Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching refs:pos

416 	char *pos;
421 for (pos = cmd, len = 0; *pos != '\0'; pos++) {
422 if (*pos < '0' || *pos > '9')
424 pin[len++] = *pos;
538 char *pos;
544 pos = os_strchr(cmd, ' ');
545 if (pos)
546 *pos++ = '\0';
554 if (pos)
555 timeout = atoi(pos);
571 if (pos == NULL)
573 pin = pos;
574 pos = os_strchr(pos, ' ');
575 if (pos) {
576 *pos++ = '\0';
577 timeout = atoi(pos);
595 char *uuid = cmd, *pin, *pos;
601 pos = os_strchr(pin, ' ');
602 if (pos) {
603 *pos++ = '\0';
604 if (hwaddr_aton(pos, addr_buf) == 0)
706 char *pos, *id_pos;
711 pos = os_strchr(rsp, '-');
712 if (pos == NULL)
714 *pos++ = '\0';
715 id_pos = pos;
716 pos = os_strchr(pos, ':');
717 if (pos == NULL)
719 *pos++ = '\0';
723 (u8 *) pos, os_strlen(pos));
735 eap->identity = (u8 *) os_strdup(pos);
736 eap->identity_len = os_strlen(pos);
742 eap->password = (u8 *) os_strdup(pos);
743 eap->password_len = os_strlen(pos);
749 eap->new_password = (u8 *) os_strdup(pos);
750 eap->new_password_len = os_strlen(pos);
756 eap->pin = os_strdup(pos);
762 eap->otp = (u8 *) os_strdup(pos);
763 eap->otp_len = os_strlen(pos);
769 eap->private_key_passwd = (u8 *) os_strdup(pos);
790 char *pos, *end, tmp[30];
807 pos = buf;
811 ret = os_snprintf(pos, end - pos, "bssid=" MACSTR "\n",
813 if (ret < 0 || ret >= end - pos)
814 return pos - buf;
815 pos += ret;
828 ret = os_snprintf(pos, end - pos, "ssid=%s\nid=%d\n",
831 if (ret < 0 || ret >= end - pos)
832 return pos - buf;
833 pos += ret;
836 ret = os_snprintf(pos, end - pos,
839 if (ret < 0 || ret >= end - pos)
840 return pos - buf;
841 pos += ret;
846 ret = os_snprintf(pos, end - pos,
850 ret = os_snprintf(pos, end - pos,
854 ret = os_snprintf(pos, end - pos,
858 ret = os_snprintf(pos, end - pos,
862 ret = os_snprintf(pos, end - pos,
870 if (ret < 0 || ret >= end - pos)
871 return pos - buf;
872 pos += ret;
877 pos += ap_ctrl_iface_wpa_get_status(wpa_s, pos,
878 end - pos,
882 pos += wpa_sm_get_status(wpa_s->wpa, pos, end - pos, verbose);
884 ret = os_snprintf(pos, end - pos, "wpa_state=%s\n",
886 if (ret < 0 || ret >= end - pos)
887 return pos - buf;
888 pos += ret;
892 ret = os_snprintf(pos, end - pos, "ip_address=%s\n", tmp);
893 if (ret < 0 || ret >= end - pos)
894 return pos - buf;
895 pos += ret;
900 ret = os_snprintf(pos, end - pos, "p2p_device_address=" MACSTR
902 if (ret < 0 || ret >= end - pos)
903 return pos - buf;
904 pos += ret;
908 ret = os_snprintf(pos, end - pos, "address=" MACSTR "\n",
910 if (ret < 0 || ret >= end - pos)
911 return pos - buf;
912 pos += ret;
916 res = eapol_sm_get_status(wpa_s->eapol, pos, end - pos,
919 pos += res;
922 res = rsn_preauth_get_status(wpa_s->wpa, pos, end - pos, verbose);
924 pos += res;
926 return pos - buf;
933 char *pos;
939 pos = os_strchr(cmd, ' ');
940 if (pos == NULL)
942 *pos++ = '\0';
944 wpa_printf(MSG_DEBUG, "CTRL_IFACE: id=%d bssid='%s'", id, pos);
