/external/wpa_supplicant_8/hostapd/ |
D | config_file.c | 391 if (os_strcmp(start, "TTLS-PAP") == 0) { in hostapd_config_read_eap_user() 395 if (os_strcmp(start, "TTLS-CHAP") == 0) { in hostapd_config_read_eap_user() 399 if (os_strcmp(start, "TTLS-MSCHAP") == 0) { in hostapd_config_read_eap_user() 404 if (os_strcmp(start, "TTLS-MSCHAPV2") == 0) { in hostapd_config_read_eap_user() 409 if (os_strcmp(start, "MACACL") == 0) { in hostapd_config_read_eap_user() 656 if (os_strcmp(start, "WPA-PSK") == 0) in hostapd_config_parse_key_mgmt() 658 else if (os_strcmp(start, "WPA-EAP") == 0) in hostapd_config_parse_key_mgmt() 661 else if (os_strcmp(start, "FT-PSK") == 0) in hostapd_config_parse_key_mgmt() 663 else if (os_strcmp(start, "FT-EAP") == 0) in hostapd_config_parse_key_mgmt() 666 else if (os_strcmp(start, "FT-EAP-SHA384") == 0) in hostapd_config_parse_key_mgmt() [all …]
|
D | ctrl_iface.c | 269 if (os_strcmp(cmd, "WPS") == 0) in hostapd_ctrl_iface_wps_nfc_config_token() 271 else if (os_strcmp(cmd, "NDEF") == 0) in hostapd_ctrl_iface_wps_nfc_config_token() 317 if (os_strcmp(cmd, "WPS") == 0) in hostapd_ctrl_iface_wps_nfc_token() 321 if (os_strcmp(cmd, "NDEF") == 0) in hostapd_ctrl_iface_wps_nfc_token() 325 if (os_strcmp(cmd, "enable") == 0) in hostapd_ctrl_iface_wps_nfc_token() 328 if (os_strcmp(cmd, "disable") == 0) { in hostapd_ctrl_iface_wps_nfc_token() 351 if (os_strcmp(cmd, "WPS") == 0) in hostapd_ctrl_iface_nfc_get_handover_sel() 353 else if (os_strcmp(cmd, "NDEF") == 0) in hostapd_ctrl_iface_nfc_get_handover_sel() 358 if (os_strcmp(pos, "WPS-CR") == 0) in hostapd_ctrl_iface_nfc_get_handover_sel() 432 if (os_strcmp(role, "RESP") == 0 && os_strcmp(type, "WPS") == 0) { in hostapd_ctrl_iface_nfc_report_handover() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
D | dbus_new_handlers_p2p.c | 129 if (os_strcmp(entry.key, "Timeout") == 0 && in wpas_dbus_handler_p2p_find() 132 } else if (os_strcmp(entry.key, "RequestedDeviceTypes") == 0) { in wpas_dbus_handler_p2p_find() 152 } else if (os_strcmp(entry.key, "DiscoveryType") == 0 && in wpas_dbus_handler_p2p_find() 154 if (os_strcmp(entry.str_value, "start_with_full") == 0) in wpas_dbus_handler_p2p_find() 156 else if (os_strcmp(entry.str_value, "social") == 0) in wpas_dbus_handler_p2p_find() 158 else if (os_strcmp(entry.str_value, "progressive") == 0) in wpas_dbus_handler_p2p_find() 162 } else if (os_strcmp(entry.key, "freq") == 0 && in wpas_dbus_handler_p2p_find() 271 if (os_strcmp(entry.key, "period") == 0 && in wpas_dbus_handler_p2p_extendedlisten() 274 else if (os_strcmp(entry.key, "interval") == 0 && in wpas_dbus_handler_p2p_extendedlisten() 317 if (os_strcmp(entry.key, "duration1") == 0 && in wpas_dbus_handler_p2p_presence_request() [all …]
|
D | dbus_new_handlers_wps.c | 51 if (os_strcmp(val, "enrollee") == 0) in wpas_dbus_handler_wps_role() 53 else if (os_strcmp(val, "registrar") == 0) in wpas_dbus_handler_wps_role() 81 if (os_strcmp(val, "pin") == 0) in wpas_dbus_handler_wps_type() 83 else if (os_strcmp(val, "pbc") == 0) in wpas_dbus_handler_wps_type() 186 if (os_strcmp(key, "Role") == 0) in wpas_dbus_handler_wps_start_entry() 189 else if (os_strcmp(key, "Type") == 0) in wpas_dbus_handler_wps_start_entry() 192 else if (os_strcmp(key, "Bssid") == 0) in wpas_dbus_handler_wps_start_entry() 195 else if (os_strcmp(key, "Pin") == 0) in wpas_dbus_handler_wps_start_entry() 199 else if (os_strcmp(key, "P2PDeviceAddress") == 0) in wpas_dbus_handler_wps_start_entry()
