/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface.c | 456 res = os_snprintf(buf, buflen, "%s", VERSION_STR); 459 res = os_snprintf(buf, buflen, "%c%c", 464 res = os_snprintf(buf, buflen, "%d", 732 ret = os_snprintf(buf, buflen, "%s", pin); 744 ret = os_snprintf(buf, buflen, "%08d", ret); 781 ret = os_snprintf(buf, buflen, "FAIL-CHECKSUM\n"); 788 ret = os_snprintf(buf, buflen, "%s", pin); 1196 return os_snprintf(buf, buflen, "OK\n"); 1205 return os_snprintf(buf, buflen, "%s", pin_txt); 1212 return os_snprintf(buf, buflen, "%s", pin_txt) [all...] |
wpa_cli.c | 165 os_snprintf(buf, sizeof(buf), MACSTR, MAC2STR(addr)); 213 os_snprintf(buf, sizeof(buf), MACSTR, MAC2STR(addr)); 334 res = os_snprintf(cfile, flen, "%s/%s", ctrl_iface_dir, 410 os_snprintf(buf, sizeof(buf), "IFNAME=%s %s", 450 res = os_snprintf(pos, end - pos, "%s", cmd); 456 res = os_snprintf(pos, end - pos, " %s", argv[i]); 577 res = os_snprintf(cmd, sizeof(cmd), "SET %s ", argv[0]); 714 res = os_snprintf(cmd, sizeof(cmd), "BSS_FLUSH 0"); 716 res = os_snprintf(cmd, sizeof(cmd), "BSS_FLUSH %s", argv[0]); 811 os_snprintf(buf, buflen, "WPS_NFC_TAG_READ %s", argv[0]) [all...] |
/external/wpa_supplicant_8/hostapd/ |
ctrl_iface.c | 239 ret = os_snprintf(buf, buflen, "FAIL-CHECKSUM\n"); 246 ret = os_snprintf(buf, buflen, "%s", pin); 425 return os_snprintf(buf, buflen, "OK\n"); 434 return os_snprintf(buf, buflen, "%s", pin_txt); 441 return os_snprintf(buf, buflen, "%s", pin_txt); 458 return os_snprintf(buf, buflen, "%s", pin); 518 ret = os_snprintf(pos, end - pos, "PBC Status: %s\n", 525 ret = os_snprintf(pos, end - pos, "Last WPS result: %s\n", 538 ret = os_snprintf(pos, end - pos, 548 ret = os_snprintf(pos, end - pos, "Peer Address: " MACSTR "\n" [all...] |
hostapd_cli.c | 237 res = os_snprintf(cmd, len, "%s %s %s", program, arg1, arg2); 307 os_snprintf(buf, sizeof(buf), "DEAUTHENTICATE %s %s", 310 os_snprintf(buf, sizeof(buf), "DEAUTHENTICATE %s", argv[0]); 325 os_snprintf(buf, sizeof(buf), "DISASSOCIATE %s %s", 328 os_snprintf(buf, sizeof(buf), "DISASSOCIATE %s", argv[0]); 384 res = os_snprintf(cmd, sizeof(cmd), "WPS_CHECK_PIN %s %s", 387 res = os_snprintf(cmd, sizeof(cmd), "WPS_CHECK_PIN %s", 429 os_snprintf(buf, buflen, "WPS_NFC_TAG_READ %s", argv[0]); 450 res = os_snprintf(cmd, sizeof(cmd), "WPS_NFC_CONFIG_TOKEN %s", 472 res = os_snprintf(cmd, sizeof(cmd), "WPS_NFC_TOKEN %s", argv[0]) [all...] |
main.c | 100 os_snprintf(format, maxlen, "%s: STA " MACSTR "%s%s: %s", 104 os_snprintf(format, maxlen, "%s:%s%s %s", 108 os_snprintf(format, maxlen, "STA " MACSTR "%s%s: %s", 112 os_snprintf(format, maxlen, "%s%s%s",
|
/external/wpa_supplicant_8/src/ap/ |
