]> Gitweb @ Texas Instruments - Open Source Git Repositories - git.TI.com/gitweb - build-utilities/hostap.git/blobdiff - wpa_supplicant/wpa_cli.c
Select the BSD license terms as the only license alternative
[build-utilities/hostap.git] / wpa_supplicant / wpa_cli.c
index bd1a5a6b56c6f40afedde1bdd431ab5bcb318b32..cc9f6cc27aed6813a9d9ed10f8a923d4e5e0480e 100644 (file)
@@ -1,6 +1,6 @@
 /*
  * WPA Supplicant - command line interface for wpa_supplicant daemon
- * Copyright (c) 2004-2008, Jouni Malinen <j@w1.fi>
+ * Copyright (c) 2004-2011, Jouni Malinen <j@w1.fi>
  *
  * This program is free software; you can redistribute it and/or modify
  * it under the terms of the GNU General Public License version 2 as
 #ifdef CONFIG_CTRL_IFACE_UNIX
 #include <dirent.h>
 #endif /* CONFIG_CTRL_IFACE_UNIX */
-#ifdef CONFIG_READLINE
-#include <readline/readline.h>
-#include <readline/history.h>
-#endif /* CONFIG_READLINE */
 
-#include "wpa_ctrl.h"
-#include "common.h"
-#include "version.h"
+#include "common/wpa_ctrl.h"
+#include "utils/common.h"
+#include "utils/eloop.h"
+#include "utils/edit.h"
+#include "utils/list.h"
+#include "common/version.h"
+#ifdef ANDROID
+#include <cutils/properties.h>
+#endif /* ANDROID */
 
 
 static const char *wpa_cli_version =
 "wpa_cli v" VERSION_STR "\n"
-"Copyright (c) 2004-2008, Jouni Malinen <j@w1.fi> and contributors";
+"Copyright (c) 2004-2012, Jouni Malinen <j@w1.fi> and contributors";
 
 
 static const char *wpa_cli_license =
-"This program is free software. You can distribute it and/or modify it\n"
-"under the terms of the GNU General Public License version 2.\n"
-"\n"
-"Alternatively, this software may be distributed under the terms of the\n"
-"BSD license. See README and COPYING for more details.\n";
+"This software may be distributed under the terms of the BSD license.\n"
+"See README for more details.\n";
 
 static const char *wpa_cli_full_license =
-"This program is free software; you can redistribute it and/or modify\n"
-"it under the terms of the GNU General Public License version 2 as\n"
-"published by the Free Software Foundation.\n"
-"\n"
-"This program is distributed in the hope that it will be useful,\n"
-"but WITHOUT ANY WARRANTY; without even the implied warranty of\n"
-"MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the\n"
-"GNU General Public License for more details.\n"
-"\n"
-"You should have received a copy of the GNU General Public License\n"
-"along with this program; if not, write to the Free Software\n"
-"Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA\n"
-"\n"
-"Alternatively, this software may be distributed under the terms of the\n"
-"BSD license.\n"
+"This software may be distributed under the terms of the BSD license.\n"
 "\n"
 "Redistribution and use in source and binary forms, with or without\n"
 "modification, are permitted provided that the following conditions are\n"
@@ -86,114 +71,306 @@ static const char *wpa_cli_full_license =
 "OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n"
 "\n";
 
-static const char *commands_help =
-"commands:\n"
-"  status [verbose] = get current WPA/EAPOL/EAP status\n"
-"  mib = get MIB variables (dot1x, dot11)\n"
-"  help = show this usage help\n"
-"  interface [ifname] = show interfaces/select interface\n"
-"  level <debug level> = change debug level\n"
-"  license = show full wpa_cli license\n"
-"  logoff = IEEE 802.1X EAPOL state machine logoff\n"
-"  logon = IEEE 802.1X EAPOL state machine logon\n"
-"  set = set variables (shows list of variables when run without arguments)\n"
-"  pmksa = show PMKSA cache\n"
-"  reassociate = force reassociation\n"
-"  reconfigure = force wpa_supplicant to re-read its configuration file\n"
-"  preauthenticate <BSSID> = force preauthentication\n"
-"  identity <network id> <identity> = configure identity for an SSID\n"
-"  password <network id> <password> = configure password for an SSID\n"
-"  new_password <network id> <password> = change password for an SSID\n"
-"  pin <network id> <pin> = configure pin for an SSID\n"
-"  otp <network id> <password> = configure one-time-password for an SSID\n"
-"  passphrase <network id> <passphrase> = configure private key passphrase\n"
-"    for an SSID\n"
-"  bssid <network id> <BSSID> = set preferred BSSID for an SSID\n"
-"  list_networks = list configured networks\n"
-"  select_network <network id> = select a network (disable others)\n"
-"  enable_network <network id> = enable a network\n"
-"  disable_network <network id> = disable a network\n"
-"  add_network = add a network\n"
-"  remove_network <network id> = remove a network\n"
-"  set_network <network id> <variable> <value> = set network variables "
-"(shows\n"
-"    list of variables when run without arguments)\n"
-"  get_network <network id> <variable> = get network variables\n"
-"  save_config = save the current configuration\n"
-"  disconnect = disconnect and wait for reassociate/reconnect command before\n "
-"    connecting\n"
-"  reconnect = like reassociate, but only takes effect if already "
-"disconnected\n"
-"  scan = request new BSS scan\n"
-"  scan_results = get latest scan results\n"
-"  bss <<idx> | <bssid>> = get detailed scan result info\n"
-"  get_capability <eap/pairwise/group/key_mgmt/proto/auth_alg> = "
-"get capabilies\n"
-"  ap_scan <value> = set ap_scan parameter\n"
-"  stkstart <addr> = request STK negotiation with <addr>\n"
-"  ft_ds <addr> = request over-the-DS FT with <addr>\n"
-"  wps_pbc [BSSID] = start Wi-Fi Protected Setup: Push Button Configuration\n"
-"  wps_pin <BSSID> [PIN] = start WPS PIN method (returns PIN, if not "
-"hardcoded)\n"
-"  wps_reg <BSSID> <AP PIN> = start WPS Registrar to configure an AP\n"
-"  terminate = terminate wpa_supplicant\n"
-"  quit = exit wpa_cli\n";
-
 static struct wpa_ctrl *ctrl_conn;
+static struct wpa_ctrl *mon_conn;
 static int wpa_cli_quit = 0;
 static int wpa_cli_attached = 0;
 static int wpa_cli_connected = 0;
 static int wpa_cli_last_id = 0;
-static const char *ctrl_iface_dir = "/var/run/wpa_supplicant";
+#ifndef CONFIG_CTRL_IFACE_DIR
+#define CONFIG_CTRL_IFACE_DIR "/var/run/wpa_supplicant"
+#endif /* CONFIG_CTRL_IFACE_DIR */
+static const char *ctrl_iface_dir = CONFIG_CTRL_IFACE_DIR;
 static char *ctrl_ifname = NULL;
 static const char *pid_file = NULL;
 static const char *action_file = NULL;
+static int ping_interval = 5;
+static int interactive = 0;
+
+struct cli_txt_entry {
+       struct dl_list list;
+       char *txt;
+};
+
+static DEFINE_DL_LIST(bsses); /* struct cli_txt_entry */
+static DEFINE_DL_LIST(p2p_peers); /* struct cli_txt_entry */
+static DEFINE_DL_LIST(p2p_groups); /* struct cli_txt_entry */
+
+
+static void print_help(void);
+static void wpa_cli_mon_receive(int sock, void *eloop_ctx, void *sock_ctx);
 
