Lines Matching refs:argv

225 			   int min_args, int argc, char *argv[])
234 if (write_cmd(buf, sizeof(buf), cmd, argc, argv) < 0)
240 static int hostapd_cli_cmd_ping(struct wpa_ctrl *ctrl, int argc, char *argv[])
246 static int hostapd_cli_cmd_relog(struct wpa_ctrl *ctrl, int argc, char *argv[])
252 static int hostapd_cli_cmd_status(struct wpa_ctrl *ctrl, int argc, char *argv[])
254 if (argc > 0 && os_strcmp(argv[0], "driver") == 0)
260 static int hostapd_cli_cmd_mib(struct wpa_ctrl *ctrl, int argc, char *argv[])
264 os_snprintf(buf, sizeof(buf), "MIB %s", argv[0]);
307 static int hostapd_cli_cmd_sta(struct wpa_ctrl *ctrl, int argc, char *argv[])
316 snprintf(buf, sizeof(buf), "STA %s %s", argv[0], argv[1]);
318 snprintf(buf, sizeof(buf), "STA %s", argv[0]);
339 char *argv[])
347 snprintf(buf, sizeof(buf), "NEW_STA %s", argv[0]);
353 char *argv[])
363 argv[0], argv[1]);
365 os_snprintf(buf, sizeof(buf), "DEAUTHENTICATE %s", argv[0]);
371 char *argv[])
381 argv[0], argv[1]);
383 os_snprintf(buf, sizeof(buf), "DISASSOCIATE %s", argv[0]);
390 char *argv[])
398 os_snprintf(buf, sizeof(buf), "SIGNATURE %s", argv[0]);
406 char *argv[])
414 snprintf(buf, sizeof(buf), "SA_QUERY %s", argv[0]);
422 char *argv[])
432 argv[0], argv[1], argv[2], argv[3]);
435 argv[0], argv[1], argv[2]);
437 snprintf(buf, sizeof(buf), "WPS_PIN %s %s", argv[0], argv[1]);
443 char *argv[])
456 argv[0], argv[1]);
459 argv[0]);
469 char *argv[])
476 char *argv[])
484 char *argv[])
496 buflen = 18 + os_strlen(argv[0]);
500 os_snprintf(buf, buflen, "WPS_NFC_TAG_READ %s", argv[0]);
510 int argc, char *argv[])
522 argv[0]);
532 int argc, char *argv[])
543 res = os_snprintf(cmd, sizeof(cmd), "WPS_NFC_TOKEN %s", argv[0]);
553 int argc, char *argv[])
565 argv[0], argv[1]);
577 char *argv[])
587 argv[0], argv[1], argv[2]);
590 argv[0], argv[1]);
592 snprintf(buf, sizeof(buf), "WPS_AP_PIN %s", argv[0]);
598 char *argv[])
605 char *argv[])
620 if (argv[0][i] == '\0')
622 os_snprintf(&ssid_hex[i * 2], 3, "%02x", argv[0][i]);
628 if (argv[3][i] == '\0')
631 argv[3][i]);
637 ssid_hex, argv[1], argv[2], key_hex);
640 ssid_hex, argv[1], argv[2]);
643 ssid_hex, argv[1]);
650 char *argv[])
662 argv[0], argv[1]);
670 char *argv[])
682 argv[0], argv[1], argv[2]);
690 char *argv[])
700 res = os_snprintf(buf, sizeof(buf), "BSS_TM_REQ %s", argv[0]);
707 res = os_snprintf(tmp, sizeof(buf) - total, " %s", argv[i]);
717 char *argv[])
761 char *argv[])
776 char *argv[])
792 static int hostapd_cli_cmd_help(struct wpa_ctrl *ctrl, int argc, char *argv[])
794 print_help(stdout, argc > 0 ? argv[0] : NULL);
815 char *argv[])
823 int argc, char *argv[])
835 res = os_snprintf(buf, sizeof(buf), "SET_QOS_MAP_SET %s", argv[0]);
843 int argc, char *argv[])
854 res = os_snprintf(buf, sizeof(buf), "SEND_QOS_MAP_CONF %s", argv[0]);
862 char *argv[])
874 argv[0], argv[1]);
882 char *argv[])
895 argv[0], argv[1], argv[2], argv[3]);
899 argv[0], argv[1], argv[2]);
906 static int hostapd_cli_cmd_quit(struct wpa_ctrl *ctrl, int argc, char *argv[])
915 static int hostapd_cli_cmd_level(struct wpa_ctrl *ctrl, int argc, char *argv[])
923 snprintf(cmd, sizeof(cmd), "LEVEL %s", argv[0]);
993 char *argv[])
999 if (hostapd_cli_reconnect(argv[0]) != 0) {
1025 static int hostapd_cli_cmd_set(struct wpa_ctrl *ctrl, int argc, char *argv[])
1036 res = os_snprintf(cmd, sizeof(cmd), "SET %s %s", argv[0], argv[1]);
1083 static int hostapd_cli_cmd_get(struct wpa_ctrl *ctrl, int argc, char *argv[])
1094 res = os_snprintf(cmd, sizeof(cmd), "GET %s", argv[0]);
