/hostap-latest/tests/hwsim/ |
D | test_nfc_p2p.py | 59 sel = dev[1].global_request("NFC_GET_HANDOVER_SEL NDEF P2P-CR").rstrip() 60 if "FAIL" in sel: 64 res = dev[1].global_request("NFC_REPORT_HANDOVER RESP P2P " + req + " " + sel) 67 res = dev[0].global_request("NFC_REPORT_HANDOVER INIT P2P " + req + " " + sel) 110 sel = dev[1].global_request("NFC_GET_HANDOVER_SEL NDEF P2P-CR").rstrip() 111 if "FAIL" in sel: 117 res = dev[1].global_request("NFC_REPORT_HANDOVER RESP P2P " + req + " " + sel) 120 res = dev[0].global_request("NFC_REPORT_HANDOVER INIT P2P " + req + " " + sel) 159 sel = dev[1].global_request("NFC_GET_HANDOVER_SEL NDEF P2P-CR").rstrip() 160 if "FAIL" in sel: [all …]
|
D | test_nfc_wps.py | 230 sel = hapd.request("NFC_GET_HANDOVER_SEL NDEF WPS-CR").rstrip() 231 if "FAIL" in sel: 233 res = hapd.request("NFC_REPORT_HANDOVER RESP WPS " + req + " " + sel) 237 res = dev[0].request("NFC_REPORT_HANDOVER INIT WPS " + req + " " + sel) 268 sel = hapd.request("NFC_GET_HANDOVER_SEL NDEF WPS-CR").rstrip() 269 if "FAIL" in sel: 306 sel = hapd.request("NFC_GET_HANDOVER_SEL NDEF WPS-CR").rstrip() 307 if "FAIL" in sel: 309 res = hapd.request("NFC_REPORT_HANDOVER RESP WPS " + req + " " + sel) 313 res = dev[0].request("NFC_REPORT_HANDOVER INIT WPS " + req + " " + sel) [all …]
|
D | test_p2p_device.py | 151 sel = wpas.global_request("NFC_GET_HANDOVER_SEL NDEF P2P-CR-TAG").rstrip() 152 if "FAIL" in sel: 157 res = dev[0].global_request("WPS_NFC_TAG_READ " + sel)
|
/hostap-latest/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.cpp | 63 void NetworkConfig::paramsFromScanResults(QTreeWidgetItem *sel) in paramsFromScanResults() argument 68 setWindowTitle(sel->text(0)); in paramsFromScanResults() 69 ssidEdit->setText(sel->text(0)); in paramsFromScanResults() 71 QString flags = sel->text(4); in paramsFromScanResults() 105 bssid = sel->text(1); in paramsFromScanResults() 109 void NetworkConfig::authChanged(int sel) in authChanged() argument 111 encrSelect->setEnabled(sel != AUTH_NONE_OPEN && sel != AUTH_NONE_WEP && in authChanged() 112 sel != AUTH_NONE_WEP_SHARED); in authChanged() 113 pskEdit->setEnabled(sel == AUTH_WPA_PSK || sel == AUTH_WPA2_PSK); in authChanged() 114 bool eap = sel == AUTH_IEEE8021X || sel == AUTH_WPA_EAP || in authChanged() [all …]
|
D | wpagui.cpp | 1075 void WpaGui::selectNetwork( const QString &sel ) in selectNetwork() argument 1077 QString cmd(sel); in selectNetwork() 1092 void WpaGui::enableNetwork(const QString &sel) in enableNetwork() argument 1094 QString cmd(sel); in enableNetwork() 1111 void WpaGui::disableNetwork(const QString &sel) in disableNetwork() argument 1113 QString cmd(sel); in disableNetwork() 1130 void WpaGui::editNetwork(const QString &sel) in editNetwork() argument 1132 QString cmd(sel); in editNetwork() 1163 QString sel(networkSelect->currentText()); in editSelectedNetwork() local 1164 editNetwork(sel); in editSelectedNetwork() [all …]
|
D | wpagui.h | 57 virtual void editNetwork(const QString &sel); 58 virtual void removeNetwork(const QString &sel); 59 virtual void enableNetwork(const QString &sel); 60 virtual void disableNetwork(const QString &sel); 61 virtual int getNetworkDisabled(const QString &sel); 83 virtual void selectNetwork(const QString &sel); 93 virtual void selectAdapter(const QString &sel);
