/hostap-latest/wpa_supplicant/wpa_gui-qt4/ |
D | eventhistory.cpp | 27 QVariant EventListModel::data(const QModelIndex &index, int role) const in data() 32 if (role == Qt::DisplayRole) in data() 48 int role) const in headerData() 50 if (role != Qt::DisplayRole) in headerData()
|
D | eventhistory.h | 26 QVariant data(const QModelIndex &index, int role) const; 28 int role = Qt::DisplayRole) const;
|
/hostap-latest/tests/hwsim/ |
D | test_dpp.py | 394 dev[0].dpp_listen(2412, role="configurator") 397 dev[1].dpp_auth_init(uri=uri0, role="enrollee") 746 dev[1].dpp_auth_init(uri=uri0, role="enrollee") 772 dev[0].dpp_listen(2412, role=resp_role) 773 dev[1].dpp_auth_init(uri=uri0, role="either") 778 def run_init_incompatible_roles(dev, role="enrollee"): argument 789 dev[0].dpp_listen(2412, role=role) 795 dev[1].dpp_auth_init(peer=id1, role="enrollee") 802 dev[1].dpp_auth_init(peer=id1, role="configurator") 807 id1 = run_init_incompatible_roles(dev, role="configurator") [all …]
|
D | hostapd.py | 510 def dpp_listen(self, freq, netrole=None, qr=None, role=None): argument 516 if role: 517 cmd += " role=" + role 522 extra=None, own=None, role=None, neg_freq=None, argument 534 if role: 535 cmd += " role=" + role 558 def dpp_pkex_init(self, identifier, code, role=None, key=None, curve=None, argument 570 if role: 571 cmd += "role=%s " % role 590 self.dpp_listen(freq, role=listen_role)
|
D | wpasupplicant.py | 1465 method="1000", info="", status=None, cpt=None, role=None): argument 1473 if role is not None: 1474 params += " role=" + role 1551 def dpp_listen(self, freq, netrole=None, qr=None, role=None): argument 1557 if role: 1558 cmd += " role=" + role 1573 extra=None, own=None, role=None, neg_freq=None, argument 1587 if role: 1588 cmd += " role=" + role 1622 def dpp_pkex_init(self, identifier, code, role=None, key=None, curve=None, argument [all …]
|
D | test_dpp3.py | 93 dev0.dpp_pkex_init(identifier=None, code=code, role="enrollee", 269 dev[0].dpp_pkex_init(identifier=None, code=code, role="enrollee")
|
/hostap-latest/wpa_supplicant/ |
D | p2p_supplicant_sd.c | 482 u8 role; in wpas_sd_req_wfd() local 504 role = *pos++; in wpas_sd_req_wfd() 505 wpa_printf(MSG_DEBUG, "P2P: WSD for device role 0x%x", role); in wpas_sd_req_wfd() 1033 static void wfd_add_sd_req_role(struct wpabuf *tlvs, u8 id, u8 role, in wfd_add_sd_req_role() argument 1045 wpabuf_put_u8(tlvs, role); in wfd_add_sd_req_role() 1067 const u8 *dst, const char *role) in wpas_p2p_sd_request_wifi_display() argument 1074 subelems = os_strchr(role, ' '); in wpas_p2p_sd_request_wifi_display() 1083 if (os_strstr(role, "[source]")) in wpas_p2p_sd_request_wifi_display() 1085 if (os_strstr(role, "[pri-sink]")) in wpas_p2p_sd_request_wifi_display() 1087 if (os_strstr(role, "[sec-sink]")) in wpas_p2p_sd_request_wifi_display() [all …]
|
D | README-P2P | 208 The remaining parameters hold same role as in legacy P2P. In case of P2PS 219 <adv_mac=peer MAC address> [role=2|4|1] <session=session id> 226 p2p_asp_provision 00:11:22:33:44:55 adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 session=12ab34 s… 233 role - Optional 235 if not present (or 1) role is negotiated by the two peers. 245 <adv_mac=local MAC address> <role=1|2|4> <status=0> 251 p2p_asp_provision_resp 00:55:44:33:22:11 adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 status=0 se… 258 role - Optional 2 (group client only) or 4 (group owner only) 259 if not present (or 1) role is negotiated by the two peers. 325 1 == auto-accept ANY role, 2 == auto-accept CLIENT role, [all …]
|
D | notify.h | 107 const char *role);
|
D | notify.c | 677 const char *role) in wpas_notify_p2p_group_removed() argument 679 wpas_dbus_signal_p2p_group_removed(wpa_s, role); in wpas_notify_p2p_group_removed()
|
