Lines Matching refs:buflen
487 char *cmd, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_get() argument
494 res = os_snprintf(buf, buflen, "%s", VERSION_STR); in wpa_supplicant_ctrl_iface_get()
497 res = os_snprintf(buf, buflen, "%c%c", in wpa_supplicant_ctrl_iface_get()
508 res = os_snprintf(buf, buflen, "%d", enabled); in wpa_supplicant_ctrl_iface_get()
514 res = wpa_snprintf_hex(buf, buflen, wpa_s->last_gtk, in wpa_supplicant_ctrl_iface_get()
519 res = tls_get_library_version(buf, buflen); in wpa_supplicant_ctrl_iface_get()
521 res = wpa_config_get_value(cmd, wpa_s->conf, buf, buflen); in wpa_supplicant_ctrl_iface_get()
524 if (os_snprintf_error(buflen, res)) in wpa_supplicant_ctrl_iface_get()
668 struct wpa_supplicant *wpa_s, char *buf, size_t buflen) in ctrl_iface_get_capability_tdls() argument
672 ret = os_snprintf(buf, buflen, "%s\n", in ctrl_iface_get_capability_tdls()
677 if (os_snprintf_error(buflen, ret)) in ctrl_iface_get_capability_tdls()
783 char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_tdls_link_status() argument
800 ret = os_snprintf(buf, buflen, "TDLS link status: %s\n", tdls_status); in wpa_supplicant_ctrl_iface_tdls_link_status()
801 if (os_snprintf_error(buflen, ret)) in wpa_supplicant_ctrl_iface_tdls_link_status()
928 size_t buflen) in wpa_supplicant_ctrl_iface_wps_pin() argument
963 buf, buflen, timeout); in wpa_supplicant_ctrl_iface_wps_pin()
972 ret = os_snprintf(buf, buflen, "%s", pin); in wpa_supplicant_ctrl_iface_wps_pin()
973 if (os_snprintf_error(buflen, ret)) in wpa_supplicant_ctrl_iface_wps_pin()
984 ret = os_snprintf(buf, buflen, "%08d", ret); in wpa_supplicant_ctrl_iface_wps_pin()
985 if (os_snprintf_error(buflen, ret)) in wpa_supplicant_ctrl_iface_wps_pin()
992 struct wpa_supplicant *wpa_s, char *cmd, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_wps_check_pin() argument
1021 ret = os_snprintf(buf, buflen, "FAIL-CHECKSUM\n"); in wpa_supplicant_ctrl_iface_wps_check_pin()
1022 if (os_snprintf_error(buflen, ret)) in wpa_supplicant_ctrl_iface_wps_check_pin()
1028 ret = os_snprintf(buf, buflen, "%s", pin); in wpa_supplicant_ctrl_iface_wps_check_pin()
1029 if (os_snprintf_error(buflen, ret)) in wpa_supplicant_ctrl_iface_wps_check_pin()
1501 size_t buflen) in wpa_supplicant_ctrl_iface_wps_ap_pin() argument
1516 return os_snprintf(buf, buflen, "OK\n"); in wpa_supplicant_ctrl_iface_wps_ap_pin()
1525 return os_snprintf(buf, buflen, "%s", pin_txt); in wpa_supplicant_ctrl_iface_wps_ap_pin()
1532 return os_snprintf(buf, buflen, "%s", pin_txt); in wpa_supplicant_ctrl_iface_wps_ap_pin()
1545 if (os_strlen(pin) > buflen) in wpa_supplicant_ctrl_iface_wps_ap_pin()
1549 return os_snprintf(buf, buflen, "%s", pin); in wpa_supplicant_ctrl_iface_wps_ap_pin()
1745 char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_status() argument
1756 return wpa_drv_status(wpa_s, buf, buflen); in wpa_supplicant_ctrl_iface_status()
1760 end = buf + buflen; in wpa_supplicant_ctrl_iface_status()
2086 size_t buflen) in wpa_supplicant_ctrl_iface_blacklist() argument
2096 end = buf + buflen; in wpa_supplicant_ctrl_iface_blacklist()
2178 size_t buflen) in wpa_supplicant_ctrl_iface_log_level() argument
2186 end = buf + buflen; in wpa_supplicant_ctrl_iface_log_level()
2224 struct wpa_supplicant *wpa_s, char *cmd, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_list_networks() argument
2231 end = buf + buflen; in wpa_supplicant_ctrl_iface_list_networks()
2485 const struct wpa_bss *bss, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_scan_result() argument
2501 end = buf + buflen; in wpa_supplicant_ctrl_iface_scan_result()
2602 struct wpa_supplicant *wpa_s, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_scan_results() argument
2609 end = buf + buflen; in wpa_supplicant_ctrl_iface_scan_results()
2853 struct wpa_supplicant *wpa_s, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_add_network() argument
2869 ret = os_snprintf(buf, buflen, "%d\n", ssid->id); in wpa_supplicant_ctrl_iface_add_network()
