From patchwork Mon Aug 10 04:06:27 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: akater X-Patchwork-Id: 1349631 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2001:8b0:10b:1231::1; helo=merlin.infradead.org; envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=merlin.20170209 header.b=LLg3+/r8; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20161025 header.b=n5jqAP06; dkim-atps=neutral Received: from merlin.infradead.org (merlin.infradead.org [IPv6:2001:8b0:10b:1231::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4BYWVp1tgrz9sPf for ; Sat, 22 Aug 2020 18:18:42 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Type: List-Subscribe:List-Help:List-Post:List-Archive:List-Unsubscribe:List-Id: MIME-Version:Message-ID:Date:Subject:To:From:Reply-To:Cc: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To: References:List-Owner; bh=2bgJrHWLXnyctJl0Usw8JJl4r2AWP9cA4lBCtnj9Obs=; b=LLg 3+/r8SvqhIFA+Gw1VT774v77lARjufwS/c7NK+gX5bUfFDf6KA1/Srlx1yFZtQt7uJg6ZAkBI0mo2 8yvG3E0irh6jSkzFVTZH1oGcWwuegi53CtDrm43nBDnTa+oRiSZRyM4uvKOwJHbn3lRNpXFyAqbCd WmbbZBZoB79senApzZlkS7cF0kgdt9yVLlQAlAF4Tbdjriecq64P/atArvrVvm6p6mhFq+XVhULMm CeV4ugKoxyo2HQkfeitgfdzTh48vlAUISSlESXPDma5LMUK+phbBIF74FXuseO+ypvYCwF6WcihPE FzzaQ+gc6sGTrn6pcH2mCxbo+lTPlGQ==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1k9OiY-0006qz-QA; Sat, 22 Aug 2020 08:17:38 +0000 Received: from mail-lf1-x144.google.com ([2a00:1450:4864:20::144]) by merlin.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1k4zEc-0006OL-Ve for hostap@lists.infradead.org; Mon, 10 Aug 2020 04:16:32 +0000 Received: by mail-lf1-x144.google.com with SMTP id h8so3963607lfp.9 for ; Sun, 09 Aug 2020 21:16:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:date:message-id:mime-version; bh=qBZdmJfc/UBMWyLCj4M5N6aKrsSeI9wdRACuaV69eBs=; b=n5jqAP06PuJPMLzr+lseitvCbDoWxFWDoKxzO9dxiiXu8Q+OpdU5jlE7PrjQrA7W71 /fo8DalHkmEem298mVLyPmhokmaYGx51XEA+Sj68Qv0SRtIgJx53NHJTZAbCRZdWF5Ue VlKUz5J5FqWVcDBfGoUCCs7Ba99nEkbtKVEgIVoVsqa1DVzvDnE4Is+L36GCV5SahbIk 1bFMD58gx1KB3axnYPPqeO5g/MmKXVxVcWtv/frl41lvjHgnNP3PhDDmZ/86x6pjmRTg k7PNLMj1MM9FcgHx4K1cyfntr6YnulbYu6Vg0vgha5ozEOd/rcMZbz8hJwF29Nyil/s+ aAZw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:mime-version; bh=qBZdmJfc/UBMWyLCj4M5N6aKrsSeI9wdRACuaV69eBs=; b=ulCx+Z4Lzad7OlnxGIYKbFwlFXBzx7waErZXHCzoi/RY42LGlCobRaIDc3bBx+psVI 11pmaovpuGHqggGOahJZQU2Fy9v0FGfiOJC1Qc++qacHY/MOlfydRJhFzNhCluAFnG9g bx8m4gx/6ljoA0wMzrt2PJqamMTGaoLpMaLgXgKRsAWOqX0ue8sa6TY9/2upQ9VD44Yv j6nKfoxzUPEHwVVOUCq2pncaWx45fkeBwg6znO55MkxnwQcSKAz4hBA9EiXEX+youJBI ksYeN/g3Sd8pJWftbkIjLtiyunpRooIRGONf2DVG+y5//Jk26LsO+d/w6/gU+2jlpz/W PMMw== X-Gm-Message-State: AOAM532v0yLQE9+Nob2hEX0x1Hfo9rpI/bs2k2Fj5jJ93pI7iVozTbQV lNNHCVBXJuf5nJIWGKySlPzc8N9U X-Google-Smtp-Source: ABdhPJxF2FlZuF5jLEqz9yb4SgOvd7uTQigLserkvhR0+Ih+GzY3Ael6PL69Ps7yDBpT5OZePPeOoA== X-Received: by 2002:ac2:4d31:: with SMTP id h17mr11781767lfk.144.1597032987195; Sun, 09 Aug 2020 21:16:27 -0700 (PDT) Received: from localhost (h-65-88.A785.priv.bahnhof.se. [46.59.65.88]) by smtp.googlemail.com with ESMTPSA id h5sm10196102lfm.70.2020.08.09.21.16.25 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 09 Aug 2020 21:16:26 -0700 (PDT) From: akater To: hostap@lists.infradead.org Subject: [PATCH] More consistent help command in wpa_cli Date: Mon, 10 Aug 2020 04:06:27 +0000 Message-ID: <87ft8v6t6k.fsf@gmail.com> MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20200810_001631_095534_E07D0E90 X-CRM114-Status: GOOD ( 14.18 ) X-Spam-Score: -0.2 (/) X-Spam-Report: SpamAssassin version 3.4.4 on merlin.infradead.org summary: Content analysis details: (-0.2 points) pts rule name description ---- ---------------------- -------------------------------------------------- -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at https://www.dnswl.org/, no trust [2a00:1450:4864:20:0:0:0:144 listed in] [list.dnswl.org] 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.0 SPF_PASS SPF: sender matches SPF record 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider [nuclearspace[at]gmail.com] -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature X-Mailman-Approved-At: Sat, 22 Aug 2020 04:17:37 -0400 X-BeenThere: hostap@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "Hostap" Errors-To: hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org I'm writing an interface for wpa_cli that parses its internal help page during use. Some docstrings are not separated from corresponding commands and its arguments with equality sign like others. This fixes it. I also capitalized all docstrings. Some were capitalized; some were not. I found that e.g. ... clear = Clear ... looks better and more consistent than ... clear = clear ... I also replaced all “sends”, “reports” with