Home
last modified time | relevance | path

Searched refs:os_strcmp (Results 1 – 25 of 99) sorted by relevance

1234

/freebsd/contrib/wpa/hostapd/
H A Dconfig_file.c391 if (os_strcmp(start, "TTLS-PAP") == 0) { in hostapd_config_read_eap_user()
395 if (os_strcmp(start, "TTLS-CHAP") == 0) { in hostapd_config_read_eap_user()
399 if (os_strcmp(start, "TTLS-MSCHAP") == 0) { in hostapd_config_read_eap_user()
404 if (os_strcmp(start, "TTLS-MSCHAPV2") == 0) { in hostapd_config_read_eap_user()
409 if (os_strcmp(start, "MACACL") == 0) { in hostapd_config_read_eap_user()
656 if (os_strcmp(start, "WPA-PSK") == 0) in hostapd_config_parse_key_mgmt()
658 else if (os_strcmp(start, "WPA-EAP") == 0) in hostapd_config_parse_key_mgmt()
661 else if (os_strcmp(start, "FT-PSK") == 0) in hostapd_config_parse_key_mgmt()
663 else if (os_strcmp(start, "FT-EAP") == 0) in hostapd_config_parse_key_mgmt()
666 else if (os_strcmp(start, "FT-EAP-SHA384") == 0) in hostapd_config_parse_key_mgmt()
[all …]
H A Dctrl_iface.c271 if (os_strcmp(cmd, "WPS") == 0) in hostapd_ctrl_iface_wps_nfc_config_token()
273 else if (os_strcmp(cmd, "NDEF") == 0) in hostapd_ctrl_iface_wps_nfc_config_token()
319 if (os_strcmp(cmd, "WPS") == 0) in hostapd_ctrl_iface_wps_nfc_token()
323 if (os_strcmp(cmd, "NDEF") == 0) in hostapd_ctrl_iface_wps_nfc_token()
327 if (os_strcmp(cmd, "enable") == 0) in hostapd_ctrl_iface_wps_nfc_token()
330 if (os_strcmp(cmd, "disable") == 0) { in hostapd_ctrl_iface_wps_nfc_token()
353 if (os_strcmp(cmd, "WPS") == 0) in hostapd_ctrl_iface_nfc_get_handover_sel()
355 else if (os_strcmp(cmd, "NDEF") == 0) in hostapd_ctrl_iface_nfc_get_handover_sel()
360 if (os_strcmp(pos, "WPS-CR") == 0) in hostapd_ctrl_iface_nfc_get_handover_sel()
434 if (os_strcmp(role, "RESP") == 0 && os_strcmp(type, "WPS") == 0) { in hostapd_ctrl_iface_nfc_report_handover()
[all …]
/freebsd/contrib/wpa/wpa_supplicant/dbus/
H A Ddbus_new_handlers_p2p.c130 if (os_strcmp(entry.key, "Timeout") == 0 && in wpas_dbus_handler_p2p_find()
133 } else if (os_strcmp(entry.key, "RequestedDeviceTypes") == 0) { in wpas_dbus_handler_p2p_find()
153 } else if (os_strcmp(entry.key, "DiscoveryType") == 0 && in wpas_dbus_handler_p2p_find()
155 if (os_strcmp(entry.str_value, "start_with_full") == 0) in wpas_dbus_handler_p2p_find()
157 else if (os_strcmp(entry.str_value, "social") == 0) in wpas_dbus_handler_p2p_find()
159 else if (os_strcmp(entry.str_value, "progressive") == 0) in wpas_dbus_handler_p2p_find()
163 } else if (os_strcmp(entry.key, "freq") == 0 && in wpas_dbus_handler_p2p_find()
272 if (os_strcmp(entry.key, "period") == 0 && in wpas_dbus_handler_p2p_extendedlisten()
275 else if (os_strcmp(entry.key, "interval") == 0 && in wpas_dbus_handler_p2p_extendedlisten()
318 if (os_strcmp(entry.key, "duration1") == 0 && in wpas_dbus_handler_p2p_presence_request()
[all …]
H A Ddbus_new_handlers_wps.c51 if (os_strcmp(val, "enrollee") == 0) in wpas_dbus_handler_wps_role()
53 else if (os_strcmp(val, "registrar") == 0) in wpas_dbus_handler_wps_role()
81 if (os_strcmp(val, "pin") == 0) in wpas_dbus_handler_wps_type()
83 else if (os_strcmp(val, "pbc") == 0) in wpas_dbus_handler_wps_type()
