Home
last modified time | relevance | path

Searched refs:os_strcmp (Results 1 – 25 of 69) sorted by relevance

123

/external/wpa_supplicant_8/hostapd/
Dconfig_file.c351 if (os_strcmp(start, "TTLS-PAP") == 0) { in hostapd_config_read_eap_user()
355 if (os_strcmp(start, "TTLS-CHAP") == 0) { in hostapd_config_read_eap_user()
359 if (os_strcmp(start, "TTLS-MSCHAP") == 0) { in hostapd_config_read_eap_user()
364 if (os_strcmp(start, "TTLS-MSCHAPV2") == 0) { in hostapd_config_read_eap_user()
369 if (os_strcmp(start, "MACACL") == 0) { in hostapd_config_read_eap_user()
661 if (os_strcmp(start, "WPA-PSK") == 0) in hostapd_config_parse_key_mgmt()
663 else if (os_strcmp(start, "WPA-EAP") == 0) in hostapd_config_parse_key_mgmt()
666 else if (os_strcmp(start, "FT-PSK") == 0) in hostapd_config_parse_key_mgmt()
668 else if (os_strcmp(start, "FT-EAP") == 0) in hostapd_config_parse_key_mgmt()
672 else if (os_strcmp(start, "WPA-PSK-SHA256") == 0) in hostapd_config_parse_key_mgmt()
[all …]
Dctrl_iface.c293 if (os_strcmp(cmd, "WPS") == 0) in hostapd_ctrl_iface_wps_nfc_config_token()
295 else if (os_strcmp(cmd, "NDEF") == 0) in hostapd_ctrl_iface_wps_nfc_config_token()
341 if (os_strcmp(cmd, "WPS") == 0) in hostapd_ctrl_iface_wps_nfc_token()
345 if (os_strcmp(cmd, "NDEF") == 0) in hostapd_ctrl_iface_wps_nfc_token()
349 if (os_strcmp(cmd, "enable") == 0) in hostapd_ctrl_iface_wps_nfc_token()
352 if (os_strcmp(cmd, "disable") == 0) { in hostapd_ctrl_iface_wps_nfc_token()
375 if (os_strcmp(cmd, "WPS") == 0) in hostapd_ctrl_iface_nfc_get_handover_sel()
377 else if (os_strcmp(cmd, "NDEF") == 0) in hostapd_ctrl_iface_nfc_get_handover_sel()
382 if (os_strcmp(pos, "WPS-CR") == 0) in hostapd_ctrl_iface_nfc_get_handover_sel()
456 if (os_strcmp(role, "RESP") == 0 && os_strcmp(type, "WPS") == 0) { in hostapd_ctrl_iface_nfc_report_handover()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/dbus/
Ddbus_new_handlers_p2p.c92 if (!os_strcmp(entry.key, "Timeout") && in wpas_dbus_handler_p2p_find()
95 } else if (os_strcmp(entry.key, "RequestedDeviceTypes") == 0) { in wpas_dbus_handler_p2p_find()
115 } else if (!os_strcmp(entry.key, "DiscoveryType") && in wpas_dbus_handler_p2p_find()
117 if (!os_strcmp(entry.str_value, "start_with_full")) in wpas_dbus_handler_p2p_find()
119 else if (!os_strcmp(entry.str_value, "social")) in wpas_dbus_handler_p2p_find()
121 else if (!os_strcmp(entry.str_value, "progressive")) in wpas_dbus_handler_p2p_find()
209 if (!os_strcmp(entry.key, "period") && in wpas_dbus_handler_p2p_extendedlisten()
212 else if (!os_strcmp(entry.key, "interval") && in wpas_dbus_handler_p2p_extendedlisten()
251 if (!os_strcmp(entry.key, "duration1") && in wpas_dbus_handler_p2p_presence_request()
254 else if (!os_strcmp(entry.key, "interval1") && in wpas_dbus_handler_p2p_presence_request()
