Home
last modified time | relevance | path

Searched refs:SSID (Results 1 – 20 of 20) sorted by relevance

/external/robolectric/src/main/java/com/xtremelabs/robolectric/shadows/
DShadowScanResult.java14 …public static ScanResult newInstance(String SSID, String BSSID, String caps, int level, int freque… in newInstance() argument
16 scanResult.SSID = SSID; in newInstance()
27 .append("SSID: ").append(valueOrNone(realObject.SSID)) in toString()
DShadowWifiConfiguration.java15 realObject.SSID = null; in __constructor__()
35 config.SSID = realObject.SSID; in copy()
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_passphrase.sgml10 <refpurpose>Generate a WPA PSK from an ASCII passphrase for a SSID</refpurpose>
26 and SSID are used to generate a 256-bit PSK.</para>
35 <para>The SSID whose passphrase should be derived.</para>
Dwpa_cli.sgml93 CTRL-REQ-PASSWORD-1:Password needed for SSID foobar
100 CTRL-REQ-OTP-2:Challenge 1235663 needed for SSID foobar
285 <para>configure identity for an SSID</para>
292 <para>configure password for an SSID</para>
299 <para>configure pin for an SSID</para>
306 <para>configure one-time-password for an SSID</para>
313 <para>set preferred BSSID for an SSID</para>
Dwpa_supplicant.conf.sgml32 e.g., one for each used SSID. wpa_supplicant will automatically
146 on what security policy is used in the selected SSID. This is
/external/robolectric/src/test/java/com/xtremelabs/robolectric/shadows/
DWifiConfigurationTest.java26 wifiConfiguration.SSID = "SSID"; in shouldCopy()
46 assertThat(copy.SSID, equalTo("SSID")); in shouldCopy()
DScanResultTest.java19 assertThat(scanResult.SSID, equalTo("SSID")); in shouldConstruct()
/external/wpa_supplicant_8/wpa_supplicant/
DREADME-HS2032 network blocks (e.g., per-SSID parameters). When requested to perform
211 # excluded_ssid: Excluded SSID
212 # This optional field can be used to excluded specific SSID(s) from
214 # than one SSID.
426 <3>SME: Trying to authenticate with 02:00:00:00:01:00 (SSID='Example Network' freq=2412 MHz)
427 <3>Trying to associate with 02:00:00:00:01:00 (SSID='Example Network' freq=2412 MHz)
467 <3>SME: Trying to authenticate with 02:00:00:00:01:00 (SSID='Example Network' freq=2412 MHz)
468 <3>Trying to associate with 02:00:00:00:01:00 (SSID='Example Network' freq=2412 MHz)
DREADME502 for each used SSID. wpa_supplicant will automatically select the best
597 selected SSID. This is mostly for testing and is not recommended for normal
723 CTRL-REQ-PASSWORD-1:Password needed for SSID foobar
728 CTRL-REQ-OTP-2:Challenge 1235663 needed for SSID foobar
747 identity <network id> <identity> = configure identity for an SSID
748 password <network id> <password> = configure password for an SSID
749 pin <network id> <pin> = configure pin for an SSID
750 otp <network id> <password> = configure one-time-password for an SSID
752 for an SSID
753 bssid <network id> <BSSID> = set preferred BSSID for an SSID
[all …]
DREADME-P2P168 SSID/passphrase configuration based on a previously used persistent
644 Set postfix string to be added to the automatically generated P2P SSID
646 could result in the SSID becoming DIRECT-ab-testing.
716 set p2p_ssid_postfix <P2P SSID postfix>
718 Set P2P SSID postfix.
DREADME-Windows.txt134 When using access points in "hidden SSID" mode, ap_scan=2 mode need to
187 wpa_supplicant tries to associate with the SSID without doing
DChangeLog499 for a specific SSID when possible)
517 allow forcing of a specific SSID/passphrase for GO Negotiation
536 * changed SSID output to use printf-escaped strings instead of masking
538 - SSID can now be configured in the same format: ssid=P"abc\x00test"
904 an ESS (same SSID)
1294 * driver_wext: added support for WE-21 change to SSID configuration
1342 * driver_wext: Remove null-termination from SSID length if the driver
1345 would break a case where the SSID actually ends in '\0', but that is
1442 * driver_ndis: fixed scan request in ap_scan=2 mode not to change SSID
1656 * added support for 'any' SSID wildcard; if ssid is not configured or
[all …]
DREADME-WPS174 wpa_cli wps_reg <AP BSSID> <AP PIN> <new SSID> <auth> <encr> <new key>
270 wps_er_config <UUID|BSSID> <AP PIN> <new SSID> <auth> <encr> <new key>
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
Dscanresults.ui32 <string>SSID</string>
Dnetworkconfig.ui35 <string>SSID</string>
Dwpagui.ui91 <string>SSID:</string>
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/lang/
Dwpa_gui_de.ts90 <source>SSID</source>
91 <translation>SSID</translation>
466 <source>SSID: </source>
584 <source>SSID</source>
701 <source>SSID:</source>
/external/wpa_supplicant_8/hostapd/
DREADME327 # (8..63 characters) that will be converted to PSK. This conversion uses SSID
328 # so the PSK changes when ASCII passphrase is used and the SSID is changed.
DREADME-WPS244 hostapd_cli wps_config <new SSID> <auth> <encr> <new key>
/external/robolectric/lib/main/
Dandroid.jarMETA-INF/ META-INF/MANIFEST.MF com/ com/android/ com/ ...