186 if (os_strcmp(key, "Role") == 0) in wpas_dbus_handler_wps_start_entry()
189 else if (os_strcmp(key, "Type") == 0) in wpas_dbus_handler_wps_start_entry()
192 else if (os_strcmp(key, "Bssid") == 0) in wpas_dbus_handler_wps_start_entry()
195 else if (os_strcmp(key, "Pin") == 0) in wpas_dbus_handler_wps_start_entry()
199 else if (os_strcmp(key, "P2PDeviceAddress") == 0) in wpas_dbus_handler_wps_start_entry()
H A Ddbus_new_handlers.c163 if (os_strcmp(key, dont_quote[i]) == 0) in should_quote_opt()
183 os_strcmp(wpa_s->dbus_new_path, path) == 0) in get_iface_by_dbus_path()
284 if (os_strcmp(entry.key, "bgscan") == 0) { in set_network_properties()
300 if (os_strcmp(entry.key, "bssid") != 0 && in set_network_properties()
301 os_strcmp(entry.key, "priority") != 0) in set_network_properties()
313 if ((os_strcmp(entry.key, "psk") == 0 && in set_network_properties()
315 (os_strcmp(entry.key, "ssid") == 0 && ssid->passphrase)) in set_network_properties()
317 else if (os_strcmp(entry.key, "priority") == 0) in set_network_properties()
325 if (os_strcmp(entry.key, "mac_addr") == 0 && in set_network_properties()
328 if (os_strcmp(entry.key, "mac_value") == 0) in set_network_properties()
[all …]
H A Ddbus_new_helpers.c151 if (os_strcmp(dbus_message_get_signature(message), "s") != 0) in properties_get_all()
167 if (os_strcmp(dbus_message_get_signature(message), "ss")) { in properties_get()
201 if (os_strcmp(dbus_message_get_signature(message), "ssv")) { in properties_set()
554 if (os_strcmp(error.name, DBUS_ERROR_OBJECT_PATH_IN_USE) == 0) { in wpa_dbus_register_object_per_iface()
618 if (os_strcmp(dsc->dbus_interface, interface) != 0) in put_changed_properties()
880 if (os_strcmp(property, dsc->dbus_property) == 0 && in wpa_dbus_mark_property_changed()
881 os_strcmp(interface, dsc->dbus_interface) == 0) { in wpa_dbus_mark_property_changed()
/freebsd/contrib/wpa/wpa_supplicant/
H A Dconfig.c71 if (os_strcmp(value, "NULL") == 0) { in wpa_config_parse_str()
376 if (value[0] == '\0' || os_strcmp(value, "\"\"") == 0 || in wpa_config_parse_bssid()
377 os_strcmp(value, "any") == 0) { in wpa_config_parse_bssid()
421 if (value[0] == '\0' || os_strcmp(value, "\"\"") == 0 || in wpa_config_parse_bssid_hint()
422 os_strcmp(value, "any") == 0) { in wpa_config_parse_bssid_hint()
691 if (os_strcmp(start, "WPA") == 0) in wpa_config_parse_proto()
693 else if (os_strcmp(start, "RSN") == 0 || in wpa_config_parse_proto()
694 os_strcmp(start, "WPA2") == 0) in wpa_config_parse_proto()
696 else if (os_strcmp(start, "OSEN") == 0) in wpa_config_parse_proto()
792 if (os_strcmp(start, "WPA-PSK") == 0) in wpa_config_parse_key_mgmt()
[all …]
H A Dctrl_iface.c345 if (*cmd == '\0' || os_strcmp(cmd, "\"\"") == 0) { in wpas_ctrl_iface_set_lci()
372 if (os_strcmp(cmd, "disable") == 0) { in wpas_ctrl_set_relative_rssi()
419 if (*cmd == '\0' || os_strcmp(cmd, "\"\"") == 0) { in wpas_ctrl_iface_set_ric_ies()
520 if (os_strcmp(value, "Auto") == 0) in wpa_supplicant_ctrl_iface_set()
522 else if (os_strcmp(value, "ForceUnauthorized") == 0) in wpa_supplicant_ctrl_iface_set()
525 else if (os_strcmp(value, "ForceAuthorized") == 0) in wpa_supplicant_ctrl_iface_set()