[all …]
Ddbus_new_handlers_wps.c51 if (os_strcmp(val, "enrollee") == 0) in wpas_dbus_handler_wps_role()
53 else if (os_strcmp(val, "registrar") == 0) in wpas_dbus_handler_wps_role()
82 if (os_strcmp(val, "pin") == 0) in wpas_dbus_handler_wps_type()
84 else if (os_strcmp(val, "pbc") == 0) in wpas_dbus_handler_wps_type()
188 if (os_strcmp(key, "Role") == 0) in wpas_dbus_handler_wps_start_entry()
191 else if (os_strcmp(key, "Type") == 0) in wpas_dbus_handler_wps_start_entry()
194 else if (os_strcmp(key, "Bssid") == 0) in wpas_dbus_handler_wps_start_entry()
197 else if (os_strcmp(key, "Pin") == 0) in wpas_dbus_handler_wps_start_entry()
201 else if (os_strcmp(key, "P2PDeviceAddress") == 0) in wpas_dbus_handler_wps_start_entry()
Ddbus_old_handlers_wps.c39 if (!os_strcmp(arg_bssid, "any")) in wpas_dbus_iface_wps_pbc()
81 if (!os_strcmp(arg_bssid, "any")) in wpas_dbus_iface_wps_pin()
141 if (!os_strcmp(arg_bssid, "any")) in wpas_dbus_iface_wps_reg()
Ddbus_new_helpers.c152 if (os_strcmp(dbus_message_get_signature(message), "s") != 0) in properties_get_all()
168 if (os_strcmp(dbus_message_get_signature(message), "ss")) { in properties_get()
202 if (os_strcmp(dbus_message_get_signature(message), "ssv")) { in properties_set()
557 if (!os_strcmp(error.name, DBUS_ERROR_OBJECT_PATH_IN_USE)) { in wpa_dbus_register_object_per_iface()
622 if (os_strcmp(dsc->dbus_interface, interface) != 0) in put_changed_properties()
893 if (os_strcmp(property, dsc->dbus_property) == 0 && in wpa_dbus_mark_property_changed()
894 os_strcmp(interface, dsc->dbus_interface) == 0) { in wpa_dbus_mark_property_changed()
Ddbus_old.c185 if (os_strcmp(dbus_message_get_member(message), "properties") == 0) in wpas_dispatch_bssid_method()
278 else if (!os_strcmp(method, "wpsPbc")) in wpas_iface_message_handler()
280 else if (!os_strcmp(method, "wpsPin")) in wpas_iface_message_handler()
282 else if (!os_strcmp(method, "wpsReg")) in wpas_iface_message_handler()
285 else if (!os_strcmp(method, "flush")) in wpas_iface_message_handler()
Ddbus_new_handlers.c151 if (os_strcmp(key, dont_quote[i]) == 0) in should_quote_opt()
170 if (os_strcmp(wpa_s->dbus_new_path, path) == 0) in get_iface_by_dbus_path()
267 if ((os_strcmp(entry.key, "psk") == 0 && in set_network_properties()
269 (os_strcmp(entry.key, "ssid") == 0 && ssid->passphrase)) in set_network_properties()
271 else if (os_strcmp(entry.key, "priority") == 0) in set_network_properties()
569 if (!os_strcmp(entry.key, "Driver") && in wpas_dbus_handler_create_interface()
576 } else if (!os_strcmp(entry.key, "Ifname") && in wpas_dbus_handler_create_interface()
583 } else if (!os_strcmp(entry.key, "ConfigFile") && in wpas_dbus_handler_create_interface()
590 } else if (!os_strcmp(entry.key, "BridgeIfname") && in wpas_dbus_handler_create_interface()
