/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_dump.c | 130 ret = os_snprintf(pos, end - pos, "aWhile=%d\nquietWhile=%d\n" 138 ret = os_snprintf(pos, end - pos, 180 ret = os_snprintf(pos, end - pos, 222 ret = os_snprintf(pos, end - pos, 247 ret = os_snprintf(pos, end - pos, 258 ret = os_snprintf(pos, end - pos, 265 ret = os_snprintf(pos, end - pos, 274 ret = os_snprintf(pos, end - pos,
|
/external/wpa_supplicant_8/hostapd/ |
hostapd_cli.c | 231 os_snprintf(buf, sizeof(buf), "MIB %s", argv[0]); 249 os_snprintf(arg, len, "%s %s", arg1, arg2); 314 os_snprintf(buf, sizeof(buf), "DEAUTHENTICATE %s %s", 317 os_snprintf(buf, sizeof(buf), "DEAUTHENTICATE %s", argv[0]); 332 os_snprintf(buf, sizeof(buf), "DISASSOCIATE %s %s", 335 os_snprintf(buf, sizeof(buf), "DISASSOCIATE %s", argv[0]); 391 res = os_snprintf(cmd, sizeof(cmd), "WPS_CHECK_PIN %s %s", 394 res = os_snprintf(cmd, sizeof(cmd), "WPS_CHECK_PIN %s", 436 os_snprintf(buf, buflen, "WPS_NFC_TAG_READ %s", argv[0]); 457 res = os_snprintf(cmd, sizeof(cmd), "WPS_NFC_CONFIG_TOKEN %s" [all...] |
ctrl_iface.c | 242 ret = os_snprintf(buf, buflen, "FAIL-CHECKSUM\n"); 249 ret = os_snprintf(buf, buflen, "%s", pin); 485 return os_snprintf(buf, buflen, "OK\n"); 494 return os_snprintf(buf, buflen, "%s", pin_txt); 501 return os_snprintf(buf, buflen, "%s", pin_txt); 518 return os_snprintf(buf, buflen, "%s", pin); 578 ret = os_snprintf(pos, end - pos, "PBC Status: %s\n", 585 ret = os_snprintf(pos, end - pos, "Last WPS result: %s\n", 598 ret = os_snprintf(pos, end - pos, 608 ret = os_snprintf(pos, end - pos, "Peer Address: " MACSTR "\n" [all...] |
/external/wpa_supplicant_8/src/utils/ |
uuid.c | 52 len = os_snprintf(str, max_len, "%02x%02x%02x%02x-%02x%02x-%02x%02x-"
|
browser-system.c | 77 ret = os_snprintf(cmd, sizeof(cmd), "x-www-browser '%s' &", url);
|
browser-android.c | 77 ret = os_snprintf(cmd, sizeof(cmd),
|
browser-wpadebug.c | 78 ret = os_snprintf(cmd, sizeof(cmd),
|
os.h | 447 * os_snprintf - Print to a memory buffer 459 * os_snprintf() should provide this guarantee, i.e., to null terminate the 467 int os_snprintf(char *str, size_t size, const char *format, ...); 541 #ifndef os_snprintf 543 #define os_snprintf _snprintf macro 545 #define os_snprintf snprintf macro
|
os_none.c | 232 int os_snprintf(char *str, size_t size, const char *format, ...) function
|
edit_readline.c | 134 os_snprintf(ps2, blen, "%s> ", ps);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface.c | 446 res = os_snprintf(buf, buflen, "%s", VERSION_STR); 449 res = os_snprintf(buf, buflen, "%c%c", 460 res = os_snprintf(buf, buflen, "%d", enabled); 623 ret = os_snprintf(buf, buflen, "%s\n", 748 ret = os_snprintf(buf, buflen, "%s", pin); 760 ret = os_snprintf(buf, buflen, "%08d", ret); 797 ret = os_snprintf(buf, buflen, "FAIL-CHECKSUM\n"); 804 ret = os_snprintf(buf, buflen, "%s", pin); 1292 return os_snprintf(buf, buflen, "OK\n"); 1301 return os_snprintf(buf, buflen, "%s", pin_txt) [all...] |