945 if (hwaddr_aton(pos, bssid)) {
946 wpa_printf(MSG_DEBUG ,"CTRL_IFACE: invalid BSSID '%s'", pos);
970 char *pos, *end, *stamp;
977 pos = buf;
979 ret = os_snprintf(pos, end-pos, "Current level: %d\n"
982 if ((ret < 0) || (ret >= end - pos))
1011 char *pos, *end;
1016 pos = buf;
1020 ret = os_snprintf(pos, end-pos, MACSTR"\n", MAC2STR(e->bssid));
1021 if ((ret < 0) || (ret >= end - pos))
1022 return pos - buf;
1023 pos += ret;
1026 return pos - buf;
1058 char *pos, *end;
1062 pos = buf;
1064 ret = os_snprintf(pos, end - pos,
1066 if (ret < 0 || ret >= end - pos)
1067 return pos - buf;
1068 pos += ret;
1072 ret = os_snprintf(pos, end - pos, "%d\t%s",
1075 if (ret < 0 || ret >= end - pos)
1076 return pos - buf;
1077 pos += ret;
1079 ret = os_snprintf(pos, end - pos, "\t" MACSTR,
1082 ret = os_snprintf(pos, end - pos, "\tany");
1084 if (ret < 0 || ret >= end - pos)
1085 return pos - buf;
1086 pos += ret;
1087 ret = os_snprintf(pos, end - pos, "\t%s%s%s",
1093 if (ret < 0 || ret >= end - pos)
1094 return pos - buf;
1095 pos += ret;
1096 ret = os_snprintf(pos, end - pos, "\n");
1097 if (ret < 0 || ret >= end - pos)
1098 return pos - buf;
1099 pos += ret;
1104 return pos - buf;
1108 static char * wpa_supplicant_cipher_txt(char *pos, char *end, int cipher)
1111 ret = os_snprintf(pos, end - pos, "-");
1112 if (ret < 0 || ret >= end - pos)
1113 return pos;
1114 pos += ret;
1116 ret = os_snprintf(pos, end - pos, "%sNONE", first ? "" : "+");
1117 if (ret < 0 || ret >= end - pos)
1118 return pos;
1119 pos += ret;
1123 ret = os_snprintf(pos, end - pos, "%sWEP40", first ? "" : "+");
1124 if (ret < 0 || ret >= end - pos)
1125 return pos;
1126 pos += ret;
1130 ret = os_snprintf(pos, end - pos, "%sWEP104",
1132 if (ret < 0 || ret >= end - pos)
1133 return pos;
1134 pos += ret;
1138 ret = os_snprintf(pos, end - pos, "%sTKIP", first ? "" : "+");
1139 if (ret < 0 || ret >= end - pos)
1140 return pos;
1141 pos += ret;
1145 ret = os_snprintf(pos, end - pos, "%sCCMP", first ? "" : "+");
1146 if (ret < 0 || ret >= end - pos)
1147 return pos;
1148 pos += ret;
1151 return pos;
1155 static char * wpa_supplicant_ie_txt(char *pos, char *end, const char *proto,
1161 ret = os_snprintf(pos, end - pos, "[%s-", proto);
1162 if (ret < 0 || ret >= end - pos)
1163 return pos;
1164 pos += ret;
1167 ret = os_snprintf(pos, end - pos, "?]");
1168 if (ret < 0 || ret >= end - pos)
1169 return pos;
1170 pos += ret;
1171 return pos;
1176 ret = os_snprintf(pos, end - pos, "%sEAP", first ? "" : "+");
1177 if (ret < 0 || ret >= end - pos)
1178 return pos;
1179 pos += ret;
1183 ret = os_snprintf(pos, end - pos, "%sPSK", first ? "" : "+");
1184 if (ret < 0 || ret >= end - pos)
1185 return pos;
1186 pos += ret;
1190 ret = os_snprintf(pos, end - pos, "%sNone", first ? "" : "+");
1191 if (ret < 0 || ret >= end - pos)
1192 return pos;
1193 pos += ret;
1198 ret = os_snprintf(pos, end - pos, "%sFT/EAP",