807 if (os_strcmp(debug_strings[i], str) == 0) { in wpas_dbus_setter_debug_level()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Dconfig.c64 if (os_strcmp(value, "NULL") == 0) { in wpa_config_parse_str()
242 if (value[0] == '\0' || os_strcmp(value, "\"\"") == 0 || in wpa_config_parse_bssid()
243 os_strcmp(value, "any") == 0) { in wpa_config_parse_bssid()
403 if (os_strcmp(start, "WPA") == 0) in wpa_config_parse_proto()
405 else if (os_strcmp(start, "RSN") == 0 || in wpa_config_parse_proto()
406 os_strcmp(start, "WPA2") == 0) in wpa_config_parse_proto()
408 else if (os_strcmp(start, "OSEN") == 0) in wpa_config_parse_proto()
502 if (os_strcmp(start, "WPA-PSK") == 0) in wpa_config_parse_key_mgmt()
504 else if (os_strcmp(start, "WPA-EAP") == 0) in wpa_config_parse_key_mgmt()
506 else if (os_strcmp(start, "IEEE8021X") == 0) in wpa_config_parse_key_mgmt()
[all …]
Dctrl_iface.c369 if (os_strcmp(value, "disable") == 0) in wpa_supplicant_ctrl_iface_set()
425 } else if (os_strcmp(cmd, "blob") == 0) { in wpa_supplicant_ctrl_iface_set()
446 if (os_strcmp(cmd, "version") == 0) { in wpa_supplicant_ctrl_iface_get()
467 } else if (os_strcmp(cmd, "gtk") == 0) { in wpa_supplicant_ctrl_iface_get()
588 if (os_strcmp(addr, "*") == 0) { in wpa_supplicant_ctrl_iface_tdls_teardown()
676 if (cmd == NULL || os_strcmp(cmd, "any") == 0) { in wpa_supplicant_ctrl_iface_wps_pbc()
715 if (os_strcmp(cmd, "any") == 0) in wpa_supplicant_ctrl_iface_wps_pin()
717 else if (os_strcmp(cmd, "get") == 0) { in wpa_supplicant_ctrl_iface_wps_pin()
841 if (os_strcmp(cmd, "WPS") == 0) in wpa_supplicant_ctrl_iface_wps_nfc_config_token()
843 else if (os_strcmp(cmd, "NDEF") == 0) in wpa_supplicant_ctrl_iface_wps_nfc_config_token()
[all …]
Dwpas_glue.c650 if (os_strcmp(field, "IDENTITY") == 0) in wpa_supplicant_ctrl_req_from_string()
652 else if (os_strcmp(field, "PASSWORD") == 0) in wpa_supplicant_ctrl_req_from_string()
654 else if (os_strcmp(field, "NEW_PASSWORD") == 0) in wpa_supplicant_ctrl_req_from_string()
656 else if (os_strcmp(field, "PIN") == 0) in wpa_supplicant_ctrl_req_from_string()
658 else if (os_strcmp(field, "OTP") == 0) in wpa_supplicant_ctrl_req_from_string()
660 else if (os_strcmp(field, "PASSPHRASE") == 0) in wpa_supplicant_ctrl_req_from_string()
662 else if (os_strcmp(field, "SIM") == 0) in wpa_supplicant_ctrl_req_from_string()
Dctrl_iface_udp.c228 if (os_strcmp(addr, "::1")) {
249 if (os_strcmp(buf, "GET_COOKIE") == 0) {
283 if (os_strcmp(pos, "ATTACH") == 0) {
290 } else if (os_strcmp(pos, "DETACH") == 0) {
574 if (os_strcmp(buf, "GET_COOKIE") == 0) {
Dmain_winsvc.c423 if (os_strcmp(argv[1], "reg") == 0) { in main()
445 } else if (os_strcmp(argv[1], "unreg") == 0) { in main()
447 } else if (os_strcmp(argv[1], "app") == 0) { in main()
/external/wpa_supplicant_8/src/ap/
