HomeSort by relevance Sort by last modified time
    Searched refs:os_snprintf (Results 1 - 25 of 107) sorted by null

1 2 3 4 5

  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_dump.c 130 ret = os_snprintf(pos, end - pos, "aWhile=%d\nquietWhile=%d\n"
138 ret = os_snprintf(pos, end - pos,
180 ret = os_snprintf(pos, end - pos,
222 ret = os_snprintf(pos, end - pos,
247 ret = os_snprintf(pos, end - pos,
258 ret = os_snprintf(pos, end - pos,
265 ret = os_snprintf(pos, end - pos,
274 ret = os_snprintf(pos, end - pos,
  /external/wpa_supplicant_8/hostapd/
hostapd_cli.c 231 os_snprintf(buf, sizeof(buf), "MIB %s", argv[0]);
249 os_snprintf(arg, len, "%s %s", arg1, arg2);
314 os_snprintf(buf, sizeof(buf), "DEAUTHENTICATE %s %s",
317 os_snprintf(buf, sizeof(buf), "DEAUTHENTICATE %s", argv[0]);
332 os_snprintf(buf, sizeof(buf), "DISASSOCIATE %s %s",
335 os_snprintf(buf, sizeof(buf), "DISASSOCIATE %s", argv[0]);
391 res = os_snprintf(cmd, sizeof(cmd), "WPS_CHECK_PIN %s %s",
394 res = os_snprintf(cmd, sizeof(cmd), "WPS_CHECK_PIN %s",
436 os_snprintf(buf, buflen, "WPS_NFC_TAG_READ %s", argv[0]);
457 res = os_snprintf(cmd, sizeof(cmd), "WPS_NFC_CONFIG_TOKEN %s"
    [all...]
ctrl_iface.c 242 ret = os_snprintf(buf, buflen, "FAIL-CHECKSUM\n");
249 ret = os_snprintf(buf, buflen, "%s", pin);
485 return os_snprintf(buf, buflen, "OK\n");
494 return os_snprintf(buf, buflen, "%s", pin_txt);
501 return os_snprintf(buf, buflen, "%s", pin_txt);
518 return os_snprintf(buf, buflen, "%s", pin);
578 ret = os_snprintf(pos, end - pos, "PBC Status: %s\n",
585 ret = os_snprintf(pos, end - pos, "Last WPS result: %s\n",
598 ret = os_snprintf(pos, end - pos,
608 ret = os_snprintf(pos, end - pos, "Peer Address: " MACSTR "\n"
    [all...]
  /external/wpa_supplicant_8/src/utils/
uuid.c 52 len = os_snprintf(str, max_len, "%02x%02x%02x%02x-%02x%02x-%02x%02x-"
browser-system.c 77 ret = os_snprintf(cmd, sizeof(cmd), "x-www-browser '%s' &", url);
browser-android.c 77 ret = os_snprintf(cmd, sizeof(cmd),
browser-wpadebug.c 78 ret = os_snprintf(cmd, sizeof(cmd),
os.h 447 * os_snprintf - Print to a memory buffer
459 * os_snprintf() should provide this guarantee, i.e., to null terminate the
467 int os_snprintf(char *str, size_t size, const char *format, ...);
541 #ifndef os_snprintf
543 #define os_snprintf _snprintf macro
545 #define os_snprintf snprintf macro
os_none.c 232 int os_snprintf(char *str, size_t size, const char *format, ...) function
edit_readline.c 134 os_snprintf(ps2, blen, "%s> ", ps);
  /external/wpa_supplicant_8/wpa_supplicant/
ctrl_iface.c 446 res = os_snprintf(buf, buflen, "%s", VERSION_STR);
449 res = os_snprintf(buf, buflen, "%c%c",
460 res = os_snprintf(buf, buflen, "%d", enabled);
623 ret = os_snprintf(buf, buflen, "%s\n",
748 ret = os_snprintf(buf, buflen, "%s", pin);
760 ret = os_snprintf(buf, buflen, "%08d", ret);
797 ret = os_snprintf(buf, buflen, "FAIL-CHECKSUM\n");
804 ret = os_snprintf(buf, buflen, "%s", pin);
1292 return os_snprintf(buf, buflen, "OK\n");
1301 return os_snprintf(buf, buflen, "%s", pin_txt)
    [all...]