1200 if (ret < 0 || ret >= end - pos)
1201 return pos;
1202 pos += ret;
1206 ret = os_snprintf(pos, end - pos, "%sFT/PSK",
1208 if (ret < 0 || ret >= end - pos)
1209 return pos;
1210 pos += ret;
1216 ret = os_snprintf(pos, end - pos, "%sEAP-SHA256",
1218 if (ret < 0 || ret >= end - pos)
1219 return pos;
1220 pos += ret;
1224 ret = os_snprintf(pos, end - pos, "%sPSK-SHA256",
1226 if (ret < 0 || ret >= end - pos)
1227 return pos;
1228 pos += ret;
1233 pos = wpa_supplicant_cipher_txt(pos, end, data.pairwise_cipher);
1236 ret = os_snprintf(pos, end - pos, "-preauth");
1237 if (ret < 0 || ret >= end - pos)
1238 return pos;
1239 pos += ret;
1242 ret = os_snprintf(pos, end - pos, "]");
1243 if (ret < 0 || ret >= end - pos)
1244 return pos;
1245 pos += ret;
1247 return pos;
1253 char *pos, char *end,
1260 return pos;
1272 ret = os_snprintf(pos, end - pos, "%s", txt);
1273 if (ret >= 0 && ret < end - pos)
1274 pos += ret;
1276 return pos;
1282 char *pos, char *end,
1288 return wpa_supplicant_wps_ie_txt_buf(wpa_s, pos, end, wps_ie);
1290 return pos;
1300 char *pos, *end;
1310 pos = buf;
1313 ret = os_snprintf(pos, end - pos, MACSTR "\t%d\t%d\t",
1315 if (ret < 0 || ret >= end - pos)
1317 pos += ret;
1320 pos = wpa_supplicant_ie_txt(pos, end, "WPA", ie, 2 + ie[1]);
1323 pos = wpa_supplicant_ie_txt(pos, end, "WPA2", ie2, 2 + ie2[1]);
1324 pos = wpa_supplicant_wps_ie_txt(wpa_s, pos, end, bss);
1326 ret = os_snprintf(pos, end - pos, "[WEP]");
1327 if (ret < 0 || ret >= end - pos)
1329 pos += ret;
1332 ret = os_snprintf(pos, end - pos, "[IBSS]");
1333 if (ret < 0 || ret >= end - pos)
1335 pos += ret;
1338 ret = os_snprintf(pos, end - pos, "[ESS]");
1339 if (ret < 0 || ret >= end - pos)
1341 pos += ret;
1344 ret = os_snprintf(pos, end - pos, "[P2P]");
1345 if (ret < 0 || ret >= end - pos)
1347 pos += ret;
1350 ret = os_snprintf(pos, end - pos, "\t%s",
1352 if (ret < 0 || ret >= end - pos)
1354 pos += ret;
1356 ret = os_snprintf(pos, end - pos, "\n");
1357 if (ret < 0 || ret >= end - pos)
1359 pos += ret;
1361 return pos - buf;
1368 char *pos, *end;
1372 pos = buf;
1374 ret = os_snprintf(pos, end - pos, "bssid / frequency / signal level / "
1376 if (ret < 0 || ret >= end - pos)
1377 return pos - buf;
1378 pos += ret;
1381 ret = wpa_supplicant_ctrl_iface_scan_result(wpa_s, bss, pos,
1382 end - pos);
1383 if (ret < 0 || ret >= end - pos)
1384 return pos - buf;
1385 pos += ret;
1388 return pos - buf;
1698 char *pos, *end;
1701 pos = buf;
1702 end = pos + buflen;
1714 ret = os_snprintf(pos, end - pos, "%sCCMP", first ? "" : " ");
1715 if (ret < 0 || ret >= end - pos)
1716 return pos - buf;
1717 pos += ret;
1722 ret = os_snprintf(pos, end - pos, "%sTKIP", first ? "" : " ");
1723 if (ret < 0 || ret >= end - pos)
1724 return pos - buf;
1725 pos += ret;
1730 ret = os_snprintf(pos, end - pos, "%sNONE", first ? "" : " ");
1731 if (ret < 0 || ret >= end - pos)
1732 return pos - buf;
