Home
last modified time | relevance | path

Searched refs:role (Results 1 – 25 of 36) sorted by relevance

12

/hostap-latest/wpa_supplicant/wpa_gui-qt4/
Deventhistory.cpp27 QVariant EventListModel::data(const QModelIndex &index, int role) const in data()
32 if (role == Qt::DisplayRole) in data()
48 int role) const in headerData()
50 if (role != Qt::DisplayRole) in headerData()
Deventhistory.h26 QVariant data(const QModelIndex &index, int role) const;
28 int role = Qt::DisplayRole) const;
/hostap-latest/tests/hwsim/
Dtest_dpp.py394 dev[0].dpp_listen(2412, role="configurator")
397 dev[1].dpp_auth_init(uri=uri0, role="enrollee")
746 dev[1].dpp_auth_init(uri=uri0, role="enrollee")
772 dev[0].dpp_listen(2412, role=resp_role)
773 dev[1].dpp_auth_init(uri=uri0, role="either")
778 def run_init_incompatible_roles(dev, role="enrollee"): argument
789 dev[0].dpp_listen(2412, role=role)
795 dev[1].dpp_auth_init(peer=id1, role="enrollee")
802 dev[1].dpp_auth_init(peer=id1, role="configurator")
807 id1 = run_init_incompatible_roles(dev, role="configurator")
[all …]
Dhostapd.py510 def dpp_listen(self, freq, netrole=None, qr=None, role=None): argument
516 if role:
517 cmd += " role=" + role
522 extra=None, own=None, role=None, neg_freq=None, argument
534 if role:
535 cmd += " role=" + role
558 def dpp_pkex_init(self, identifier, code, role=None, key=None, curve=None, argument
570 if role:
571 cmd += "role=%s " % role
590 self.dpp_listen(freq, role=listen_role)
Dwpasupplicant.py1465 method="1000", info="", status=None, cpt=None, role=None): argument
1473 if role is not None:
1474 params += " role=" + role
1551 def dpp_listen(self, freq, netrole=None, qr=None, role=None): argument
1557 if role:
1558 cmd += " role=" + role
1573 extra=None, own=None, role=None, neg_freq=None, argument
1587 if role:
1588 cmd += " role=" + role
1622 def dpp_pkex_init(self, identifier, code, role=None, key=None, curve=None, argument
[all …]
Dtest_dpp3.py93 dev0.dpp_pkex_init(identifier=None, code=code, role="enrollee",
269 dev[0].dpp_pkex_init(identifier=None, code=code, role="enrollee")
/hostap-latest/wpa_supplicant/
Dp2p_supplicant_sd.c482 u8 role; in wpas_sd_req_wfd() local
504 role = *pos++; in wpas_sd_req_wfd()
505 wpa_printf(MSG_DEBUG, "P2P: WSD for device role 0x%x", role); in wpas_sd_req_wfd()
1033 static void wfd_add_sd_req_role(struct wpabuf *tlvs, u8 id, u8 role, in wfd_add_sd_req_role() argument
1045 wpabuf_put_u8(tlvs, role); in wfd_add_sd_req_role()
1067 const u8 *dst, const char *role) in wpas_p2p_sd_request_wifi_display() argument
1074 subelems = os_strchr(role, ' '); in wpas_p2p_sd_request_wifi_display()
1083 if (os_strstr(role, "[source]")) in wpas_p2p_sd_request_wifi_display()
1085 if (os_strstr(role, "[pri-sink]")) in wpas_p2p_sd_request_wifi_display()
1087 if (os_strstr(role, "[sec-sink]")) in wpas_p2p_sd_request_wifi_display()
[all …]
DREADME-P2P208 The remaining parameters hold same role as in legacy P2P. In case of P2PS
219 <adv_mac=peer MAC address> [role=2|4|1] <session=session id>
226 p2p_asp_provision 00:11:22:33:44:55 adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 session=12ab34 s…
233 role - Optional
235 if not present (or 1) role is negotiated by the two peers.
245 <adv_mac=local MAC address> <role=1|2|4> <status=0>
251 p2p_asp_provision_resp 00:55:44:33:22:11 adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 status=0 se…
258 role - Optional 2 (group client only) or 4 (group owner only)
259 if not present (or 1) role is negotiated by the two peers.