ctrl_iface_ap.c | 36 ret = os_snprintf(buf + len, buflen - len, "connected_time=%u\n", 53 ret = os_snprintf(buf, buflen, "FAIL\n"); 60 ret = os_snprintf(buf + len, buflen - len, MACSTR "\n", 105 ret = os_snprintf(buf, buflen, "FAIL\n"); 124 ret = os_snprintf(buf, buflen, "FAIL\n");
|
vlan_init.c | 409 os_snprintf(if_request.device1, sizeof(if_request.device1), "vlan%d", 615 os_snprintf(br_name, sizeof(br_name), "%s%d", 619 os_snprintf(br_name, sizeof(br_name), 623 os_snprintf(br_name, sizeof(br_name), 637 os_snprintf(vlan_ifname, 642 os_snprintf(vlan_ifname, 691 os_snprintf(br_name, sizeof(br_name), "%s%d", 695 os_snprintf(br_name, sizeof(br_name), 699 os_snprintf(br_name, sizeof(br_name), 710 os_snprintf(vlan_ifname [all...] |
eap_user_db.c | 175 os_snprintf(cmd, sizeof(cmd), 186 os_snprintf(cmd, sizeof(cmd),
|
/external/wpa_supplicant_8/src/wps/ |
wps.c | 554 ret = os_snprintf(pos, end - pos, 557 ret = os_snprintf(pos, end - pos, 567 ret = os_snprintf(pos, end - pos, 575 ret = os_snprintf(pos, end - pos, 583 ret = os_snprintf(pos, end - pos, 592 ret = os_snprintf(pos, end - pos, 603 ret = os_snprintf(pos, end - pos, 625 ret = os_snprintf(pos, end - pos, "wps_device_name=%s\n", str); 633 ret = os_snprintf(pos, end - pos,
|
http_client.c | 349 os_snprintf(n, len, "%s%s", base, url); 357 os_snprintf(n, len, "%s/%s", base, url);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.c | 85 os_snprintf(cmd, sizeof(cmd), "SELECT 1 FROM %s;", name); 188 os_snprintf(cmd, sizeof(cmd), "INSERT OR REPLACE INTO pseudonyms " 227 os_snprintf(cmd, sizeof(cmd), 253 pos += os_snprintf(pos, end - pos, "INSERT OR REPLACE INTO reauth " 264 pos += os_snprintf(pos, end - pos, ", '"); 266 pos += os_snprintf(pos, end - pos, "'"); 270 pos += os_snprintf(pos, end - pos, ", '"); 273 pos += os_snprintf(pos, end - pos, "'"); 277 pos += os_snprintf(pos, end - pos, ", '"); 280 pos += os_snprintf(pos, end - pos, "'") [all...] |
/external/wpa_supplicant_8/src/utils/ |
uuid.c | 52 len = os_snprintf(str, max_len, "%02x%02x%02x%02x-%02x%02x-%02x%02x-"
|
edit_readline.c | 134 os_snprintf(ps2, blen, "%s> ", ps);
|
os_none.c | 221 int os_snprintf(char *str, size_t size, const char *format, ...) function
|
os.h | 381 * os_snprintf - Print to a memory buffer 393 * os_snprintf() should provide this guarantee, i.e., to null terminate the 401 int os_snprintf(char *str, size_t size, const char *format, ...); 478 #ifndef os_snprintf 480 #define os_snprintf _snprintf macro 482 #define os_snprintf snprintf macro
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new.c | 396 os_snprintf(net_obj_path, WPAS_DBUS_OBJECT_PATH_MAX, 508 os_snprintf(net_obj_path, WPAS_DBUS_OBJECT_PATH_MAX, 545 os_snprintf(path, WPAS_DBUS_OBJECT_PATH_MAX, 888 os_snprintf(sta_mac, WPAS_DBUS_OBJECT_PATH_MAX, MACSTR, MAC2STR(sta)); 1052 os_snprintf(pin, sizeof(pin), "%08d", generated_pin); 1065 os_snprintf(peer_obj_path, WPAS_DBUS_OBJECT_PATH_MAX, 1114 os_snprintf(peer_obj_path, WPAS_DBUS_OBJECT_PATH_MAX, 1151 os_snprintf(group_obj_path, WPAS_DBUS_OBJECT_PATH_MAX, [all...] |