624 if (os_strcmp(value, "disable") == 0) in wpa_supplicant_ctrl_iface_set()
812 if (os_strcmp(value, "NULL") == 0) in wpa_supplicant_ctrl_iface_set()
818 if (os_strcmp(value, "NULL") == 0) in wpa_supplicant_ctrl_iface_set()
824 if (os_strcmp(value, "NULL") == 0) in wpa_supplicant_ctrl_iface_set()
[all …]
H A Dctrl_iface_udp.c253 if (os_strcmp(addr, "::1")) {
282 if (os_strcmp(buf, "GET_COOKIE") == 0) {
319 if (os_strcmp(pos, "ATTACH") == 0) {
327 } else if (os_strcmp(pos, "DETACH") == 0) {
654 if (os_strcmp(addr, "::1")) {
683 if (os_strcmp(buf, "GET_COOKIE") == 0) {
713 if (os_strcmp(pos, "ATTACH") == 0) {
719 } else if (os_strcmp(pos, "DETACH") == 0) {
H A Dmain_winsvc.c423 if (os_strcmp(argv[1], "reg") == 0) { in main()
445 } else if (os_strcmp(argv[1], "unreg") == 0) { in main()
447 } else if (os_strcmp(argv[1], "app") == 0) { in main()
H A Dwpas_glue.c876 if (os_strcmp(field, "IDENTITY") == 0) in wpa_supplicant_ctrl_req_from_string()
878 else if (os_strcmp(field, "PASSWORD") == 0) in wpa_supplicant_ctrl_req_from_string()
880 else if (os_strcmp(field, "NEW_PASSWORD") == 0) in wpa_supplicant_ctrl_req_from_string()
882 else if (os_strcmp(field, "PIN") == 0) in wpa_supplicant_ctrl_req_from_string()
884 else if (os_strcmp(field, "OTP") == 0) in wpa_supplicant_ctrl_req_from_string()
886 else if (os_strcmp(field, "PASSPHRASE") == 0) in wpa_supplicant_ctrl_req_from_string()
888 else if (os_strcmp(field, "SIM") == 0) in wpa_supplicant_ctrl_req_from_string()
890 else if (os_strcmp(field, "PSK_PASSPHRASE") == 0) in wpa_supplicant_ctrl_req_from_string()
892 else if (os_strcmp(field, "EXT_CERT_CHECK") == 0) in wpa_supplicant_ctrl_req_from_string()
/freebsd/contrib/wpa/src/ap/
H A Deap_user_db.c44 if (os_strcmp(start, "TTLS-PAP") == 0) { in set_user_methods()
48 if (os_strcmp(start, "TTLS-CHAP") == 0) { in set_user_methods()
52 if (os_strcmp(start, "TTLS-MSCHAP") == 0) { in set_user_methods()
56 if (os_strcmp(start, "TTLS-MSCHAPV2") == 0) { in set_user_methods()
85 if (os_strcmp(col[i], "password") == 0 && argv[i]) { in get_user_cb()
90 } else if (os_strcmp(col[i], "methods") == 0 && argv[i]) { in get_user_cb()
92 } else if (os_strcmp(col[i], "remediation") == 0 && argv[i]) { in get_user_cb()
94 } else if (os_strcmp(col[i], "t_c_timestamp") == 0 && argv[i]) { in get_user_cb()
110 if (os_strcmp(col[i], "identity") == 0 && argv[i]) in get_wildcard_cb()
112 else if (os_strcmp(col[i], "methods") == 0 && argv[i]) in get_wildcard_cb()
/freebsd/contrib/wpa/src/utils/
H A Dtrace.c320 os_strcmp(data.function, __func__) != 0)) { in wpa_trace_calling_func()
356 (os_strcmp(func, "wpa_trace_add_ref_func") == 0 || in wpa_trace_dump_func()
357 os_strcmp(func, "wpa_trace_check_ref") == 0 || in wpa_trace_dump_func()
358 os_strcmp(func, "wpa_trace_show") == 0)) in wpa_trace_dump_func()
371 os_strcmp(func, "main") == 0) in wpa_trace_dump_func()
H A Dos_none.c183 return os_strcmp(s1, s2); in os_strcasecmp()
209 int os_strcmp(const char *s1, const char *s2) in os_strcmp() function
H A Dos.h452 int os_strcmp(const char *s1, const char *s2);
555 #ifndef os_strcmp
556 #define os_strcmp(s1, s2) strcmp((s1), (s2)) macro