imperative “Send”, “Report”, ... It is likely that hostapd_cli.c needs very similar patch but I'm not using it. I'll likely patch it later if this patch gets merged. diff --git a/wpa_supplicant/wpa_cli.c b/wpa_supplicant/wpa_cli.c index f5b02f662..afdcecca4 100644 --- a/wpa_supplicant/wpa_cli.c +++ b/wpa_supplicant/wpa_cli.c @@ -3147,50 +3147,50 @@ struct wpa_cli_cmd { static const struct wpa_cli_cmd wpa_cli_commands[] = { { "status", wpa_cli_cmd_status, NULL, cli_cmd_flag_none, - "[verbose] = get current WPA/EAPOL/EAP status" }, + "[verbose] = Get current WPA/EAPOL/EAP status" }, { "ifname", wpa_cli_cmd_ifname, NULL, cli_cmd_flag_none, - "= get current interface name" }, + "= Get current interface name" }, { "ping", wpa_cli_cmd_ping, NULL, cli_cmd_flag_none, - "= pings wpa_supplicant" }, + "= Ping wpa_supplicant" }, { "relog", wpa_cli_cmd_relog, NULL, cli_cmd_flag_none, - "= re-open log-file (allow rolling logs)" }, + "= Re-open log-file (allow rolling logs)" }, { "note", wpa_cli_cmd_note, NULL, cli_cmd_flag_none, - " = add a note to wpa_supplicant debug log" }, + " = Add a note to wpa_supplicant debug log" }, { "mib", wpa_cli_cmd_mib, NULL, cli_cmd_flag_none, - "= get MIB variables (dot1x, dot11)" }, + "= Get MIB variables (dot1x, dot11)" }, { "help", wpa_cli_cmd_help, wpa_cli_complete_help, cli_cmd_flag_none, - "[command] = show usage help" }, + "[command] = Show usage help" }, { "interface", wpa_cli_cmd_interface, NULL, cli_cmd_flag_none, - "[ifname] = show interfaces/select interface" }, + "[ifname] = Show interfaces/select interface" }, { "level", wpa_cli_cmd_level, NULL, cli_cmd_flag_none, - " = change debug level" }, + " = Change debug level" }, { "license", wpa_cli_cmd_license, NULL, cli_cmd_flag_none, - "= show full wpa_cli license" }, + "= Show full wpa_cli license" }, { "quit", wpa_cli_cmd_quit, NULL, cli_cmd_flag_none, - "= exit wpa_cli" }, + "= Exit wpa_cli" }, { "set", wpa_cli_cmd_set, wpa_cli_complete_set, cli_cmd_flag_none, - "= set variables (shows list of variables when run without " + "= Set variables (shows list of variables when run without " "arguments)" }, { "dump", wpa_cli_cmd_dump, NULL, cli_cmd_flag_none, - "= dump config variables" }, + "= Dump config variables" }, { "get", wpa_cli_cmd_get, wpa_cli_complete_get, cli_cmd_flag_none, - " = get information" }, + " = Get information" }, { "driver_flags", wpa_cli_cmd_driver_flags, NULL, cli_cmd_flag_none, - "= list driver flags" }, + "= List driver flags" }, { "logon", wpa_cli_cmd_logon, NULL, cli_cmd_flag_none, "= IEEE 802.1X EAPOL state machine logon" }, @@ -3199,272 +3199,272 @@ static const struct wpa_cli_cmd wpa_cli_commands[] = { "= IEEE 802.1X EAPOL state machine logoff" }, { "pmksa", wpa_cli_cmd_pmksa, NULL, cli_cmd_flag_none, - "= show PMKSA cache" }, + "= Show PMKSA cache" }, { "pmksa_flush", wpa_cli_cmd_pmksa_flush, NULL, cli_cmd_flag_none, - "= flush PMKSA cache entries" }, + "= Flush PMKSA cache entries" }, #ifdef CONFIG_PMKSA_CACHE_EXTERNAL { "pmksa_get", wpa_cli_cmd_pmksa_get, NULL, cli_cmd_flag_none, - " = fetch all stored PMKSA cache entries" }, + " = Fetch all stored PMKSA cache entries" }, { "pmksa_add", wpa_cli_cmd_pmksa_add, NULL, cli_cmd_flag_sensitive, - " = store PMKSA cache entry from external storage" }, + " = Store PMKSA cache entry from external storage" }, #ifdef CONFIG_MESH { "mesh_pmksa_get", wpa_cli_mesh_cmd_pmksa_get, NULL, cli_cmd_flag_none, - " = fetch all stored mesh PMKSA cache entries" }, + " = Fetch all stored mesh PMKSA cache entries" }, { "mesh_pmksa_add", wpa_cli_mesh_cmd_pmksa_add, NULL, cli_cmd_flag_sensitive, - " = store mesh PMKSA cache entry from external storage" }, + " = Store mesh PMKSA cache entry from external storage" }, #endif /* CONFIG_MESH */ #endif /* CONFIG_PMKSA_CACHE_EXTERNAL */ { "reassociate", wpa_cli_cmd_reassociate, NULL, cli_cmd_flag_none, - "= force reassociation" }, + "= Force reassociation" }, { "reattach", wpa_cli_cmd_reattach, NULL, cli_cmd_flag_none, - "= force reassociation back to the same BSS" }, + "= Force reassociation back to the same BSS" }, { "preauthenticate", wpa_cli_cmd_preauthenticate, wpa_cli_complete_bss, cli_cmd_flag_none, - " = force preauthentication" }, + " = Force preauthentication" }, { "identity", wpa_cli_cmd_identity, wpa_cli_complete_network_id, cli_cmd_flag_none, - " = configure identity for an SSID" }, + " = Configure identity for an SSID" }, { "password", wpa_cli_cmd_password, wpa_cli_complete_network_id, cli_cmd_flag_sensitive, - " = configure password for an SSID" }, + " = Configure password for an SSID" }, { "new_password", wpa_cli_cmd_new_password, wpa_cli_complete_network_id, cli_cmd_flag_sensitive, - " = change password for an SSID" }, + " = Change password for an