wpa_cli.c 165 os_snprintf(buf, sizeof(buf), MACSTR, MAC2STR(addr));
213 os_snprintf(buf, sizeof(buf), MACSTR, MAC2STR(addr));
334 res = os_snprintf(cfile, flen, "%s/%s", ctrl_iface_dir,
410 os_snprintf(buf, sizeof(buf), "IFNAME=%s %s",
450 res = os_snprintf(pos, end - pos, "%s", cmd);
456 res = os_snprintf(pos, end - pos, " %s", argv[i]);
579 res = os_snprintf(cmd, sizeof(cmd), "SET %s ", argv[0]);
725 res = os_snprintf(cmd, sizeof(cmd), "BSS_FLUSH 0");
727 res = os_snprintf(cmd, sizeof(cmd), "BSS_FLUSH %s", argv[0]);
822 os_snprintf(buf, buflen, "WPS_NFC_TAG_READ %s", argv[0])
    [all...]
config.c 227 res = os_snprintf(value, 20, "%d", *src);
272 res = os_snprintf(value, 20, MACSTR, MAC2STR(ssid->bssid));
363 os_snprintf(buf, len, "ext:%s", ssid->ext_psk);
447 ret = os_snprintf(pos, end - pos, "%sWPA",
455 ret = os_snprintf(pos, end - pos, "%sRSN",
463 ret = os_snprintf(pos, end - pos, "%sOSEN",
575 ret = os_snprintf(pos, end - pos, "%sWPA-PSK",
585 ret = os_snprintf(pos, end - pos, "%sWPA-EAP",
595 ret = os_snprintf(pos, end - pos, "%sIEEE8021X",
605 ret = os_snprintf(pos, end - pos, "%sNONE"
    [all...]
  /external/wpa_supplicant_8/src/ap/
ctrl_iface_ap.c 35 ret = os_snprintf(buf, buflen, "rx_packets=%lu\ntx_packets=%lu\n"
56 ret = os_snprintf(buf, buflen, "connected_time=%u\n",
93 ret = os_snprintf(buf + len, buflen - len, MACSTR "\nflags=",
104 ret = os_snprintf(buf + len, buflen - len, "\naid=%d\ncapability=0x%x\n"
112 ret = os_snprintf(buf + len, buflen - len, "%02x%s",
120 ret = os_snprintf(buf + len, buflen - len, "\ntimeout_next=%s\n",
166 ret = os_snprintf(buf, buflen, "FAIL\n");
205 ret = os_snprintf(buf, buflen, "FAIL\n");
398 ret = os_snprintf(buf + len, buflen - len,
430 ret = os_snprintf(buf + len, buflen - len
    [all...]
vlan_init.c 403 os_snprintf(if_request.device1, sizeof(if_request.device1), "vlan%d",
491 os_snprintf(br_name, sizeof(br_name), "%s%d",
495 os_snprintf(br_name, sizeof(br_name),
499 os_snprintf(br_name, sizeof(br_name),
511 os_snprintf(vlan_ifname,
516 os_snprintf(vlan_ifname,
558 os_snprintf(br_name, sizeof(br_name), "%s%d",
562 os_snprintf(br_name, sizeof(br_name),
566 os_snprintf(br_name, sizeof(br_name),
576 os_snprintf(vlan_ifname
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_sim_db.c 84 os_snprintf(cmd, sizeof(cmd), "SELECT 1 FROM %s;", name);
187 os_snprintf(cmd, sizeof(cmd), "INSERT OR REPLACE INTO pseudonyms "
226 os_snprintf(cmd, sizeof(cmd),
252 pos += os_snprintf(pos, end - pos, "INSERT OR REPLACE INTO reauth "
263 pos += os_snprintf(pos, end - pos, ", '");
265 pos += os_snprintf(pos, end - pos, "'");
269 pos += os_snprintf(pos, end - pos, ", '");
272 pos += os_snprintf(pos, end - pos, "'");
276 pos += os_snprintf(pos, end - pos, ", '");
279 pos += os_snprintf(pos, end - pos, "'")
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_parse.c 602 ret = os_snprintf(pos, end - pos, "p2p_group_client: "
610 ret = os_snprintf(pos, end - pos,
622 ret = os_snprintf(pos, end - pos, " dev_type=%s",
640 ret = os_snprintf(pos, end - pos, " dev_name='%s'\n", name);
671 ret = os_snprintf(pos, end - pos,
682 ret = os_snprintf(pos, end - pos,
692 ret = os_snprintf(pos, end - pos, "p2p_device_name=%s\n",