/freebsd/contrib/wpa/src/eap_server/
H A Deap_sim_db.c213 if (os_strcmp(col[i], "permanent") == 0 && argv[i]) { in get_pseudonym_cb()
314 if (os_strcmp(col[i], "permanent") == 0 && argv[i]) { in get_reauth_cb()
318 } else if (os_strcmp(col[i], "counter") == 0 && argv[i]) { in get_reauth_cb()
320 } else if (os_strcmp(col[i], "mk") == 0 && argv[i]) { in get_reauth_cb()
322 } else if (os_strcmp(col[i], "k_encr") == 0 && argv[i]) { in get_reauth_cb()
325 } else if (os_strcmp(col[i], "k_aut") == 0 && argv[i]) { in get_reauth_cb()
328 } else if (os_strcmp(col[i], "k_re") == 0 && argv[i]) { in get_reauth_cb()
383 if (entry->aka == aka && os_strcmp(entry->imsi, imsi) == 0) { in eap_sim_db_get_pending()
662 if (os_strcmp(cmd, "SIM-RESP-AUTH") == 0) in eap_sim_db_receive()
664 else if (os_strcmp(cmd, "AKA-RESP-AUTH") == 0) in eap_sim_db_receive()
[all …]
H A Deap_server_methods.c50 if (os_strcmp(m->name, name) == 0) { in eap_server_get_type()
121 os_strcmp(m->name, method->name) == 0) { in eap_server_method_register()
H A Dtncs.c302 if (os_strcmp(functionName, "TNC_TNCS_ReportMessageTypes") == 0) in TNC_TNCS_BindFunction()
304 else if (os_strcmp(functionName, "TNC_TNCS_SendMessage") == 0) in TNC_TNCS_BindFunction()
306 else if (os_strcmp(functionName, "TNC_TNCS_RequestHandshakeRetry") == in TNC_TNCS_BindFunction()
309 else if (os_strcmp(functionName, "TNC_TNCS_ProvideRecommendation") == in TNC_TNCS_BindFunction()
312 else if (os_strcmp(functionName, "TNC_TNCS_GetAttribute") == 0) in TNC_TNCS_BindFunction()
314 else if (os_strcmp(functionName, "TNC_TNCS_SetAttribute") == 0) in TNC_TNCS_BindFunction()
/freebsd/contrib/wpa/src/eap_peer/
H A Deap_fast_pac.c431 if (os_strcmp(pac_file_hdr, rc.buf) != 0) in eap_fast_load_pac()
435 if (os_strcmp(rc.buf, "START") == 0) in eap_fast_load_pac()
437 else if (os_strcmp(rc.buf, "END") == 0) { in eap_fast_load_pac()
442 else if (os_strcmp(rc.buf, "PAC-Type") == 0) in eap_fast_load_pac()
444 else if (os_strcmp(rc.buf, "PAC-Key") == 0) in eap_fast_load_pac()
446 else if (os_strcmp(rc.buf, "PAC-Opaque") == 0) in eap_fast_load_pac()
448 else if (os_strcmp(rc.buf, "A-ID") == 0) in eap_fast_load_pac()
450 else if (os_strcmp(rc.buf, "I-ID") == 0) in eap_fast_load_pac()
452 else if (os_strcmp(rc.buf, "A-ID-Info") == 0) in eap_fast_load_pac()
H A Deap_teap_pac.c432 if (os_strcmp(pac_file_hdr, rc.buf) != 0) in eap_teap_load_pac()
436 if (os_strcmp(rc.buf, "START") == 0) in eap_teap_load_pac()
438 else if (os_strcmp(rc.buf, "END") == 0) { in eap_teap_load_pac()
443 else if (os_strcmp(rc.buf, "PAC-Type") == 0) in eap_teap_load_pac()
445 else if (os_strcmp(rc.buf, "PAC-Key") == 0) in eap_teap_load_pac()
447 else if (os_strcmp(rc.buf, "PAC-Opaque") == 0) in eap_teap_load_pac()
449 else if (os_strcmp(rc.buf, "A-ID") == 0) in eap_teap_load_pac()
451 else if (os_strcmp(rc.buf, "I-ID") == 0) in eap_teap_load_pac()
453 else if (os_strcmp(rc.buf, "A-ID-Info") == 0) in eap_teap_load_pac()
H A Dtncc.c239 if (os_strcmp(functionName, "TNC_TNCC_ReportMessageTypes") == 0) in TNC_TNCC_BindFunction()
241 else if (os_strcmp(functionName, "TNC_TNCC_SendMessage") == 0) in TNC_TNCC_BindFunction()