SSID" }, { "pin", wpa_cli_cmd_pin, wpa_cli_complete_network_id, cli_cmd_flag_sensitive, - " = configure pin for an SSID" }, + " = Configure pin for an SSID" }, { "otp", wpa_cli_cmd_otp, wpa_cli_complete_network_id, cli_cmd_flag_sensitive, - " = configure one-time-password for an SSID" + " = Configure one-time-password for an SSID" }, { "psk_passphrase", wpa_cli_cmd_psk_passphrase, wpa_cli_complete_network_id, cli_cmd_flag_sensitive, - " = configure PSK/passphrase for an SSID" }, + " = Configure PSK/passphrase for an SSID" }, { "passphrase", wpa_cli_cmd_passphrase, wpa_cli_complete_network_id, cli_cmd_flag_sensitive, - " = configure private key passphrase\n" + " = Configure private key passphrase\n" " for an SSID" }, { "sim", wpa_cli_cmd_sim, wpa_cli_complete_network_id, cli_cmd_flag_sensitive, - " = report SIM operation result" }, + " = Report SIM operation result" }, { "bssid", wpa_cli_cmd_bssid, wpa_cli_complete_network_id, cli_cmd_flag_none, - " = set preferred BSSID for an SSID" }, + " = Set preferred BSSID for an SSID" }, { "blacklist", wpa_cli_cmd_blacklist, wpa_cli_complete_bss, cli_cmd_flag_none, - " = add a BSSID to the blacklist\n" - "blacklist clear = clear the blacklist\n" - "blacklist = display the blacklist" }, + " = Add a BSSID to the blacklist\n" + "blacklist clear = Clear the blacklist\n" + "blacklist = Display the blacklist" }, { "log_level", wpa_cli_cmd_log_level, NULL, cli_cmd_flag_none, - " [] = update the log level/timestamp\n" - "log_level = display the current log level and log options" }, + " [] = Update the log level/timestamp\n" + "log_level = Display the current log level and log options" }, { "list_networks", wpa_cli_cmd_list_networks, NULL, cli_cmd_flag_none, - "= list configured networks" }, + "= List configured networks" }, { "select_network", wpa_cli_cmd_select_network, wpa_cli_complete_network_id, cli_cmd_flag_none, - " = select a network (disable others)" }, + " = Select a network (disable others)" }, { "enable_network", wpa_cli_cmd_enable_network, wpa_cli_complete_network_id, cli_cmd_flag_none, - " = enable a network" }, + " = Enable a network" }, { "disable_network", wpa_cli_cmd_disable_network, wpa_cli_complete_network_id, cli_cmd_flag_none, - " = disable a network" }, + " = Disable a network" }, { "add_network", wpa_cli_cmd_add_network, NULL, cli_cmd_flag_none, - "= add a network" }, + "= Add a network" }, { "remove_network", wpa_cli_cmd_remove_network, wpa_cli_complete_network_id, cli_cmd_flag_none, - " = remove a network" }, + " = Remove a network" }, { "set_network", wpa_cli_cmd_set_network, wpa_cli_complete_network, cli_cmd_flag_sensitive, - " = set network variables (shows\n" + " = Set network variables (shows\n" " list of variables when run without arguments)" }, { "get_network", wpa_cli_cmd_get_network, wpa_cli_complete_network, cli_cmd_flag_none, - " = get network variables" }, + " = Get network variables" }, { "dup_network", wpa_cli_cmd_dup_network, wpa_cli_complete_dup_network, cli_cmd_flag_none, - " = duplicate network variables" + " = Duplicate network variables" }, { "list_creds", wpa_cli_cmd_list_creds, NULL, cli_cmd_flag_none, - "= list configured credentials" }, + "= List configured credentials" }, { "add_cred", wpa_cli_cmd_add_cred, NULL, cli_cmd_flag_none, - "= add a credential" }, + "= Add a credential" }, { "remove_cred", wpa_cli_cmd_remove_cred, NULL, cli_cmd_flag_none, - " = remove a credential" }, + " = Remove a credential" }, { "set_cred", wpa_cli_cmd_set_cred, wpa_cli_complete_cred, cli_cmd_flag_sensitive, - " = set credential variables" }, + " = Set credential variables" }, { "get_cred", wpa_cli_cmd_get_cred, wpa_cli_complete_cred, cli_cmd_flag_none, - " = get credential variables" }, + " = Get credential variables" }, { "save_config", wpa_cli_cmd_save_config, NULL, cli_cmd_flag_none, - "= save the current configuration" }, + "= Save the current configuration" }, { "disconnect", wpa_cli_cmd_disconnect, NULL, cli_cmd_flag_none, - "= disconnect and wait for reassociate/reconnect command before\n" + "= Disconnect and wait for reassociate/reconnect command before\n" " connecting" }, { "reconnect", wpa_cli_cmd_reconnect, NULL, cli_cmd_flag_none, - "= like reassociate, but only takes effect if already disconnected" + "= Like reassociate, but only takes effect if already disconnected" }, { "scan", wpa_cli_cmd_scan, NULL, cli_cmd_flag_none, - "= request new BSS scan" }, + "= Request new BSS scan" }, { "scan_results", wpa_cli_cmd_scan_results, NULL, cli_cmd_flag_none, - "= get latest scan results" }, + "= Get latest scan results" }, { "abort_scan", wpa_cli_cmd_abort_scan, NULL, cli_cmd_flag_none, - "= request ongoing scan to be aborted" }, + "= Request ongoing scan to be