Lines Matching full:passphrase
1111 if (ssid->passphrase && !s->passphrase)
1113 else if (ssid->passphrase && s->passphrase &&
1114 os_strcmp(ssid->passphrase, s->passphrase) != 0)
1148 if (ssid->passphrase) {
1149 os_free(s->passphrase);
1150 s->passphrase = os_strdup(ssid->passphrase);
1156 if (s->passphrase && !s->psk_set)
1262 const u8 *psk, const char *passphrase,
1279 if (passphrase && passphrase[0] == '\0')
1280 passphrase = NULL;
1283 * Include PSK/passphrase only in the control interface message and
1292 passphrase ? " passphrase=\"" : "",
1293 passphrase ? passphrase : "",
1294 passphrase ? "\"" : "",
1381 ssid && ssid->passphrase == NULL &&
1383 ssid ? ssid->passphrase : NULL,
1782 params->passphrase[0] == '\0' ?
1784 params->passphrase,
1925 if (os_strlen(params->passphrase) > 0) {
1926 ssid->passphrase = os_strdup(params->passphrase);
1927 if (ssid->passphrase == NULL) {
1929 "P2P: Failed to copy passphrase for GO");
1934 ssid->passphrase = NULL;
1938 else if (ssid->passphrase)
2239 ssid->mode == WPAS_MODE_P2P_GO && ssid->passphrase) {
2240 size_t len = os_strlen(ssid->passphrase);
2241 wpa_printf(MSG_DEBUG, "P2P: Override passphrase based "
2243 os_memcpy(res->passphrase, ssid->passphrase, len);
2244 res->passphrase[len] = '\0';
5341 * parameters or -1 to generate new values (SSID/passphrase)
6175 if (params->passphrase)
6176 ssid->passphrase = os_strdup(params->passphrase);
6282 if (ssid->passphrase) {
6283 if (os_strlen(ssid->passphrase) >= sizeof(params.passphrase)) {
6284 wpa_printf(MSG_ERROR, "P2P: Invalid passphrase in "
6288 os_strlcpy(params.passphrase, ssid->passphrase,
6289 sizeof(params.passphrase));
7041 ssid->passphrase == NULL && ssid->psk_set ?
7043 ssid->passphrase, go_dev_addr, persistent,