 
 static void usage(void)
 {
        printf("wpa_cli [-p<path to ctrl sockets>] [-i<ifname>] [-hvB] "
               "[-a<action file>] \\\n"
-              "        [-P<pid file>] [-g<global ctrl>]  [command..]\n"
+              "        [-P<pid file>] [-g<global ctrl>] [-G<ping interval>]  "
+              "[command..]\n"
               "  -h = help (show this usage text)\n"
               "  -v = shown version information\n"
               "  -a = run in daemon mode executing the action file based on "
               "events from\n"
               "       wpa_supplicant\n"
               "  -B = run a daemon in the background\n"
-              "  default path: /var/run/wpa_supplicant\n"
-              "  default interface: first interface found in socket path\n"
-              "%s",
-              commands_help);
+              "  default path: " CONFIG_CTRL_IFACE_DIR "\n"
+              "  default interface: first interface found in socket path\n");
+       print_help();
+}
+
+
+static void cli_txt_list_free(struct cli_txt_entry *e)
+{
+       dl_list_del(&e->list);
+       os_free(e->txt);
+       os_free(e);
+}
+
+
+static void cli_txt_list_flush(struct dl_list *list)
+{
+       struct cli_txt_entry *e;
+       while ((e = dl_list_first(list, struct cli_txt_entry, list)))
+               cli_txt_list_free(e);
+}
+
+
+static struct cli_txt_entry * cli_txt_list_get(struct dl_list *txt_list,
+                                              const char *txt)
+{
+       struct cli_txt_entry *e;
+       dl_list_for_each(e, txt_list, struct cli_txt_entry, list) {
+               if (os_strcmp(e->txt, txt) == 0)
+                       return e;
+       }
+       return NULL;
+}
+
+
+static void cli_txt_list_del(struct dl_list *txt_list, const char *txt)
+{
+       struct cli_txt_entry *e;
+       e = cli_txt_list_get(txt_list, txt);
+       if (e)
+               cli_txt_list_free(e);
+}
+
+
+static void cli_txt_list_del_addr(struct dl_list *txt_list, const char *txt)
+{
+       u8 addr[ETH_ALEN];
+       char buf[18];
+       if (hwaddr_aton(txt, addr) < 0)
+               return;
+       os_snprintf(buf, sizeof(buf), MACSTR, MAC2STR(addr));
+       cli_txt_list_del(txt_list, buf);
+}
+
+
+#ifdef CONFIG_P2P
+static void cli_txt_list_del_word(struct dl_list *txt_list, const char *txt)
+{
+       const char *end;
+       char *buf;
+       end = os_strchr(txt, ' ');
+       if (end == NULL)
+               end = txt + os_strlen(txt);
+       buf = os_malloc(end - txt + 1);
+       if (buf == NULL)
+               return;
+       os_memcpy(buf, txt, end - txt);
+       buf[end - txt] = '\0';
+       cli_txt_list_del(txt_list, buf);
+       os_free(buf);
+}
+#endif /* CONFIG_P2P */
+
+
+static int cli_txt_list_add(struct dl_list *txt_list, const char *txt)
+{
+       struct cli_txt_entry *e;
+       e = cli_txt_list_get(txt_list, txt);
+       if (e)
+               return 0;
+       e = os_zalloc(sizeof(*e));
+       if (e == NULL)
+               return -1;
+       e->txt = os_strdup(txt);
+       if (e->txt == NULL) {
+               os_free(e);
+               return -1;
+       }
+       dl_list_add(txt_list, &e->list);
+       return 0;
+}
+
+
+#ifdef CONFIG_P2P
+static int cli_txt_list_add_addr(struct dl_list *txt_list, const char *txt)
+{
+       u8 addr[ETH_ALEN];
+       char buf[18];
+       if (hwaddr_aton(txt, addr) < 0)
+               return -1;
+       os_snprintf(buf, sizeof(buf), MACSTR, MAC2STR(addr));
+       return cli_txt_list_add(txt_list, buf);
+}
+
+
+static int cli_txt_list_add_word(struct dl_list *txt_list, const char *txt)
+{
+       const char *end;
+       char *buf;
+       int ret;
+       end = os_strchr(txt, ' ');
+       if (end == NULL)
+               end = txt + os_strlen(txt);
+       buf = os_malloc(end - txt + 1);
+       if (buf == NULL)
+               return -1;
+       os_memcpy(buf, txt, end - txt);
+       buf[end - txt] = '\0';
+       ret = cli_txt_list_add(txt_list, buf);
+       os_free(buf);
+       return ret;
+}
+#endif /* CONFIG_P2P */
+
+
+static char ** cli_txt_list_array(struct dl_list *txt_list)
+{
+       unsigned int i, count = dl_list_len(txt_list);
+       char **res;
+       struct cli_txt_entry *e;
+
+       res = os_zalloc((count + 1) * sizeof(char *));
+       if (res == NULL)
+               return NULL;
+
+       i = 0;
+       dl_list_for_each(e, txt_list, struct cli_txt_entry, list) {
+               res[i] = os_strdup(e->txt);
+               if (res[i] == NULL)
+                       break;
+               i++;
+       }
+
+       return res;
+}
+
+
+static int get_cmd_arg_num(const char *str, int pos)
+{
+       int arg = 0, i;
+
+       for (i = 0; i <= pos; i++) {
+               if (str[i] != ' ') {
+                       arg++;
+                       while (i <= pos && str[i] != ' ')
+                               i++;
+               }
+       }
+
+       if (arg > 0)
+               arg--;
+       return arg;
+}
+
+
+static int str_starts(const char *src, const char *match)
+{
+       return os_strncmp(src, match, os_strlen(match)) == 0;
+}
+
+
+static int wpa_cli_show_event(const char *event)
+{
+       const char *start;
+
+       start = os_strchr(event, '>');
+       if (start == NULL)
+               return 1;
+
+       start++;
+       /*
+        * Skip BSS added/removed events since they can be relatively frequent
+        * and are likely of not much use for an interactive user.
+        */
+       if (str_starts(start, WPA_EVENT_BSS_ADDED) ||
+           str_starts(start, WPA_EVENT_BSS_REMOVED))
+               return 0;
+
+       return 1;
 }
 
 
-static struct wpa_ctrl * wpa_cli_open_connection(const char *ifname)
+static int wpa_cli_open_connection(const char *ifname, int attach)
 {
 #if defined(CONFIG_CTRL_IFACE_UDP) || defined(CONFIG_CTRL_IFACE_NAMED_PIPE)
        ctrl_conn = wpa_ctrl_open(ifname);
-       return ctrl_conn;
+       if (ctrl_conn == NULL)
+               return -1;
+
+       if (attach && interactive)
+               mon_conn = wpa_ctrl_open(ifname);
+       else
+               mon_conn = NULL;
 #else /* CONFIG_CTRL_IFACE_UDP || CONFIG_CTRL_IFACE_NAMED_PIPE */
-       char *cfile;
+       char *cfile = NULL;
        int flen, res;
 
        if (ifname == NULL)
-               return NULL;
+               return -1;
 