|
D | networkconfig.h | 26 virtual void paramsFromScanResults(QTreeWidgetItem *sel); 34 virtual void authChanged(int sel); 36 virtual void encrChanged(const QString &sel); 39 virtual void eapChanged(int sel);
|
D | addinterface.cpp | 182 void AddInterface::interfaceSelected(QTreeWidgetItem *sel) in interfaceSelected() argument 184 if (!sel) in interfaceSelected() 199 sel->text(1).toLocal8Bit().constData(), in interfaceSelected() 201 sel->text(0).toLocal8Bit().constData(), in interfaceSelected() 230 if (!addRegistryInterface(sel->text(1))) { in interfaceSelected() 237 wpagui->selectAdapter(sel->text(1)); in interfaceSelected()
|
D | scanresults.cpp | 132 void ScanResults::bssSelected(QTreeWidgetItem *sel) in bssSelected() argument 138 nc->paramsFromScanResults(sel); in bssSelected()
|
D | addinterface.h | 28 virtual void interfaceSelected(QTreeWidgetItem *sel);
|
D | scanresults.h | 31 virtual void bssSelected(QTreeWidgetItem *sel);
|
/hostap-latest/wpa_supplicant/ |
D | pasn_supplicant.c | 160 int sel, key_mgmt, pairwise_cipher; in wpas_pasn_get_params_from_bss() local 205 sel = rsne_data.pairwise_cipher; in wpas_pasn_get_params_from_bss() 207 sel &= ssid->pairwise_cipher; in wpas_pasn_get_params_from_bss() 210 rsne_data.pairwise_cipher, sel); in wpas_pasn_get_params_from_bss() 212 pairwise_cipher = wpa_pick_pairwise_cipher(sel, 1); in wpas_pasn_get_params_from_bss() 219 sel = rsne_data.key_mgmt; in wpas_pasn_get_params_from_bss() 221 sel &= ssid->key_mgmt; in wpas_pasn_get_params_from_bss() 224 rsne_data.key_mgmt, sel); in wpas_pasn_get_params_from_bss() 227 sel &= ~(WPA_KEY_MGMT_SAE | WPA_KEY_MGMT_SAE_EXT_KEY | in wpas_pasn_get_params_from_bss() 233 sel &= ~WPA_KEY_MGMT_FT; in wpas_pasn_get_params_from_bss() [all …]
|
D | wps_supplicant.h | 82 const struct wpabuf *sel); 85 const struct wpabuf *sel);
|
D | wpa_supplicant.c | 1405 int sel; in wpas_set_mgmt_group_cipher() local 1407 sel = ie->mgmt_group_cipher; in wpas_set_mgmt_group_cipher() 1409 sel &= ssid->group_mgmt_cipher; in wpas_set_mgmt_group_cipher() 1412 sel = 0; in wpas_set_mgmt_group_cipher() 1415 ie->mgmt_group_cipher, ssid->group_mgmt_cipher, sel); in wpas_set_mgmt_group_cipher() 1416 if (sel & WPA_CIPHER_AES_128_CMAC) { in wpas_set_mgmt_group_cipher() 1420 } else if (sel & WPA_CIPHER_BIP_GMAC_128) { in wpas_set_mgmt_group_cipher() 1424 } else if (sel & WPA_CIPHER_BIP_GMAC_256) { in wpas_set_mgmt_group_cipher() 1428 } else if (sel & WPA_CIPHER_BIP_CMAC_256) { in wpas_set_mgmt_group_cipher() 1671 int sel, proto; in wpa_supplicant_set_suites() local [all …]
|
D | ap.h | 94 const struct wpabuf *sel);
|
D | events.c | 3144 int sel; in wpa_supplicant_use_own_rsne_params() local 3195 sel = ie.key_mgmt; in wpa_supplicant_use_own_rsne_params() 3197 sel &= ssid->key_mgmt; in wpa_supplicant_use_own_rsne_params() 3201 ie.key_mgmt, ssid->key_mgmt, sel); in wpa_supplicant_use_own_rsne_params() 3202 if (ie.key_mgmt && !sel) { in wpa_supplicant_use_own_rsne_params() 3244 sel = ie.pairwise_cipher; in wpa_supplicant_use_own_rsne_params() 3246 sel &= ssid->pairwise_cipher; in wpa_supplicant_use_own_rsne_params() 3250 ie.pairwise_cipher, ssid->pairwise_cipher, sel); in wpa_supplicant_use_own_rsne_params() 3251 if (ie.pairwise_cipher && !sel) { in wpa_supplicant_use_own_rsne_params() 3318 sel = ie.group_cipher; in wpa_supplicant_use_own_rsne_params() [all …]