2870 if (os_snprintf_error(buflen, ret)) in wpa_supplicant_ctrl_iface_add_network()
3053 struct wpa_supplicant *wpa_s, char *cmd, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_get_network() argument
3062 if (name == NULL || buflen == 0) in wpa_supplicant_ctrl_iface_get_network()
3084 res = os_strlcpy(buf, value, buflen); in wpa_supplicant_ctrl_iface_get_network()
3085 if (res >= buflen) { in wpa_supplicant_ctrl_iface_get_network()
3150 char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_list_creds() argument
3157 end = buf + buflen; in wpa_supplicant_ctrl_iface_list_creds()
3183 char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_add_cred() argument
3196 ret = os_snprintf(buf, buflen, "%d\n", cred->id); in wpa_supplicant_ctrl_iface_add_cred()
3197 if (os_snprintf_error(buflen, ret)) in wpa_supplicant_ctrl_iface_add_cred()
3351 size_t buflen) in wpa_supplicant_ctrl_iface_get_cred() argument
3382 res = os_strlcpy(buf, value, buflen); in wpa_supplicant_ctrl_iface_get_cred()
3383 if (res >= buflen) { in wpa_supplicant_ctrl_iface_get_cred()
3446 char *buf, size_t buflen) in ctrl_iface_get_capability_pairwise() argument
3454 end = pos + buflen; in ctrl_iface_get_capability_pairwise()
3459 len = os_strlcpy(buf, "CCMP TKIP NONE", buflen); in ctrl_iface_get_capability_pairwise()
3460 if (len >= buflen) in ctrl_iface_get_capability_pairwise()
3482 char *buf, size_t buflen) in ctrl_iface_get_capability_group() argument
3490 end = pos + buflen; in ctrl_iface_get_capability_group()
3495 len = os_strlcpy(buf, "CCMP TKIP WEP104 WEP40", buflen); in ctrl_iface_get_capability_group()
3496 if (len >= buflen) in ctrl_iface_get_capability_group()
3518 char *buf, size_t buflen) in ctrl_iface_get_capability_group_mgmt() argument
3525 end = pos + buflen; in ctrl_iface_get_capability_group_mgmt()
3547 char *buf, size_t buflen) in ctrl_iface_get_capability_key_mgmt() argument
3554 end = pos + buflen; in ctrl_iface_get_capability_key_mgmt()
3560 "NONE", buflen); in ctrl_iface_get_capability_key_mgmt()
3561 if (len >= buflen) in ctrl_iface_get_capability_key_mgmt()
3617 char *buf, size_t buflen) in ctrl_iface_get_capability_proto() argument
3624 end = pos + buflen; in ctrl_iface_get_capability_proto()
3629 len = os_strlcpy(buf, "RSN WPA", buflen); in ctrl_iface_get_capability_proto()
3630 if (len >= buflen) in ctrl_iface_get_capability_proto()
3660 char *buf, size_t buflen) in ctrl_iface_get_capability_auth_alg() argument
3667 end = pos + buflen; in ctrl_iface_get_capability_auth_alg()
3672 len = os_strlcpy(buf, "OPEN SHARED LEAP", buflen); in ctrl_iface_get_capability_auth_alg()
3673 if (len >= buflen) in ctrl_iface_get_capability_auth_alg()
3718 char *buf, size_t buflen) in ctrl_iface_get_capability_modes() argument
3725 end = pos + buflen; in ctrl_iface_get_capability_modes()
3730 len = os_strlcpy(buf, "IBSS AP", buflen); in ctrl_iface_get_capability_modes()
3731 if (len >= buflen) in ctrl_iface_get_capability_modes()
3767 char *buf, size_t buflen) in ctrl_iface_get_capability_channels() argument
3774 end = pos + buflen; in ctrl_iface_get_capability_channels()
3817 char *buf, size_t buflen) in ctrl_iface_get_capability_freq() argument
3824 end = pos + buflen; in ctrl_iface_get_capability_freq()
3875 size_t buflen) in wpa_supplicant_ctrl_iface_get_capability() argument
3898 return eap_get_names(buf, buflen); in wpa_supplicant_ctrl_iface_get_capability()
3905 buf, buflen); in wpa_supplicant_ctrl_iface_get_capability()
3909 buf, buflen); in wpa_supplicant_ctrl_iface_get_capability()
3913 buf, buflen); in wpa_supplicant_ctrl_iface_get_capability()
3917 buf, buflen); in wpa_supplicant_ctrl_iface_get_capability()
3921 buf, buflen); in wpa_supplicant_ctrl_iface_get_capability()
3925 &capa, buf, buflen); in wpa_supplicant_ctrl_iface_get_capability()
3929 buf, buflen); in wpa_supplicant_ctrl_iface_get_capability()
