Home
last modified time | relevance | path

Searched refs:sel (Results 1 – 25 of 33) sorted by relevance

12

/hostap-latest/tests/hwsim/
Dtest_nfc_p2p.py59 sel = dev[1].global_request("NFC_GET_HANDOVER_SEL NDEF P2P-CR").rstrip()
60 if "FAIL" in sel:
64 res = dev[1].global_request("NFC_REPORT_HANDOVER RESP P2P " + req + " " + sel)
67 res = dev[0].global_request("NFC_REPORT_HANDOVER INIT P2P " + req + " " + sel)
110 sel = dev[1].global_request("NFC_GET_HANDOVER_SEL NDEF P2P-CR").rstrip()
111 if "FAIL" in sel:
117 res = dev[1].global_request("NFC_REPORT_HANDOVER RESP P2P " + req + " " + sel)
120 res = dev[0].global_request("NFC_REPORT_HANDOVER INIT P2P " + req + " " + sel)
159 sel = dev[1].global_request("NFC_GET_HANDOVER_SEL NDEF P2P-CR").rstrip()
160 if "FAIL" in sel:
[all …]
Dtest_nfc_wps.py230 sel = hapd.request("NFC_GET_HANDOVER_SEL NDEF WPS-CR").rstrip()
231 if "FAIL" in sel:
233 res = hapd.request("NFC_REPORT_HANDOVER RESP WPS " + req + " " + sel)
237 res = dev[0].request("NFC_REPORT_HANDOVER INIT WPS " + req + " " + sel)
268 sel = hapd.request("NFC_GET_HANDOVER_SEL NDEF WPS-CR").rstrip()
269 if "FAIL" in sel:
306 sel = hapd.request("NFC_GET_HANDOVER_SEL NDEF WPS-CR").rstrip()
307 if "FAIL" in sel:
309 res = hapd.request("NFC_REPORT_HANDOVER RESP WPS " + req + " " + sel)
313 res = dev[0].request("NFC_REPORT_HANDOVER INIT WPS " + req + " " + sel)
[all …]
Dtest_p2p_device.py151 sel = wpas.global_request("NFC_GET_HANDOVER_SEL NDEF P2P-CR-TAG").rstrip()
152 if "FAIL" in sel:
157 res = dev[0].global_request("WPS_NFC_TAG_READ " + sel)
/hostap-latest/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.cpp63 void NetworkConfig::paramsFromScanResults(QTreeWidgetItem *sel) in paramsFromScanResults() argument
68 setWindowTitle(sel->text(0)); in paramsFromScanResults()
69 ssidEdit->setText(sel->text(0)); in paramsFromScanResults()
71 QString flags = sel->text(4); in paramsFromScanResults()
105 bssid = sel->text(1); in paramsFromScanResults()
109 void NetworkConfig::authChanged(int sel) in authChanged() argument
111 encrSelect->setEnabled(sel != AUTH_NONE_OPEN && sel != AUTH_NONE_WEP && in authChanged()
112 sel != AUTH_NONE_WEP_SHARED); in authChanged()
113 pskEdit->setEnabled(sel == AUTH_WPA_PSK || sel == AUTH_WPA2_PSK); in authChanged()
114 bool eap = sel == AUTH_IEEE8021X || sel == AUTH_WPA_EAP || in authChanged()
[all …]
Dwpagui.cpp1075 void WpaGui::selectNetwork( const QString &sel ) in selectNetwork() argument
1077 QString cmd(sel); in selectNetwork()
1092 void WpaGui::enableNetwork(const QString &sel) in enableNetwork() argument
1094 QString cmd(sel); in enableNetwork()
1111 void WpaGui::disableNetwork(const QString &sel) in disableNetwork() argument
1113 QString cmd(sel); in disableNetwork()
1130 void WpaGui::editNetwork(const QString &sel) in editNetwork() argument
1132 QString cmd(sel); in editNetwork()
1163 QString sel(networkSelect->currentText()); in editSelectedNetwork() local
1164 editNetwork(sel); in editSelectedNetwork()
[all …]
Dwpagui.h57 virtual void editNetwork(const QString &sel);
58 virtual void removeNetwork(const QString &sel);
59 virtual void enableNetwork(const QString &sel);
