/external/wpa_supplicant_8/hs20/client/ |
D | osu_client.c | 121 if (os_strcasecmp(proto, "EST") != 0) { in osu_get_certificate() 540 if (os_strcasecmp(pos, "/PerProviderSubscription") != 0) { in hs20_add_pps_mo() 634 if (os_strcasecmp(name, "PerProviderSubscription") != 0) { in hs20_add_pps_mo() 880 if (os_strcasecmp(type, "home") == 0) in set_pps_cred_policy_min_backhaul() 882 else if (os_strcasecmp(type, "roaming") == 0) in set_pps_cred_policy_min_backhaul() 1044 if (os_strcasecmp(name, "PreferredRoamingPartnerList") == 0) in set_pps_cred_policy() 1046 else if (os_strcasecmp(name, "MinBackhaulThreshold") == 0) in set_pps_cred_policy() 1048 else if (os_strcasecmp(name, "PolicyUpdate") == 0) in set_pps_cred_policy() 1050 else if (os_strcasecmp(name, "SPExclusionList") == 0) in set_pps_cred_policy() 1052 else if (os_strcasecmp(name, "RequiredProtoPortTuple") == 0) in set_pps_cred_policy() [all …]
|
D | oma_dm_client.c | 451 if (name == NULL || os_strcasecmp(name, "getCertificate") != 0) { in oma_dm_exec_get_cert() 478 if (os_strcasecmp(locuri, "./DevDetail/Ext/org.wi-fi/Wi-Fi/Ops/" in oma_dm_exec() 481 } else if (os_strcasecmp(locuri, "./DevDetail/Ext/org.wi-fi/Wi-Fi/Ops/" in oma_dm_exec() 893 if (os_strcasecmp(name, "Password") == 0) { in oma_dm_get() 1005 if (name == NULL || os_strcasecmp(name, "SyncML") != 0) { in oma_dm_process() 1021 if (os_strcasecmp(name, "RespURI") == 0) { in oma_dm_process() 1026 } else if (os_strcasecmp(name, "MsgID") == 0) { in oma_dm_process() 1055 if (os_strcasecmp(name, "Exec") == 0) { in oma_dm_process() 1065 } else if (os_strcasecmp(name, "Add") == 0) { in oma_dm_process() 1075 } else if (os_strcasecmp(name, "Replace") == 0) { in oma_dm_process() [all …]
|
/external/wpa_supplicant_8/src/utils/ |
D | os.h | 396 int os_strcasecmp(const char *s1, const char *s2); 518 #ifndef os_strcasecmp 520 #define os_strcasecmp(s1, s2) _stricmp((s1), (s2)) macro 522 #define os_strcasecmp(s1, s2) strcasecmp((s1), (s2)) macro
|
D | wpa_debug.c | 849 if (os_strcasecmp(s, "EXCESSIVE") == 0) in str_to_debug_level() 851 if (os_strcasecmp(s, "MSGDUMP") == 0) in str_to_debug_level() 853 if (os_strcasecmp(s, "DEBUG") == 0) in str_to_debug_level() 855 if (os_strcasecmp(s, "INFO") == 0) in str_to_debug_level() 857 if (os_strcasecmp(s, "WARNING") == 0) in str_to_debug_level() 859 if (os_strcasecmp(s, "ERROR") == 0) in str_to_debug_level()
|
D | os_none.c | 171 int os_strcasecmp(const char *s1, const char *s2) in os_strcasecmp() function
|
D | xml-utils.c | 77 if (os_strcasecmp(name, path) == 0) in get_node_iter() 319 if (os_strcasecmp(lname, name) == 0) in get_first_child_node()
|
D | os_internal.c | 355 int os_strcasecmp(const char *s1, const char *s2) in os_strcasecmp() function
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_upnp_web.c | 329 if (os_strcasecmp(filename, UPNP_WPS_DEVICE_XML_FILE) == 0) { in web_connection_parse_get() 343 } else if (!os_strcasecmp(filename, UPNP_WPS_SCPD_XML_FILE)) { in web_connection_parse_get() 930 if (os_strcasecmp(filename, UPNP_WPS_DEVICE_CONTROL_FILE)) { in web_connection_parse_post() 1016 if (os_strcasecmp(filename, UPNP_WPS_DEVICE_EVENT_FILE) != 0) { in web_connection_parse_subscribe() 1225 if (os_strcasecmp(filename, UPNP_WPS_DEVICE_EVENT_FILE) != 0) { in web_connection_parse_unsubscribe()
|
