/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface_unix.c | 154 if (os_strcmp(buf, "ATTACH") == 0) { 161 } else if (os_strcmp(buf, "DETACH") == 0) { 576 if (os_strcmp(buf, "ATTACH") == 0) {
|
wps_supplicant.c | [all...] |
ctrl_iface_named_pipe.c | 298 if (os_strcmp(buf, "ATTACH") == 0) { 303 } else if (os_strcmp(buf, "DETACH") == 0) {
|
/external/wpa_supplicant/ |
eap_fast.c | 347 os_strcmp(pac_file_hdr, buf) != 0) { 363 if (os_strcmp(buf, "START") == 0) { 378 } else if (os_strcmp(buf, "END") == 0) { 390 } else if (pac && os_strcmp(buf, "PAC-Key") == 0) { 404 } else if (pac && os_strcmp(buf, "PAC-Opaque") == 0) { 415 } else if (pac && os_strcmp(buf, "A-ID") == 0) { 424 } else if (pac && os_strcmp(buf, "I-ID") == 0) { 433 } else if (pac && os_strcmp(buf, "A-ID-Info") == 0) { [all...] |
driver_test.c | 448 } else if (os_strcmp(buf, "DISASSOC") == 0) { 450 } else if (os_strcmp(buf, "DEAUTH") == 0) { 815 if (os_strcmp(dent->d_name, ".") == 0 || 816 os_strcmp(dent->d_name, "..") == 0)
|
l2_packet_freebsd.c | 258 if (os_strcmp(dev->name, l2->ifname) != 0)
|
ctrl_iface_named_pipe.c | 298 if (os_strcmp(buf, "ATTACH") == 0) { 303 } else if (os_strcmp(buf, "DETACH") == 0) {
|
wpa_supplicant.c | 570 wpa_s->driver && os_strcmp(wpa_s->driver->name, "wired") == 0) 632 os_strcmp(wpa_s->driver->name, "wired") == 0) { 928 os_strcmp(conf->ctrl_interface, 1030 wpa_s->driver && os_strcmp(wpa_s->driver->name, "wired") == 0) { [all...] |
l2_packet_pcap.c | 352 if (os_strcmp(dev->name, l2->ifname) != 0)
|
l2_packet_winpcap.c | 315 if (os_strcmp(dev->name, l2->ifname) != 0)
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim_db.c | 316 if (os_strcmp(cmd, "SIM-RESP-AUTH") == 0) 318 else if (os_strcmp(cmd, "AKA-RESP-AUTH") == 0) 674 if (os_strcmp(p->pseudonym, pseudonym) == 0) 737 if (os_strcmp(r->reauth_id, reauth_id) == 0) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/l2_packet/ |
l2_packet_freebsd.c | 261 if (os_strcmp(dev->name, l2->ifname) != 0)
|
l2_packet_pcap.c | 352 if (os_strcmp(dev->name, l2->ifname) != 0)
|
l2_packet_winpcap.c | 315 if (os_strcmp(dev->name, l2->ifname) != 0)
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.c | 317 if (os_strcmp(cmd, "SIM-RESP-AUTH") == 0) 319 else if (os_strcmp(cmd, "AKA-RESP-AUTH") == 0) 675 if (os_strcmp(p->pseudonym, pseudonym) == 0) 738 if (os_strcmp(r->reauth_id, reauth_id) == 0) [all...] |
/external/wpa_supplicant_8/src/utils/ |
common.c | 275 if (os_strcmp(argv[optind], "--") == 0) {
|
edit.c | 188 if (os_strcmp(str, h->str) == 0) { 412 return os_strcmp(* (const char **) a, * (const char **) b);
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_introspect.c | 39 if (os_strcmp(iface->dbus_interface, dbus_interface) == 0)
|
/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_cli.c | 237 int verbose = argc > 0 && os_strcmp(argv[0], "verbose") == 0; 1063 if ((argc == 2) && os_strcmp(argv[1], "strict") != 0) { [all...] |
ctrl_iface_named_pipe.c | 298 if (os_strcmp(buf, "ATTACH") == 0) { 303 } else if (os_strcmp(buf, "DETACH") == 0) {
|
/external/wpa_supplicant_8/hostapd/ |
hostapd_cli.c | 984 if (os_strcmp(dent->d_name, ".") == 0 986 os_strcmp(dent->d_name, "..") == 0)
|
/external/wpa_supplicant_8/src/ap/ |
vlan_init.c | 488 if (os_strcmp(ifname, vlan->ifname) == 0) { 536 if (os_strcmp(ifname, vlan->ifname) == 0) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_test.c | 567 } else if (os_strcmp(buf, "DISASSOC") == 0) { 570 } else if (os_strcmp(buf, "DEAUTH") == 0) { 1040 if (os_strcmp(dent->d_name, ".") == 0 || 1041 os_strcmp(dent->d_name, "..") == 0) [all...] |
/external/wpa_supplicant_8/src/l2_packet/ |
l2_packet_freebsd.c | 292 if (os_strcmp(dev->name, l2->ifname) != 0)
|
l2_packet_pcap.c | 352 if (os_strcmp(dev->name, l2->ifname) != 0)
|