/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | xml_libxml2.c | 404 char *txt; local 408 txt = xml_node_get_text(ctx, node); 409 if (txt == NULL) 412 ret = base64_decode((unsigned char *) txt, strlen(txt), &len); 415 xml_node_get_text_free(ctx, txt); 418 txt = os_malloc(len + 1); 419 if (txt == NULL) { 423 os_memcpy(txt, ret, len); 424 txt[le [all...] |
/external/wpa_supplicant_8/hs20/client/ |
H A D | est.c | 138 res = http_download_file(ctx->http, buf, "Cert/est-cacerts.txt", 153 resp = os_readfile("Cert/est-cacerts.txt", &resp_len); 155 wpa_printf(MSG_INFO, "Could not read Cert/est-cacerts.txt"); 191 unlink("Cert/est-cacerts.txt"); 247 char txt[100]; local 253 res = OBJ_obj2txt(txt, sizeof(txt), oid, 1); 254 if (res < 0 || res >= (int) sizeof(txt)) 257 if (os_strcmp(txt, "1.2.840.113549.1.9.7") == 0) { 259 } else if (os_strcmp(txt, "1. 271 char txt[100]; local 301 char txt[100], txt2[100]; local 498 char *txt; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_glue.c | 117 logger_level level, const char *txt) 136 hostapd_logger(hapd, addr, HOSTAPD_MODULE_WPA, hlevel, "%s", txt); 116 hostapd_wpa_auth_logger(void *ctx, const u8 *addr, logger_level level, const char *txt) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_fast_pac.c | 480 size_t len, int txt) 491 if (txt) 517 if (txt) { 518 ret = os_snprintf(*pos, end - *pos, "%s-txt=", field); 478 eap_fast_write(char **buf, char **pos, size_t *buf_len, const char *field, const u8 *data, size_t len, int txt) argument
|
H A D | eap_tls_common.c | 59 const char *txt) 61 if (txt == NULL) 63 if (os_strstr(txt, "tls_allow_md5=1")) 65 if (os_strstr(txt, "tls_disable_time_checks=1")) 67 if (os_strstr(txt, "tls_disable_session_ticket=1")) 69 if (os_strstr(txt, "tls_disable_session_ticket=0")) 71 if (os_strstr(txt, "tls_disable_tlsv1_0=1")) 73 if (os_strstr(txt, "tls_disable_tlsv1_0=0")) 75 if (os_strstr(txt, "tls_disable_tlsv1_1=1")) 77 if (os_strstr(txt, "tls_disable_tlsv1_ 58 eap_tls_params_flags(struct tls_connection_params *params, const char *txt) argument [all...] |
H A D | eap_mschapv2.c | 2 * EAP peer method: EAP-MSCHAPV2 (draft-kamath-pppext-eap-mschapv2-00.txt) 9 * draft-kamath-pppext-eap-mschapv2-00.txt defines the Microsoft EAP CHAP 401 struct eap_mschapv2_data *data, char *txt) 411 pos = txt; 400 eap_mschapv2_failure_txt(struct eap_sm *sm, struct eap_mschapv2_data *data, char *txt) argument
|
/external/wpa_supplicant_8/src/eapol_auth/ |
H A D | eapol_auth_sm.c | 51 const char *txt) 55 eapol->cb.logger(eapol->conf.ctx, addr, level, txt); 49 eapol_auth_logger(struct eapol_authenticator *eapol, const u8 *addr, eapol_logger_level level, const char *txt) argument
|
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_go_neg.c | 649 char txt[100], *pos, *end; local 688 pos = txt; 689 end = pos + sizeof(txt); 698 size, txt);
|
/external/wpa_supplicant_8/src/utils/ |
H A D | xml_libxml2.c | 404 char *txt; local 408 txt = xml_node_get_text(ctx, node); 409 if (txt == NULL) 412 ret = base64_decode((unsigned char *) txt, strlen(txt), &len); 415 xml_node_get_text_free(ctx, txt); 418 txt = os_malloc(len + 1); 419 if (txt == NULL) { 423 os_memcpy(txt, ret, len); 424 txt[le [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ctrl_iface_named_pipe.c | 428 const char *txt, size_t len) 433 wpa_supplicant_ctrl_iface_send(wpa_s->ctrl_iface, level, txt, len); 426 wpa_supplicant_ctrl_iface_msg_cb(void *ctx, int level, enum wpa_msg_type type, const char *txt, size_t len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_glue.c | 117 logger_level level, const char *txt) 136 hostapd_logger(hapd, addr, HOSTAPD_MODULE_WPA, hlevel, "%s", txt); 116 hostapd_wpa_auth_logger(void *ctx, const u8 *addr, logger_level level, const char *txt) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_fast_pac.c | 480 size_t len, int txt) 491 if (txt) 517 if (txt) { 518 ret = os_snprintf(*pos, end - *pos, "%s-txt=", field); 478 eap_fast_write(char **buf, char **pos, size_t *buf_len, const char *field, const u8 *data, size_t len, int txt) argument