|
D | dbus_new_handlers.c | 163 if (os_strcmp(key, dont_quote[i]) == 0) in should_quote_opt() 183 os_strcmp(wpa_s->dbus_new_path, path) == 0) in get_iface_by_dbus_path() 284 if (os_strcmp(entry.key, "bgscan") == 0) { in set_network_properties() 300 if (os_strcmp(entry.key, "bssid") != 0 && in set_network_properties() 301 os_strcmp(entry.key, "priority") != 0) in set_network_properties() 313 if ((os_strcmp(entry.key, "psk") == 0 && in set_network_properties() 315 (os_strcmp(entry.key, "ssid") == 0 && ssid->passphrase)) in set_network_properties() 317 else if (os_strcmp(entry.key, "priority") == 0) in set_network_properties() 325 if (os_strcmp(entry.key, "mac_addr") == 0 && in set_network_properties() 328 if (os_strcmp(entry.key, "mac_value") == 0) in set_network_properties() [all …]
|
D | dbus_new_helpers.c | 151 if (os_strcmp(dbus_message_get_signature(message), "s") != 0) in properties_get_all() 167 if (os_strcmp(dbus_message_get_signature(message), "ss")) { in properties_get() 201 if (os_strcmp(dbus_message_get_signature(message), "ssv")) { in properties_set() 554 if (os_strcmp(error.name, DBUS_ERROR_OBJECT_PATH_IN_USE) == 0) { in wpa_dbus_register_object_per_iface() 618 if (os_strcmp(dsc->dbus_interface, interface) != 0) in put_changed_properties() 866 if (os_strcmp(property, dsc->dbus_property) == 0 && in wpa_dbus_mark_property_changed() 867 os_strcmp(interface, dsc->dbus_interface) == 0) { in wpa_dbus_mark_property_changed()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | config.c | 71 if (os_strcmp(value, "NULL") == 0) { in wpa_config_parse_str() 360 if (value[0] == '\0' || os_strcmp(value, "\"\"") == 0 || in wpa_config_parse_bssid() 361 os_strcmp(value, "any") == 0) { in wpa_config_parse_bssid() 405 if (value[0] == '\0' || os_strcmp(value, "\"\"") == 0 || in wpa_config_parse_bssid_hint() 406 os_strcmp(value, "any") == 0) { in wpa_config_parse_bssid_hint() 675 if (os_strcmp(start, "WPA") == 0) in wpa_config_parse_proto() 677 else if (os_strcmp(start, "RSN") == 0 || in wpa_config_parse_proto() 678 os_strcmp(start, "WPA2") == 0) in wpa_config_parse_proto() 680 else if (os_strcmp(start, "OSEN") == 0) in wpa_config_parse_proto() 776 if (os_strcmp(start, "WPA-PSK") == 0) in wpa_config_parse_key_mgmt() [all …]
|
D | ctrl_iface.c | 343 if (*cmd == '\0' || os_strcmp(cmd, "\"\"") == 0) { in wpas_ctrl_iface_set_lci() 370 if (os_strcmp(cmd, "disable") == 0) { in wpas_ctrl_set_relative_rssi() 417 if (*cmd == '\0' || os_strcmp(cmd, "\"\"") == 0) { in wpas_ctrl_iface_set_ric_ies() 518 if (os_strcmp(value, "Auto") == 0) in wpa_supplicant_ctrl_iface_set() 520 else if (os_strcmp(value, "ForceUnauthorized") == 0) in wpa_supplicant_ctrl_iface_set() 523 else if (os_strcmp(value, "ForceAuthorized") == 0) in wpa_supplicant_ctrl_iface_set() 622 if (os_strcmp(value, "disable") == 0) in wpa_supplicant_ctrl_iface_set() 804 if (os_strcmp(value, "NULL") == 0) in wpa_supplicant_ctrl_iface_set() 810 if (os_strcmp(value, "NULL") == 0) in wpa_supplicant_ctrl_iface_set() 816 if (os_strcmp(value, "NULL") == 0) in wpa_supplicant_ctrl_iface_set() [all …]