-       flen = os_strlen(ctrl_iface_dir) + os_strlen(ifname) + 2;
-       cfile = os_malloc(flen);
-       if (cfile == NULL)
-               return NULL;
-       res = os_snprintf(cfile, flen, "%s/%s", ctrl_iface_dir, ifname);
-       if (res < 0 || res >= flen) {
-               os_free(cfile);
-               return NULL;
+#ifdef ANDROID
+       if (access(ctrl_iface_dir, F_OK) < 0) {
+               cfile = os_strdup(ifname);
+               if (cfile == NULL)
+                       return -1;
+       }
+#endif /* ANDROID */
+
+       if (cfile == NULL) {
+               flen = os_strlen(ctrl_iface_dir) + os_strlen(ifname) + 2;
+               cfile = os_malloc(flen);
+               if (cfile == NULL)
+                       return -1;
+               res = os_snprintf(cfile, flen, "%s/%s", ctrl_iface_dir,
+                                 ifname);
+               if (res < 0 || res >= flen) {
+                       os_free(cfile);
+                       return -1;
+               }
        }
 
        ctrl_conn = wpa_ctrl_open(cfile);
+       if (ctrl_conn == NULL) {
+               os_free(cfile);
+               return -1;
+       }
+
+       if (attach && interactive)
+               mon_conn = wpa_ctrl_open(cfile);
+       else
+               mon_conn = NULL;
        os_free(cfile);
-       return ctrl_conn;
 #endif /* CONFIG_CTRL_IFACE_UDP || CONFIG_CTRL_IFACE_NAMED_PIPE */
+
+       if (mon_conn) {
+               if (wpa_ctrl_attach(mon_conn) == 0) {
+                       wpa_cli_attached = 1;
+                       if (interactive)
+                               eloop_register_read_sock(
+                                       wpa_ctrl_get_fd(mon_conn),
+                                       wpa_cli_mon_receive, NULL, NULL);
+               } else {
+                       printf("Warning: Failed to attach to "
+                              "wpa_supplicant.\n");
+                       return -1;
+               }
+       }
+
+       return 0;
 }
 
 
@@ -203,11 +380,16 @@ static void wpa_cli_close_connection(void)
                return;
 
        if (wpa_cli_attached) {
-               wpa_ctrl_detach(ctrl_conn);
+               wpa_ctrl_detach(interactive ? mon_conn : ctrl_conn);
                wpa_cli_attached = 0;
        }
        wpa_ctrl_close(ctrl_conn);
        ctrl_conn = NULL;
+       if (mon_conn) {
+               eloop_unregister_read_sock(wpa_ctrl_get_fd(mon_conn));
+               wpa_ctrl_close(mon_conn);
+               mon_conn = NULL;
+       }
 }
 
 
@@ -240,6 +422,8 @@ static int _wpa_ctrl_command(struct wpa_ctrl *ctrl, char *cmd, int print)
        if (print) {
                buf[len] = '\0';
                printf("%s", buf);
+               if (interactive && len > 0 && buf[len - 1] != '\n')
+                       printf("\n");
        }
        return 0;
 }
@@ -253,8 +437,11 @@ static int wpa_ctrl_command(struct wpa_ctrl *ctrl, char *cmd)
 
 static int wpa_cli_cmd_status(struct wpa_ctrl *ctrl, int argc, char *argv[])
 {
-       int verbose = argc > 0 && os_strcmp(argv[0], "verbose") == 0;
-       return wpa_ctrl_command(ctrl, verbose ? "STATUS-VERBOSE" : "STATUS");
+       if (argc > 0 && os_strcmp(argv[0], "verbose") == 0)
+               return wpa_ctrl_command(ctrl, "STATUS-VERBOSE");
+       if (argc > 0 && os_strcmp(argv[0], "wps") == 0)
+               return wpa_ctrl_command(ctrl, "STATUS-WPS");
+       return wpa_ctrl_command(ctrl, "STATUS");
 }
 
 
@@ -264,6 +451,25 @@ static int wpa_cli_cmd_ping(struct wpa_ctrl *ctrl, int argc, char *argv[])
 }
 
 
+static int wpa_cli_cmd_relog(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       return wpa_ctrl_command(ctrl, "RELOG");
+}
+
+
+static int wpa_cli_cmd_note(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       char cmd[256];
+       int ret;
+       if (argc == 0)
+               return -1;
+       ret = os_snprintf(cmd, sizeof(cmd), "NOTE %s", argv[0]);
+       if (ret < 0 || (size_t) ret >= sizeof(cmd))
+               return -1;
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
 static int wpa_cli_cmd_mib(struct wpa_ctrl *ctrl, int argc, char *argv[])
 {
        return wpa_ctrl_command(ctrl, "MIB");
@@ -278,7 +484,7 @@ static int wpa_cli_cmd_pmksa(struct wpa_ctrl *ctrl, int argc, char *argv[])
 
 static int wpa_cli_cmd_help(struct wpa_ctrl *ctrl, int argc, char *argv[])
 {
-       printf("%s", commands_help);
+       print_help();
        return 0;
 }
 
@@ -293,6 +499,8 @@ static int wpa_cli_cmd_license(struct wpa_ctrl *ctrl, int argc, char *argv[])
 static int wpa_cli_cmd_quit(struct wpa_ctrl *ctrl, int argc, char *argv[])
 {
        wpa_cli_quit = 1;
+       if (interactive)
+               eloop_terminate();
        return 0;
 }
 
@@ -327,13 +535,17 @@ static int wpa_cli_cmd_set(struct wpa_ctrl *ctrl, int argc, char *argv[])
                return 0;
        }
 
-       if (argc != 2) {
+       if (argc != 1 && argc != 2) {
                printf("Invalid SET command: needs two arguments (variable "
                       "name and value)\n");
                return -1;
        }
 
-       res = os_snprintf(cmd, sizeof(cmd), "SET %s %s", argv[0], argv[1]);
+       if (argc == 1)
+               res = os_snprintf(cmd, sizeof(cmd), "SET %s ", argv[0]);
+       else
+               res = os_snprintf(cmd, sizeof(cmd), "SET %s %s",
+                                 argv[0], argv[1]);
        if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
                printf("Too long SET command.\n");
                return -1;
@@ -342,6 +554,26 @@ static int wpa_cli_cmd_set(struct wpa_ctrl *ctrl, int argc, char *argv[])
 }
 
 
+static int wpa_cli_cmd_get(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       char cmd[256];
+       int res;
+
+       if (argc != 1) {
+               printf("Invalid GET command: need one argument (variable "
+                      "name)\n");
+               return -1;
+       }
+
+       res = os_snprintf(cmd, sizeof(cmd), "GET %s", argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+               printf("Too long GET command.\n");
+               return -1;
+       }
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
 static int wpa_cli_cmd_logoff(struct wpa_ctrl *ctrl, int argc, char *argv[])
 {
        return wpa_ctrl_command(ctrl, "LOGOFF");
@@ -401,6 +633,66 @@ static int wpa_cli_cmd_ap_scan(struct wpa_ctrl *ctrl, int argc, char *argv[])
 }
 
 
+static int wpa_cli_cmd_scan_interval(struct wpa_ctrl *ctrl, int argc,
+                                    char *argv[])
+{
+       char cmd[256];
+       int res;
+
+       if (argc != 1) {
+               printf("Invalid SCAN_INTERVAL command: needs one argument "
+                      "scan_interval value)\n");
+               return -1;
+       }
+       res = os_snprintf(cmd, sizeof(cmd), "SCAN_INTERVAL %s", argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+               printf("Too long SCAN_INTERVAL command.\n");
+               return -1;
+       }
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_bss_expire_age(struct wpa_ctrl *ctrl, int argc,
+                                     char *argv[])
+{
+       char cmd[256];
+       int res;
+
+       if (argc != 1) {
+               printf("Invalid BSS_EXPIRE_AGE command: needs one argument "
+                      "(bss_expire_age value)\n");
+               return -1;
+       }
+       res = os_snprintf(cmd, sizeof(cmd), "BSS_EXPIRE_AGE %s", argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+               printf("Too long BSS_EXPIRE_AGE command.\n");
+               return -1;
+       }
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_bss_expire_count(struct wpa_ctrl *ctrl, int argc,
+                                       char *argv[])
+{
+       char cmd[256];
+       int res;
+
+       if (argc != 1) {
+               printf("Invalid BSS_EXPIRE_COUNT command: needs one argument "
+                      "(bss_expire_count value)\n");
+               return -1;
+       }
+       res = os_snprintf(cmd, sizeof(cmd), "BSS_EXPIRE_COUNT %s", argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+               printf("Too long BSS_EXPIRE_COUNT command.\n");
+               return -1;
+       }
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
 static int wpa_cli_cmd_stkstart(struct wpa_ctrl *ctrl, int argc,
                                char *argv[])
 {
@@ -495,75 +787,395 @@ static int wpa_cli_cmd_wps_pin(struct wpa_ctrl *ctrl, int argc, char *argv[])
 }
 