|
H A D | eap_tls_common.c | 59 const char *txt) 61 if (txt == NULL) 63 if (os_strstr(txt, "tls_allow_md5=1")) 65 if (os_strstr(txt, "tls_disable_time_checks=1")) 67 if (os_strstr(txt, "tls_disable_session_ticket=1")) 69 if (os_strstr(txt, "tls_disable_session_ticket=0")) 71 if (os_strstr(txt, "tls_disable_tlsv1_0=1")) 73 if (os_strstr(txt, "tls_disable_tlsv1_0=0")) 75 if (os_strstr(txt, "tls_disable_tlsv1_1=1")) 77 if (os_strstr(txt, "tls_disable_tlsv1_ 58 eap_tls_params_flags(struct tls_connection_params *params, const char *txt) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_auth/ |
H A D | eapol_auth_sm.c | 51 const char *txt) 55 eapol->cb.logger(eapol->conf.ctx, addr, level, txt); 49 eapol_auth_logger(struct eapol_authenticator *eapol, const u8 *addr, eapol_logger_level level, const char *txt) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_go_neg.c | 649 char txt[100], *pos, *end; local 688 pos = txt; 689 end = pos + sizeof(txt); 698 size, txt);
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | xml_libxml2.c | 404 char *txt; local 408 txt = xml_node_get_text(ctx, node); 409 if (txt == NULL) 412 ret = base64_decode((unsigned char *) txt, strlen(txt), &len); 415 xml_node_get_text_free(ctx, txt); 418 txt = os_malloc(len + 1); 419 if (txt == NULL) { 423 os_memcpy(txt, ret, len); 424 txt[le [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
H A D | networkconfig.cpp | 462 const char *txt, *pos; local 472 txt = edit->text().toLocal8Bit().constData(); 473 if (strcmp(txt, WPA_GUI_KEY_DATA) == 0) 475 len = strlen(txt); 478 pos = txt; 492 setNetworkParam(network_id, buf, txt, !hex);
|
/external/antlr/antlr-3.4/tool/src/main/java/org/antlr/tool/ |
H A D | GrammarAST.java | 147 public GrammarAST(int t, String txt) { argument 148 initialize(t,txt);
|
/external/wpa_supplicant_8/hostapd/ |
H A D | main.c | 43 int level, const char *txt, size_t len) 97 txt); 101 module_str ? module_str : "", txt); 105 module_str ? module_str : "", txt); 109 module_str ? ": " : "", txt); 42 hostapd_logger_cb(void *ctx, const u8 *addr, unsigned int module, int level, const char *txt, size_t len) argument
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl_ocsp.c | 25 static void tls_show_errors(int level, const char *func, const char *txt) argument 30 func, txt, ERR_error_string(ERR_get_error(), NULL)); 229 char *txt; local 234 txt = os_malloc(rlen + 1); 235 if (!txt) { 240 res = BIO_read(out, txt, rlen); 243 os_free(txt); 247 txt[res] = '\0'; 248 return txt; 403 char *txt; local 498 char *txt; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_mschapv2.c | 2 * EAP peer method: EAP-MSCHAPV2 (draft-kamath-pppext-eap-mschapv2-00.txt) 9 * draft-kamath-pppext-eap-mschapv2-00.txt defines the Microsoft EAP CHAP 401 struct eap_mschapv2_data *data, char *txt) 411 pos = txt; 400 eap_mschapv2_failure_txt(struct eap_sm *sm, struct eap_mschapv2_data *data, char *txt) argument
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_cred.c | 889 char txt[80]; local 900 asn1_oid_to_str(&oid, txt, sizeof(txt)); 901 wpa_printf(MSG_DEBUG, "PKCS #12: contentType %s", txt); 919 txt);
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_upnp.c | 632 char txt[10]; local 669 os_snprintf(txt, sizeof(txt), "%d", ap_status); 670 wpabuf_put_property(buf, "APStatus", txt);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl_ocsp.c | 25 static void tls_show_errors(int level, const char *func, const char *txt) argument 30 func, txt, ERR_error_string(ERR_get_error(), NULL)); 229 char *txt; local 234 txt = os_malloc(rlen + 1); 235 if (!txt) { 240 res = BIO_read(out, txt, rlen); 243 os_free(txt); 247 txt[res] = '\0'; 248 return txt; 403 char *txt; local 498 char *txt; local [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_cred.c | 889 char txt[80]; local 900 asn1_oid_to_str(&oid, txt, sizeof(txt)); 901 wpa_printf(MSG_DEBUG, "PKCS #12: contentType %s", txt); 919 txt);
|