Lines Matching refs:cmd

70 static void print_help(const char *cmd);
225 static int _wpa_ctrl_command(struct wpa_ctrl *ctrl, const char *cmd, int print)
237 ifname_prefix, cmd);
239 cmd = buf;
242 ret = wpa_ctrl_request(ctrl, cmd, os_strlen(cmd), buf, &len,
245 printf("'%s' command timed out.\n", cmd);
248 printf("'%s' command failed.\n", cmd);
261 static int wpa_ctrl_command(struct wpa_ctrl *ctrl, const char *cmd)
263 return _wpa_ctrl_command(ctrl, cmd, 1);
267 static int wpa_cli_cmd(struct wpa_ctrl *ctrl, const char *cmd, int min_args,
273 "required.\n", cmd, min_args,
277 if (write_cmd(buf, sizeof(buf), cmd, argc, argv) < 0)
415 char cmd[256];
419 res = os_snprintf(cmd, sizeof(cmd), "SET %s ", argv[0]);
420 if (os_snprintf_error(sizeof(cmd), res)) {
424 return wpa_ctrl_command(ctrl, cmd);
674 char cmd[256];
678 res = os_snprintf(cmd, sizeof(cmd), "BSS_FLUSH 0");
680 res = os_snprintf(cmd, sizeof(cmd), "BSS_FLUSH %s", argv[0]);
681 if (os_snprintf_error(sizeof(cmd), res)) {
685 return wpa_ctrl_command(ctrl, cmd);
802 char cmd[256];
806 res = os_snprintf(cmd, sizeof(cmd), "WPS_REG %s %s",
830 res = os_snprintf(cmd, sizeof(cmd),
849 if (os_snprintf_error(sizeof(cmd), res)) {
853 return wpa_ctrl_command(ctrl, cmd);
934 char cmd[256];
959 res = os_snprintf(cmd, sizeof(cmd),
974 if (os_snprintf_error(sizeof(cmd), res)) {
978 return wpa_ctrl_command(ctrl, cmd);
1013 char cmd[256], *pos, *end;
1022 end = cmd + sizeof(cmd);
1023 pos = cmd;
1040 return wpa_ctrl_command(ctrl, cmd);
1046 char cmd[256], *pos, *end;
1055 end = cmd + sizeof(cmd);
1056 pos = cmd;
1073 return wpa_ctrl_command(ctrl, cmd);
1080 char cmd[256], *pos, *end;
1089 end = cmd + sizeof(cmd);
1090 pos = cmd;
1107 return wpa_ctrl_command(ctrl, cmd);
1113 char cmd[256], *pos, *end;
1122 end = cmd + sizeof(cmd);
1123 pos = cmd;
1139 return wpa_ctrl_command(ctrl, cmd);
1145 char cmd[256], *pos, *end;
1154 end = cmd + sizeof(cmd);
1155 pos = cmd;
1172 return wpa_ctrl_command(ctrl, cmd);
1178 char cmd[256], *pos, *end;
1187 end = cmd + sizeof(cmd);
1188 pos = cmd;
1204 return wpa_ctrl_command(ctrl, cmd);
1211 char cmd[256], *pos, *end;
1219 end = cmd + sizeof(cmd);
1220 pos = cmd;
1237 return wpa_ctrl_command(ctrl, cmd);
1244 char cmd[256], *pos, *end;
1253 end = cmd + sizeof(cmd);
1254 pos = cmd;
1271 return wpa_ctrl_command(ctrl, cmd);
1812 char cmd[256];
1827 res = os_snprintf(cmd, sizeof(cmd),
1834 if (os_snprintf_error(sizeof(cmd), res))
1836 cmd[sizeof(cmd) - 1] = '\0';
1837 return wpa_ctrl_command(ctrl, cmd);
1877 static int wpa_ctrl_command_sta(struct wpa_ctrl *ctrl, const char *cmd,
1890 ifname_prefix, cmd);
1892 cmd = buf;
1895 ret = wpa_ctrl_request(ctrl, cmd, os_strlen(cmd), buf, &len,
1898 printf("'%s' command timed out.\n", cmd);
1901 printf("'%s' command failed.\n", cmd);
1923 char addr[32], cmd[64];
1928 os_snprintf(cmd, sizeof(cmd), "STA-NEXT %s", addr);
1929 } while (wpa_ctrl_command_sta(ctrl, cmd, addr, sizeof(addr), 1) == 0);
1938 char addr[32], cmd[64];
1945 os_snprintf(cmd, sizeof(cmd), "STA-NEXT %s", addr);
1946 } while (wpa_ctrl_command_sta(ctrl, cmd, addr, sizeof(addr), 0) == 0);
2224 char cmd[4096];
2232 if (write_cmd(cmd, sizeof(cmd), "P2P_SERV_DISC_REQ", argc, argv) < 0)
2234 return wpa_ctrl_command(ctrl, cmd);
2248 char cmd[4096];
2257 res = os_snprintf(cmd, sizeof(cmd), "P2P_SERV_DISC_RESP %s %s %s %s",
2259 if (os_snprintf_error(sizeof(cmd), res))
2261 cmd[sizeof(cmd) - 1] = '\0';
2262 return wpa_ctrl_command(ctrl, cmd);
2315 char cmd[4096];
2325 res = os_snprintf(cmd, sizeof(cmd),