aborted" }, { "bss", wpa_cli_cmd_bss, wpa_cli_complete_bss, cli_cmd_flag_none, - "< | > = get detailed scan result info" }, + "< | > = Get detailed scan result info" }, { "get_capability", wpa_cli_cmd_get_capability, wpa_cli_complete_get_capability, cli_cmd_flag_none, " " - "= get capabilities" }, + "= Get capabilities" }, { "reconfigure", wpa_cli_cmd_reconfigure, NULL, cli_cmd_flag_none, - "= force wpa_supplicant to re-read its configuration file" }, + "= Force wpa_supplicant to re-read its configuration file" }, { "terminate", wpa_cli_cmd_terminate, NULL, cli_cmd_flag_none, - "= terminate wpa_supplicant" }, + "= Terminate wpa_supplicant" }, { "interface_add", wpa_cli_cmd_interface_add, NULL, cli_cmd_flag_none, " \n" - " = adds new interface, all " + " = Add new interface, all " "parameters but\n" " are optional. Supported types are station ('sta') and " "AP ('ap')" }, { "interface_remove", wpa_cli_cmd_interface_remove, NULL, cli_cmd_flag_none, - " = removes the interface" }, + " = Remove the interface" }, { "interface_list", wpa_cli_cmd_interface_list, NULL, cli_cmd_flag_none, - "= list available interfaces" }, + "= List available interfaces" }, { "ap_scan", wpa_cli_cmd_ap_scan, NULL, cli_cmd_flag_none, - " = set ap_scan parameter" }, + " = Set ap_scan parameter" }, { "scan_interval", wpa_cli_cmd_scan_interval, NULL, cli_cmd_flag_none, - " = set scan_interval parameter (in seconds)" }, + " = Set scan_interval parameter (in seconds)" }, { "bss_expire_age", wpa_cli_cmd_bss_expire_age, NULL, cli_cmd_flag_none, - " = set BSS expiration age parameter" }, + " = Set BSS expiration age parameter" }, { "bss_expire_count", wpa_cli_cmd_bss_expire_count, NULL, cli_cmd_flag_none, - " = set BSS expiration scan count parameter" }, + " = Set BSS expiration scan count parameter" }, { "bss_flush", wpa_cli_cmd_bss_flush, NULL, cli_cmd_flag_none, - " = set BSS flush age (0 by default)" }, + " = Set BSS flush age (0 by default)" }, { "ft_ds", wpa_cli_cmd_ft_ds, wpa_cli_complete_bss, cli_cmd_flag_none, - " = request over-the-DS FT with " }, + " = Request over-the-DS FT with " }, { "wps_pbc", wpa_cli_cmd_wps_pbc, wpa_cli_complete_bss, cli_cmd_flag_none, - "[BSSID] = start Wi-Fi Protected Setup: Push Button Configuration" }, + "[BSSID] = Start Wi-Fi Protected Setup: Push Button Configuration" }, { "wps_pin", wpa_cli_cmd_wps_pin, wpa_cli_complete_bss, cli_cmd_flag_sensitive, - " [PIN] = start WPS PIN method (returns PIN, if not " + " [PIN] = Start WPS PIN method (returns PIN, if not " "hardcoded)" }, { "wps_check_pin", wpa_cli_cmd_wps_check_pin, NULL, cli_cmd_flag_sensitive, - " = verify PIN checksum" }, + " = Verify PIN checksum" }, { "wps_cancel", wpa_cli_cmd_wps_cancel, NULL, cli_cmd_flag_none, - "Cancels the pending WPS operation" }, + "= Cancel the pending WPS operation" }, #ifdef CONFIG_WPS_NFC { "wps_nfc", wpa_cli_cmd_wps_nfc, wpa_cli_complete_bss, cli_cmd_flag_none, - "[BSSID] = start Wi-Fi Protected Setup: NFC" }, + "[BSSID] = Start Wi-Fi Protected Setup: NFC" }, { "wps_nfc_config_token", wpa_cli_cmd_wps_nfc_config_token, NULL, cli_cmd_flag_none, - " = build configuration token" }, + " = Build configuration token" }, { "wps_nfc_token", wpa_cli_cmd_wps_nfc_token, NULL, cli_cmd_flag_none, - " = create password token" }, + " = Create password token" }, { "wps_nfc_tag_read", wpa_cli_cmd_wps_nfc_tag_read, NULL, cli_cmd_flag_sensitive, - " = report read NFC tag with WPS data" }, + " = Report read NFC tag with WPS data" }, { "nfc_get_handover_req", wpa_cli_cmd_nfc_get_handover_req, NULL, cli_cmd_flag_none, - " = create NFC handover request" }, + " = Create NFC handover request" }, { "nfc_get_handover_sel", wpa_cli_cmd_nfc_get_handover_sel, NULL, cli_cmd_flag_none, - " = create NFC handover select" }, + " = Create NFC handover select" }, { "nfc_report_handover", wpa_cli_cmd_nfc_report_handover, NULL, cli_cmd_flag_none, - " = report completed " + " = Report completed " "NFC handover" }, #endif /* CONFIG_WPS_NFC */ { "wps_reg", wpa_cli_cmd_wps_reg, wpa_cli_complete_bss, cli_cmd_flag_sensitive, - " = start WPS Registrar to configure an AP" }, + " = Start WPS Registrar to configure an AP" }, { "wps_ap_pin", wpa_cli_cmd_wps_ap_pin, NULL, cli_cmd_flag_sensitive, - "[params..] = enable/disable AP PIN" }, + "[params..] = Enable/disable AP PIN" }, { "wps_er_start", wpa_cli_cmd_wps_er_start, NULL, cli_cmd_flag_none, - "[IP address] = start Wi-Fi Protected Setup External Registrar" }, + "[IP address] = Start Wi-Fi Protected Setup External Registrar" }, { "wps_er_stop", wpa_cli_cmd_wps_er_stop, NULL, cli_cmd_flag_none, - "= stop Wi-Fi Protected Setup External Registrar" }, + "= Stop Wi-Fi Protected Setup External Registrar" }, { "wps_er_pin", wpa_cli_cmd_wps_er_pin, NULL, cli_cmd_flag_sensitive, - " = add an Enrollee PIN to External