1129 static int hostapd_cli_cmd_fst(struct wpa_ctrl *ctrl, int argc, char *argv[])
1145 argv[i]);
1158 int argc, char *argv[])
1176 argv[0], argv[1]);
1185 res = os_snprintf(tmp, sizeof(cmd) - total, " %s", argv[i]);
1197 char *argv[])
1204 char *argv[])
1211 char *argv[])
1218 char *argv[])
1224 static int hostapd_cli_cmd_vendor(struct wpa_ctrl *ctrl, int argc, char *argv[])
1235 res = os_snprintf(cmd, sizeof(cmd), "VENDOR %s %s %s", argv[0], argv[1],
1236 argc == 3 ? argv[2] : "");
1246 char *argv[])
1253 char *argv[])
1260 argc >= 1 ? argv[0] : "",
1262 argc == 2 ? argv[1] : "");
1271 static int hostapd_cli_cmd_raw(struct wpa_ctrl *ctrl, int argc, char *argv[])
1275 return hostapd_cli_cmd(ctrl, argv[0], 0, argc - 1, &argv[1]);
1279 static int hostapd_cli_cmd_pmksa(struct wpa_ctrl *ctrl, int argc, char *argv[])
1286 char *argv[])
1293 char *argv[])
1304 argv[0], argv[1], argv[2], argc >= 4 ? argv[3] : "",
1305 argc >= 5 ? argv[4] : "", argc == 6 ? argv[5] : "");
1315 char *argv[])
1326 argv[0], argv[1]);
1336 char *argv[])
1346 res = os_snprintf(cmd, sizeof(cmd), "REQ_LCI %s", argv[0]);
1356 char *argv[])
1363 return hostapd_cli_cmd(ctrl, "REQ_RANGE", 4, argc, argv);
1368 char *argv[])
1377 char *argv[])
1379 return hostapd_cli_cmd(ctrl, "DPP_QR_CODE", 1, argc, argv);
1384 char *argv[])
1386 return hostapd_cli_cmd(ctrl, "DPP_BOOTSTRAP_GEN", 1, argc, argv);
1391 char *argv[])
1393 return hostapd_cli_cmd(ctrl, "DPP_BOOTSTRAP_REMOVE", 1, argc, argv);
1398 int argc, char *argv[])
1400 return hostapd_cli_cmd(ctrl, "DPP_BOOTSTRAP_GET_URI", 1, argc, argv);
1405 char *argv[])
1407 return hostapd_cli_cmd(ctrl, "DPP_BOOTSTRAP_INFO", 1, argc, argv);
1412 char *argv[])
1414 return hostapd_cli_cmd(ctrl, "DPP_AUTH_INIT", 1, argc, argv);
1419 char *argv[])
1421 return hostapd_cli_cmd(ctrl, "DPP_LISTEN", 1, argc, argv);
1426 char *argv[])
1433 char *argv[])
1435 return hostapd_cli_cmd(ctrl, "DPP_CONFIGURATOR_ADD", 0, argc, argv);
1440 int argc, char *argv[])
1442 return hostapd_cli_cmd(ctrl, "DPP_CONFIGURATOR_REMOVE", 1, argc, argv);
1447 int argc, char *argv[])
1449 return hostapd_cli_cmd(ctrl, "DPP_CONFIGURATOR_GET_KEY", 1, argc, argv);
1454 int argc, char *argv[])
1456 return hostapd_cli_cmd(ctrl, "DPP_CONFIGURATOR_SIGN", 1, argc, argv);
1461 char *argv[])
1463 return hostapd_cli_cmd(ctrl, "DPP_PKEX_ADD", 1, argc, argv);
1468 char *argv[])
1470 return hostapd_cli_cmd(ctrl, "DPP_PKEX_REMOVE", 1, argc, argv);
1477 char *argv[])
1479 return hostapd_cli_cmd(ctrl, "ACCEPT_ACL", 1, argc, argv);
1484 char *argv[])
1486 return hostapd_cli_cmd(ctrl, "DENY_ACL", 1, argc, argv);
1491 char *argv[])
1493 return hostapd_cli_cmd(ctrl, "POLL_STA", 1, argc, argv);
1498 char *argv[])
1500 return hostapd_cli_cmd(ctrl, "REQ_BEACON", 2, argc, argv);
1505 char *argv[])
1513 int (*handler)(struct wpa_ctrl *ctrl, int argc, char *argv[]);
1727 static void wpa_request(struct wpa_ctrl *ctrl, int argc, char *argv[])
1735 if (strncasecmp(cmd->cmd, argv[0], strlen(argv[0])) == 0) {
1737 if (os_strcasecmp(cmd->cmd, argv[0]) == 0) {
1748 printf("Ambiguous command '%s'; possible commands:", argv[0]);
1751 if (strncasecmp(cmd->cmd, argv[0], strlen(argv[0])) ==
1759 printf("Unknown command '%s'\n", argv[0]);
1761 match->handler(ctrl, argc - 1, &argv[1]);
1850 char *argv[max_args];
1852 argc = tokenize_cmd(cmd, argv);
1854 wpa_request(ctrl_conn, argc, argv);
2009 int main(int argc, char *argv[])
2019 c = getopt(argc, argv, "a:BhG:i:p:P:s:v");
2115 wpa_request(ctrl_conn, argc - optind, &argv[optind]);
2126 int main(int argc, char *argv[])