1733 pos += ret;
1737 return pos - buf;
1746 char *pos, *end;
1749 pos = buf;
1750 end = pos + buflen;
1762 ret = os_snprintf(pos, end - pos, "%sCCMP", first ? "" : " ");
1763 if (ret < 0 || ret >= end - pos)
1764 return pos - buf;
1765 pos += ret;
1770 ret = os_snprintf(pos, end - pos, "%sTKIP", first ? "" : " ");
1771 if (ret < 0 || ret >= end - pos)
1772 return pos - buf;
1773 pos += ret;
1778 ret = os_snprintf(pos, end - pos, "%sWEP104",
1780 if (ret < 0 || ret >= end - pos)
1781 return pos - buf;
1782 pos += ret;
1787 ret = os_snprintf(pos, end - pos, "%sWEP40", first ? "" : " ");
1788 if (ret < 0 || ret >= end - pos)
1789 return pos - buf;
1790 pos += ret;
1794 return pos - buf;
1803 char *pos, *end;
1806 pos = buf;
1807 end = pos + buflen;
1819 ret = os_snprintf(pos, end - pos, "NONE IEEE8021X");
1820 if (ret < 0 || ret >= end - pos)
1821 return pos - buf;
1822 pos += ret;
1826 ret = os_snprintf(pos, end - pos, " WPA-EAP");
1827 if (ret < 0 || ret >= end - pos)
1828 return pos - buf;
1829 pos += ret;
1834 ret = os_snprintf(pos, end - pos, " WPA-PSK");
1835 if (ret < 0 || ret >= end - pos)
1836 return pos - buf;
1837 pos += ret;
1841 ret = os_snprintf(pos, end - pos, " WPA-NONE");
1842 if (ret < 0 || ret >= end - pos)
1843 return pos - buf;
1844 pos += ret;
1847 return pos - buf;
1856 char *pos, *end;
1859 pos = buf;
1860 end = pos + buflen;
1873 ret = os_snprintf(pos, end - pos, "%sRSN", first ? "" : " ");
1874 if (ret < 0 || ret >= end - pos)
1875 return pos - buf;
1876 pos += ret;
1882 ret = os_snprintf(pos, end - pos, "%sWPA", first ? "" : " ");
1883 if (ret < 0 || ret >= end - pos)
1884 return pos - buf;
1885 pos += ret;
1889 return pos - buf;
1898 char *pos, *end;
1901 pos = buf;
1902 end = pos + buflen;
1914 ret = os_snprintf(pos, end - pos, "%sOPEN", first ? "" : " ");
1915 if (ret < 0 || ret >= end - pos)
1916 return pos - buf;
1917 pos += ret;
1922 ret = os_snprintf(pos, end - pos, "%sSHARED",
1924 if (ret < 0 || ret >= end - pos)
1925 return pos - buf;
1926 pos += ret;
1931 ret = os_snprintf(pos, end - pos, "%sLEAP", first ? "" : " ");
1932 if (ret < 0 || ret >= end - pos)
1933 return pos - buf;
1934 pos += ret;
1938 return pos - buf;
2007 char *pos, *end;
2044 pos = buf;
2046 ret = os_snprintf(pos, end - pos,
2061 if (ret < 0 || ret >= end - pos)
2062 return pos - buf;
2063 pos += ret;
2067 ret = os_snprintf(pos, end - pos, "%02x", *ie++);
2068 if (ret < 0 || ret >= end - pos)
2069 return pos - buf;
2070 pos += ret;
2073 ret = os_snprintf(pos, end - pos, "[P2P]");
2074 if (ret < 0 || ret >= end - pos)
2075 return pos - buf;
2076 pos += ret;
2079 ret = os_snprintf(pos, end - pos, "\n");
2080 if (ret < 0 || ret >= end - pos)
2081 return pos - buf;
2082 pos += ret;
2084 ret = os_snprintf(pos, end - pos, "flags=");
2085 if (ret < 0 || ret >= end - pos)
2086 return pos - buf;
2087 pos += ret;
2091 pos = wpa_supplicant_ie_txt(pos, end, "WPA", ie, 2 + ie[1]);