|
D | ctrl_iface_udp.c | 253 if (os_strcmp(addr, "::1")) { 282 if (os_strcmp(buf, "GET_COOKIE") == 0) { 319 if (os_strcmp(pos, "ATTACH") == 0) { 327 } else if (os_strcmp(pos, "DETACH") == 0) { 654 if (os_strcmp(addr, "::1")) { 683 if (os_strcmp(buf, "GET_COOKIE") == 0) { 713 if (os_strcmp(pos, "ATTACH") == 0) { 719 } else if (os_strcmp(pos, "DETACH") == 0) {
|
D | main_winsvc.c | 423 if (os_strcmp(argv[1], "reg") == 0) { in main() 445 } else if (os_strcmp(argv[1], "unreg") == 0) { in main() 447 } else if (os_strcmp(argv[1], "app") == 0) { in main()
|
D | wpas_glue.c | 873 if (os_strcmp(field, "IDENTITY") == 0) in wpa_supplicant_ctrl_req_from_string() 875 else if (os_strcmp(field, "PASSWORD") == 0) in wpa_supplicant_ctrl_req_from_string() 877 else if (os_strcmp(field, "NEW_PASSWORD") == 0) in wpa_supplicant_ctrl_req_from_string() 879 else if (os_strcmp(field, "PIN") == 0) in wpa_supplicant_ctrl_req_from_string() 881 else if (os_strcmp(field, "OTP") == 0) in wpa_supplicant_ctrl_req_from_string() 883 else if (os_strcmp(field, "PASSPHRASE") == 0) in wpa_supplicant_ctrl_req_from_string() 885 else if (os_strcmp(field, "SIM") == 0) in wpa_supplicant_ctrl_req_from_string() 887 else if (os_strcmp(field, "PSK_PASSPHRASE") == 0) in wpa_supplicant_ctrl_req_from_string() 889 else if (os_strcmp(field, "EXT_CERT_CHECK") == 0) in wpa_supplicant_ctrl_req_from_string()
|
/external/wpa_supplicant_8/src/ap/ |
D | eap_user_db.c | 44 if (os_strcmp(start, "TTLS-PAP") == 0) { in set_user_methods() 48 if (os_strcmp(start, "TTLS-CHAP") == 0) { in set_user_methods() 52 if (os_strcmp(start, "TTLS-MSCHAP") == 0) { in set_user_methods() 56 if (os_strcmp(start, "TTLS-MSCHAPV2") == 0) { in set_user_methods() 85 if (os_strcmp(col[i], "password") == 0 && argv[i]) { in get_user_cb() 90 } else if (os_strcmp(col[i], "methods") == 0 && argv[i]) { in get_user_cb() 92 } else if (os_strcmp(col[i], "remediation") == 0 && argv[i]) { in get_user_cb() 94 } else if (os_strcmp(col[i], "t_c_timestamp") == 0 && argv[i]) { in get_user_cb() 110 if (os_strcmp(col[i], "identity") == 0 && argv[i]) in get_wildcard_cb() 112 else if (os_strcmp(col[i], "methods") == 0 && argv[i]) in get_wildcard_cb()
|
/external/wpa_supplicant_8/src/utils/ |
D | os_unix.c | 584 if (i < res && os_strcmp(func[i], __func__) == 0) in testing_fail_alloc() 586 if (i < res && os_strcmp(func[i], "os_malloc") == 0) in testing_fail_alloc() 588 if (i < res && os_strcmp(func[i], "os_zalloc") == 0) in testing_fail_alloc() 590 if (i < res && os_strcmp(func[i], "os_calloc") == 0) in testing_fail_alloc() 592 if (i < res && os_strcmp(func[i], "os_realloc") == 0) in testing_fail_alloc() 594 if (i < res && os_strcmp(func[i], "os_realloc_array") == 0) in testing_fail_alloc() 596 if (i < res && os_strcmp(func[i], "os_strdup") == 0) in testing_fail_alloc() 598 if (i < res && os_strcmp(func[i], "os_memdup") == 0) in testing_fail_alloc() 670 if (i < res && os_strcmp(func[i], __func__) == 0) in testing_test_fail()
|