325 1 == auto-accept ANY role, 2 == auto-accept CLIENT role,
[all …]
Dnotify.h107 const char *role);
Dnotify.c677 const char *role) in wpas_notify_p2p_group_removed() argument
679 wpas_dbus_signal_p2p_group_removed(wpa_s, role); in wpas_notify_p2p_group_removed()
Dp2p_supplicant.c716 static u8 p2ps_group_capability(void *ctx, u8 incoming, u8 role, in p2ps_group_capability() argument
730 wpa_printf(MSG_DEBUG, "P2P: Conncap - in:%d role:%d", incoming, role); in p2ps_group_capability()
770 if (role == P2PS_SETUP_CLIENT || in p2ps_group_capability()
779 if (role == P2PS_SETUP_NONE || role == P2PS_SETUP_NEW) { in p2ps_group_capability()
796 if (role && role != P2PS_SETUP_NEW) { in p2ps_group_capability()
804 if ((role & P2PS_SETUP_CLIENT) && !go_wpa_s && in p2ps_group_capability()
812 conncap = role; in p2ps_group_capability()
820 if (incoming == role || cli_wpa_s) in p2ps_group_capability()
827 if (incoming != role) { in p2ps_group_capability()
7361 wpa_s, P2PS_SETUP_NONE, p2ps_prov->role, in wpas_p2p_prov_disc()
[all …]
Dp2p_supplicant.h94 const u8 *dst, const char *role);
Dctrl_iface.c1831 char *pos, *role, *type, *pos2; in wpas_ctrl_nfc_report_handover() local
1844 role = cmd; in wpas_ctrl_nfc_report_handover()
1845 pos = os_strchr(role, ' '); in wpas_ctrl_nfc_report_handover()
1907 role, type, (int) wpabuf_len(req), (int) wpabuf_len(sel)); in wpas_ctrl_nfc_report_handover()
1909 if (os_strcmp(role, "INIT") == 0 && os_strcmp(type, "WPS") == 0) { in wpas_ctrl_nfc_report_handover()
1912 } else if (os_strcmp(role, "RESP") == 0 && os_strcmp(type, "WPS") == 0) in wpas_ctrl_nfc_report_handover()
1919 } else if (os_strcmp(role, "INIT") == 0 && os_strcmp(type, "P2P") == 0) in wpas_ctrl_nfc_report_handover()
1922 } else if (os_strcmp(role, "RESP") == 0 && os_strcmp(type, "P2P") == 0) in wpas_ctrl_nfc_report_handover()
1929 "reported: role=%s type=%s", role, type); in wpas_ctrl_nfc_report_handover()
6200 u8 role = P2PS_SETUP_NONE; in p2p_parse_asp_provision_cmd() local
[all …]
/hostap-latest/wpa_supplicant/dbus/
Ddbus_new_handlers_wps.c25 int role; /* 0 - not set, 1 - enrollee, 2 - registrar */ member
52 params->role = 1; in wpas_dbus_handler_wps_role()
54 params->role = 2; in wpas_dbus_handler_wps_role()
268 if (params.role == 0) { in wpas_dbus_handler_wps_start()
272 } else if (params.role == 2) { in wpas_dbus_handler_wps_start()
302 (params.role == 1 ? "enrollee" : "registrar"), in wpas_dbus_handler_wps_start()
Ddbus_new.h208 const char *role);
440 const char *role) in wpas_dbus_signal_p2p_group_removed() argument
Ddbus_new_handlers_p2p.c2464 u8 role = wpas_get_p2p_role(wpa_s); in wpas_dbus_getter_p2p_group_bssid() local
2467 if (role == WPAS_P2P_ROLE_CLIENT) { in wpas_dbus_getter_p2p_group_bssid()
2489 u8 role = wpas_get_p2p_role(wpa_s); in wpas_dbus_getter_p2p_group_frequency() local
2491 if (role == WPAS_P2P_ROLE_CLIENT) { in wpas_dbus_getter_p2p_group_frequency()
/hostap-latest/src/common/
Ddpp_auth.c1382 u8 role = auth->r_capab & DPP_CAPAB_ROLE_MASK; in dpp_auth_resp_rx_status() local
1384 if ((auth->configurator && role != DPP_CAPAB_ENROLLEE) || in dpp_auth_resp_rx_status()
1385 (!auth->configurator && role != DPP_CAPAB_CONFIGURATOR)) { in dpp_auth_resp_rx_status()
1388 role); in dpp_auth_resp_rx_status()
1418 u8 role; in dpp_auth_resp_rx() local
1642 role = auth->r_capab & DPP_CAPAB_ROLE_MASK; in dpp_auth_resp_rx()
1645 (role == DPP_CAPAB_CONFIGURATOR || role == DPP_CAPAB_ENROLLEE)) { in dpp_auth_resp_rx()
1648 auth->configurator = role == DPP_CAPAB_ENROLLEE; in dpp_auth_resp_rx()
1651 } else if ((auth->configurator && role != DPP_CAPAB_ENROLLEE) || in dpp_auth_resp_rx()
1652 (!auth->configurator && role != DPP_CAPAB_CONFIGURATOR)) { in dpp_auth_resp_rx()
[all …]
Ddpp.c2772 struct json_token *id, *role; in dpp_parse_connector() local