D | p2p_supplicant.c | 716 static u8 p2ps_group_capability(void *ctx, u8 incoming, u8 role, in p2ps_group_capability() argument 730 wpa_printf(MSG_DEBUG, "P2P: Conncap - in:%d role:%d", incoming, role); in p2ps_group_capability() 770 if (role == P2PS_SETUP_CLIENT || in p2ps_group_capability() 779 if (role == P2PS_SETUP_NONE || role == P2PS_SETUP_NEW) { in p2ps_group_capability() 796 if (role && role != P2PS_SETUP_NEW) { in p2ps_group_capability() 804 if ((role & P2PS_SETUP_CLIENT) && !go_wpa_s && in p2ps_group_capability() 812 conncap = role; in p2ps_group_capability() 820 if (incoming == role || cli_wpa_s) in p2ps_group_capability() 827 if (incoming != role) { in p2ps_group_capability() 7361 wpa_s, P2PS_SETUP_NONE, p2ps_prov->role, in wpas_p2p_prov_disc() [all …]
|
D | p2p_supplicant.h | 94 const u8 *dst, const char *role);
|
D | ctrl_iface.c | 1831 char *pos, *role, *type, *pos2; in wpas_ctrl_nfc_report_handover() local 1844 role = cmd; in wpas_ctrl_nfc_report_handover() 1845 pos = os_strchr(role, ' '); in wpas_ctrl_nfc_report_handover() 1907 role, type, (int) wpabuf_len(req), (int) wpabuf_len(sel)); in wpas_ctrl_nfc_report_handover() 1909 if (os_strcmp(role, "INIT") == 0 && os_strcmp(type, "WPS") == 0) { in wpas_ctrl_nfc_report_handover() 1912 } else if (os_strcmp(role, "RESP") == 0 && os_strcmp(type, "WPS") == 0) in wpas_ctrl_nfc_report_handover() 1919 } else if (os_strcmp(role, "INIT") == 0 && os_strcmp(type, "P2P") == 0) in wpas_ctrl_nfc_report_handover() 1922 } else if (os_strcmp(role, "RESP") == 0 && os_strcmp(type, "P2P") == 0) in wpas_ctrl_nfc_report_handover() 1929 "reported: role=%s type=%s", role, type); in wpas_ctrl_nfc_report_handover() 6200 u8 role = P2PS_SETUP_NONE; in p2p_parse_asp_provision_cmd() local [all …]
|
/hostap-latest/wpa_supplicant/dbus/ |
D | dbus_new_handlers_wps.c | 25 int role; /* 0 - not set, 1 - enrollee, 2 - registrar */ member 52 params->role = 1; in wpas_dbus_handler_wps_role() 54 params->role = 2; in wpas_dbus_handler_wps_role() 268 if (params.role == 0) { in wpas_dbus_handler_wps_start() 272 } else if (params.role == 2) { in wpas_dbus_handler_wps_start() 302 (params.role == 1 ? "enrollee" : "registrar"), in wpas_dbus_handler_wps_start()
|
D | dbus_new.h | 208 const char *role); 440 const char *role) in wpas_dbus_signal_p2p_group_removed() argument
|
D | dbus_new_handlers_p2p.c | 2464 u8 role = wpas_get_p2p_role(wpa_s); in wpas_dbus_getter_p2p_group_bssid() local 2467 if (role == WPAS_P2P_ROLE_CLIENT) { in wpas_dbus_getter_p2p_group_bssid() 2489 u8 role = wpas_get_p2p_role(wpa_s); in wpas_dbus_getter_p2p_group_frequency() local 2491 if (role == WPAS_P2P_ROLE_CLIENT) { in wpas_dbus_getter_p2p_group_frequency()
|
/hostap-latest/src/common/ |
D | dpp_auth.c | 1382 u8 role = auth->r_capab & DPP_CAPAB_ROLE_MASK; in dpp_auth_resp_rx_status() local 1384 if ((auth->configurator && role != DPP_CAPAB_ENROLLEE) || in dpp_auth_resp_rx_status() 1385 (!auth->configurator && role != DPP_CAPAB_CONFIGURATOR)) { in dpp_auth_resp_rx_status() 1388 role); in dpp_auth_resp_rx_status() 1418 u8 role; in dpp_auth_resp_rx() local 1642 role = auth->r_capab & DPP_CAPAB_ROLE_MASK; in dpp_auth_resp_rx() 1645 (role == DPP_CAPAB_CONFIGURATOR || role == DPP_CAPAB_ENROLLEE)) { in dpp_auth_resp_rx() 1648 auth->configurator = role == DPP_CAPAB_ENROLLEE; in dpp_auth_resp_rx() 1651 } else if ((auth->configurator && role != DPP_CAPAB_ENROLLEE) || in dpp_auth_resp_rx() 1652 (!auth->configurator && role != DPP_CAPAB_CONFIGURATOR)) { in dpp_auth_resp_rx() [all …]
|