D | trace.c | 320 os_strcmp(data.function, __func__) != 0)) { in wpa_trace_calling_func() 356 (os_strcmp(func, "wpa_trace_add_ref_func") == 0 || in wpa_trace_dump_func() 357 os_strcmp(func, "wpa_trace_check_ref") == 0 || in wpa_trace_dump_func() 358 os_strcmp(func, "wpa_trace_show") == 0)) in wpa_trace_dump_func() 371 os_strcmp(func, "main") == 0) in wpa_trace_dump_func()
|
D | os_none.c | 183 return os_strcmp(s1, s2); in os_strcasecmp() 209 int os_strcmp(const char *s1, const char *s2) in os_strcmp() function
|
D | os.h | 432 int os_strcmp(const char *s1, const char *s2); 535 #ifndef os_strcmp 536 #define os_strcmp(s1, s2) strcmp((s1), (s2)) macro
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_sim_db.c | 213 if (os_strcmp(col[i], "permanent") == 0 && argv[i]) { in get_pseudonym_cb() 314 if (os_strcmp(col[i], "permanent") == 0 && argv[i]) { in get_reauth_cb() 318 } else if (os_strcmp(col[i], "counter") == 0 && argv[i]) { in get_reauth_cb() 320 } else if (os_strcmp(col[i], "mk") == 0 && argv[i]) { in get_reauth_cb() 322 } else if (os_strcmp(col[i], "k_encr") == 0 && argv[i]) { in get_reauth_cb() 325 } else if (os_strcmp(col[i], "k_aut") == 0 && argv[i]) { in get_reauth_cb() 328 } else if (os_strcmp(col[i], "k_re") == 0 && argv[i]) { in get_reauth_cb() 383 if (entry->aka == aka && os_strcmp(entry->imsi, imsi) == 0) { in eap_sim_db_get_pending() 662 if (os_strcmp(cmd, "SIM-RESP-AUTH") == 0) in eap_sim_db_receive() 664 else if (os_strcmp(cmd, "AKA-RESP-AUTH") == 0) in eap_sim_db_receive() [all …]
|
D | eap_server_methods.c | 50 if (os_strcmp(m->name, name) == 0) { in eap_server_get_type() 121 os_strcmp(m->name, method->name) == 0) { in eap_server_method_register()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_fast_pac.c | 431 if (os_strcmp(pac_file_hdr, rc.buf) != 0) in eap_fast_load_pac() 435 if (os_strcmp(rc.buf, "START") == 0) in eap_fast_load_pac() 437 else if (os_strcmp(rc.buf, "END") == 0) { in eap_fast_load_pac() 442 else if (os_strcmp(rc.buf, "PAC-Type") == 0) in eap_fast_load_pac() 444 else if (os_strcmp(rc.buf, "PAC-Key") == 0) in eap_fast_load_pac() 446 else if (os_strcmp(rc.buf, "PAC-Opaque") == 0) in eap_fast_load_pac() 448 else if (os_strcmp(rc.buf, "A-ID") == 0) in eap_fast_load_pac() 450 else if (os_strcmp(rc.buf, "I-ID") == 0) in eap_fast_load_pac() 452 else if (os_strcmp(rc.buf, "A-ID-Info") == 0) in eap_fast_load_pac()
|
D | eap_teap_pac.c | 432 if (os_strcmp(pac_file_hdr, rc.buf) != 0) in eap_teap_load_pac() 436 if (os_strcmp(rc.buf, "START") == 0) in eap_teap_load_pac() 438 else if (os_strcmp(rc.buf, "END") == 0) { in eap_teap_load_pac() 443 else if (os_strcmp(rc.buf, "PAC-Type") == 0) in eap_teap_load_pac() 445 else if (os_strcmp(rc.buf, "PAC-Key") == 0) in eap_teap_load_pac() 447 else if (os_strcmp(rc.buf, "PAC-Opaque") == 0) in eap_teap_load_pac() 449 else if (os_strcmp(rc.buf, "A-ID") == 0) in eap_teap_load_pac() 451 else if (os_strcmp(rc.buf, "I-ID") == 0) in eap_teap_load_pac() 453 else if (os_strcmp(rc.buf, "A-ID-Info") == 0) in eap_teap_load_pac()
|
