Home | History | Annotate | Download | only in hostapd

Lines Matching defs:argv

225 			   int min_args, int argc, char *argv[])
234 if (write_cmd(buf, sizeof(buf), cmd, argc, argv) < 0)
240 static int hostapd_cli_cmd_ping(struct wpa_ctrl *ctrl, int argc, char *argv[])
246 static int hostapd_cli_cmd_relog(struct wpa_ctrl *ctrl, int argc, char *argv[])
252 static int hostapd_cli_cmd_status(struct wpa_ctrl *ctrl, int argc, char *argv[])
254 if (argc > 0 && os_strcmp(argv[0], "driver") == 0)
260 static int hostapd_cli_cmd_mib(struct wpa_ctrl *ctrl, int argc, char *argv[])
264 os_snprintf(buf, sizeof(buf), "MIB %s", argv[0]);
307 static int hostapd_cli_cmd_sta(struct wpa_ctrl *ctrl, int argc, char *argv[])
316 snprintf(buf, sizeof(buf), "STA %s %s", argv[0], argv[1]);
318 snprintf(buf, sizeof(buf), "STA %s", argv[0]);
339 char *argv[])
347 snprintf(buf, sizeof(buf), "NEW_STA %s", argv[0]);
353 char *argv[])
363 argv[0], argv[1]);
365 os_snprintf(buf, sizeof(buf), "DEAUTHENTICATE %s", argv[0]);
371 char *argv[])
381 argv[0], argv[1]);
383 os_snprintf(buf, sizeof(buf), "DISASSOCIATE %s", argv[0]);
390 char *argv[])
398 os_snprintf(buf, sizeof(buf), "SIGNATURE %s", argv[0]);
406 char *argv[])
414 snprintf(buf, sizeof(buf), "SA_QUERY %s", argv[0]);
422 char *argv[])
432 argv[0], argv[1], argv[2], argv[3]);
435 argv[0], argv[1], argv[2]);
437 snprintf(buf, sizeof(buf), "WPS_PIN %s %s", argv[0], argv[1]);
443 char *argv[])
456 argv[0], argv[1]);
459 argv[0]);
469 char *argv[])
476 char *argv[])
484 char *argv[])
496 buflen = 18 + os_strlen(argv[0]);
500 os_snprintf(buf, buflen, "WPS_NFC_TAG_READ %s", argv[0]);
510 int argc, char *argv[])
522 argv[0]);
532 int argc, char *argv[])
543 res = os_snprintf(cmd, sizeof(cmd), "WPS_NFC_TOKEN %s", argv[0]);
553 int argc, char *argv[])
565 argv[0], argv[1]);
577 char *argv[])
587 argv[0], argv[1], argv[2]);
590 argv[0], argv[1]);
592 snprintf(buf, sizeof(buf), "WPS_AP_PIN %s", argv[0]);
598 char *argv[])
605 char *argv[])
620 if (argv[0][i] == '\0')
622 os_snprintf(&ssid_hex[i * 2], 3, "%02x", argv[0][i]);
628 if (argv[3][i] == '\0')
631 argv[3][i]);
637 ssid_hex, argv[1], argv[2], key_hex);
640 ssid_hex, argv[1], argv[2]);
643 ssid_hex, argv[1]);
650 char *argv[])
662 argv[0], argv[1]);
670 char *argv[])
682 argv[0], argv[1], argv[2]);
690 char *argv[])
700 res = os_snprintf(buf, sizeof(buf), "BSS_TM_REQ %s", argv[0]);
707 res = os_snprintf(tmp, sizeof(buf) - total, " %s", argv[i]);
717 char *argv[])
761 char *argv[])
776 char *argv[])
792 static int hostapd_cli_cmd_help(struct wpa_ctrl *ctrl, int argc, char *argv[])
794 print_help(stdout, argc > 0 ? argv[0] : NULL);
815 char *argv[])
823 int argc, char *argv[])
835 res = os_snprintf(buf, sizeof(buf), "SET_QOS_MAP_SET %s", argv[0]);
843 int argc, char *argv[])
854 res = os_snprintf(buf, sizeof(buf), "SEND_QOS_MAP_CONF %s", argv[0]);
862 char *argv[])
874 argv[0], argv[1]);
882 char *argv[])
895 argv[0], argv[1], argv[2], argv[3]);
899 argv[0], argv[1], argv[2]);
906 static int hostapd_cli_cmd_quit(struct wpa_ctrl *ctrl, int argc, char *argv[])
915 static int hostapd_cli_cmd_level(struct wpa_ctrl *ctrl, int argc, char *argv[])
923 snprintf(cmd, sizeof(cmd), "LEVEL %s", argv[0]);
993 char *argv[])