D | dpp.c | 2772 struct json_token *id, *role; in dpp_parse_connector() local 2780 role = json_get_member(token, "netRole"); in dpp_parse_connector() 2781 if (!role || role->type != JSON_STRING) { in dpp_parse_connector() 2787 id->string, role->string); in dpp_parse_connector() 4044 struct json_token *id, *role; in dpp_connector_compatible_group() local 4050 role = json_get_member(token, "netRole"); in dpp_connector_compatible_group() 4051 if (!role || role->type != JSON_STRING) in dpp_connector_compatible_group() 4061 if (!reconfig && dpp_compatible_netrole(role->string, net_role)) in dpp_connector_compatible_group() 4081 struct json_token *id, *role; in dpp_connector_match_groups() local 4090 role = json_get_member(token, "netRole"); in dpp_connector_match_groups() [all …]
|
/hostap-latest/src/p2p/ |
D | p2p_invitation.c | 663 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, in p2p_invite() argument 672 MAC2STR(peer), role, persistent_group, force_freq, in p2p_invite() 690 p2p->retry_invite_req = role == P2P_INVITE_ROLE_GO && in p2p_invite() 703 role != P2P_INVITE_ROLE_CLIENT) < 0) in p2p_invite() 706 if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq && in p2p_invite() 727 p2p->inv_role = role; in p2p_invite()
|
D | p2p.h | 210 u8 role; member 1121 u8 (*p2ps_group_capability)(void *ctx, u8 incoming, u8 role, 1465 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role,
|
D | p2p_build.c | 378 enum p2p_role_indication role) in p2p_buf_add_oob_go_neg_channel() argument 386 wpabuf_put_u8(buf, (u8) role); /* Role indication */ in p2p_buf_add_oob_go_neg_channel() 389 oper_class, channel, role); in p2p_buf_add_oob_go_neg_channel()
|
D | p2p.c | 5323 enum p2p_role_indication role = P2P_DEVICE_NOT_IN_GROUP; in p2p_build_nfc_handover() local 5338 role = P2P_GO_IN_A_GROUP; in p2p_build_nfc_handover() 5347 role = P2P_CLIENT_IN_A_GROUP; in p2p_build_nfc_handover() 5358 channel, role); in p2p_build_nfc_handover() 5405 enum p2p_role_indication role; in p2p_process_nfc_connection_handover() local 5461 role = msg.oob_go_neg_channel[5]; in p2p_process_nfc_connection_handover() 5463 if (role == P2P_GO_IN_A_GROUP) { in p2p_process_nfc_connection_handover() 5466 } else if (role == P2P_CLIENT_IN_A_GROUP) { in p2p_process_nfc_connection_handover() 5474 if (!params->sel && role != P2P_GO_IN_A_GROUP) { in p2p_process_nfc_connection_handover() 5506 if (role == P2P_GO_IN_A_GROUP && p2p->num_groups > 0) in p2p_process_nfc_connection_handover() [all …]
|
/hostap-latest/doc/ |
D | dbus.doxygen | 1403 …<tr><td>Role</td><td>s</td><td>The device's role. Possible values are "enrollee" and "registrar".<… 1404 …ication type. Applies only for enrollee role. Possible values are "pin" and "pbc".</td><td>Yes, fo… 1405 … <tr><td>Pin</td><td>s</td><td>WPS Pin.</td><td>Yes, for registrar role; otherwise optional</td> 1406 … specify the peer MAC address when authorizing WPS connection in AP or P2P GO role.</td><td>No</td> 1407 …Device Address of a peer to authorize for PBC connection. Used only in P2P GO role.</td><td>No</td> 1417 …<tr><td>Pin</td><td>s</td><td>Newly generated PIN, if not specified for enrollee role and pin auth… 1870 …uch sense to have a P2PDevice property role since there can be multiple concurrent groups and the … 1955 …<tr><td>role</td><td>s</td><td>The role of the local device in the group: "GO" or "client".</td></… 1974 …<tr><td>role_go</td><td>s</td><td>The role of the local device in the group: "GO" or "client".</td… 2033 …<tr><td>role</td><td>s</td><td>The role of the local device in the group: "GO" or "client".</td></… [all …]
|
D | p2p.doxygen | 328 When a P2P group interface is created in group owner role, per-group 358 When the P2P group interface for GO role is removed, 447 P2P device "Wireless Client2" (which ended up operating in GO role):
|
/hostap-latest/wpa_supplicant/examples/ |
D | dpp-nfc.py | 1172 role = "selector" if handover.i_m_selector else "requestor" 1173 summary("Connection handover result: I'm the %s" % role,
|