D | tncc.c | 239 if (os_strcmp(functionName, "TNC_TNCC_ReportMessageTypes") == 0) in TNC_TNCC_BindFunction() 241 else if (os_strcmp(functionName, "TNC_TNCC_SendMessage") == 0) in TNC_TNCC_BindFunction() 243 else if (os_strcmp(functionName, "TNC_TNCC_RequestHandshakeRetry") == in TNC_TNCC_BindFunction() 246 else if (os_strcmp(functionName, "TNC_9048_LogMessage") == 0) in TNC_TNCC_BindFunction() 248 else if (os_strcmp(functionName, "TNC_9048_UserMessage") == 0) in TNC_TNCC_BindFunction() 672 if (os_strcmp(pos, "allow") == 0) in tncc_get_recommendation() 674 else if (os_strcmp(pos, "none") == 0) in tncc_get_recommendation() 676 else if (os_strcmp(pos, "isolate") == 0) in tncc_get_recommendation()
|
/external/wpa_supplicant_8/hs20/client/ |
D | est.c | 259 if (os_strcmp(txt, "1.2.840.113549.1.9.7") == 0) { in add_csrattrs_oid() 261 } else if (os_strcmp(txt, "1.2.840.113549.1.1.11") == 0) { in add_csrattrs_oid() 284 if (os_strcmp(txt, "1.3.6.1.1.1.1.22") == 0) { in add_csrattrs_ext_req() 286 } else if (os_strcmp(txt, "1.3.6.1.4.1.40808.1.1.3") == 0) { in add_csrattrs_ext_req() 288 } else if (os_strcmp(txt, "1.3.6.1.4.1.40808.1.1.4") == 0) { in add_csrattrs_ext_req() 290 } else if (os_strcmp(txt, "1.3.6.1.4.1.40808.1.1.5") == 0) { in add_csrattrs_ext_req() 313 if (os_strcmp(txt, "1.2.840.113549.1.9.14") == 0) { in add_csrattrs_attr()
|
/external/wpa_supplicant_8/src/common/ |
D | dpp.c | 1631 if (os_strcmp(curve, "prime256v1") == 0) in dpp_supports_curve() 1633 else if (os_strcmp(curve, "secp384r1") == 0) in dpp_supports_curve() 1635 else if (os_strcmp(curve, "secp521r1") == 0) in dpp_supports_curve() 1637 else if (os_strcmp(curve, "brainpoolP256r1") == 0) in dpp_supports_curve() 1639 else if (os_strcmp(curve, "brainpoolP384r1") == 0) in dpp_supports_curve() 1641 else if (os_strcmp(curve, "brainpoolP512r1") == 0) in dpp_supports_curve() 2430 if (os_strcmp(token->string, "infra") != 0) { in dpp_conf_req_rx() 2443 if (os_strcmp(token->string, "sta") == 0) { in dpp_conf_req_rx() 2445 } else if (os_strcmp(token->string, "ap") == 0) { in dpp_conf_req_rx() 2447 } else if (os_strcmp(token->string, "configurator") == 0) { in dpp_conf_req_rx() [all …]
|
/external/wpa_supplicant_8/src/eapol_auth/ |
D | eapol_auth_sm.c | 1120 if (os_strcmp(value, "Both") == 0) in eapol_auth_set_conf() 1122 else if (os_strcmp(value, "In") == 0) in eapol_auth_set_conf() 1131 if (os_strcmp(value, "ForceAuthorized") == 0) in eapol_auth_set_conf() 1133 else if (os_strcmp(value, "ForceUnauthorized") == 0) in eapol_auth_set_conf() 1135 else if (os_strcmp(value, "Auto") == 0) in eapol_auth_set_conf() 1159 if (os_strcmp(value, "TRUE") == 0) in eapol_auth_set_conf() 1161 else if (os_strcmp(value, "FALSE") == 0) in eapol_auth_set_conf() 1170 if (os_strcmp(value, "TRUE") == 0) in eapol_auth_set_conf() 1172 else if (os_strcmp(value, "FALSE") == 0) in eapol_auth_set_conf()
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_macsec_qca.c | 267 if (os_strcmp(ifname, "eth2") == 0) { in macsec_qca_secy_id_get() 269 } else if (os_strcmp(ifname, "eth3") == 0) { in macsec_qca_secy_id_get() 271 } else if (os_strcmp(ifname, "eth4") == 0 || in macsec_qca_secy_id_get() 272 os_strcmp(ifname, "eth0") == 0) { in macsec_qca_secy_id_get() 274 } else if (os_strcmp(ifname, "eth5") == 0 || in macsec_qca_secy_id_get() 275 os_strcmp(ifname, "eth1") == 0) { in macsec_qca_secy_id_get()
|