dbus_old_handlers_wps.c | 112 os_snprintf(npin, sizeof(npin), "%08d", ret);
|
/external/wpa_supplicant_8/src/common/ |
wpa_ctrl.c | 102 ret = os_snprintf(ctrl->local.sun_path, sizeof(ctrl->local.sun_path), 154 os_snprintf(buf, sizeof(buf), "wpa_%s", ctrl_path); 239 dirnamelen = (size_t) os_snprintf(pathname, sizeof(pathname), "%s/", 370 os_snprintf(ps, WPA_CTRL_MAX_PS_NAME, "%s/%s", 578 ret = os_snprintf(name, 256, NAMED_PIPE_PREFIX); 580 ret = os_snprintf(name, 256, NAMED_PIPE_PREFIX "-%s",
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_parse.c | 558 ret = os_snprintf(pos, end - pos, "p2p_group_client: " 566 ret = os_snprintf(pos, end - pos, 578 ret = os_snprintf(pos, end - pos, " dev_type=%s", 596 ret = os_snprintf(pos, end - pos, " dev_name='%s'\n", name); 627 ret = os_snprintf(pos, end - pos, 638 ret = os_snprintf(pos, end - pos, 648 ret = os_snprintf(pos, end - pos, "p2p_device_name=%s\n", 655 ret = os_snprintf(pos, end - pos, "p2p_device_addr=" MACSTR 663 ret = os_snprintf(pos, end - pos, "p2p_config_methods=0x%x\n",
|
/hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/ |
driver_cmd_wext.c | 249 os_snprintf(&buf[bp], WEXT_PNO_SCAN_INTERVAL_LENGTH + 1, "%x", WEXT_PNO_SCAN_INTERVAL); 253 os_snprintf(&buf[bp], WEXT_PNO_REPEAT_LENGTH + 1, "%x", WEXT_PNO_REPEAT); 257 os_snprintf(&buf[bp], WEXT_PNO_MAX_REPEAT_LENGTH + 1, "%x", WEXT_PNO_MAX_REPEAT); 301 os_snprintf(cmd, MAX_DRV_CMD_SIZE, "COUNTRY %s",
|
driver_cmd_nl80211.c | 59 ret = os_snprintf(buf, buf_len,
|
/hardware/ti/wlan/mac80211/wpa_supplicant_lib/ |
driver_mac80211_nl.c | 93 ret = os_snprintf(buf, buf_len,
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_fast_pac.c | 504 ret = os_snprintf(*pos, end - *pos, "%s=", field); 509 ret = os_snprintf(*pos, end - *pos, "\n"); 515 ret = os_snprintf(*pos, end - *pos, "%s-txt=", field); 520 ret = os_snprintf(*pos, end - *pos, "%c", data[i]); 525 ret = os_snprintf(*pos, end - *pos, "\n"); 577 ret = os_snprintf(*pos, *buf + *buf_len - *pos, 600 ret = os_snprintf(*pos, *buf + *buf_len - *pos, "END\n"); 632 ret = os_snprintf(pos, buf + buf_len - pos, "%s\n", pac_file_hdr);
|
/external/wpa_supplicant_8/src/l2_packet/ |
l2_packet_privsep.c | 156 os_snprintf(l2->own_socket_path, len, "%s/wpa_privsep-l2-%d-%d", 160 os_snprintf(l2->priv_addr.sun_path, sizeof(l2->priv_addr.sun_path),
|
l2_packet_pcap.c | 205 os_snprintf(ifname, sizeof(ifname), "\\Device\\NPF_%s", l2->ifname); 231 os_snprintf(pcap_filter, sizeof(pcap_filter),
|