 
-static int wpa_cli_cmd_wps_reg(struct wpa_ctrl *ctrl, int argc, char *argv[])
+static int wpa_cli_cmd_wps_check_pin(struct wpa_ctrl *ctrl, int argc,
+                                    char *argv[])
 {
        char cmd[256];
        int res;
 
-       if (argc != 2) {
-               printf("Invalid WPS_REG command: need two arguments:\n"
-                      "- BSSID: use 'any' to select any\n"
-                      "- AP PIN\n");
+       if (argc != 1 && argc != 2) {
+               printf("Invalid WPS_CHECK_PIN command: needs one argument:\n"
+                      "- PIN to be verified\n");
                return -1;
        }
 
-       res = os_snprintf(cmd, sizeof(cmd), "WPS_REG %s %s", argv[0], argv[1]);
+       if (argc == 2)
+               res = os_snprintf(cmd, sizeof(cmd), "WPS_CHECK_PIN %s %s",
+                                 argv[0], argv[1]);
+       else
+               res = os_snprintf(cmd, sizeof(cmd), "WPS_CHECK_PIN %s",
+                                 argv[0]);
        if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
-               printf("Too long WPS_REG command.\n");
+               printf("Too long WPS_CHECK_PIN command.\n");
                return -1;
        }
        return wpa_ctrl_command(ctrl, cmd);
 }
 
 
-static int wpa_cli_cmd_level(struct wpa_ctrl *ctrl, int argc, char *argv[])
+static int wpa_cli_cmd_wps_cancel(struct wpa_ctrl *ctrl, int argc,
+                                 char *argv[])
+{
+       return wpa_ctrl_command(ctrl, "WPS_CANCEL");
+}
+
+
+#ifdef CONFIG_WPS_OOB
+static int wpa_cli_cmd_wps_oob(struct wpa_ctrl *ctrl, int argc, char *argv[])
 {
        char cmd[256];
        int res;
 
-       if (argc != 1) {
-               printf("Invalid LEVEL command: needs one argument (debug "
-                      "level)\n");
+       if (argc != 3 && argc != 4) {
+               printf("Invalid WPS_OOB command: need three or four "
+                      "arguments:\n"
+                      "- DEV_TYPE: use 'ufd' or 'nfc'\n"
+                      "- PATH: path of OOB device like '/mnt'\n"
+                      "- METHOD: OOB method 'pin-e' or 'pin-r', "
+                      "'cred'\n"
+                      "- DEV_NAME: (only for NFC) device name like "
+                      "'pn531'\n");
                return -1;
        }
-       res = os_snprintf(cmd, sizeof(cmd), "LEVEL %s", argv[0]);
+
+       if (argc == 3)
+               res = os_snprintf(cmd, sizeof(cmd), "WPS_OOB %s %s %s",
+                                 argv[0], argv[1], argv[2]);
+       else
+               res = os_snprintf(cmd, sizeof(cmd), "WPS_OOB %s %s %s %s",
+                                 argv[0], argv[1], argv[2], argv[3]);
        if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
-               printf("Too long LEVEL command.\n");
+               printf("Too long WPS_OOB command.\n");
                return -1;
        }
        return wpa_ctrl_command(ctrl, cmd);
 }
+#endif /* CONFIG_WPS_OOB */
 
 
-static int wpa_cli_cmd_identity(struct wpa_ctrl *ctrl, int argc, char *argv[])
+static int wpa_cli_cmd_wps_reg(struct wpa_ctrl *ctrl, int argc, char *argv[])
 {
-       char cmd[256], *pos, *end;
-       int i, ret;
+       char cmd[256];
+       int res;
 
-       if (argc < 2) {
-               printf("Invalid IDENTITY command: needs two arguments "
-                      "(network id and identity)\n");
+       if (argc == 2)
+               res = os_snprintf(cmd, sizeof(cmd), "WPS_REG %s %s",
+                                 argv[0], argv[1]);
+       else if (argc == 5 || argc == 6) {
+               char ssid_hex[2 * 32 + 1];
+               char key_hex[2 * 64 + 1];
+               int i;
+
+               ssid_hex[0] = '\0';
+               for (i = 0; i < 32; i++) {
+                       if (argv[2][i] == '\0')
+                               break;
+                       os_snprintf(&ssid_hex[i * 2], 3, "%02x", argv[2][i]);
+               }
+
+               key_hex[0] = '\0';
+               if (argc == 6) {
+                       for (i = 0; i < 64; i++) {
+                               if (argv[5][i] == '\0')
+                                       break;
+                               os_snprintf(&key_hex[i * 2], 3, "%02x",
+                                           argv[5][i]);
+                       }
+               }
+
+               res = os_snprintf(cmd, sizeof(cmd),
+                                 "WPS_REG %s %s %s %s %s %s",
+                                 argv[0], argv[1], ssid_hex, argv[3], argv[4],
+                                 key_hex);
+       } else {
+               printf("Invalid WPS_REG command: need two arguments:\n"
+                      "- BSSID of the target AP\n"
+                      "- AP PIN\n");
+               printf("Alternatively, six arguments can be used to "
+                      "reconfigure the AP:\n"
+                      "- BSSID of the target AP\n"
+                      "- AP PIN\n"
+                      "- new SSID\n"
+                      "- new auth (OPEN, WPAPSK, WPA2PSK)\n"
+                      "- new encr (NONE, WEP, TKIP, CCMP)\n"
+                      "- new key\n");
                return -1;
        }
 