D | wps_er.c | 524 found = os_strcasecmp(val, "urn:schemas-wifialliance-org:" in wps_er_find_wfadevice()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | ctrl_iface.c | 326 if (os_strcasecmp(cmd, "EAPOL::heldPeriod") == 0) { in wpa_supplicant_ctrl_iface_set() 329 } else if (os_strcasecmp(cmd, "EAPOL::authPeriod") == 0) { in wpa_supplicant_ctrl_iface_set() 332 } else if (os_strcasecmp(cmd, "EAPOL::startPeriod") == 0) { in wpa_supplicant_ctrl_iface_set() 335 } else if (os_strcasecmp(cmd, "EAPOL::maxStart") == 0) { in wpa_supplicant_ctrl_iface_set() 338 } else if (os_strcasecmp(cmd, "dot11RSNAConfigPMKLifetime") == 0) { in wpa_supplicant_ctrl_iface_set() 342 } else if (os_strcasecmp(cmd, "dot11RSNAConfigPMKReauthThreshold") == in wpa_supplicant_ctrl_iface_set() 347 } else if (os_strcasecmp(cmd, "dot11RSNAConfigSATimeout") == 0) { in wpa_supplicant_ctrl_iface_set() 350 } else if (os_strcasecmp(cmd, "wps_fragment_size") == 0) { in wpa_supplicant_ctrl_iface_set() 353 } else if (os_strcasecmp(cmd, "wps_version_number") == 0) { in wpa_supplicant_ctrl_iface_set() 367 } else if (os_strcasecmp(cmd, "wps_testing_dummy_cred") == 0) { in wpa_supplicant_ctrl_iface_set() [all …]
|
D | wpa_cli.c | 3570 if (os_strcasecmp(wpa_cli_commands[i].cmd, cmd) == 0) { in wpa_cli_cmd_completion() 3636 if (os_strcasecmp(cmd->cmd, argv[0]) == 0) { in wpa_request()
|
D | interworking.c | 570 return os_strcasecmp(realm->realm, home_realm) == 0; in nai_realm_match() 581 if (os_strcasecmp(pos, home_realm) == 0) { in nai_realm_match()
|
/external/wpa_supplicant_8/src/eapol_auth/ |
D | eapol_auth_sm.c | 1118 if (os_strcasecmp(param, "AdminControlledDirections") == 0) { in eapol_auth_set_conf() 1129 if (os_strcasecmp(param, "AdminControlledPortControl") == 0) { in eapol_auth_set_conf() 1142 if (os_strcasecmp(param, "quietPeriod") == 0) { in eapol_auth_set_conf() 1147 if (os_strcasecmp(param, "serverTimeout") == 0) { in eapol_auth_set_conf() 1152 if (os_strcasecmp(param, "reAuthPeriod") == 0) { in eapol_auth_set_conf() 1157 if (os_strcasecmp(param, "reAuthEnabled") == 0) { in eapol_auth_set_conf() 1168 if (os_strcasecmp(param, "KeyTransmissionEnabled") == 0) { in eapol_auth_set_conf()
|
/external/wpa_supplicant_8/hostapd/ |
D | ctrl_iface.c | 1295 } else if (os_strcasecmp(cmd, "wps_version_number") == 0) { in hostapd_ctrl_iface_set() 1310 } else if (os_strcasecmp(cmd, "wps_testing_dummy_cred") == 0) { in hostapd_ctrl_iface_set() 1314 } else if (os_strcasecmp(cmd, "wps_corrupt_pkhash") == 0) { in hostapd_ctrl_iface_set() 1320 } else if (os_strcasecmp(cmd, "gas_frag_limit") == 0) { in hostapd_ctrl_iface_set() 1328 } else if (os_strcasecmp(cmd, "ext_mgmt_frame_handling") == 0) { in hostapd_ctrl_iface_set() 1330 } else if (os_strcasecmp(cmd, "ext_eapol_frame_io") == 0) { in hostapd_ctrl_iface_set() 1334 } else if (os_strcasecmp(cmd, "mbo_assoc_disallow") == 0) { in hostapd_ctrl_iface_set() 1360 if (os_strcasecmp(cmd, "deny_mac_file") == 0) { in hostapd_ctrl_iface_set() 1373 os_strcasecmp(cmd, "accept_mac_file") == 0) { in hostapd_ctrl_iface_set()
|
D | hostapd_cli.c | 1221 if (os_strcasecmp(cmd->cmd, argv[0]) == 0) { in wpa_request()
|
/external/wpa_supplicant_8/src/fst/ |
D | fst_ctrl_iface.c | 339 if (!os_strcasecmp(p, FST_CS_PVAL_RESPONSE_ACCEPT)) { in session_respond() 341 } else if (!os_strcasecmp(p, FST_CS_PVAL_RESPONSE_REJECT)) { in session_respond()
|
D | fst_session.c | 1414 if (!os_strcasecmp(additional_param, FST_CTR_PVAL_BAD_NEW_BAND)) in fst_test_req_send_fst_request() 1450 if (!os_strcasecmp(response, FST_CS_PVAL_RESPONSE_REJECT)) in fst_test_req_send_fst_response() 1489 if (!os_strcasecmp(response, FST_CTR_PVAL_BAD_NEW_BAND)) in fst_test_req_send_fst_response()
|
/external/wpa_supplicant_8/src/tls/ |
D | x509v3.c | 126 return os_strcasecmp(a, b); in x509_str_compare() 132 ret = os_strcasecmp(aa, bb); in x509_str_compare()
|