2780 role = json_get_member(token, "netRole"); in dpp_parse_connector()
2781 if (!role || role->type != JSON_STRING) { in dpp_parse_connector()
2787 id->string, role->string); in dpp_parse_connector()
4044 struct json_token *id, *role; in dpp_connector_compatible_group() local
4050 role = json_get_member(token, "netRole"); in dpp_connector_compatible_group()
4051 if (!role || role->type != JSON_STRING) in dpp_connector_compatible_group()
4061 if (!reconfig && dpp_compatible_netrole(role->string, net_role)) in dpp_connector_compatible_group()
4081 struct json_token *id, *role; in dpp_connector_match_groups() local
4090 role = json_get_member(token, "netRole"); in dpp_connector_match_groups()
[all …]
/hostap-latest/src/p2p/
Dp2p_invitation.c663 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, in p2p_invite() argument
672 MAC2STR(peer), role, persistent_group, force_freq, in p2p_invite()
690 p2p->retry_invite_req = role == P2P_INVITE_ROLE_GO && in p2p_invite()
703 role != P2P_INVITE_ROLE_CLIENT) < 0) in p2p_invite()
706 if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq && in p2p_invite()
727 p2p->inv_role = role; in p2p_invite()
Dp2p.h210 u8 role; member
1121 u8 (*p2ps_group_capability)(void *ctx, u8 incoming, u8 role,
1465 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role,
Dp2p_build.c378 enum p2p_role_indication role) in p2p_buf_add_oob_go_neg_channel() argument
386 wpabuf_put_u8(buf, (u8) role); /* Role indication */ in p2p_buf_add_oob_go_neg_channel()
389 oper_class, channel, role); in p2p_buf_add_oob_go_neg_channel()
Dp2p.c5323 enum p2p_role_indication role = P2P_DEVICE_NOT_IN_GROUP; in p2p_build_nfc_handover() local
5338 role = P2P_GO_IN_A_GROUP; in p2p_build_nfc_handover()
5347 role = P2P_CLIENT_IN_A_GROUP; in p2p_build_nfc_handover()
5358 channel, role); in p2p_build_nfc_handover()
5405 enum p2p_role_indication role; in p2p_process_nfc_connection_handover() local
5461 role = msg.oob_go_neg_channel[5]; in p2p_process_nfc_connection_handover()
5463 if (role == P2P_GO_IN_A_GROUP) { in p2p_process_nfc_connection_handover()
5466 } else if (role == P2P_CLIENT_IN_A_GROUP) { in p2p_process_nfc_connection_handover()
5474 if (!params->sel && role != P2P_GO_IN_A_GROUP) { in p2p_process_nfc_connection_handover()
5506 if (role == P2P_GO_IN_A_GROUP && p2p->num_groups > 0) in p2p_process_nfc_connection_handover()
[all …]
/hostap-latest/doc/
Ddbus.doxygen1403 …<tr><td>Role</td><td>s</td><td>The device's role. Possible values are "enrollee" and "registrar".<…
1404 …ication type. Applies only for enrollee role. Possible values are "pin" and "pbc".</td><td>Yes, fo…
1405 … <tr><td>Pin</td><td>s</td><td>WPS Pin.</td><td>Yes, for registrar role; otherwise optional</td>
1406 … specify the peer MAC address when authorizing WPS connection in AP or P2P GO role.</td><td>No</td>
1407 …Device Address of a peer to authorize for PBC connection. Used only in P2P GO role.</td><td>No</td>
1417 …<tr><td>Pin</td><td>s</td><td>Newly generated PIN, if not specified for enrollee role and pin auth…
1870 …uch sense to have a P2PDevice property role since there can be multiple concurrent groups and the …
1955 …<tr><td>role</td><td>s</td><td>The role of the local device in the group: "GO" or "client".</td></…
1974 …<tr><td>role_go</td><td>s</td><td>The role of the local device in the group: "GO" or "client".</td…
2033 …<tr><td>role</td><td>s</td><td>The role of the local device in the group: "GO" or "client".</td></…
[all …]
Dp2p.doxygen328 When a P2P group interface is created in group owner role, per-group
358 When the P2P group interface for GO role is removed,
447 P2P device "Wireless Client2" (which ended up operating in GO role):
/hostap-latest/wpa_supplicant/examples/
Ddpp-nfc.py1172 role = "selector" if handover.i_m_selector else "requestor"
1173 summary("Connection handover result: I'm the %s" % role,

12