Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching refs:passphrase

1111 		if (ssid->passphrase && !s->passphrase)
1113 else if (ssid->passphrase && s->passphrase &&
1114 os_strcmp(ssid->passphrase, s->passphrase) != 0)
1148 if (ssid->passphrase) {
1149 os_free(s->passphrase);
1150 s->passphrase = os_strdup(ssid->passphrase);
1156 if (s->passphrase && !s->psk_set)
1262 const u8 *psk, const char *passphrase,
1279 if (passphrase && passphrase[0] == '\0')
1280 passphrase = NULL;
1283 * Include PSK/passphrase only in the control interface message and
1292 passphrase ? " passphrase=\"" : "",
1293 passphrase ? passphrase : "",
1294 passphrase ? "\"" : "",
1377 ssid && ssid->passphrase == NULL &&
1379 ssid ? ssid->passphrase : NULL,
1778 params->passphrase[0] == '\0' ?
1780 params->passphrase,
1921 if (os_strlen(params->passphrase) > 0) {
1922 ssid->passphrase = os_strdup(params->passphrase);
1923 if (ssid->passphrase == NULL) {
1925 "P2P: Failed to copy passphrase for GO");
1930 ssid->passphrase = NULL;
1934 else if (ssid->passphrase)
2230 ssid->mode == WPAS_MODE_P2P_GO && ssid->passphrase) {
2231 size_t len = os_strlen(ssid->passphrase);
2232 wpa_printf(MSG_DEBUG, "P2P: Override passphrase based "
2234 os_memcpy(res->passphrase, ssid->passphrase, len);
2235 res->passphrase[len] = '\0';
5332 * parameters or -1 to generate new values (SSID/passphrase)
6163 if (params->passphrase)
6164 ssid->passphrase = os_strdup(params->passphrase);
6270 if (ssid->passphrase) {
6271 if (os_strlen(ssid->passphrase) >= sizeof(params.passphrase)) {
6272 wpa_printf(MSG_ERROR, "P2P: Invalid passphrase in "
6276 os_strlcpy(params.passphrase, ssid->passphrase,
6277 sizeof(params.passphrase));
7023 ssid->passphrase == NULL && ssid->psk_set ?
7025 ssid->passphrase, go_dev_addr, persistent,