Lines Matching defs:cmd

201 static int _wpa_ctrl_command(struct wpa_ctrl *ctrl, char *cmd, int print)
212 ret = wpa_ctrl_request(ctrl, cmd, os_strlen(cmd), buf, &len,
215 printf("'%s' command timed out.\n", cmd);
218 printf("'%s' command failed.\n", cmd);
229 static int wpa_ctrl_command(struct wpa_ctrl *ctrl, char *cmd)
231 return _wpa_ctrl_command(ctrl, cmd, 1);
303 char cmd[256];
317 res = os_snprintf(cmd, sizeof(cmd), "SET %s %s", argv[0], argv[1]);
318 if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
322 return wpa_ctrl_command(ctrl, cmd);
348 char cmd[256];
357 res = os_snprintf(cmd, sizeof(cmd), "PREAUTH %s", argv[0]);
358 if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
362 return wpa_ctrl_command(ctrl, cmd);
368 char cmd[256];
376 res = os_snprintf(cmd, sizeof(cmd), "AP_SCAN %s", argv[0]);
377 if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
381 return wpa_ctrl_command(ctrl, cmd);
388 char cmd[256];
397 res = os_snprintf(cmd, sizeof(cmd), "STKSTART %s", argv[0]);
398 if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
402 return wpa_ctrl_command(ctrl, cmd);
408 char cmd[256];
417 res = os_snprintf(cmd, sizeof(cmd), "FT_DS %s", argv[0]);
418 if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
422 return wpa_ctrl_command(ctrl, cmd);
428 char cmd[256];
437 res = os_snprintf(cmd, sizeof(cmd), "WPS_PBC %s", argv[0]);
438 if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
442 return wpa_ctrl_command(ctrl, cmd);
448 char cmd[256];
461 res = os_snprintf(cmd, sizeof(cmd), "WPS_PIN %s", argv[0]);
462 if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
466 return wpa_ctrl_command(ctrl, cmd);
470 res = os_snprintf(cmd, sizeof(cmd), "WPS_PIN %s %s", argv[0], argv[1]);
471 if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
475 return wpa_ctrl_command(ctrl, cmd);
481 char cmd[256];
491 res = os_snprintf(cmd, sizeof(cmd), "WPS_REG %s %s", argv[0], argv[1]);
492 if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
496 return wpa_ctrl_command(ctrl, cmd);
502 char cmd[256];
510 res = os_snprintf(cmd, sizeof(cmd), "LEVEL %s", argv[0]);
511 if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
515 return wpa_ctrl_command(ctrl, cmd);
521 char cmd[256], *pos, *end;
530 end = cmd + sizeof(cmd);
531 pos = cmd;
548 return wpa_ctrl_command(ctrl, cmd);
554 char cmd[256], *pos, *end;
563 end = cmd + sizeof(cmd);
564 pos = cmd;
581 return wpa_ctrl_command(ctrl, cmd);
588 char cmd[256], *pos, *end;
597 end = cmd + sizeof(cmd);
598 pos = cmd;
615 return wpa_ctrl_command(ctrl, cmd);
621 char cmd[256], *pos, *end;
630 end = cmd + sizeof(cmd);
631 pos = cmd;
647 return wpa_ctrl_command(ctrl, cmd);
653 char cmd[256], *pos, *end;
662 end = cmd + sizeof(cmd);
663 pos = cmd;
680 return wpa_ctrl_command(ctrl, cmd);
687 char cmd[256], *pos, *end;
696 end = cmd + sizeof(cmd);
697 pos = cmd;
714 return wpa_ctrl_command(ctrl, cmd);
720 char cmd[256], *pos, *end;
729 end = cmd + sizeof(cmd);
730 pos = cmd;
746 return wpa_ctrl_command(ctrl, cmd);
754 char cmd[256];
762 res = os_snprintf(cmd, sizeof(cmd), "SCAN_INTERVAL %s", argv[0]);
763 if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
767 return wpa_ctrl_command(ctrl, cmd);
773 char cmd[256], *pos, *end;
776 end = cmd + sizeof(cmd);
777 pos = cmd;
793 return wpa_ctrl_command(ctrl, cmd);
799 char cmd[256], *pos, *end;
802 end = cmd + sizeof(cmd);
803 pos = cmd;
819 return wpa_ctrl_command(ctrl, cmd);
834 char cmd[32];
843 res = os_snprintf(cmd, sizeof(cmd), "SELECT_NETWORK %s", argv[0]);
844 if (res < 0 || (size_t) res >= sizeof(cmd))
846 cmd[sizeof(cmd) - 1] = '\0';
848 return wpa_ctrl_command(ctrl, cmd);
855 char cmd[32];