Deap_user_db.c44 if (os_strcmp(start, "TTLS-PAP") == 0) { in set_user_methods()
48 if (os_strcmp(start, "TTLS-CHAP") == 0) { in set_user_methods()
52 if (os_strcmp(start, "TTLS-MSCHAP") == 0) { in set_user_methods()
56 if (os_strcmp(start, "TTLS-MSCHAPV2") == 0) { in set_user_methods()
85 if (os_strcmp(col[i], "password") == 0 && argv[i]) { in get_user_cb()
90 } else if (os_strcmp(col[i], "methods") == 0 && argv[i]) { in get_user_cb()
92 } else if (os_strcmp(col[i], "remediation") == 0 && argv[i]) { in get_user_cb()
108 if (os_strcmp(col[i], "identity") == 0 && argv[i]) in get_wildcard_cb()
110 else if (os_strcmp(col[i], "methods") == 0 && argv[i]) in get_wildcard_cb()
/external/wpa_supplicant_8/src/utils/
Dtrace.c267 (os_strcmp(func, "wpa_trace_add_ref_func") == 0 || in wpa_trace_dump_func()
268 os_strcmp(func, "wpa_trace_check_ref") == 0 || in wpa_trace_dump_func()
269 os_strcmp(func, "wpa_trace_show") == 0)) in wpa_trace_dump_func()
282 os_strcmp(func, "main") == 0) in wpa_trace_dump_func()
Dos_none.c171 return os_strcmp(s1, s2); in os_strcasecmp()
197 int os_strcmp(const char *s1, const char *s2) in os_strcmp() function
Dos.h425 int os_strcmp(const char *s1, const char *s2);
528 #ifndef os_strcmp
529 #define os_strcmp(s1, s2) strcmp((s1), (s2)) macro
/external/wpa_supplicant_8/src/eap_server/
Deap_sim_db.c208 if (os_strcmp(col[i], "permanent") == 0 && argv[i]) { in get_pseudonym_cb()
309 if (os_strcmp(col[i], "permanent") == 0 && argv[i]) { in get_reauth_cb()
313 } else if (os_strcmp(col[i], "counter") == 0 && argv[i]) { in get_reauth_cb()
315 } else if (os_strcmp(col[i], "mk") == 0 && argv[i]) { in get_reauth_cb()
317 } else if (os_strcmp(col[i], "k_encr") == 0 && argv[i]) { in get_reauth_cb()
320 } else if (os_strcmp(col[i], "k_aut") == 0 && argv[i]) { in get_reauth_cb()
323 } else if (os_strcmp(col[i], "k_re") == 0 && argv[i]) { in get_reauth_cb()
378 if (entry->aka == aka && os_strcmp(entry->imsi, imsi) == 0) { in eap_sim_db_get_pending()
608 if (os_strcmp(cmd, "SIM-RESP-AUTH") == 0) in eap_sim_db_receive()
610 else if (os_strcmp(cmd, "AKA-RESP-AUTH") == 0) in eap_sim_db_receive()
[all …]
Deap_server_methods.c49 if (os_strcmp(m->name, name) == 0) { in eap_server_get_type()
116 os_strcmp(m->name, method->name) == 0) in eap_server_method_register()
/external/wpa_supplicant_8/src/eap_peer/
Deap_fast_pac.c432 if (os_strcmp(pac_file_hdr, rc.buf) != 0) in eap_fast_load_pac()
436 if (os_strcmp(rc.buf, "START") == 0) in eap_fast_load_pac()
438 else if (os_strcmp(rc.buf, "END") == 0) { in eap_fast_load_pac()
443 else if (os_strcmp(rc.buf, "PAC-Type") == 0) in eap_fast_load_pac()
445 else if (os_strcmp(rc.buf, "PAC-Key") == 0) in eap_fast_load_pac()
447 else if (os_strcmp(rc.buf, "PAC-Opaque") == 0) in eap_fast_load_pac()
