Home | History | Annotate | Download | only in hostapd

Lines Matching defs:reply

283 						   char *cmd, char *reply,
301 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf),
303 reply[res++] = '\n';
304 reply[res] = '\0';
313 char *reply, size_t max_len,
323 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf),
325 reply[res++] = '\n';
326 reply[res] = '\0';
335 char *cmd, char *reply,
339 return hostapd_ctrl_iface_wps_nfc_token_gen(hapd, reply,
343 return hostapd_ctrl_iface_wps_nfc_token_gen(hapd, reply,
359 char *cmd, char *reply,
386 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf),
388 reply[res++] = '\n';
389 reply[res] = '\0';
960 char *reply;
976 reply = os_malloc(reply_size);
977 if (reply == NULL) {
983 os_memcpy(reply, "OK\n", 3);
987 os_memcpy(reply, "PONG\n", 5);
993 reply_len = ieee802_11_get_mib(hapd, reply, reply_size);
995 res = wpa_get_mib(hapd->wpa_auth, reply + reply_len,
1003 res = ieee802_1x_get_mib(hapd, reply + reply_len,
1013 reply + reply_len,
1022 reply_len = hostapd_ctrl_iface_sta_first(hapd, reply,
1025 reply_len = hostapd_ctrl_iface_sta(hapd, buf + 4, reply,
1028 reply_len = hostapd_ctrl_iface_sta_next(hapd, buf + 9, reply,
1062 hapd, buf + 14, reply, reply_size);
1071 reply, reply_size);
1076 reply_len = hostapd_ctrl_iface_wps_get_status(hapd, reply,
1084 hapd, buf + 21, reply, reply_size);
1087 hapd, buf + 14, reply, reply_size);
1090 hapd, buf + 21, reply, reply_size);
1105 reply_len = hostapd_ctrl_iface_get_config(hapd, reply,
1111 reply_len = hostapd_ctrl_iface_get(hapd, buf + 4, reply,
1123 os_memcpy(reply, "UNKNOWN COMMAND\n", 16);
1128 os_memcpy(reply, "FAIL\n", 5);
1131 sendto(sock, reply, reply_len, 0, (struct sockaddr *) &from, fromlen);
1132 os_free(reply);
1378 char reply[24];
1389 os_memcpy(reply, "OK\n", 3);
1393 os_memcpy(reply, "PONG\n", 5);
1408 os_memcpy(reply, "FAIL\n", 5);
1412 sendto(sock, reply, reply_len, 0, (struct sockaddr *) &from, fromlen);