wpa_cli.c | 165 os_snprintf(buf, sizeof(buf), MACSTR, MAC2STR(addr)); 213 os_snprintf(buf, sizeof(buf), MACSTR, MAC2STR(addr)); 334 res = os_snprintf(cfile, flen, "%s/%s", ctrl_iface_dir, 410 os_snprintf(buf, sizeof(buf), "IFNAME=%s %s", 450 res = os_snprintf(pos, end - pos, "%s", cmd); 456 res = os_snprintf(pos, end - pos, " %s", argv[i]); 579 res = os_snprintf(cmd, sizeof(cmd), "SET %s ", argv[0]); 725 res = os_snprintf(cmd, sizeof(cmd), "BSS_FLUSH 0"); 727 res = os_snprintf(cmd, sizeof(cmd), "BSS_FLUSH %s", argv[0]); 822 os_snprintf(buf, buflen, "WPS_NFC_TAG_READ %s", argv[0]) [all...] |
config.c | 227 res = os_snprintf(value, 20, "%d", *src); 272 res = os_snprintf(value, 20, MACSTR, MAC2STR(ssid->bssid)); 363 os_snprintf(buf, len, "ext:%s", ssid->ext_psk); 447 ret = os_snprintf(pos, end - pos, "%sWPA", 455 ret = os_snprintf(pos, end - pos, "%sRSN", 463 ret = os_snprintf(pos, end - pos, "%sOSEN", 575 ret = os_snprintf(pos, end - pos, "%sWPA-PSK", 585 ret = os_snprintf(pos, end - pos, "%sWPA-EAP", 595 ret = os_snprintf(pos, end - pos, "%sIEEE8021X", 605 ret = os_snprintf(pos, end - pos, "%sNONE" [all...] |
/external/wpa_supplicant_8/src/ap/ |
ctrl_iface_ap.c | 35 ret = os_snprintf(buf, buflen, "rx_packets=%lu\ntx_packets=%lu\n" 56 ret = os_snprintf(buf, buflen, "connected_time=%u\n", 93 ret = os_snprintf(buf + len, buflen - len, MACSTR "\nflags=", 104 ret = os_snprintf(buf + len, buflen - len, "\naid=%d\ncapability=0x%x\n" 112 ret = os_snprintf(buf + len, buflen - len, "%02x%s", 120 ret = os_snprintf(buf + len, buflen - len, "\ntimeout_next=%s\n", 166 ret = os_snprintf(buf, buflen, "FAIL\n"); 205 ret = os_snprintf(buf, buflen, "FAIL\n"); 398 ret = os_snprintf(buf + len, buflen - len, 430 ret = os_snprintf(buf + len, buflen - len [all...] |
vlan_init.c | 403 os_snprintf(if_request.device1, sizeof(if_request.device1), "vlan%d", 491 os_snprintf(br_name, sizeof(br_name), "%s%d", 495 os_snprintf(br_name, sizeof(br_name), 499 os_snprintf(br_name, sizeof(br_name), 511 os_snprintf(vlan_ifname, 516 os_snprintf(vlan_ifname, 558 os_snprintf(br_name, sizeof(br_name), "%s%d", 562 os_snprintf(br_name, sizeof(br_name), 566 os_snprintf(br_name, sizeof(br_name), 576 os_snprintf(vlan_ifname [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.c | 84 os_snprintf(cmd, sizeof(cmd), "SELECT 1 FROM %s;", name); 187 os_snprintf(cmd, sizeof(cmd), "INSERT OR REPLACE INTO pseudonyms " 226 os_snprintf(cmd, sizeof(cmd), 252 pos += os_snprintf(pos, end - pos, "INSERT OR REPLACE INTO reauth " 263 pos += os_snprintf(pos, end - pos, ", '"); 265 pos += os_snprintf(pos, end - pos, "'"); 269 pos += os_snprintf(pos, end - pos, ", '"); 272 pos += os_snprintf(pos, end - pos, "'"); 276 pos += os_snprintf(pos, end - pos, ", '"); 279 pos += os_snprintf(pos, end - pos, "'") [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_parse.c | 602 ret = os_snprintf(pos, end - pos, "p2p_group_client: " 610 ret = os_snprintf(pos, end - pos, 622 ret = os_snprintf(pos, end - pos, " dev_type=%s", 640 ret = os_snprintf(pos, end - pos, " dev_name='%s'\n", name); 671 ret = os_snprintf(pos, end - pos, 682 ret = os_snprintf(pos, end - pos, 692 ret = os_snprintf(pos, end - pos, "p2p_device_name=%s\n", 699 ret = os_snprintf(pos, end - pos, "p2p_device_addr=" MACSTR 707 ret = os_snprintf(pos, end - pos, "p2p_config_methods=0x%x\n",