60 virtual void disableNetwork(const QString &sel);
61 virtual int getNetworkDisabled(const QString &sel);
83 virtual void selectNetwork(const QString &sel);
93 virtual void selectAdapter(const QString &sel);
Dnetworkconfig.h26 virtual void paramsFromScanResults(QTreeWidgetItem *sel);
34 virtual void authChanged(int sel);
36 virtual void encrChanged(const QString &sel);
39 virtual void eapChanged(int sel);
Daddinterface.cpp182 void AddInterface::interfaceSelected(QTreeWidgetItem *sel) in interfaceSelected() argument
184 if (!sel) in interfaceSelected()
199 sel->text(1).toLocal8Bit().constData(), in interfaceSelected()
201 sel->text(0).toLocal8Bit().constData(), in interfaceSelected()
230 if (!addRegistryInterface(sel->text(1))) { in interfaceSelected()
237 wpagui->selectAdapter(sel->text(1)); in interfaceSelected()
Dscanresults.cpp132 void ScanResults::bssSelected(QTreeWidgetItem *sel) in bssSelected() argument
138 nc->paramsFromScanResults(sel); in bssSelected()
Daddinterface.h28 virtual void interfaceSelected(QTreeWidgetItem *sel);
Dscanresults.h31 virtual void bssSelected(QTreeWidgetItem *sel);
/hostap-latest/wpa_supplicant/
Dpasn_supplicant.c160 int sel, key_mgmt, pairwise_cipher; in wpas_pasn_get_params_from_bss() local
205 sel = rsne_data.pairwise_cipher; in wpas_pasn_get_params_from_bss()
207 sel &= ssid->pairwise_cipher; in wpas_pasn_get_params_from_bss()
210 rsne_data.pairwise_cipher, sel); in wpas_pasn_get_params_from_bss()
212 pairwise_cipher = wpa_pick_pairwise_cipher(sel, 1); in wpas_pasn_get_params_from_bss()
219 sel = rsne_data.key_mgmt; in wpas_pasn_get_params_from_bss()
221 sel &= ssid->key_mgmt; in wpas_pasn_get_params_from_bss()
224 rsne_data.key_mgmt, sel); in wpas_pasn_get_params_from_bss()
227 sel &= ~(WPA_KEY_MGMT_SAE | WPA_KEY_MGMT_SAE_EXT_KEY | in wpas_pasn_get_params_from_bss()
233 sel &= ~WPA_KEY_MGMT_FT; in wpas_pasn_get_params_from_bss()
[all …]
Dwps_supplicant.h82 const struct wpabuf *sel);
85 const struct wpabuf *sel);
Dwpa_supplicant.c1405 int sel; in wpas_set_mgmt_group_cipher() local
1407 sel = ie->mgmt_group_cipher; in wpas_set_mgmt_group_cipher()
1409 sel &= ssid->group_mgmt_cipher; in wpas_set_mgmt_group_cipher()
1412 sel = 0; in wpas_set_mgmt_group_cipher()
1415 ie->mgmt_group_cipher, ssid->group_mgmt_cipher, sel); in wpas_set_mgmt_group_cipher()
1416 if (sel & WPA_CIPHER_AES_128_CMAC) { in wpas_set_mgmt_group_cipher()
1420 } else if (sel & WPA_CIPHER_BIP_GMAC_128) { in wpas_set_mgmt_group_cipher()
1424 } else if (sel & WPA_CIPHER_BIP_GMAC_256) { in wpas_set_mgmt_group_cipher()
1428 } else if (sel & WPA_CIPHER_BIP_CMAC_256) { in wpas_set_mgmt_group_cipher()
1671 int sel, proto; in wpa_supplicant_set_suites() local
[all …]
Dap.h94 const struct wpabuf *sel);
Devents.c3144 int sel; in wpa_supplicant_use_own_rsne_params() local
3195 sel = ie.key_mgmt; in wpa_supplicant_use_own_rsne_params()
3197 sel &= ssid->key_mgmt; in wpa_supplicant_use_own_rsne_params()
3201 ie.key_mgmt, ssid->key_mgmt, sel); in wpa_supplicant_use_own_rsne_params()
3202 if (ie.key_mgmt && !sel) { in wpa_supplicant_use_own_rsne_params()
3244 sel = ie.pairwise_cipher; in wpa_supplicant_use_own_rsne_params()
