Lines Matching defs:passphrase

1042 		if (ssid->passphrase && !s->passphrase)
1044 else if (ssid->passphrase && s->passphrase &&
1045 os_strcmp(ssid->passphrase, s->passphrase) != 0)
1078 if (ssid->passphrase) {
1079 os_free(s->passphrase);
1080 s->passphrase = os_strdup(ssid->passphrase);
1086 if (s->passphrase && !s->psk_set)
1192 const u8 *psk, const char *passphrase,
1209 if (passphrase && passphrase[0] == '\0')
1210 passphrase = NULL;
1213 * Include PSK/passphrase only in the control interface message and
1222 passphrase ? " passphrase=\"" : "",
1223 passphrase ? passphrase : "",
1224 passphrase ? "\"" : "",
1307 ssid && ssid->passphrase == NULL &&
1309 ssid ? ssid->passphrase : NULL,
1682 params->passphrase[0] == '\0' ?
1684 params->passphrase,
1811 if (os_strlen(params->passphrase) > 0) {
1812 ssid->passphrase = os_strdup(params->passphrase);
1813 if (ssid->passphrase == NULL) {
1815 "P2P: Failed to copy passphrase for GO");
1820 ssid->passphrase = NULL;
1824 else if (ssid->passphrase)
2103 ssid->mode == WPAS_MODE_P2P_GO && ssid->passphrase) {
2104 size_t len = os_strlen(ssid->passphrase);
2105 wpa_printf(MSG_DEBUG, "P2P: Override passphrase based "
2107 os_memcpy(res->passphrase, ssid->passphrase, len);
2108 res->passphrase[len] = '\0';
4830 * parameters or -1 to generate new values (SSID/passphrase)
5491 if (params->passphrase)
5492 ssid->passphrase = os_strdup(params->passphrase);
5592 if (ssid->passphrase) {
5593 if (os_strlen(ssid->passphrase) >= sizeof(params.passphrase)) {
5594 wpa_printf(MSG_ERROR, "P2P: Invalid passphrase in "
5598 os_strlcpy(params.passphrase, ssid->passphrase,
5599 sizeof(params.passphrase));
6299 ssid->passphrase == NULL && ssid->psk_set ?
6301 ssid->passphrase, go_dev_addr, persistent,