|
D | p2p_supplicant.h | 176 const struct wpabuf *sel, int forced_freq);
|
D | wps_supplicant.c | 2807 const struct wpabuf *sel) in wpas_wps_nfc_report_handover() argument 2811 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: Carrier record in select", sel); in wpas_wps_nfc_report_handover() 2812 return wpas_wps_nfc_rx_handover_sel(wpa_s, sel); in wpas_wps_nfc_report_handover() 2818 const struct wpabuf *sel) in wpas_er_wps_nfc_report_handover() argument
|
/hostap-latest/hostapd/ |
D | wps-ap-nfc.py | 101 def wpas_report_handover(req, sel): argument 107 str(sel).encode("hex")) 141 sel = nfc.ndef.HandoverSelectMessage(version="1.2") 159 sel.add_carrier(message[0], "active", message[1:]) 163 print(sel.pretty()) 166 print(str(sel).encode("hex")) 170 return sel
|
D | ctrl_iface.c | 385 struct wpabuf *req, *sel; in hostapd_ctrl_iface_nfc_report_handover() local 426 sel = wpabuf_alloc(len); in hostapd_ctrl_iface_nfc_report_handover() 427 if (sel == NULL) { in hostapd_ctrl_iface_nfc_report_handover() 431 if (hexstr2bin(pos2, wpabuf_put(sel, len), len) < 0) { in hostapd_ctrl_iface_nfc_report_handover() 433 wpabuf_free(sel); in hostapd_ctrl_iface_nfc_report_handover() 438 ret = hostapd_wps_nfc_report_handover(hapd, req, sel); in hostapd_ctrl_iface_nfc_report_handover() 445 wpabuf_free(sel); in hostapd_ctrl_iface_nfc_report_handover()
|
/hostap-latest/wpa_supplicant/examples/ |
D | p2p-nfc.py | 132 def wpas_report_handover(req, sel, type): argument 136 …cmd = "NFC_REPORT_HANDOVER " + type + " P2P " + str(req).encode("hex") + " " + str(sel).encode("he… 143 def wpas_report_handover_wsc(req, sel, type): argument 147 …cmd = "NFC_REPORT_HANDOVER " + type + " WPS " + str(req).encode("hex") + " " + str(sel).encode("he… 292 sel = nfc.ndef.HandoverSelectMessage(version="1.2") 321 sel.add_carrier(message[0], "active", message[1:]) 351 sel.add_carrier(message[0], "active", message[1:]) 357 print(sel.pretty()) 360 print(str(sel).encode("hex")) 364 return sel
|
D | wps-nfc.py | 129 def wpas_report_handover(req, sel, type): argument 135 str(sel).encode("hex")) 170 sel = nfc.ndef.HandoverSelectMessage(version="1.2") 189 sel.add_carrier(message[0], "active", message[1:]) 193 print(sel.pretty()) 196 print(str(sel).encode("hex")) 200 return sel
|
D | dpp-nfc.py | 621 sel = [hs] 703 sel = [hs, carrier] 706 summary("Sending handover select: " + str(sel)) 728 return sel
|
/hostap-latest/tests/hwsim/vm/ |
D | parallel-vm.py | 170 def start_vm(vm, sel): argument 182 sel.register(stream, selectors.EVENT_READ, vm) 227 def check_vm_start(scr, sel, test_queue): argument 249 start_vm(vm[i], sel) 254 def vm_terminated(_vm, scr, sel, test_queue): argument 257 sel.unregister(stream) 323 sel = selectors.DefaultSelector() 327 start_vm(vm[0], sel) 346 events = sel.select(timeout=1) 357 if vm_terminated(_vm, scr, sel, test_queue): [all …]
|
/hostap-latest/src/ap/ |
D | wps_hostapd.h | 42 const struct wpabuf *sel);
|