-       end = cmd + sizeof(cmd);
-       pos = cmd;
-       ret = os_snprintf(pos, end - pos, WPA_CTRL_RSP "IDENTITY-%s:%s",
-                         argv[0], argv[1]);
-       if (ret < 0 || ret >= end - pos) {
-               printf("Too long IDENTITY command.\n");
+       if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+               printf("Too long WPS_REG command.\n");
                return -1;
        }
-       pos += ret;
-       for (i = 2; i < argc; i++) {
-               ret = os_snprintf(pos, end - pos, " %s", argv[i]);
-               if (ret < 0 || ret >= end - pos) {
-                       printf("Too long IDENTITY command.\n");
-                       return -1;
-               }
-               pos += ret;
-       }
-
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_wps_ap_pin(struct wpa_ctrl *ctrl, int argc,
+                                 char *argv[])
+{
+       char cmd[256];
+       int res;
+
+       if (argc < 1) {
+               printf("Invalid WPS_AP_PIN command: needs at least one "
+                      "argument\n");
+               return -1;
+       }
+
+       if (argc > 2)
+               res = os_snprintf(cmd, sizeof(cmd), "WPS_AP_PIN %s %s %s",
+                                 argv[0], argv[1], argv[2]);
+       else if (argc > 1)
+               res = os_snprintf(cmd, sizeof(cmd), "WPS_AP_PIN %s %s",
+                                 argv[0], argv[1]);
+       else
+               res = os_snprintf(cmd, sizeof(cmd), "WPS_AP_PIN %s",
+                                 argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+               printf("Too long WPS_AP_PIN command.\n");
+               return -1;
+       }
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_wps_er_start(struct wpa_ctrl *ctrl, int argc,
+                                   char *argv[])
+{
+       char cmd[100];
+       if (argc > 0) {
+               os_snprintf(cmd, sizeof(cmd), "WPS_ER_START %s", argv[0]);
+               return wpa_ctrl_command(ctrl, cmd);
+       }
+       return wpa_ctrl_command(ctrl, "WPS_ER_START");
+}
+
+
+static int wpa_cli_cmd_wps_er_stop(struct wpa_ctrl *ctrl, int argc,
+                                  char *argv[])
+{
+       return wpa_ctrl_command(ctrl, "WPS_ER_STOP");
+
+}
+
+
+static int wpa_cli_cmd_wps_er_pin(struct wpa_ctrl *ctrl, int argc,
+                                 char *argv[])
+{
+       char cmd[256];
+       int res;
+
+       if (argc < 2) {
+               printf("Invalid WPS_ER_PIN command: need at least two "
+                      "arguments:\n"
+                      "- UUID: use 'any' to select any\n"
+                      "- PIN: Enrollee PIN\n"
+                      "optional: - Enrollee MAC address\n");
+               return -1;
+       }
+
+       if (argc > 2)
+               res = os_snprintf(cmd, sizeof(cmd), "WPS_ER_PIN %s %s %s",
+                                 argv[0], argv[1], argv[2]);
+       else
+               res = os_snprintf(cmd, sizeof(cmd), "WPS_ER_PIN %s %s",
+                                 argv[0], argv[1]);
+       if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+               printf("Too long WPS_ER_PIN command.\n");
+               return -1;
+       }
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_wps_er_pbc(struct wpa_ctrl *ctrl, int argc,
+                                 char *argv[])
+{
+       char cmd[256];
+       int res;
+
+       if (argc != 1) {
+               printf("Invalid WPS_ER_PBC command: need one argument:\n"
+                      "- UUID: Specify the Enrollee\n");
+               return -1;
+       }
+
+       res = os_snprintf(cmd, sizeof(cmd), "WPS_ER_PBC %s",
+                         argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+               printf("Too long WPS_ER_PBC command.\n");
+               return -1;
+       }
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_wps_er_learn(struct wpa_ctrl *ctrl, int argc,
+                                   char *argv[])
+{
+       char cmd[256];
+       int res;
+
+       if (argc != 2) {
+               printf("Invalid WPS_ER_LEARN command: need two arguments:\n"
+                      "- UUID: specify which AP to use\n"
+                      "- PIN: AP PIN\n");
+               return -1;
+       }
+
+       res = os_snprintf(cmd, sizeof(cmd), "WPS_ER_LEARN %s %s",
+                         argv[0], argv[1]);
+       if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+               printf("Too long WPS_ER_LEARN command.\n");
+               return -1;
+       }
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_wps_er_set_config(struct wpa_ctrl *ctrl, int argc,
+                                        char *argv[])
+{
+       char cmd[256];
+       int res;
+
+       if (argc != 2) {
+               printf("Invalid WPS_ER_SET_CONFIG command: need two "
+                      "arguments:\n"
+                      "- UUID: specify which AP to use\n"
+                      "- Network configuration id\n");
+               return -1;
+       }
+
+       res = os_snprintf(cmd, sizeof(cmd), "WPS_ER_SET_CONFIG %s %s",
+                         argv[0], argv[1]);
+       if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+               printf("Too long WPS_ER_SET_CONFIG command.\n");
+               return -1;
+       }
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_wps_er_config(struct wpa_ctrl *ctrl, int argc,
+                                    char *argv[])
+{
+       char cmd[256];
+       int res;
+
+       if (argc == 5 || argc == 6) {
+               char ssid_hex[2 * 32 + 1];
+               char key_hex[2 * 64 + 1];
+               int i;
+
+               ssid_hex[0] = '\0';
+               for (i = 0; i < 32; i++) {
+                       if (argv[2][i] == '\0')
+                               break;
+                       os_snprintf(&ssid_hex[i * 2], 3, "%02x", argv[2][i]);
+               }
+
+               key_hex[0] = '\0';
+               if (argc == 6) {
+                       for (i = 0; i < 64; i++) {
+                               if (argv[5][i] == '\0')
+                                       break;
+                               os_snprintf(&key_hex[i * 2], 3, "%02x",
+                                           argv[5][i]);
+                       }
+               }
+
+               res = os_snprintf(cmd, sizeof(cmd),
+                                 "WPS_ER_CONFIG %s %s %s %s %s %s",
+                                 argv[0], argv[1], ssid_hex, argv[3], argv[4],
+                                 key_hex);
+       } else {
+               printf("Invalid WPS_ER_CONFIG command: need six arguments:\n"
+                      "- AP UUID\n"
+                      "- AP PIN\n"
+                      "- new SSID\n"
+                      "- new auth (OPEN, WPAPSK, WPA2PSK)\n"
+                      "- new encr (NONE, WEP, TKIP, CCMP)\n"
+                      "- new key\n");
+               return -1;
+       }
+
+       if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+               printf("Too long WPS_ER_CONFIG command.\n");
+               return -1;
+       }
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_ibss_rsn(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       char cmd[256];
+       int res;
+
+       if (argc != 1) {
+               printf("Invalid IBSS_RSN command: needs one argument "
+                      "(Peer STA MAC address)\n");
+               return -1;
+       }
+
+       res = os_snprintf(cmd, sizeof(cmd), "IBSS_RSN %s", argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+               printf("Too long IBSS_RSN command.\n");
+               return -1;
+       }
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_level(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       char cmd[256];
+       int res;
+
+       if (argc != 1) {
+               printf("Invalid LEVEL command: needs one argument (debug "
+                      "level)\n");
+               return -1;
+       }
+       res = os_snprintf(cmd, sizeof(cmd), "LEVEL %s", argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+               printf("Too long LEVEL command.\n");
+               return -1;
+       }
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_identity(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       char cmd[256], *pos, *end;
+       int i, ret;
+
+       if (argc < 2) {
+               printf("Invalid IDENTITY command: needs two arguments "
+                      "(network id and identity)\n");
+               return -1;
+       }
+
+       end = cmd + sizeof(cmd);
+       pos = cmd;
+       ret = os_snprintf(pos, end - pos, WPA_CTRL_RSP "IDENTITY-%s:%s",
+                         argv[0], argv[1]);
+       if (ret < 0 || ret >= end - pos) {
+               printf("Too long IDENTITY command.\n");
+               return -1;
+       }
+       pos += ret;
+       for (i = 2; i < argc; i++) {
+               ret = os_snprintf(pos, end - pos, " %s", argv[i]);
+               if (ret < 0 || ret >= end - pos) {
+                       printf("Too long IDENTITY command.\n");
+                       return -1;
+               }
+               pos += ret;
+       }
+
        return wpa_ctrl_command(ctrl, cmd);
 }
 
@@ -766,6 +1378,58 @@ static int wpa_cli_cmd_bssid(struct wpa_ctrl *ctrl, int argc, char *argv[])
 }
 
 
+static int wpa_cli_cmd_blacklist(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       char cmd[256], *pos, *end;
+       int i, ret;
+
+       end = cmd + sizeof(cmd);
+       pos = cmd;
+       ret = os_snprintf(pos, end - pos, "BLACKLIST");
+       if (ret < 0 || ret >= end - pos) {
+               printf("Too long BLACKLIST command.\n");
+               return -1;
+       }
+       pos += ret;
+       for (i = 0; i < argc; i++) {
+               ret = os_snprintf(pos, end - pos, " %s", argv[i]);
+               if (ret < 0 || ret >= end - pos) {
+                       printf("Too long BLACKLIST command.\n");
+                       return -1;
+               }
+               pos += ret;
+       }
+
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_log_level(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       char cmd[256], *pos, *end;
+       int i, ret;
+
+       end = cmd + sizeof(cmd);
+       pos = cmd;
+       ret = os_snprintf(pos, end - pos, "LOG_LEVEL");
+       if (ret < 0 || ret >= end - pos) {
+               printf("Too long LOG_LEVEL command.\n");
+               return -1;
+       }
+       pos += ret;
+       for (i = 0; i < argc; i++) {
+               ret = os_snprintf(pos, end - pos, " %s", argv[i]);
+               if (ret < 0 || ret >= end - pos) {
+                       printf("Too long LOG_LEVEL command.\n");
+                       return -1;
+               }
+               pos += ret;
+       }
+
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
 static int wpa_cli_cmd_list_networks(struct wpa_ctrl *ctrl, int argc,
                                     char *argv[])
 {
@@ -993,195 +1657,1476 @@ static int wpa_cli_cmd_bss(struct wpa_ctrl *ctrl, int argc, char *argv[])
 }
 