Registrar" }, + " = Add an Enrollee PIN to External Registrar" }, { "wps_er_pbc", wpa_cli_cmd_wps_er_pbc, NULL, cli_cmd_flag_none, - " = accept an Enrollee PBC using External Registrar" }, + " = Accept an Enrollee PBC using External Registrar" }, { "wps_er_learn", wpa_cli_cmd_wps_er_learn, NULL, cli_cmd_flag_sensitive, - " = learn AP configuration" }, + " = Learn AP configuration" }, { "wps_er_set_config", wpa_cli_cmd_wps_er_set_config, NULL, cli_cmd_flag_none, - " = set AP configuration for enrolling" }, + " = Set AP configuration for enrolling" }, { "wps_er_config", wpa_cli_cmd_wps_er_config, NULL, cli_cmd_flag_sensitive, - " = configure AP" }, + " = Configure AP" }, #ifdef CONFIG_WPS_NFC { "wps_er_nfc_config_token", wpa_cli_cmd_wps_er_nfc_config_token, NULL, cli_cmd_flag_none, - " = build NFC configuration token" }, + " = Build NFC configuration token" }, #endif /* CONFIG_WPS_NFC */ { "ibss_rsn", wpa_cli_cmd_ibss_rsn, NULL, cli_cmd_flag_none, - " = request RSN authentication with in IBSS" }, + " = Request RSN authentication with in IBSS" }, #ifdef CONFIG_AP { "sta", wpa_cli_cmd_sta, wpa_cli_complete_sta, cli_cmd_flag_none, - " = get information about an associated station (AP)" }, + " = Get information about an associated station (AP)" }, { "all_sta", wpa_cli_cmd_all_sta, NULL, cli_cmd_flag_none, - "= get information about all associated stations (AP)" }, + "= Get information about all associated stations (AP)" }, { "list_sta", wpa_cli_cmd_list_sta, NULL, cli_cmd_flag_none, - "= list all stations (AP)" }, + "= List all stations (AP)" }, { "deauthenticate", wpa_cli_cmd_deauthenticate, wpa_cli_complete_deauthenticate, cli_cmd_flag_none, - " = deauthenticate a station" }, + " = Deauthenticate a station" }, { "disassociate", wpa_cli_cmd_disassociate, wpa_cli_complete_disassociate, cli_cmd_flag_none, - " = disassociate a station" }, + " = Disassociate a station" }, { "chan_switch", wpa_cli_cmd_chanswitch, NULL, cli_cmd_flag_none, " [sec_channel_offset=] [center_freq1=]" @@ -3472,23 +3472,23 @@ static const struct wpa_cli_cmd wpa_cli_commands[] = { " = CSA parameters" }, #endif /* CONFIG_AP */ { "suspend", wpa_cli_cmd_suspend, NULL, cli_cmd_flag_none, - "= notification of suspend/hibernate" }, + "= Notification of suspend/hibernate" }, { "resume", wpa_cli_cmd_resume, NULL, cli_cmd_flag_none, - "= notification of resume/thaw" }, + "= Notification of resume/thaw" }, #ifdef CONFIG_TESTING_OPTIONS { "drop_sa", wpa_cli_cmd_drop_sa, NULL, cli_cmd_flag_none, - "= drop SA without deauth/disassoc (test command)" }, + "= Drop SA without deauth/disassoc (test command)" }, #endif /* CONFIG_TESTING_OPTIONS */ { "roam", wpa_cli_cmd_roam, wpa_cli_complete_bss, cli_cmd_flag_none, - " = roam to the specified BSS" }, + " = Roam to the specified BSS" }, #ifdef CONFIG_MESH { "mesh_interface_add", wpa_cli_cmd_mesh_interface_add, NULL, cli_cmd_flag_none, "[ifname] = Create a new mesh interface" }, { "mesh_group_add", wpa_cli_cmd_mesh_group_add, NULL, cli_cmd_flag_none, - " = join a mesh network (disable others)" }, + " = Join a mesh network (disable others)" }, { "mesh_group_remove", wpa_cli_cmd_mesh_group_remove, NULL, cli_cmd_flag_none, " = Remove mesh group interface" }, @@ -3505,135 +3505,135 @@ static const struct wpa_cli_cmd wpa_cli_commands[] = { #ifdef CONFIG_P2P { "p2p_find", wpa_cli_cmd_p2p_find, wpa_cli_complete_p2p_find, cli_cmd_flag_none, - "[timeout] [type=*] = find P2P Devices for up-to timeout seconds" }, + "[timeout] [type=*] = Find P2P Devices for up-to timeout seconds" }, { "p2p_stop_find", wpa_cli_cmd_p2p_stop_find, NULL, cli_cmd_flag_none, - "= stop P2P Devices search" }, + "= Stop P2P Devices search" }, { "p2p_asp_provision", wpa_cli_cmd_p2p_asp_provision, NULL, cli_cmd_flag_none, - " adv_id= conncap= [info=] = provision with a P2P ASP Device" }, + " adv_id= conncap= [info=] = Provision with a P2P ASP Device" }, { "p2p_asp_provision_resp", wpa_cli_cmd_p2p_asp_provision_resp, NULL, cli_cmd_flag_none, - " adv_id= [role] [info=] = provision with a P2P ASP Device" }, + " adv_id= [role] [info=] = Provision with a P2P ASP Device" }, { "p2p_connect", wpa_cli_cmd_p2p_connect, wpa_cli_complete_p2p_connect, cli_cmd_flag_none, - " <\"pbc\"|PIN> [ht40] = connect to a P2P Device" }, + " <\"pbc\"|PIN> [ht40] = Connect to a P2P Device" }, { "p2p_listen", wpa_cli_cmd_p2p_listen, NULL, cli_cmd_flag_none, - "[timeout] = listen for P2P Devices for up-to timeout seconds" }, + "[timeout] = Listen for P2P Devices for up-to timeout seconds" }, { "p2p_group_remove", wpa_cli_cmd_p2p_group_remove, wpa_cli_complete_p2p_group_remove, cli_cmd_flag_none, - " = remove P2P group interface (terminate group if GO)" }, + " = Remove P2P group interface (terminate group if