_8/src/common/ |
privsep_commands.h | 35 u8 bssid[ETH_ALEN]; member in struct:privsep_cmd_authenticate 52 u8 bssid[ETH_ALEN]; member in struct:privsep_cmd_associate 96 u8 bssid[ETH_ALEN]; member in struct:privsep_event_auth
|
/external/autotest/server/site_tests/network_WiFi_ChannelHop/ |
network_WiFi_ChannelHop.py | 26 bssid=network_WiFi_ChannelHop.ORIGINAL_BSSID) 38 # This checks both channel jumping on the same BSSID and channel 40 for freq, bssid in ((2437, network_WiFi_ChannelHop.ORIGINAL_BSSID), 56 bssid=bssid)
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
scanresults.cpp | 78 QString ssid, bssid, freq, signal, flags; local 87 if ((*it).startsWith("bssid=")) 88 bssid = (*it).mid(pos); 102 item->setText(1, bssid); 108 if (bssid.isEmpty())
|
/external/iw/ |
connect.c | 17 unsigned char bssid[6]; local 38 /* bssid */ 40 if (mac_addr_a2n(bssid, argv[0]) == 0) { 41 NLA_PUT(msg, NL80211_ATTR_MAC, 6, bssid); 143 TOPLEVEL(connect, "[-w] <SSID> [<freq in MHz>] [<bssid>] [key 0:abcde d:1:6162636465]", 145 "Join the network with the given SSID (and frequency, BSSID).\n" 154 unsigned char bssid[6]; local 166 /* bssid */ 167 if (mac_addr_a2n(bssid, argv[0]) == 0) { 168 NLA_PUT(msg, NL80211_ATTR_MAC, 6, bssid); [all...] |
/hardware/libhardware_legacy/include/hardware_legacy/ |
gscan.h | 41 int max_bssid_history_entries; // number of BSSID/RSSI entries that device can hold 82 mac_addr bssid; member in struct:__anon32308 162 // the BSSID/RSSI history buffer (keep the highest RSSI 216 wifi_scan_result results[MAX_AP_CACHE_PER_SCAN]; // scan results - one for each bssid 222 /* BSSID Hotlist */ 231 mac_addr bssid; // AP BSSID member in struct:__anon32316 242 /* Set the BSSID Hotlist */ 246 /* Clear the BSSID Hotlist */ 270 /* BSSID blacklist * 282 mac_addr bssid; \/\/ BSSID member in struct:__anon32322 [all...] |