 
+static char ** wpa_cli_complete_bss(const char *str, int pos)
+{
+       int arg = get_cmd_arg_num(str, pos);
+       char **res = NULL;
+
+       switch (arg) {
+       case 1:
+               res = cli_txt_list_array(&bsses);
+               break;
+       }
+
+       return res;
+}
+
+
 static int wpa_cli_cmd_get_capability(struct wpa_ctrl *ctrl, int argc,
                                      char *argv[])
 {
-       char cmd[64];
+       char cmd[64];
+       int res;
+
+       if (argc < 1 || argc > 2) {
+               printf("Invalid GET_CAPABILITY command: need either one or "
+                      "two arguments\n");
+               return -1;
+       }
+
+       if ((argc == 2) && os_strcmp(argv[1], "strict") != 0) {
+               printf("Invalid GET_CAPABILITY command: second argument, "
+                      "if any, must be 'strict'\n");
+               return -1;
+       }
+
+       res = os_snprintf(cmd, sizeof(cmd), "GET_CAPABILITY %s%s", argv[0],
+                         (argc == 2) ? " strict" : "");
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_list_interfaces(struct wpa_ctrl *ctrl)
+{
+       printf("Available interfaces:\n");
+       return wpa_ctrl_command(ctrl, "INTERFACES");
+}
+
+
+static int wpa_cli_cmd_interface(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       if (argc < 1) {
+               wpa_cli_list_interfaces(ctrl);
+               return 0;
+       }
+
+       wpa_cli_close_connection();
+       os_free(ctrl_ifname);
+       ctrl_ifname = os_strdup(argv[0]);
+
+       if (wpa_cli_open_connection(ctrl_ifname, 1)) {
+               printf("Connected to interface '%s.\n", ctrl_ifname);
+       } else {
+               printf("Could not connect to interface '%s' - re-trying\n",
+                      ctrl_ifname);
+       }
+       return 0;
+}
+
+
+static int wpa_cli_cmd_reconfigure(struct wpa_ctrl *ctrl, int argc,
+                                  char *argv[])
+{
+       return wpa_ctrl_command(ctrl, "RECONFIGURE");
+}
+
+
+static int wpa_cli_cmd_terminate(struct wpa_ctrl *ctrl, int argc,
+                                char *argv[])
+{
+       return wpa_ctrl_command(ctrl, "TERMINATE");
+}
+
+
+static int wpa_cli_cmd_interface_add(struct wpa_ctrl *ctrl, int argc,
+                                    char *argv[])
+{
+       char cmd[256];
+       int res;
+
+       if (argc < 1) {
+               printf("Invalid INTERFACE_ADD command: needs at least one "
+                      "argument (interface name)\n"
+                      "All arguments: ifname confname driver ctrl_interface "
+                      "driver_param bridge_name\n");
+               return -1;
+       }
+
+       /*
+        * INTERFACE_ADD <ifname>TAB<confname>TAB<driver>TAB<ctrl_interface>TAB
+        * <driver_param>TAB<bridge_name>
+        */
+       res = os_snprintf(cmd, sizeof(cmd),
+                         "INTERFACE_ADD %s\t%s\t%s\t%s\t%s\t%s",
+                         argv[0],
+                         argc > 1 ? argv[1] : "", argc > 2 ? argv[2] : "",
+                         argc > 3 ? argv[3] : "", argc > 4 ? argv[4] : "",
+                         argc > 5 ? argv[5] : "");
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_interface_remove(struct wpa_ctrl *ctrl, int argc,
+                                       char *argv[])
+{
+       char cmd[128];
+       int res;
+
+       if (argc != 1) {
+               printf("Invalid INTERFACE_REMOVE command: needs one argument "
+                      "(interface name)\n");
+               return -1;
+       }
+
+       res = os_snprintf(cmd, sizeof(cmd), "INTERFACE_REMOVE %s", argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_interface_list(struct wpa_ctrl *ctrl, int argc,
+                                     char *argv[])
+{
+       return wpa_ctrl_command(ctrl, "INTERFACE_LIST");
+}
+
+
+#ifdef CONFIG_AP
+static int wpa_cli_cmd_sta(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       char buf[64];
+       if (argc != 1) {
+               printf("Invalid 'sta' command - exactly one argument, STA "
+                      "address, is required.\n");
+               return -1;
+       }
+       os_snprintf(buf, sizeof(buf), "STA %s", argv[0]);
+       return wpa_ctrl_command(ctrl, buf);
+}
+
+
+static int wpa_ctrl_command_sta(struct wpa_ctrl *ctrl, char *cmd,
+                               char *addr, size_t addr_len)
+{
+       char buf[4096], *pos;
+       size_t len;
+       int ret;
+
+       if (ctrl_conn == NULL) {
+               printf("Not connected to hostapd - command dropped.\n");
+               return -1;
+       }
+       len = sizeof(buf) - 1;
+       ret = wpa_ctrl_request(ctrl, cmd, strlen(cmd), buf, &len,
+                              wpa_cli_msg_cb);
+       if (ret == -2) {
+               printf("'%s' command timed out.\n", cmd);
+               return -2;
+       } else if (ret < 0) {
+               printf("'%s' command failed.\n", cmd);
+               return -1;
+       }
+
+       buf[len] = '\0';
+       if (memcmp(buf, "FAIL", 4) == 0)
+               return -1;
+       printf("%s", buf);
+
+       pos = buf;
+       while (*pos != '\0' && *pos != '\n')
+               pos++;
+       *pos = '\0';
+       os_strlcpy(addr, buf, addr_len);
+       return 0;
+}
+
+
+static int wpa_cli_cmd_all_sta(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       char addr[32], cmd[64];
+
+       if (wpa_ctrl_command_sta(ctrl, "STA-FIRST", addr, sizeof(addr)))
+               return 0;
+       do {
+               os_snprintf(cmd, sizeof(cmd), "STA-NEXT %s", addr);
+       } while (wpa_ctrl_command_sta(ctrl, cmd, addr, sizeof(addr)) == 0);
+
+       return -1;
+}
+#endif /* CONFIG_AP */
+
+
+static int wpa_cli_cmd_suspend(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       return wpa_ctrl_command(ctrl, "SUSPEND");
+}
+
+
+static int wpa_cli_cmd_resume(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       return wpa_ctrl_command(ctrl, "RESUME");
+}
+
+
+static int wpa_cli_cmd_drop_sa(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       return wpa_ctrl_command(ctrl, "DROP_SA");
+}
+
+
+static int wpa_cli_cmd_roam(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       char cmd[128];
+       int res;
+
+       if (argc != 1) {
+               printf("Invalid ROAM command: needs one argument "
+                      "(target AP's BSSID)\n");
+               return -1;
+       }
+
+       res = os_snprintf(cmd, sizeof(cmd), "ROAM %s", argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+               printf("Too long ROAM command.\n");
+               return -1;
+       }
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+#ifdef CONFIG_P2P
+
+static int wpa_cli_cmd_p2p_find(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       char cmd[128];
+       int res;
+
+       if (argc == 0)
+               return wpa_ctrl_command(ctrl, "P2P_FIND");
+
+       if (argc > 2)
+               res = os_snprintf(cmd, sizeof(cmd), "P2P_FIND %s %s %s",
+                                 argv[0], argv[1], argv[2]);
+       else if (argc > 1)
+               res = os_snprintf(cmd, sizeof(cmd), "P2P_FIND %s %s",
+                                 argv[0], argv[1]);
+       else
+               res = os_snprintf(cmd, sizeof(cmd), "P2P_FIND %s", argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_p2p_stop_find(struct wpa_ctrl *ctrl, int argc,