GO)" }, { "p2p_group_add", wpa_cli_cmd_p2p_group_add, NULL, cli_cmd_flag_none, - "[ht40] = add a new P2P group (local end as GO)" }, + "[ht40] = Add a new P2P group (local end as GO)" }, { "p2p_group_member", wpa_cli_cmd_p2p_group_member, NULL, cli_cmd_flag_none, " = Get peer interface address on local GO using peer Device Address" }, { "p2p_prov_disc", wpa_cli_cmd_p2p_prov_disc, wpa_cli_complete_p2p_peer, cli_cmd_flag_none, - " = request provisioning discovery" }, + " = Request provisioning discovery" }, { "p2p_get_passphrase", wpa_cli_cmd_p2p_get_passphrase, NULL, cli_cmd_flag_none, - "= get the passphrase for a group (GO only)" }, + "= Get the passphrase for a group (GO only)" }, { "p2p_serv_disc_req", wpa_cli_cmd_p2p_serv_disc_req, wpa_cli_complete_p2p_peer, cli_cmd_flag_none, - " = schedule service discovery request" }, + " = Schedule service discovery request" }, { "p2p_serv_disc_cancel_req", wpa_cli_cmd_p2p_serv_disc_cancel_req, NULL, cli_cmd_flag_none, - " = cancel pending service discovery request" }, + " = Cancel pending service discovery request" }, { "p2p_serv_disc_resp", wpa_cli_cmd_p2p_serv_disc_resp, NULL, cli_cmd_flag_none, - " = service discovery response" }, + " = Service discovery response" }, { "p2p_service_update", wpa_cli_cmd_p2p_service_update, NULL, cli_cmd_flag_none, - "= indicate change in local services" }, + "= Indicate change in local services" }, { "p2p_serv_disc_external", wpa_cli_cmd_p2p_serv_disc_external, NULL, cli_cmd_flag_none, - " = set external processing of service discovery" }, + " = Set external processing of service discovery" }, { "p2p_service_flush", wpa_cli_cmd_p2p_service_flush, NULL, cli_cmd_flag_none, - "= remove all stored service entries" }, + "= Remove all stored service entries" }, { "p2p_service_add", wpa_cli_cmd_p2p_service_add, NULL, cli_cmd_flag_none, - " = add a local " + " = Add a local " "service" }, { "p2p_service_rep", wpa_cli_cmd_p2p_service_rep, NULL, cli_cmd_flag_none, - "asp [] = replace " + "asp [] = Replace " "local ASP service" }, { "p2p_service_del", wpa_cli_cmd_p2p_service_del, NULL, cli_cmd_flag_none, - " [|service] = remove a local " + " [|service] = Remove a local " "service" }, { "p2p_reject", wpa_cli_cmd_p2p_reject, wpa_cli_complete_p2p_peer, cli_cmd_flag_none, - " = reject connection attempts from a specific peer" }, + " = Reject connection attempts from a specific peer" }, { "p2p_invite", wpa_cli_cmd_p2p_invite, NULL, cli_cmd_flag_none, - " [peer=addr] = invite peer" }, + " [peer=addr] = Invite peer" }, { "p2p_peers", wpa_cli_cmd_p2p_peers, NULL, cli_cmd_flag_none, - "[discovered] = list known (optionally, only fully discovered) P2P " + "[discovered] = List known (optionally, only fully discovered) P2P " "peers" }, { "p2p_peer", wpa_cli_cmd_p2p_peer, wpa_cli_complete_p2p_peer, cli_cmd_flag_none, - "
= show information about known P2P peer" }, + "
= Show information about known P2P peer" }, { "p2p_set", wpa_cli_cmd_p2p_set, wpa_cli_complete_p2p_set, cli_cmd_flag_none, - " = set a P2P parameter" }, + " = Set a P2P parameter" }, { "p2p_flush", wpa_cli_cmd_p2p_flush, NULL, cli_cmd_flag_none, - "= flush P2P state" }, + "= Flush P2P state" }, { "p2p_cancel", wpa_cli_cmd_p2p_cancel, NULL, cli_cmd_flag_none, - "= cancel P2P group formation" }, + "= Cancel P2P group formation" }, { "p2p_unauthorize", wpa_cli_cmd_p2p_unauthorize, wpa_cli_complete_p2p_peer, cli_cmd_flag_none, - "
= unauthorize a peer" }, + "
= Unauthorize a peer" }, { "p2p_presence_req", wpa_cli_cmd_p2p_presence_req, NULL, cli_cmd_flag_none, - "[ ] [ ] = request GO " + "[ ] [ ] = Request GO " "presence" }, { "p2p_ext_listen", wpa_cli_cmd_p2p_ext_listen, NULL, cli_cmd_flag_none, - "[ ] = set extended listen timing" }, + "[ ] = Set extended listen timing" }, { "p2p_remove_client", wpa_cli_cmd_p2p_remove_client, wpa_cli_complete_p2p_peer, cli_cmd_flag_none, - " = remove a peer from all groups" }, + " = Remove a peer from all groups" }, #endif /* CONFIG_P2P */ { "vendor_elem_add", wpa_cli_cmd_vendor_elem_add, NULL, cli_cmd_flag_none, - " = add vendor specific IEs to frame(s)\n" + " = Add vendor specific IEs to frame(s)\n" VENDOR_ELEM_FRAME_ID }, { "vendor_elem_get", wpa_cli_cmd_vendor_elem_get, NULL, cli_cmd_flag_none, - " = get vendor specific IE(s) to frame(s)\n" + " = Get vendor specific IE(s) to frame(s)\n" VENDOR_ELEM_FRAME_ID }, { "vendor_elem_remove", wpa_cli_cmd_vendor_elem_remove, NULL, cli_cmd_flag_none, - " = remove vendor specific IE(s) in frame(s)\n" + " = Remove vendor specific IE(s) in frame(s)\n" VENDOR_ELEM_FRAME_ID }, #ifdef CONFIG_WIFI_DISPLAY { "wfd_subelem_set", wpa_cli_cmd_wfd_subelem_set, NULL, cli_cmd_flag_none, - " [contents] = set Wi-Fi Display subelement" }, + " [contents] = Set Wi-Fi Display