243 else if (os_strcmp(functionName, "TNC_TNCC_RequestHandshakeRetry") == in TNC_TNCC_BindFunction()
246 else if (os_strcmp(functionName, "TNC_9048_LogMessage") == 0) in TNC_TNCC_BindFunction()
248 else if (os_strcmp(functionName, "TNC_9048_UserMessage") == 0) in TNC_TNCC_BindFunction()
672 if (os_strcmp(pos, "allow") == 0) in tncc_get_recommendation()
674 else if (os_strcmp(pos, "none") == 0) in tncc_get_recommendation()
676 else if (os_strcmp(pos, "isolate") == 0) in tncc_get_recommendation()
/freebsd/contrib/wpa/hs20/client/
H A Dest.c259 if (os_strcmp(txt, "1.2.840.113549.1.9.7") == 0) { in add_csrattrs_oid()
261 } else if (os_strcmp(txt, "1.2.840.113549.1.1.11") == 0) { in add_csrattrs_oid()
284 if (os_strcmp(txt, "1.3.6.1.1.1.1.22") == 0) { in add_csrattrs_ext_req()
286 } else if (os_strcmp(txt, "1.3.6.1.4.1.40808.1.1.3") == 0) { in add_csrattrs_ext_req()
288 } else if (os_strcmp(txt, "1.3.6.1.4.1.40808.1.1.4") == 0) { in add_csrattrs_ext_req()
290 } else if (os_strcmp(txt, "1.3.6.1.4.1.40808.1.1.5") == 0) { in add_csrattrs_ext_req()
313 if (os_strcmp(txt, "1.2.840.113549.1.9.14") == 0) { in add_csrattrs_attr()
/freebsd/contrib/wpa/src/common/
H A Ddpp.c1631 if (os_strcmp(curve, "prime256v1") == 0) in dpp_supports_curve()
1633 else if (os_strcmp(curve, "secp384r1") == 0) in dpp_supports_curve()
1635 else if (os_strcmp(curve, "secp521r1") == 0) in dpp_supports_curve()
1637 else if (os_strcmp(curve, "brainpoolP256r1") == 0) in dpp_supports_curve()
1639 else if (os_strcmp(curve, "brainpoolP384r1") == 0) in dpp_supports_curve()
1641 else if (os_strcmp(curve, "brainpoolP512r1") == 0) in dpp_supports_curve()
2430 if (os_strcmp(token->string, "infra") != 0) { in dpp_conf_req_rx()
2443 if (os_strcmp(token->string, "sta") == 0) { in dpp_conf_req_rx()
2445 } else if (os_strcmp(token->string, "ap") == 0) { in dpp_conf_req_rx()
2447 } else if (os_strcmp(token->string, "configurator") == 0) { in dpp_conf_req_rx()
[all …]
/freebsd/contrib/wpa/src/eapol_auth/
H A Deapol_auth_sm.c1120 if (os_strcmp(value, "Both") == 0) in eapol_auth_set_conf()
1122 else if (os_strcmp(value, "In") == 0) in eapol_auth_set_conf()
1131 if (os_strcmp(value, "ForceAuthorized") == 0) in eapol_auth_set_conf()
1133 else if (os_strcmp(value, "ForceUnauthorized") == 0) in eapol_auth_set_conf()
1135 else if (os_strcmp(value, "Auto") == 0) in eapol_auth_set_conf()
1159 if (os_strcmp(value, "TRUE") == 0) in eapol_auth_set_conf()
1161 else if (os_strcmp(value, "FALSE") == 0) in eapol_auth_set_conf()
1170 if (os_strcmp(value, "TRUE") == 0) in eapol_auth_set_conf()
1172 else if (os_strcmp(value, "FALSE") == 0) in eapol_auth_set_conf()
/freebsd/contrib/wpa/src/drivers/
H A Ddriver_macsec_qca.c267 if (os_strcmp(ifname, "eth2") == 0) { in macsec_qca_secy_id_get()
269 } else if (os_strcmp(ifname, "eth3") == 0) { in macsec_qca_secy_id_get()
271 } else if (os_strcmp(ifname, "eth4") == 0 || in macsec_qca_secy_id_get()
272 os_strcmp(ifname, "eth0") == 0) { in macsec_qca_secy_id_get()
274 } else if (os_strcmp(ifname, "eth5") == 0 || in macsec_qca_secy_id_get()
275 os_strcmp(ifname, "eth1") == 0) { in macsec_qca_secy_id_get()

1234