+                                    char *argv[])
+{
+       return wpa_ctrl_command(ctrl, "P2P_STOP_FIND");
+}
+
+
+static int wpa_cli_cmd_p2p_connect(struct wpa_ctrl *ctrl, int argc,
+                                  char *argv[])
+{
+       char cmd[128];
+       int res;
+
+       if (argc < 2) {
+               printf("Invalid P2P_CONNECT command: needs at least two "
+                      "arguments (address and pbc/PIN)\n");
+               return -1;
+       }
+
+       if (argc > 4)
+               res = os_snprintf(cmd, sizeof(cmd),
+                                 "P2P_CONNECT %s %s %s %s %s",
+                                 argv[0], argv[1], argv[2], argv[3],
+                                 argv[4]);
+       else if (argc > 3)
+               res = os_snprintf(cmd, sizeof(cmd), "P2P_CONNECT %s %s %s %s",
+                                 argv[0], argv[1], argv[2], argv[3]);
+       else if (argc > 2)
+               res = os_snprintf(cmd, sizeof(cmd), "P2P_CONNECT %s %s %s",
+                                 argv[0], argv[1], argv[2]);
+       else
+               res = os_snprintf(cmd, sizeof(cmd), "P2P_CONNECT %s %s",
+                                 argv[0], argv[1]);
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static char ** wpa_cli_complete_p2p_connect(const char *str, int pos)
+{
+       int arg = get_cmd_arg_num(str, pos);
+       char **res = NULL;
+
+       switch (arg) {
+       case 1:
+               res = cli_txt_list_array(&p2p_peers);
+               break;
+       }
+
+       return res;
+}
+
+
+static int wpa_cli_cmd_p2p_listen(struct wpa_ctrl *ctrl, int argc,
+                                 char *argv[])
+{
+       char cmd[128];
+       int res;
+
+       if (argc == 0)
+               return wpa_ctrl_command(ctrl, "P2P_LISTEN");
+
+       res = os_snprintf(cmd, sizeof(cmd), "P2P_LISTEN %s", argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_p2p_group_remove(struct wpa_ctrl *ctrl, int argc,
+                                       char *argv[])
+{
+       char cmd[128];
+       int res;
+
+       if (argc != 1) {
+               printf("Invalid P2P_GROUP_REMOVE command: needs one argument "
+                      "(interface name)\n");
+               return -1;
+       }
+
+       res = os_snprintf(cmd, sizeof(cmd), "P2P_GROUP_REMOVE %s", argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static char ** wpa_cli_complete_p2p_group_remove(const char *str, int pos)
+{
+       int arg = get_cmd_arg_num(str, pos);
+       char **res = NULL;
+
+       switch (arg) {
+       case 1:
+               res = cli_txt_list_array(&p2p_groups);
+               break;
+       }
+
+       return res;
+}
+
+
+static int wpa_cli_cmd_p2p_group_add(struct wpa_ctrl *ctrl, int argc,
+                                       char *argv[])
+{
+       char cmd[128];
+       int res;
+
+       if (argc == 0)
+               return wpa_ctrl_command(ctrl, "P2P_GROUP_ADD");
+
+       if (argc > 1)
+               res = os_snprintf(cmd, sizeof(cmd), "P2P_GROUP_ADD %s %s",
+                                 argv[0], argv[1]);
+       else
+               res = os_snprintf(cmd, sizeof(cmd), "P2P_GROUP_ADD %s",
+                                 argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_p2p_prov_disc(struct wpa_ctrl *ctrl, int argc,
+                                    char *argv[])
+{
+       char cmd[128];
+       int res;
+
+       if (argc != 2 && argc != 3) {
+               printf("Invalid P2P_PROV_DISC command: needs at least "
+                      "two arguments, address and config method\n"
+                      "(display, keypad, or pbc) and an optional join\n");
+               return -1;
+       }
+
+       if (argc == 3)
+               res = os_snprintf(cmd, sizeof(cmd), "P2P_PROV_DISC %s %s %s",
+                                 argv[0], argv[1], argv[2]);
+       else
+               res = os_snprintf(cmd, sizeof(cmd), "P2P_PROV_DISC %s %s",
+                                 argv[0], argv[1]);
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_p2p_get_passphrase(struct wpa_ctrl *ctrl, int argc,
+                                         char *argv[])
+{
+       return wpa_ctrl_command(ctrl, "P2P_GET_PASSPHRASE");
+}
+
+
+static int wpa_cli_cmd_p2p_serv_disc_req(struct wpa_ctrl *ctrl, int argc,
+                                        char *argv[])
+{
+       char cmd[4096];
+       int res;
+
+       if (argc != 2 && argc != 4) {
+               printf("Invalid P2P_SERV_DISC_REQ command: needs two "
+                      "arguments (address and TLVs) or four arguments "
+                      "(address, \"upnp\", version, search target "
+                      "(SSDP ST:)\n");
+               return -1;
+       }
+
+       if (argc == 4)
+               res = os_snprintf(cmd, sizeof(cmd),
+                                 "P2P_SERV_DISC_REQ %s %s %s %s",
+                                 argv[0], argv[1], argv[2], argv[3]);
+       else
+               res = os_snprintf(cmd, sizeof(cmd), "P2P_SERV_DISC_REQ %s %s",
+                                 argv[0], argv[1]);
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_p2p_serv_disc_cancel_req(struct wpa_ctrl *ctrl,
+                                               int argc, char *argv[])
+{
+       char cmd[128];
+       int res;
+
+       if (argc != 1) {
+               printf("Invalid P2P_SERV_DISC_CANCEL_REQ command: needs one "
+                      "argument (pending request identifier)\n");
+               return -1;
+       }
+
+       res = os_snprintf(cmd, sizeof(cmd), "P2P_SERV_DISC_CANCEL_REQ %s",
+                         argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_p2p_serv_disc_resp(struct wpa_ctrl *ctrl, int argc,
+                                         char *argv[])
+{
+       char cmd[4096];
+       int res;
+
+       if (argc != 4) {
+               printf("Invalid P2P_SERV_DISC_RESP command: needs four "
+                      "arguments (freq, address, dialog token, and TLVs)\n");
+               return -1;
+       }
+
+       res = os_snprintf(cmd, sizeof(cmd), "P2P_SERV_DISC_RESP %s %s %s %s",
+                         argv[0], argv[1], argv[2], argv[3]);
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_p2p_service_update(struct wpa_ctrl *ctrl, int argc,
+                                         char *argv[])
+{
+       return wpa_ctrl_command(ctrl, "P2P_SERVICE_UPDATE");
+}
+
+
+static int wpa_cli_cmd_p2p_serv_disc_external(struct wpa_ctrl *ctrl,
+                                             int argc, char *argv[])
+{
+       char cmd[128];
+       int res;
+
+       if (argc != 1) {
+               printf("Invalid P2P_SERV_DISC_EXTERNAL command: needs one "
+                      "argument (external processing: 0/1)\n");
+               return -1;
+       }
+
+       res = os_snprintf(cmd, sizeof(cmd), "P2P_SERV_DISC_EXTERNAL %s",
+                         argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_p2p_service_flush(struct wpa_ctrl *ctrl, int argc,
+                                        char *argv[])
+{
+       return wpa_ctrl_command(ctrl, "P2P_SERVICE_FLUSH");
+}
+
+
+static int wpa_cli_cmd_p2p_service_add(struct wpa_ctrl *ctrl, int argc,
+                                      char *argv[])
+{
+       char cmd[4096];
+       int res;
+
+       if (argc != 3 && argc != 4) {
+               printf("Invalid P2P_SERVICE_ADD command: needs three or four "