subelement" }, { "wfd_subelem_get", wpa_cli_cmd_wfd_subelem_get, NULL, cli_cmd_flag_none, - " = get Wi-Fi Display subelement" }, + " = Get Wi-Fi Display subelement" }, #endif /* CONFIG_WIFI_DISPLAY */ #ifdef CONFIG_INTERWORKING { "fetch_anqp", wpa_cli_cmd_fetch_anqp, NULL, cli_cmd_flag_none, - "= fetch ANQP information for all APs" }, + "= Fetch ANQP information for all APs" }, { "stop_fetch_anqp", wpa_cli_cmd_stop_fetch_anqp, NULL, cli_cmd_flag_none, - "= stop fetch_anqp operation" }, + "= Stop fetch_anqp operation" }, { "interworking_select", wpa_cli_cmd_interworking_select, NULL, cli_cmd_flag_none, - "[auto] = perform Interworking network selection" }, + "[auto] = Perform Interworking network selection" }, { "interworking_connect", wpa_cli_cmd_interworking_connect, wpa_cli_complete_bss, cli_cmd_flag_none, - " = connect using Interworking credentials" }, + " = Connect using Interworking credentials" }, { "interworking_add_network", wpa_cli_cmd_interworking_add_network, wpa_cli_complete_bss, cli_cmd_flag_none, - " = connect using Interworking credentials" }, + " = Connect using Interworking credentials" }, { "anqp_get", wpa_cli_cmd_anqp_get, wpa_cli_complete_bss, cli_cmd_flag_none, - " [,]... = request ANQP information" }, + " [,]... = Request ANQP information" }, { "gas_request", wpa_cli_cmd_gas_request, wpa_cli_complete_bss, cli_cmd_flag_none, " [QueryReq] = GAS request" }, @@ -3644,32 +3644,32 @@ static const struct wpa_cli_cmd wpa_cli_commands[] = { #ifdef CONFIG_HS20 { "hs20_anqp_get", wpa_cli_cmd_hs20_anqp_get, wpa_cli_complete_bss, cli_cmd_flag_none, - " [,]... = request HS 2.0 ANQP information" + " [,]... = Request HS 2.0 ANQP information" }, { "nai_home_realm_list", wpa_cli_cmd_get_nai_home_realm_list, wpa_cli_complete_bss, cli_cmd_flag_none, - " = get HS20 nai home realm list" }, + " = Get HS20 nai home realm list" }, { "hs20_icon_request", wpa_cli_cmd_hs20_icon_request, wpa_cli_complete_bss, cli_cmd_flag_none, - " = get Hotspot 2.0 OSU icon" }, + " = Get Hotspot 2.0 OSU icon" }, { "fetch_osu", wpa_cli_cmd_fetch_osu, NULL, cli_cmd_flag_none, - "= fetch OSU provider information from all APs" }, + "= Fetch OSU provider information from all APs" }, { "cancel_fetch_osu", wpa_cli_cmd_cancel_fetch_osu, NULL, cli_cmd_flag_none, - "= cancel fetch_osu command" }, + "= Cancel fetch_osu command" }, #endif /* CONFIG_HS20 */ { "sta_autoconnect", wpa_cli_cmd_sta_autoconnect, NULL, cli_cmd_flag_none, - "<0/1> = disable/enable automatic reconnection" }, + "<0/1> = Disable/enable automatic reconnection" }, { "tdls_discover", wpa_cli_cmd_tdls_discover, NULL, cli_cmd_flag_none, - " = request TDLS discovery with " }, + " = Request TDLS discovery with " }, { "tdls_setup", wpa_cli_cmd_tdls_setup, NULL, cli_cmd_flag_none, - " = request TDLS setup with " }, + " = Request TDLS setup with " }, { "tdls_teardown", wpa_cli_cmd_tdls_teardown, NULL, cli_cmd_flag_none, - " = tear down TDLS with " }, + " = Tear down TDLS with " }, { "tdls_link_status", wpa_cli_cmd_tdls_link_status, NULL, cli_cmd_flag_none, " = TDLS link status with " }, @@ -3677,40 +3677,40 @@ static const struct wpa_cli_cmd wpa_cli_commands[] = { cli_cmd_flag_none, " [nominal_msdu_size=#] " "[mean_data_rate=#] [min_phy_rate=#] [sba=#] [fixed_nominal_msdu] " - "= add WMM-AC traffic stream" }, + "= Add WMM-AC traffic stream" }, { "wmm_ac_delts", wpa_cli_cmd_wmm_ac_delts, NULL, cli_cmd_flag_none, - " = delete WMM-AC traffic stream" }, + " = Delete WMM-AC traffic stream" }, { "wmm_ac_status", wpa_cli_cmd_wmm_ac_status, NULL, cli_cmd_flag_none, - "= show status for Wireless Multi-Media Admission-Control" }, + "= Show status for Wireless Multi-Media Admission-Control" }, { "tdls_chan_switch", wpa_cli_cmd_tdls_chan_switch, NULL, cli_cmd_flag_none, " [sec_channel_offset=] [center_freq1=] " - "[center_freq2=] [bandwidth=] [ht|vht] = enable channel switching " + "[center_freq2=] [bandwidth=] [ht|vht] = Enable channel switching " "with TDLS peer" }, { "tdls_cancel_chan_switch", wpa_cli_cmd_tdls_cancel_chan_switch, NULL, cli_cmd_flag_none, - " = disable channel switching with TDLS peer " }, + " = Disable channel switching with TDLS peer " }, { "signal_poll", wpa_cli_cmd_signal_poll, NULL, cli_cmd_flag_none, - "= get signal parameters" }, + "= Get signal parameters" }, { "signal_monitor", wpa_cli_cmd_signal_monitor, NULL, cli_cmd_flag_none, - "= set signal monitor parameters" }, + "= Set signal monitor parameters" }, { "pktcnt_poll", wpa_cli_cmd_pktcnt_poll, NULL, cli_cmd_flag_none, - "= get TX/RX packet counters" }, + "= Get TX/RX packet counters" }, { "reauthenticate", wpa_cli_cmd_reauthenticate, NULL, cli_cmd_flag_none, - "= trigger IEEE 802.1X/EAPOL reauthentication" }, + "= Trigger IEEE 802.1X/EAPOL reauthentication" }, #ifdef CONFIG_AUTOSCAN { "autoscan", wpa_cli_cmd_autoscan, NULL, cli_cmd_flag_none, "[params] = Set or unset (if none) autoscan parameters" }, #endif /* CONFIG_AUTOSCAN */ #ifdef CONFIG_WNM { "wnm_sleep", wpa_cli_cmd_wnm_sleep, NULL, cli_cmd_flag_none, - " [interval=#] = enter/exit WNM-Sleep mode" }, + " [interval=#] = Enter/exit WNM-Sleep mode" }, { "wnm_bss_query", wpa_cli_cmd_wnm_bss_query, NULL, cli_cmd_flag_none, " [list]" " [neighbor=,,,,[,]" @@ -3719,13 +3719,13 @@ static const struct wpa_cli_cmd wpa_cli_commands[] = { { "raw", wpa_cli_cmd_raw, NULL, cli_cmd_flag_sensitive, " = Sent unprocessed command" }, { "flush", wpa_cli_cmd_flush, NULL, cli_cmd_flag_none, - "= flush wpa_supplicant state" }, + "= Flush wpa_supplicant state" }, #ifdef ANDROID { "driver", wpa_cli_cmd_driver, NULL, cli_cmd_flag_none, - " = driver private commands" }, + " = Driver private commands" }, #endif /* ANDROID */ { "radio_work", wpa_cli_cmd_radio_work, NULL, cli_cmd_flag_none, - "= radio_work " }, + "= Radio_work " }, { "vendor", wpa_cli_cmd_vendor, NULL, cli_cmd_flag_none, " [] = Send vendor command" }, @@ -3734,64 +3734,64 @@ static const struct wpa_cli_cmd wpa_cli_commands[] = { "[ssid=] [lci] [civic] = Trigger request to AP for neighboring AP report (with optional given SSID in hex or enclosed in double quotes, default: current SSID; with optional LCI and location civic request)" }, { "erp_flush", wpa_cli_cmd_erp_flush, NULL, cli_cmd_flag_none, - "= flush ERP keys" }, + "= Flush ERP keys" }, { "mac_rand_scan", wpa_cli_cmd_mac_rand_scan, NULL, cli_cmd_flag_none, " enable=<0/1> [addr=mac-address " - "mask=mac-address-mask] = scan MAC randomization" + "mask=mac-address-mask] = Scan MAC randomization" }, { "get_pref_freq_list", wpa_cli_cmd_get_pref_freq_list, NULL, cli_cmd_flag_none, - " = retrieve preferred freq list for the specified interface type" }, + " = Retrieve preferred freq list for the specified interface type" }, { "p2p_lo_start", wpa_cli_cmd_p2p_lo_start, NULL, cli_cmd_flag_none, - " = start P2P listen offload" }, + " = Start P2P listen offload" }, { "p2p_lo_stop", wpa_cli_cmd_p2p_lo_stop, NULL, cli_cmd_flag_none, - "= stop P2P listen offload" }, + "= Stop P2P listen offload" }, #ifdef CONFIG_DPP { "dpp_qr_code", wpa_cli_cmd_dpp_qr_code, NULL, cli_cmd_flag_none, - "report a scanned DPP URI from a QR Code" }, + "= Report a scanned DPP URI from a QR Code" }, { "dpp_bootstrap_gen", wpa_cli_cmd_dpp_bootstrap_gen, NULL, cli_cmd_flag_sensitive, - "type= [chan=..] [mac=..] [info=..] [curve=..] [key=..] = generate DPP bootstrap information" }, + "type= [chan=..] [mac=..] [info=..] [curve=..] [key=..] = Generate DPP bootstrap information" }, { "dpp_bootstrap_remove", wpa_cli_cmd_dpp_bootstrap_remove, NULL, cli_cmd_flag_none, - "*| = remove DPP bootstrap information" }, + "*| = Remove DPP bootstrap information" }, { "dpp_bootstrap_get_uri", wpa_cli_cmd_dpp_bootstrap_get_uri, NULL, cli_cmd_flag_none, - " = get DPP bootstrap URI" }, + " = Get DPP bootstrap URI" }, { "dpp_bootstrap_info", wpa_cli_cmd_dpp_bootstrap_info, NULL, cli_cmd_flag_none, - " = show DPP bootstrap information" }, + " = Show DPP bootstrap information" }, { "dpp_auth_init", wpa_cli_cmd_dpp_auth_init, NULL, cli_cmd_flag_none, - "peer= [own=] = initiate DPP bootstrapping" }, + "peer= [own=] = Initiate DPP bootstrapping" }, { "dpp_listen", wpa_cli_cmd_dpp_listen, NULL, cli_cmd_flag_none, - " = start DPP listen" }, + " = Start DPP listen" }, { "dpp_stop_listen", wpa_cli_cmd_dpp_stop_listen, NULL, cli_cmd_flag_none, - "= stop DPP listen" }, + "= Stop DPP listen" }, { "dpp_configurator_add", wpa_cli_cmd_dpp_configurator_add, NULL, cli_cmd_flag_sensitive, - "[curve=..] [key=..] = add DPP configurator" }, + "[curve=..] [key=..] = Add DPP configurator" }, { "dpp_configurator_remove", wpa_cli_cmd_dpp_configurator_remove, NULL, cli_cmd_flag_none, - "*| = remove DPP configurator" }, + "*| = Remove DPP configurator" }, { "dpp_configurator_get_key", wpa_cli_cmd_dpp_configurator_get_key, NULL, cli_cmd_flag_none, " = Get DPP configurator's private key" }, { "dpp_configurator_sign", wpa_cli_cmd_dpp_configurator_sign, NULL, cli_cmd_flag_none, - "conf= configurator= = generate self DPP configuration" }, + "conf= configurator= = Generate self DPP configuration" }, { "dpp_pkex_add", wpa_cli_cmd_dpp_pkex_add, NULL, cli_cmd_flag_sensitive, - "add PKEX code" }, + "= Add PKEX code" }, { "dpp_pkex_remove", wpa_cli_cmd_dpp_pkex_remove, NULL, cli_cmd_flag_none, - "*| = remove DPP pkex information" }, + "*| = Remove DPP pkex information" }, #endif /* CONFIG_DPP */ { "all_bss", wpa_cli_cmd_all_bss, NULL, cli_cmd_flag_none, - "= list all BSS entries (scan results)" }, + "= List all BSS entries (scan results)" }, { NULL, NULL, NULL, cli_cmd_flag_none, NULL } };