2094 pos = wpa_supplicant_ie_txt(pos, end, "WPA2", ie2, 2 + ie2[1]);
2095 pos = wpa_supplicant_wps_ie_txt(wpa_s, pos, end, bss);
2097 ret = os_snprintf(pos, end - pos, "[WEP]");
2098 if (ret < 0 || ret >= end - pos)
2099 return pos - buf;
2100 pos += ret;
2103 ret = os_snprintf(pos, end - pos, "[IBSS]");
2104 if (ret < 0 || ret >= end - pos)
2105 return pos - buf;
2106 pos += ret;
2109 ret = os_snprintf(pos, end - pos, "[ESS]");
2110 if (ret < 0 || ret >= end - pos)
2111 return pos - buf;
2112 pos += ret;
2115 ret = os_snprintf(pos, end - pos, "\n");
2116 if (ret < 0 || ret >= end - pos)
2117 return pos - buf;
2118 pos += ret;
2120 ret = os_snprintf(pos, end - pos, "ssid=%s\n",
2122 if (ret < 0 || ret >= end - pos)
2123 return pos - buf;
2124 pos += ret;
2128 ret = wpas_wps_scan_result_text(ie, bss->ie_len, pos, end);
2129 if (ret < 0 || ret >= end - pos)
2130 return pos - buf;
2131 pos += ret;
2136 ret = wpas_p2p_scan_result_text(ie, bss->ie_len, pos, end);
2137 if (ret < 0 || ret >= end - pos)
2138 return pos - buf;
2139 pos += ret;
2142 return pos - buf;
2263 char *pos, *pos2;
2280 pos = cmd + 17;
2281 if (*pos != ' ')
2283 pos++;
2285 persistent_group = os_strstr(pos, " persistent") != NULL;
2286 join = os_strstr(pos, " join") != NULL;
2287 auth = os_strstr(pos, " auth") != NULL;
2289 pos2 = os_strstr(pos, " go_intent=");
2297 pos2 = os_strstr(pos, " freq=");
2305 if (os_strncmp(pos, "pin", 3) == 0) {
2308 } else if (os_strncmp(pos, "pbc", 3) == 0) {
2311 pin = pos;
2312 pos = os_strchr(pin, ' ');
2314 if (pos) {
2315 *pos++ = '\0';
2316 if (os_strncmp(pos, "label", 5) == 0)
2318 else if (os_strncmp(pos, "display", 7) == 0)
2358 char *pos;
2365 pos = cmd + 17;
2366 if (*pos != ' ')
2368 pos++;
2370 return wpas_p2p_prov_disc(wpa_s, addr, pos);
2405 char *pos;
2414 pos = cmd + 17;
2415 if (*pos != ' ')
2417 pos++;
2419 if (os_strncmp(pos, "upnp ", 5) == 0) {
2421 pos += 5;
2422 if (hexstr2bin(pos, &version, 1) < 0)
2424 pos += 2;
2425 if (*pos != ' ')
2427 pos++;
2429 version, pos);
2431 len = os_strlen(pos);
2438 if (hexstr2bin(pos, wpabuf_put(tlvs, len), len) < 0) {
2471 char *pos, *pos2;
2474 pos = os_strchr(cmd, ' ');
2475 if (pos == NULL)
2477 *pos++ = '\0';
2482 if (hwaddr_aton(pos, dst))
2484 pos += 17;
2485 if (*pos != ' ')
2487 pos++;
2489 pos2 = os_strchr(pos, ' ');
2493 dialog_token = atoi(pos);
2524 char *pos;
2528 pos = os_strchr(cmd, ' ');
2529 if (pos == NULL)
2531 *pos++ = '\0';
2545 len = os_strlen(pos);
2556 if (hexstr2bin(pos, wpabuf_put(resp, len), len) < 0) {
2573 char *pos;
2576 pos = os_strchr(cmd, ' ');
2577 if (pos == NULL)
2579 *pos++ = '\0';
2584 return wpas_p2p_service_add_upnp(wpa_s, version, pos);
2590 char *pos;
2592 pos = os_strchr(cmd, ' ');
2593 if (pos == NULL)
2595 *pos++ = '\0';
2598 return p2p_ctrl_service_add_bonjour(wpa_s, pos);
2600 return p2p_ctrl_service_add_upnp(wpa_s, pos);
2633 char *pos;