|
/external/wpa_supplicant_8/src/wps/ |
wps.c | 556 ret = os_snprintf(pos, end - pos, 559 ret = os_snprintf(pos, end - pos, 569 ret = os_snprintf(pos, end - pos, 577 ret = os_snprintf(pos, end - pos, 585 ret = os_snprintf(pos, end - pos, 594 ret = os_snprintf(pos, end - pos, 605 ret = os_snprintf(pos, end - pos, 627 ret = os_snprintf(pos, end - pos, "wps_device_name=%s\n", str); 635 ret = os_snprintf(pos, end - pos,
|
/external/wpa_supplicant_8/hs20/client/ |
est.c | 108 os_snprintf(buf, buflen, "%s/cacerts", url); 405 os_snprintf(name, sizeof(name), "cert-user-%u", val); 555 os_snprintf(buf, buflen, "%s/csrattrs", url); 601 os_snprintf(old_cert_buf, sizeof(old_cert_buf), 649 os_snprintf(buf, buflen, "%s/simplereenroll", url); 650 os_snprintf(client_cert_buf, sizeof(client_cert_buf), 653 os_snprintf(client_key_buf, sizeof(client_key_buf), 657 os_snprintf(buf, buflen, "%s/simpleenroll", url);
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new.c | 397 os_snprintf(net_obj_path, WPAS_DBUS_OBJECT_PATH_MAX, 509 os_snprintf(net_obj_path, WPAS_DBUS_OBJECT_PATH_MAX, 546 os_snprintf(path, WPAS_DBUS_OBJECT_PATH_MAX, 884 os_snprintf(sta_mac, WPAS_DBUS_OBJECT_PATH_MAX, MACSTR, MAC2STR(sta)); 1060 os_snprintf(pin, sizeof(pin), "%08d", generated_pin); 1073 os_snprintf(peer_obj_path, WPAS_DBUS_OBJECT_PATH_MAX, 1122 os_snprintf(peer_obj_path, WPAS_DBUS_OBJECT_PATH_MAX, 1159 os_snprintf(group_obj_path, WPAS_DBUS_OBJECT_PATH_MAX, [all...] |
dbus_old_handlers_wps.c | 112 os_snprintf(npin, sizeof(npin), "%08d", ret);
|
/external/wpa_supplicant_8/src/common/ |
wpa_ctrl.c | 111 ret = os_snprintf(ctrl->local.sun_path, sizeof(ctrl->local.sun_path), 163 os_snprintf(buf, sizeof(buf), "wpa_%s", ctrl_path); 248 dirnamelen = (size_t) os_snprintf(pathname, sizeof(pathname), "%s/", 433 os_snprintf(ps, WPA_CTRL_MAX_PS_NAME, "%s/%s", 641 ret = os_snprintf(name, 256, NAMED_PIPE_PREFIX); 643 ret = os_snprintf(name, 256, NAMED_PIPE_PREFIX "-%s",
|
/hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/ |
driver_cmd_wext.c | 249 os_snprintf(&buf[bp], WEXT_PNO_SCAN_INTERVAL_LENGTH + 1, "%x", WEXT_PNO_SCAN_INTERVAL); 253 os_snprintf(&buf[bp], WEXT_PNO_REPEAT_LENGTH + 1, "%x", WEXT_PNO_REPEAT); 257 os_snprintf(&buf[bp], WEXT_PNO_MAX_REPEAT_LENGTH + 1, "%x", WEXT_PNO_MAX_REPEAT); 301 os_snprintf(cmd, MAX_DRV_CMD_SIZE, "COUNTRY %s",
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_fast_pac.c | 506 ret = os_snprintf(*pos, end - *pos, "%s=", field); 511 ret = os_snprintf(*pos, end - *pos, "\n"); 517 ret = os_snprintf(*pos, end - *pos, "%s-txt=", field); 522 ret = os_snprintf(*pos, end - *pos, "%c", data[i]); 527 ret = os_snprintf(*pos, end - *pos, "\n"); 579 ret = os_snprintf(*pos, *buf + *buf_len - *pos, 602 ret = os_snprintf(*pos, *buf + *buf_len - *pos, "END\n"); 634 ret = os_snprintf(pos, buf + buf_len - pos, "%s\n", pac_file_hdr);
|
/external/wpa_supplicant_8/src/l2_packet/ |
l2_packet_privsep.c | 156 os_snprintf(l2->own_socket_path, len, "%s/wpa_privsep-l2-%d-%d", 160 os_snprintf(l2->priv_addr.sun_path, sizeof(l2->priv_addr.sun_path),
|