999 if (hostapd_cli_reconnect(argv[0]) != 0) {
1025 static int hostapd_cli_cmd_set(struct wpa_ctrl *ctrl, int argc, char *argv[])
1036 res = os_snprintf(cmd, sizeof(cmd), "SET %s %s", argv[0], argv[1]);
1083 static int hostapd_cli_cmd_get(struct wpa_ctrl *ctrl, int argc, char *argv[])
1094 res = os_snprintf(cmd, sizeof(cmd), "GET %s", argv[0]);
1129 static int hostapd_cli_cmd_fst(struct wpa_ctrl *ctrl, int argc, char *argv[])
1145 argv[i]);
1158 int argc, char *argv[])
1176 argv[0], argv[1]);
1185 res = os_snprintf(tmp, sizeof(cmd) - total, " %s", argv[i]);
1197 char *argv[])
1204 char *argv[])
1211 char *argv[])
1217 static int hostapd_cli_cmd_vendor(struct wpa_ctrl *ctrl, int argc, char *argv[])
1228 res = os_snprintf(cmd, sizeof(cmd), "VENDOR %s %s %s", argv[0], argv[1],
1229 argc == 3 ? argv[2] : "");
1239 char *argv[])
1246 char *argv[])
1253 argc >= 1 ? argv[0] : "",
1255 argc == 2 ? argv[1] : "");
1264 static int hostapd_cli_cmd_raw(struct wpa_ctrl *ctrl, int argc, char *argv[])
1268 return hostapd_cli_cmd(ctrl, argv[0], 0, argc - 1, &argv[1]);
1272 static int hostapd_cli_cmd_pmksa(struct wpa_ctrl *ctrl, int argc, char *argv[])
1279 char *argv[])
1286 char *argv[])
1297 argv[0], argv[1], argv[2], argc >= 4 ? argv[3] : "",
1298 argc >= 5 ? argv[4] : "", argc == 6 ? argv[5] : "");
1308 char *argv[])
1319 argv[0], argv[1]);
1329 char *argv[])
1339 res = os_snprintf(cmd, sizeof(cmd), "REQ_LCI %s", argv[0]);
1349 char *argv[])
1356 return hostapd_cli_cmd(ctrl, "REQ_RANGE", 4, argc, argv);
1361 char *argv[])
1370 char *argv[])
1372 return hostapd_cli_cmd(ctrl, "DPP_QR_CODE", 1, argc, argv);
1377 char *argv[])
1379 return hostapd_cli_cmd(ctrl, "DPP_BOOTSTRAP_GEN", 1, argc, argv);
1384 char *argv[])
1386 return hostapd_cli_cmd(ctrl, "DPP_BOOTSTRAP_REMOVE", 1, argc, argv);
1391 int argc, char *argv[])
1393 return hostapd_cli_cmd(ctrl, "DPP_BOOTSTRAP_GET_URI", 1, argc, argv);
1398 char *argv[])
1400 return hostapd_cli_cmd(ctrl, "DPP_BOOTSTRAP_INFO", 1, argc, argv);
1405 char *argv[])
1407 return hostapd_cli_cmd(ctrl, "DPP_AUTH_INIT", 1, argc, argv);
1412 char *argv[])
1414 return hostapd_cli_cmd(ctrl, "DPP_CONFIGURATOR_ADD", 0, argc, argv);
1419 int argc, char *argv[])
1421 return hostapd_cli_cmd(ctrl, "DPP_CONFIGURATOR_REMOVE", 1, argc, argv);
1426 char *argv[])
1428 return hostapd_cli_cmd(ctrl, "DPP_PKEX_ADD", 1, argc, argv);
1433 char *argv[])
1435 return hostapd_cli_cmd(ctrl, "DPP_PKEX_REMOVE", 1, argc, argv);
1443 int (*handler)(struct wpa_ctrl *ctrl, int argc, char *argv[]);
1636 static void wpa_request(struct wpa_ctrl *ctrl, int argc, char *argv[])
1644 if (strncasecmp(cmd->cmd, argv[0], strlen(argv[0])) == 0) {
1646 if (os_strcasecmp(cmd->cmd, argv[0]) == 0) {
1657 printf("Ambiguous command '%s'; possible commands:", argv[0]);
1660 if (strncasecmp(cmd->cmd, argv[0], strlen(argv[0])) ==
1668 printf("Unknown command '%s'\n", argv[0]);
1670 match->handler(ctrl, argc - 1, &argv[1]);
1759 char *argv[max_args];
1761 argc = tokenize_cmd(cmd, argv);
1763 wpa_request(ctrl_conn, argc, argv);
1918 int main(int argc, char *argv[])
1928 c = getopt(argc, argv, "a:BhG:i:p:P:s:v");
2024 wpa_request(ctrl_conn, argc - optind, &argv[optind]);
2035 int main(int argc, char *argv[])