699 ret = os_snprintf(pos, end - pos, "p2p_device_addr=" MACSTR
707 ret = os_snprintf(pos, end - pos, "p2p_config_methods=0x%x\n",
  /external/wpa_supplicant_8/src/wps/
wps.c 556 ret = os_snprintf(pos, end - pos,
559 ret = os_snprintf(pos, end - pos,
569 ret = os_snprintf(pos, end - pos,
577 ret = os_snprintf(pos, end - pos,
585 ret = os_snprintf(pos, end - pos,
594 ret = os_snprintf(pos, end - pos,
605 ret = os_snprintf(pos, end - pos,
627 ret = os_snprintf(pos, end - pos, "wps_device_name=%s\n", str);
635 ret = os_snprintf(pos, end - pos,
  /external/wpa_supplicant_8/hs20/client/
est.c 108 os_snprintf(buf, buflen, "%s/cacerts", url);
405 os_snprintf(name, sizeof(name), "cert-user-%u", val);
555 os_snprintf(buf, buflen, "%s/csrattrs", url);
601 os_snprintf(old_cert_buf, sizeof(old_cert_buf),
649 os_snprintf(buf, buflen, "%s/simplereenroll", url);
650 os_snprintf(client_cert_buf, sizeof(client_cert_buf),
653 os_snprintf(client_key_buf, sizeof(client_key_buf),
657 os_snprintf(buf, buflen, "%s/simpleenroll", url);
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_new.c 397 os_snprintf(net_obj_path, WPAS_DBUS_OBJECT_PATH_MAX,
509 os_snprintf(net_obj_path, WPAS_DBUS_OBJECT_PATH_MAX,
546 os_snprintf(path, WPAS_DBUS_OBJECT_PATH_MAX,
884 os_snprintf(sta_mac, WPAS_DBUS_OBJECT_PATH_MAX, MACSTR, MAC2STR(sta));
1060 os_snprintf(pin, sizeof(pin), "%08d", generated_pin);
1073 os_snprintf(peer_obj_path, WPAS_DBUS_OBJECT_PATH_MAX,
1122 os_snprintf(peer_obj_path, WPAS_DBUS_OBJECT_PATH_MAX,
1159 os_snprintf(group_obj_path, WPAS_DBUS_OBJECT_PATH_MAX,
    [all...]
dbus_old_handlers_wps.c 112 os_snprintf(npin, sizeof(npin), "%08d", ret);
  /external/wpa_supplicant_8/src/common/
wpa_ctrl.c 111 ret = os_snprintf(ctrl->local.sun_path, sizeof(ctrl->local.sun_path),
163 os_snprintf(buf, sizeof(buf), "wpa_%s", ctrl_path);
248 dirnamelen = (size_t) os_snprintf(pathname, sizeof(pathname), "%s/",
433 os_snprintf(ps, WPA_CTRL_MAX_PS_NAME, "%s/%s",
641 ret = os_snprintf(name, 256, NAMED_PIPE_PREFIX);
643 ret = os_snprintf(name, 256, NAMED_PIPE_PREFIX "-%s",
  /hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/
driver_cmd_wext.c 249 os_snprintf(&buf[bp], WEXT_PNO_SCAN_INTERVAL_LENGTH + 1, "%x", WEXT_PNO_SCAN_INTERVAL);
253 os_snprintf(&buf[bp], WEXT_PNO_REPEAT_LENGTH + 1, "%x", WEXT_PNO_REPEAT);
257 os_snprintf(&buf[bp], WEXT_PNO_MAX_REPEAT_LENGTH + 1, "%x", WEXT_PNO_MAX_REPEAT);
301 os_snprintf(cmd, MAX_DRV_CMD_SIZE, "COUNTRY %s",
  /external/wpa_supplicant_8/src/eap_peer/
eap_fast_pac.c 506 ret = os_snprintf(*pos, end - *pos, "%s=", field);
511 ret = os_snprintf(*pos, end - *pos, "\n");
517 ret = os_snprintf(*pos, end - *pos, "%s-txt=", field);
522 ret = os_snprintf(*pos, end - *pos, "%c", data[i]);
527 ret = os_snprintf(*pos, end - *pos, "\n");
579 ret = os_snprintf(*pos, *buf + *buf_len - *pos,
602 ret = os_snprintf(*pos, *buf + *buf_len - *pos, "END\n");
634 ret = os_snprintf(pos, buf + buf_len - pos, "%s\n", pac_file_hdr);
  /external/wpa_supplicant_8/src/l2_packet/
l2_packet_privsep.c 156 os_snprintf(l2->own_socket_path, len, "%s/wpa_privsep-l2-%d-%d",
160 os_snprintf(l2->priv_addr.sun_path, sizeof(l2->priv_addr.sun_path),

Completed in 974 milliseconds

1 2 3 4 5