Home | History | Annotate | Download | only in wpa_gui-qt4

Lines Matching refs:reply

321 	char reply[100];
334 reply_len = sizeof(reply) - 1;
335 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) {
352 char reply[20];
354 reply_len = sizeof(reply) - 1;
355 if (wpagui->ctrlRequest("P2P_FIND", reply, &reply_len) < 0 ||
356 memcmp(reply, "FAIL", 4) == 0) {
367 char reply[20];
369 reply_len = sizeof(reply) - 1;
370 wpagui->ctrlRequest("P2P_STOP_FIND", reply, &reply_len);
376 char reply[20];
378 reply_len = sizeof(reply) - 1;
379 if (wpagui->ctrlRequest("P2P_LISTEN 3600", reply, &reply_len) < 0 ||
380 memcmp(reply, "FAIL", 4) == 0) {
391 char reply[20];
393 reply_len = sizeof(reply) - 1;
394 if (wpagui->ctrlRequest("P2P_GROUP_ADD", reply, &reply_len) < 0 ||
395 memcmp(reply, "FAIL", 4) == 0) {
456 char reply[2048];
461 reply_len = sizeof(reply) - 1;
462 if (wpagui->ctrlRequest("STA-FIRST", reply, &reply_len) < 0)
466 reply[reply_len] = '\0';
467 QString info(reply);
468 char *txt = reply;
472 if (strncmp(reply, "FAIL", 4) == 0 ||
473 strncmp(reply, "UNKNOWN", 7) == 0)
478 reply_len = sizeof(reply) - 1;
479 res = snprintf(cmd, sizeof(cmd), "STA-NEXT %s", reply);
482 res = wpagui->ctrlRequest(cmd, reply, &reply_len);
489 char reply[2048];
493 reply_len = sizeof(reply) - 1;
495 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0)
498 reply[reply_len] = '\0';
499 QString info(reply);
500 char *txt = reply;
504 if (strncmp(reply, "FAIL", 4) == 0 ||
505 strncmp(reply, "UNKNOWN", 7) == 0)
576 char reply[2048];
582 reply_len = sizeof(reply) - 1;
583 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0)
585 reply[reply_len] = '\0';
587 QString bss(reply);
679 char reply[100];
684 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0)
686 reply[reply_len] = '\0';
687 mode = atoi(reply);
771 char reply[20];
772 size_t replylen = sizeof(reply) - 1;
773 wpagui->ctrlRequest("WPS_ER_START", reply, &replylen);
1063 char reply[100];
1067 reply_len = sizeof(reply) - 1;
1068 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0)
1070 reply[reply_len] = '\0';
1072 char *pos = strrchr(reply, '"');
1073 if (pos && reply[0] == '"') {
1075 name = reply + 1;
1077 name = reply;
1352 char reply[100];
1357 reply_len = sizeof(reply) - 1;
1358 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) {
1386 char reply[100];
1391 reply_len = sizeof(reply) - 1;
1392 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) {
1410 char reply[100];
1414 reply_len = sizeof(reply) - 1;
1415 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) {
1433 char reply[100];
1437 reply_len = sizeof(reply) - 1;
1438 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) {
1454 char reply[100];
1458 reply_len = sizeof(reply) - 1;
1459 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) {
1466 reply[reply_len] = '\0';
1470 "peer device: ") + reply);
1482 char reply[100];
1487 reply_len = sizeof(reply) - 1;
1488 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) {
1495 reply[reply_len] = '\0';
1517 char reply[100];
1522 reply_len = sizeof(reply) - 1;
1523 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) {
1537 char reply[100];
1542 reply_len = sizeof(reply) - 1;
1543 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) {
1555 char reply[20];
1556 size_t replylen = sizeof(reply) - 1;
1557 wpagui->ctrlRequest("WPS_ER_STOP", reply, &replylen);
1712 char reply[100];
1728 reply_len = sizeof(reply) - 1;
1729 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) {
1751 char reply[100];
1757 reply_len = sizeof(reply) - 1;
1758 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) {
1799 char reply[64];
1802 reply_len = sizeof(reply) - 1;
1803 if (wpagui->ctrlRequest("P2P_GET_PASSPHRASE", reply, &reply_len) < 0 ||
1804 memcmp(reply, "FAIL", 4) == 0) {
1810 reply[reply_len] = '\0';
1813 reply);
1824 char reply[100];
1829 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0 ||
1830 memcmp(reply, "FAIL", 4) == 0) {
1847 char reply[100];
1852 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0 ||
1853 memcmp(reply, "FAIL", 4) == 0) {