3932 return ctrl_iface_get_capability_channels(wpa_s, buf, buflen); in wpa_supplicant_ctrl_iface_get_capability()
3935 return ctrl_iface_get_capability_freq(wpa_s, buf, buflen); in wpa_supplicant_ctrl_iface_get_capability()
3939 return ctrl_iface_get_capability_tdls(wpa_s, buf, buflen); in wpa_supplicant_ctrl_iface_get_capability()
3944 res = os_snprintf(buf, buflen, "ERP"); in wpa_supplicant_ctrl_iface_get_capability()
3945 if (os_snprintf_error(buflen, res)) in wpa_supplicant_ctrl_iface_get_capability()
3994 unsigned long mask, char *buf, size_t buflen) in print_bss_info() argument
4002 end = buf + buflen; in print_bss_info()
4316 size_t buflen) in wpa_supplicant_ctrl_iface_bss() argument
4325 char *ctmp, *end = buf + buflen; in wpa_supplicant_ctrl_iface_bss()
4427 len = print_bss_info(wpa_s, bss, mask, buf, buflen); in wpa_supplicant_ctrl_iface_bss()
4430 buflen -= len; in wpa_supplicant_ctrl_iface_bss()
4798 char *buf, size_t buflen) in p2p_ctrl_connect() argument
4911 ret = os_snprintf(buf, buflen, "%08d", new_pin); in p2p_ctrl_connect()
4912 if (os_snprintf_error(buflen, ret)) in p2p_ctrl_connect()
4960 size_t buflen) in p2p_get_passphrase() argument
4968 os_strlcpy(buf, ssid->passphrase, buflen); in p2p_get_passphrase()
4974 char *buf, size_t buflen) in p2p_ctrl_serv_disc_req() argument
5060 res = os_snprintf(buf, buflen, "%llx", (long long unsigned) ref); in p2p_ctrl_serv_disc_req()
5061 if (os_snprintf_error(buflen, res)) in p2p_ctrl_serv_disc_req()
5577 char *buf, size_t buflen) in p2p_ctrl_peer() argument
5610 end = buf + buflen; in p2p_ctrl_peer()
6209 size_t buflen) in gas_response_get() argument
6247 return os_snprintf(buf, buflen, "FAIL-Invalid range"); in gas_response_get()
6254 return os_snprintf(buf, buflen, "FAIL-Invalid range"); in gas_response_get()
6257 if (requested_len * 2 + 1 > buflen) in gas_response_get()
6258 return os_snprintf(buf, buflen, "FAIL-Too long response"); in gas_response_get()
6260 ret = wpa_snprintf_hex(buf, buflen, wpabuf_head_u8(resp) + start, in gas_response_get()
6507 size_t buflen) in wpa_supplicant_signal_poll() argument
6518 end = buf + buflen; in wpa_supplicant_signal_poll()
6566 size_t buflen) in wpa_supplicant_pktcnt_poll() argument
6575 ret = os_snprintf(buf, buflen, "TXGOOD=%lu\nTXBAD=%lu\nRXGOOD=%lu\n", in wpa_supplicant_pktcnt_poll()
6577 if (os_snprintf_error(buflen, ret)) in wpa_supplicant_pktcnt_poll()
6585 char *buf, size_t buflen) in wpa_supplicant_driver_cmd() argument
6589 ret = wpa_drv_driver_cmd(wpa_s, cmd, buf, buflen); in wpa_supplicant_driver_cmd()
6601 ret = os_snprintf(buf, buflen, "%s\n", "OK"); in wpa_supplicant_driver_cmd()
6602 if (os_snprintf_error(buflen, ret)) in wpa_supplicant_driver_cmd()
6611 char *buf, size_t buflen) in wpa_supplicant_vendor_cmd() argument
6647 reply = wpabuf_alloc((buflen - 1) / 2); in wpa_supplicant_vendor_cmd()
6657 ret = wpa_snprintf_hex(buf, buflen, wpabuf_head_u8(reply), in wpa_supplicant_vendor_cmd()
6780 char *buf, size_t buflen) in wpas_ctrl_radio_work_show() argument
6787 end = buf + buflen; in wpas_ctrl_radio_work_show()
6848 char *buf, size_t buflen) in wpas_ctrl_radio_work_add() argument
6894 ret = os_snprintf(buf, buflen, "%u", ework->id); in wpas_ctrl_radio_work_add()
6895 if (os_snprintf_error(buflen, ret)) in wpas_ctrl_radio_work_add()
6930 char *buf, size_t buflen) in wpas_ctrl_radio_work() argument
6933 return wpas_ctrl_radio_work_show(wpa_s, buf, buflen); in wpas_ctrl_radio_work()
6935 return wpas_ctrl_radio_work_add(wpa_s, cmd + 4, buf, buflen); in wpas_ctrl_radio_work()
7569 char *buf, size_t buflen) in wpas_ctrl_get_alloc_fail() argument
7575 return os_snprintf(buf, buflen, "%u:%s", wpa_trace_fail_after, in wpas_ctrl_get_alloc_fail()
7726 char *buf, size_t buflen) in wpas_ctrl_vendor_elem_get() argument
7737 return wpa_snprintf_hex(buf, buflen, in wpas_ctrl_vendor_elem_get()
9081 char *buf, size_t buflen) in wpas_global_ctrl_iface_status() argument
9088 end = buf + buflen; in wpas_global_ctrl_iface_status()