3246 sel &= ssid->pairwise_cipher; in wpa_supplicant_use_own_rsne_params()
3250 ie.pairwise_cipher, ssid->pairwise_cipher, sel); in wpa_supplicant_use_own_rsne_params()
3251 if (ie.pairwise_cipher && !sel) { in wpa_supplicant_use_own_rsne_params()
3318 sel = ie.group_cipher; in wpa_supplicant_use_own_rsne_params()
[all …]
Dp2p_supplicant.h176 const struct wpabuf *sel, int forced_freq);
Dwps_supplicant.c2807 const struct wpabuf *sel) in wpas_wps_nfc_report_handover() argument
2811 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: Carrier record in select", sel); in wpas_wps_nfc_report_handover()
2812 return wpas_wps_nfc_rx_handover_sel(wpa_s, sel); in wpas_wps_nfc_report_handover()
2818 const struct wpabuf *sel) in wpas_er_wps_nfc_report_handover() argument
/hostap-latest/hostapd/
Dwps-ap-nfc.py101 def wpas_report_handover(req, sel): argument
107 str(sel).encode("hex"))
141 sel = nfc.ndef.HandoverSelectMessage(version="1.2")
159 sel.add_carrier(message[0], "active", message[1:])
163 print(sel.pretty())
166 print(str(sel).encode("hex"))
170 return sel
Dctrl_iface.c385 struct wpabuf *req, *sel; in hostapd_ctrl_iface_nfc_report_handover() local
426 sel = wpabuf_alloc(len); in hostapd_ctrl_iface_nfc_report_handover()
427 if (sel == NULL) { in hostapd_ctrl_iface_nfc_report_handover()
431 if (hexstr2bin(pos2, wpabuf_put(sel, len), len) < 0) { in hostapd_ctrl_iface_nfc_report_handover()
433 wpabuf_free(sel); in hostapd_ctrl_iface_nfc_report_handover()
438 ret = hostapd_wps_nfc_report_handover(hapd, req, sel); in hostapd_ctrl_iface_nfc_report_handover()
445 wpabuf_free(sel); in hostapd_ctrl_iface_nfc_report_handover()
/hostap-latest/wpa_supplicant/examples/
Dp2p-nfc.py132 def wpas_report_handover(req, sel, type): argument
136 …cmd = "NFC_REPORT_HANDOVER " + type + " P2P " + str(req).encode("hex") + " " + str(sel).encode("he…
143 def wpas_report_handover_wsc(req, sel, type): argument
147 …cmd = "NFC_REPORT_HANDOVER " + type + " WPS " + str(req).encode("hex") + " " + str(sel).encode("he…
292 sel = nfc.ndef.HandoverSelectMessage(version="1.2")
321 sel.add_carrier(message[0], "active", message[1:])
351 sel.add_carrier(message[0], "active", message[1:])
357 print(sel.pretty())
360 print(str(sel).encode("hex"))
364 return sel
Dwps-nfc.py129 def wpas_report_handover(req, sel, type): argument
135 str(sel).encode("hex"))
170 sel = nfc.ndef.HandoverSelectMessage(version="1.2")
189 sel.add_carrier(message[0], "active", message[1:])
193 print(sel.pretty())
196 print(str(sel).encode("hex"))
200 return sel
Ddpp-nfc.py621 sel = [hs]
703 sel = [hs, carrier]
706 summary("Sending handover select: " + str(sel))
728 return sel
/hostap-latest/tests/hwsim/vm/
Dparallel-vm.py170 def start_vm(vm, sel): argument
182 sel.register(stream, selectors.EVENT_READ, vm)
227 def check_vm_start(scr, sel, test_queue): argument
249 start_vm(vm[i], sel)
254 def vm_terminated(_vm, scr, sel, test_queue): argument
257 sel.unregister(stream)
323 sel = selectors.DefaultSelector()
327 start_vm(vm[0], sel)
346 events = sel.select(timeout=1)
357 if vm_terminated(_vm, scr, sel, test_queue):
[all …]
/hostap-latest/src/ap/
Dwps_hostapd.h42 const struct wpabuf *sel);

12