449 else if (os_strcmp(rc.buf, "A-ID") == 0) in eap_fast_load_pac()
451 else if (os_strcmp(rc.buf, "I-ID") == 0) in eap_fast_load_pac()
453 else if (os_strcmp(rc.buf, "A-ID-Info") == 0) in eap_fast_load_pac()
Dtncc.c240 if (os_strcmp(functionName, "TNC_TNCC_ReportMessageTypes") == 0) in TNC_TNCC_BindFunction()
242 else if (os_strcmp(functionName, "TNC_TNCC_SendMessage") == 0) in TNC_TNCC_BindFunction()
244 else if (os_strcmp(functionName, "TNC_TNCC_RequestHandshakeRetry") == in TNC_TNCC_BindFunction()
247 else if (os_strcmp(functionName, "TNC_9048_LogMessage") == 0) in TNC_TNCC_BindFunction()
249 else if (os_strcmp(functionName, "TNC_9048_UserMessage") == 0) in TNC_TNCC_BindFunction()
674 if (os_strcmp(pos, "allow") == 0) in tncc_get_recommendation()
676 else if (os_strcmp(pos, "none") == 0) in tncc_get_recommendation()
678 else if (os_strcmp(pos, "isolate") == 0) in tncc_get_recommendation()
Deap_methods.c52 if (os_strcmp(m->name, name) == 0) { in eap_peer_get_type()
324 os_strcmp(m->name, method->name) == 0) in eap_peer_method_register()
/external/wpa_supplicant_8/hs20/client/
Dest.c232 if (os_strcmp(txt, "1.2.840.113549.1.9.7") == 0) { in add_csrattrs_oid()
234 } else if (os_strcmp(txt, "1.2.840.113549.1.1.11") == 0) { in add_csrattrs_oid()
257 if (os_strcmp(txt, "1.3.6.1.1.1.1.22") == 0) { in add_csrattrs_ext_req()
259 } else if (os_strcmp(txt, "1.3.6.1.4.1.40808.1.1.3") == 0) { in add_csrattrs_ext_req()
261 } else if (os_strcmp(txt, "1.3.6.1.4.1.40808.1.1.4") == 0) { in add_csrattrs_ext_req()
263 } else if (os_strcmp(txt, "1.3.6.1.4.1.40808.1.1.5") == 0) { in add_csrattrs_ext_req()
286 if (os_strcmp(txt, "1.2.840.113549.1.9.14") == 0) { in add_csrattrs_attr()
/external/wpa_supplicant_8/src/common/
Dieee802_11_common.c449 if (os_strcmp(pos, "aifs") == 0) { in hostapd_config_wmm_ac()
456 } else if (os_strcmp(pos, "cwmin") == 0) { in hostapd_config_wmm_ac()
463 } else if (os_strcmp(pos, "cwmax") == 0) { in hostapd_config_wmm_ac()
470 } else if (os_strcmp(pos, "txop_limit") == 0) { in hostapd_config_wmm_ac()
477 } else if (os_strcmp(pos, "acm") == 0) { in hostapd_config_wmm_ac()
Dwpa_common.c1379 if (os_strcmp(start, "CCMP-256") == 0) in wpa_parse_cipher()
1381 else if (os_strcmp(start, "GCMP-256") == 0) in wpa_parse_cipher()
1383 else if (os_strcmp(start, "CCMP") == 0) in wpa_parse_cipher()
1385 else if (os_strcmp(start, "GCMP") == 0) in wpa_parse_cipher()
1387 else if (os_strcmp(start, "TKIP") == 0) in wpa_parse_cipher()
1389 else if (os_strcmp(start, "WEP104") == 0) in wpa_parse_cipher()
1391 else if (os_strcmp(start, "WEP40") == 0) in wpa_parse_cipher()
1393 else if (os_strcmp(start, "NONE") == 0) in wpa_parse_cipher()
1395 else if (os_strcmp(start, "GTK_NOT_USED") == 0) in wpa_parse_cipher()
1505 if (os_strcmp(start, trigger) != 0) in wpa_check_wowlan_trigger()

123