2329 res = os_snprintf(cmd, sizeof(cmd),
2332 if (os_snprintf_error(sizeof(cmd), res))
2334 cmd[sizeof(cmd) - 1] = '\0';
2335 return wpa_ctrl_command(ctrl, cmd);
2374 static int wpa_ctrl_command_p2p_peer(struct wpa_ctrl *ctrl, const char *cmd,
2385 ret = wpa_ctrl_request(ctrl, cmd, os_strlen(cmd), buf, &len,
2388 printf("'%s' command timed out.\n", cmd);
2391 printf("'%s' command failed.\n", cmd);
2412 char addr[32], cmd[64];
2421 os_snprintf(cmd, sizeof(cmd), "P2P_PEER NEXT-%s", addr);
2422 } while (wpa_ctrl_command_p2p_peer(ctrl, cmd, addr, sizeof(addr),
2565 char cmd[100];
2574 res = os_snprintf(cmd, sizeof(cmd), "WFD_SUBELEM_SET %s %s",
2576 if (os_snprintf_error(sizeof(cmd), res))
2578 cmd[sizeof(cmd) - 1] = '\0';
2579 return wpa_ctrl_command(ctrl, cmd);
2586 char cmd[100];
2595 res = os_snprintf(cmd, sizeof(cmd), "WFD_SUBELEM_GET %s",
2597 if (os_snprintf_error(sizeof(cmd), res))
2599 cmd[sizeof(cmd) - 1] = '\0';
2600 return wpa_ctrl_command(ctrl, cmd);
2674 char cmd[512];
2682 if (write_cmd(cmd, sizeof(cmd), "HS20_GET_NAI_HOME_REALM_LIST",
2686 return wpa_ctrl_command(ctrl, cmd);
2693 char cmd[512];
2701 if (write_cmd(cmd, sizeof(cmd), "HS20_ICON_REQUEST", argc, argv) < 0)
2704 return wpa_ctrl_command(ctrl, cmd);
3033 const char *cmd;
3464 "<cmd> [peer=addr] = invite peer" },
3693 static void print_cmd_help(const struct wpa_cli_cmd *cmd, const char *pad)
3698 printf("%s%s ", pad, cmd->cmd);
3699 for (n = 0; (c = cmd->usage[n]); n++) {
3708 static void print_help(const char *cmd)
3712 for (n = 0; wpa_cli_commands[n].cmd; n++) {
3713 if (cmd == NULL || str_starts(wpa_cli_commands[n].cmd, cmd))
3719 static int wpa_cli_edit_filter_history_cb(void *ctx, const char *cmd)
3725 delim = os_strchr(cmd, ' ');
3727 len = delim - cmd;
3729 len = os_strlen(cmd);
3731 for (n = 0; (c = wpa_cli_commands[n].cmd); n++) {
3732 if (os_strncasecmp(cmd, c, len) == 0 && len == os_strlen(c))
3753 for (i = 0; wpa_cli_commands[i].cmd; i++) {
3754 res[i] = os_strdup(wpa_cli_commands[i].cmd);
3779 static char ** wpa_cli_cmd_completion(const char *cmd, const char *str,
3784 for (i = 0; wpa_cli_commands[i].cmd; i++) {
3785 if (os_strcasecmp(wpa_cli_commands[i].cmd, cmd) == 0) {
3804 char *cmd;
3818 cmd = os_malloc(pos + 1);
3819 if (cmd == NULL)
3821 os_memcpy(cmd, str, pos);
3822 cmd[end - str] = '\0';
3823 res = wpa_cli_cmd_completion(cmd, str, pos);
3824 os_free(cmd);
3831 const struct wpa_cli_cmd *cmd, *match = NULL;
3846 cmd = wpa_cli_commands;
3847 while (cmd->cmd) {
3848 if (os_strncasecmp(cmd->cmd, argv[0], os_strlen(argv[0])) == 0)
3850 match = cmd;
3851 if (os_strcasecmp(cmd->cmd, argv[0]) == 0) {
3858 cmd++;
3863 cmd = wpa_cli_commands;
3864 while (cmd->cmd) {
3865 if (os_strncasecmp(cmd->cmd, argv[0],
3867 printf(" %s", cmd->cmd);
3869 cmd++;
4266 static void wpa_cli_edit_cmd_cb(void *ctx, char *cmd)
4270 argc = tokenize_cmd(cmd, argv);
4324 const char *cmd = "BSS RANGE=ALL MASK=0x2";
4329 ret = wpa_ctrl_request(ctrl, cmd, os_strlen(cmd), buf, &len, NULL);
4355 const char *cmd = "INTERFACES";
4363 ret = wpa_ctrl_request(ctrl, cmd, os_strlen(cmd), buf, &len, NULL);
4387 const char *cmd = "LIST_CREDS";
4395 ret = wpa_ctrl_request(ctrl, cmd, os_strlen(cmd), buf, &len, NULL);
4419 const char *cmd = "LIST_NETWORKS";
4427 ret = wpa_ctrl_request(ctrl, cmd, os_strlen(cmd), buf, &len, NULL);
4449 char addr[32], cmd[64];
4461 os_snprintf(cmd, sizeof(cmd), "STA-NEXT %s", addr);
4462 } while (wpa_ctrl_command_sta(ctrl, cmd, addr, sizeof(addr), 0) == 0);