864 res = os_snprintf(cmd, sizeof(cmd), "ENABLE_NETWORK %s", argv[0]);
865 if (res < 0 || (size_t) res >= sizeof(cmd))
867 cmd[sizeof(cmd) - 1] = '\0';
869 return wpa_ctrl_command(ctrl, cmd);
876 char cmd[32];
885 res = os_snprintf(cmd, sizeof(cmd), "DISABLE_NETWORK %s", argv[0]);
886 if (res < 0 || (size_t) res >= sizeof(cmd))
888 cmd[sizeof(cmd) - 1] = '\0';
890 return wpa_ctrl_command(ctrl, cmd);
904 char cmd[32];
913 res = os_snprintf(cmd, sizeof(cmd), "REMOVE_NETWORK %s", argv[0]);
914 if (res < 0 || (size_t) res >= sizeof(cmd))
916 cmd[sizeof(cmd) - 1] = '\0';
918 return wpa_ctrl_command(ctrl, cmd);
946 char cmd[256];
960 res = os_snprintf(cmd, sizeof(cmd), "SET_NETWORK %s %s %s",
962 if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
966 return wpa_ctrl_command(ctrl, cmd);
973 char cmd[256];
987 res = os_snprintf(cmd, sizeof(cmd), "GET_NETWORK %s %s",
989 if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
993 return wpa_ctrl_command(ctrl, cmd);
1033 char cmd[64];
1042 res = os_snprintf(cmd, sizeof(cmd), "BSS %s", argv[0]);
1043 if (res < 0 || (size_t) res >= sizeof(cmd))
1045 cmd[sizeof(cmd) - 1] = '\0';
1047 return wpa_ctrl_command(ctrl, cmd);
1054 char cmd[64];
1069 res = os_snprintf(cmd, sizeof(cmd), "GET_CAPABILITY %s%s", argv[0],
1071 if (res < 0 || (size_t) res >= sizeof(cmd))
1073 cmd[sizeof(cmd) - 1] = '\0';
1075 return wpa_ctrl_command(ctrl, cmd);
1130 char cmd[256];
1145 res = os_snprintf(cmd, sizeof(cmd),
1151 if (res < 0 || (size_t) res >= sizeof(cmd))
1153 cmd[sizeof(cmd) - 1] = '\0';
1154 return wpa_ctrl_command(ctrl, cmd);
1161 char cmd[128];
1170 res = os_snprintf(cmd, sizeof(cmd), "INTERFACE_REMOVE %s", argv[0]);
1171 if (res < 0 || (size_t) res >= sizeof(cmd))
1173 cmd[sizeof(cmd) - 1] = '\0';
1174 return wpa_ctrl_command(ctrl, cmd);
1188 char cmd[32];
1191 printf("Invalid DRIVER command: needs one argument (cmd)\n");
1196 os_snprintf(cmd, sizeof(cmd), "DRIVER %s %s", argv[0], argv[1]);
1198 os_snprintf(cmd, sizeof(cmd), "DRIVER %s", argv[0]);
1199 cmd[sizeof(cmd) - 1] = '\0';
1201 return wpa_ctrl_command(ctrl, cmd);
1211 const char *cmd;
1392 static void print_cmd_help(struct wpa_cli_cmd *cmd, const char *pad)
1397 printf("%s%s ", pad, cmd->cmd);
1398 for (n = 0; (c = cmd->usage[n]); n++) {
1411 for (n = 0; wpa_cli_commands[n].cmd; n++)
1417 static int cmd_has_sensitive_data(const char *cmd)
1423 delim = os_strchr(cmd, ' ');
1425 len = delim - cmd;
1427 len = os_strlen(cmd);
1429 for (n = 0; (c = wpa_cli_commands[n].cmd); n++) {
1430 if (os_strncasecmp(cmd, c, len) == 0 && len == os_strlen(c))
1441 struct wpa_cli_cmd *cmd, *match = NULL;
1446 cmd = wpa_cli_commands;
1447 while (cmd->cmd) {
1448 if (os_strncasecmp(cmd->cmd, argv[0], os_strlen(argv[0])) == 0)
1450 match = cmd;
1451 if (os_strcasecmp(cmd->cmd, argv[0]) == 0) {
1458 cmd++;
1463 cmd = wpa_cli_commands;
1464 while (cmd->cmd) {
1465 if (os_strncasecmp(cmd->cmd, argv[0],
1467 printf(" %s", cmd->cmd);
1469 cmd++;
1496 char *cmd;
1502 cmd = os_malloc(len);
1503 if (cmd == NULL)
1505 res = os_snprintf(cmd, len, "%s %s %s", program, arg1, arg2);
1507 os_free(cmd);
1510 cmd[len - 1] = '\0';
1512 if (system(cmd) < 0)
1515 os_free(cmd);
1647 const char *cmd;
1654 while ((cmd = wpa_cli_commands[i].cmd)) {
1656 if (os_strncasecmp(cmd, text, len) == 0)
1657 return os_strdup(cmd);
1681 char cmdbuf[256], *cmd, *argv[max_args], *pos;
1715 cmd = readline("> ");
1716 if (cmd && *cmd) {
1721 if (h == NULL || os_strcmp(cmd, h->line) != 0)
1722 add_history(cmd);
1727 cmd = fgets(cmdbuf, sizeof(cmdbuf), stdin);
1732 if (cmd == NULL)
1735 pos = cmd;
1744 pos = cmd;
1767 if (cmd != cmdbuf)
1768 os_free(cmd);