2636 pos = os_strchr(cmd, ' ');
2637 if (pos == NULL)
2639 *pos++ = '\0';
2644 return wpas_p2p_service_del_upnp(wpa_s, version, pos);
2650 char *pos;
2652 pos = os_strchr(cmd, ' ');
2653 if (pos == NULL)
2655 *pos++ = '\0';
2658 return p2p_ctrl_service_del_bonjour(wpa_s, pos);
2660 return p2p_ctrl_service_del_upnp(wpa_s, pos);
2681 char *pos;
2687 pos = os_strstr(cmd, " peer=");
2688 if (pos) {
2689 pos += 6;
2690 if (hwaddr_aton(pos, peer))
2701 return wpas_p2p_invite(wpa_s, pos ? peer : NULL, ssid, NULL);
2707 char *pos;
2710 pos = os_strstr(cmd, " peer=");
2711 if (!pos)
2714 *pos = '\0';
2715 pos += 6;
2716 if (hwaddr_aton(pos, peer)) {
2717 wpa_printf(MSG_DEBUG, "P2P: Invalid MAC address '%s'", pos);
2721 pos = os_strstr(pos, " go_dev_addr=");
2722 if (pos) {
2723 pos += 13;
2724 if (hwaddr_aton(pos, go_dev_addr)) {
2726 pos);
2769 char *pos;
2771 pos = os_strstr(cmd, "freq=");
2772 if (pos)
2773 freq = atoi(pos + 5);
2870 char *pos;
2874 pos = os_strchr(param, ',');
2875 if (pos == NULL)
2877 pos++;
2878 start = atoi(pos);
2879 pos = os_strchr(pos, ',');
2880 if (pos == NULL)
2882 pos++;
2883 duration = atoi(pos);
2975 char *pos;
2978 pos = os_strchr(param, ',');
2979 if (pos == NULL)
2981 pos++;
2982 bk = atoi(pos);
2983 pos = os_strchr(pos, ',');
2984 if (pos == NULL)
2986 pos++;
2987 vi = atoi(pos);
2988 pos = os_strchr(pos, ',');
2989 if (pos == NULL)
2991 pos++;
2992 vo = atoi(pos);
3018 char *pos, *pos2;
3022 pos = os_strchr(cmd, ' ');
3023 if (pos == NULL)
3025 *pos++ = '\0';
3028 pos2 = os_strchr(pos, ' ');
3031 int1 = atoi(pos);
3036 pos = os_strchr(pos2, ' ');
3037 if (pos == NULL)
3039 *pos++ = '\0';
3041 int2 = atoi(pos);
3050 char *pos;
3054 pos = os_strchr(cmd, ' ');
3055 if (pos == NULL)
3057 *pos++ = '\0';
3059 interval = atoi(pos);
3546 char *pos;
3557 iface.ifname = pos = cmd;
3558 pos = os_strchr(pos, '\t');
3559 if (pos)
3560 *pos++ = '\0';
3563 if (pos == NULL)
3566 iface.confname = pos;
3567 pos = os_strchr(pos, '\t');
3568 if (pos)
3569 *pos++ = '\0';
3572 if (pos == NULL)
3575 iface.driver = pos;
3576 pos = os_strchr(pos, '\t');
3577 if (pos)
3578 *pos++ = '\0';
3581 if (pos == NULL)
3584 iface.ctrl_interface = pos;
3585 pos = os_strchr(pos, '\t');
3586 if (pos)
3587 *pos++ = '\0';
3590 if (pos == NULL)
3593 iface.driver_param = pos;
3594 pos = os_strchr(pos, '\t');
3595 if (pos)
3596 *pos++ = '\0';
3599 if (pos == NULL)
3602 iface.bridge_ifname = pos;
3603 pos = os_strchr(pos, '\t');
3604 if (pos)
3605 *pos++ = '\0';
3608 if (pos == NULL)
3653 char *pos, *end;
3671 pos = buf;
3674 res = os_snprintf(pos, end - pos, "%s\t%s\t%s\n",
3677 if (res < 0 || res >= end - pos) {
3678 *pos = '\0';
3681 pos += res;
3686 return pos - buf;
3694 char *pos, *end;
3698 pos = buf;
3702 res = os_snprintf(pos, end - pos, "%s\n", wpa_s->ifname);
3703 if (res < 0 || res >= end - pos) {
3704 *pos = '\0';
3707 pos += res;
3710 return pos - buf;