+                      "arguments\n");
+               return -1;
+       }
+
+       if (argc == 4)
+               res = os_snprintf(cmd, sizeof(cmd),
+                                 "P2P_SERVICE_ADD %s %s %s %s",
+                                 argv[0], argv[1], argv[2], argv[3]);
+       else
+               res = os_snprintf(cmd, sizeof(cmd),
+                                 "P2P_SERVICE_ADD %s %s %s",
+                                 argv[0], argv[1], argv[2]);
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_p2p_service_del(struct wpa_ctrl *ctrl, int argc,
+                                      char *argv[])
+{
+       char cmd[4096];
+       int res;
+
+       if (argc != 2 && argc != 3) {
+               printf("Invalid P2P_SERVICE_DEL command: needs two or three "
+                      "arguments\n");
+               return -1;
+       }
+
+       if (argc == 3)
+               res = os_snprintf(cmd, sizeof(cmd),
+                                 "P2P_SERVICE_DEL %s %s %s",
+                                 argv[0], argv[1], argv[2]);
+       else
+               res = os_snprintf(cmd, sizeof(cmd),
+                                 "P2P_SERVICE_DEL %s %s",
+                                 argv[0], argv[1]);
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_p2p_reject(struct wpa_ctrl *ctrl,
+                                 int argc, char *argv[])
+{
+       char cmd[128];
+       int res;
+
+       if (argc != 1) {
+               printf("Invalid P2P_REJECT command: needs one argument "
+                      "(peer address)\n");
+               return -1;
+       }
+
+       res = os_snprintf(cmd, sizeof(cmd), "P2P_REJECT %s", argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_p2p_invite(struct wpa_ctrl *ctrl,
+                                 int argc, char *argv[])
+{
+       char cmd[128];
+       int res;
+
+       if (argc < 1) {
+               printf("Invalid P2P_INVITE command: needs at least one "
+                      "argument\n");
+               return -1;
+       }
+
+       if (argc > 2)
+               res = os_snprintf(cmd, sizeof(cmd), "P2P_INVITE %s %s %s",
+                                 argv[0], argv[1], argv[2]);
+       else if (argc > 1)
+               res = os_snprintf(cmd, sizeof(cmd), "P2P_INVITE %s %s",
+                                 argv[0], argv[1]);
+       else
+               res = os_snprintf(cmd, sizeof(cmd), "P2P_INVITE %s", argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_p2p_peer(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       char buf[64];
+       if (argc != 1) {
+               printf("Invalid 'p2p_peer' command - exactly one argument, "
+                      "P2P peer device address, is required.\n");
+               return -1;
+       }
+       os_snprintf(buf, sizeof(buf), "P2P_PEER %s", argv[0]);
+       return wpa_ctrl_command(ctrl, buf);
+}
+
+
+static char ** wpa_cli_complete_p2p_peer(const char *str, int pos)
+{
+       int arg = get_cmd_arg_num(str, pos);
+       char **res = NULL;
+
+       switch (arg) {
+       case 1:
+               res = cli_txt_list_array(&p2p_peers);
+               break;
+       }
+
+       return res;
+}
+
+
+static int wpa_ctrl_command_p2p_peer(struct wpa_ctrl *ctrl, char *cmd,
+                                    char *addr, size_t addr_len,
+                                    int discovered)
+{
+       char buf[4096], *pos;
+       size_t len;
+       int ret;
+
+       if (ctrl_conn == NULL)
+               return -1;
+       len = sizeof(buf) - 1;
+       ret = wpa_ctrl_request(ctrl, cmd, strlen(cmd), buf, &len,
+                              wpa_cli_msg_cb);
+       if (ret == -2) {
+               printf("'%s' command timed out.\n", cmd);
+               return -2;
+       } else if (ret < 0) {
+               printf("'%s' command failed.\n", cmd);
+               return -1;
+       }
+
+       buf[len] = '\0';
+       if (memcmp(buf, "FAIL", 4) == 0)
+               return -1;
+
+       pos = buf;
+       while (*pos != '\0' && *pos != '\n')
+               pos++;
+       *pos++ = '\0';
+       os_strlcpy(addr, buf, addr_len);
+       if (!discovered || os_strstr(pos, "[PROBE_REQ_ONLY]") == NULL)
+               printf("%s\n", addr);
+       return 0;
+}
+
+
+static int wpa_cli_cmd_p2p_peers(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       char addr[32], cmd[64];
+       int discovered;
+
+       discovered = argc > 0 && os_strcmp(argv[0], "discovered") == 0;
+
+       if (wpa_ctrl_command_p2p_peer(ctrl, "P2P_PEER FIRST",
+                                     addr, sizeof(addr), discovered))
+               return -1;
+       do {
+               os_snprintf(cmd, sizeof(cmd), "P2P_PEER NEXT-%s", addr);
+       } while (wpa_ctrl_command_p2p_peer(ctrl, cmd, addr, sizeof(addr),
+                        discovered) == 0);
+
+       return 0;
+}
+
+
+static int wpa_cli_cmd_p2p_set(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       char cmd[100];
+       int res;
+
+       if (argc != 2) {
+               printf("Invalid P2P_SET command: needs two arguments (field, "
+                      "value)\n");
+               return -1;
+       }
+
+       res = os_snprintf(cmd, sizeof(cmd), "P2P_SET %s %s", argv[0], argv[1]);
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_p2p_flush(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       return wpa_ctrl_command(ctrl, "P2P_FLUSH");
+}
+
+
+static int wpa_cli_cmd_p2p_cancel(struct wpa_ctrl *ctrl, int argc,
+                                 char *argv[])
+{
+       return wpa_ctrl_command(ctrl, "P2P_CANCEL");
+}
+
+
+static int wpa_cli_cmd_p2p_unauthorize(struct wpa_ctrl *ctrl, int argc,
+                                      char *argv[])
+{
+       char cmd[100];
+       int res;
+
+       if (argc != 1) {
+               printf("Invalid P2P_UNAUTHORIZE command: needs one argument "
+                      "(peer address)\n");
+               return -1;
+       }
+
+       res = os_snprintf(cmd, sizeof(cmd), "P2P_UNAUTHORIZE %s", argv[0]);
+
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_p2p_presence_req(struct wpa_ctrl *ctrl, int argc,
+                                       char *argv[])
+{
+       char cmd[100];
+       int res;
+
+       if (argc != 0 && argc != 2 && argc != 4) {
+               printf("Invalid P2P_PRESENCE_REQ command: needs two arguments "
+                      "(preferred duration, interval; in microsecods).\n"
+                      "Optional second pair can be used to provide "
+                      "acceptable values.\n");
+               return -1;
+       }
+
+       if (argc == 4)
+               res = os_snprintf(cmd, sizeof(cmd),
+                                 "P2P_PRESENCE_REQ %s %s %s %s",
+                                 argv[0], argv[1], argv[2], argv[3]);
+       else if (argc == 2)
+               res = os_snprintf(cmd, sizeof(cmd), "P2P_PRESENCE_REQ %s %s",
+                                 argv[0], argv[1]);
+       else
+               res = os_snprintf(cmd, sizeof(cmd), "P2P_PRESENCE_REQ");
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_p2p_ext_listen(struct wpa_ctrl *ctrl, int argc,
+                                     char *argv[])
+{
+       char cmd[100];
+       int res;
+
+       if (argc != 0 && argc != 2) {
+               printf("Invalid P2P_EXT_LISTEN command: needs two arguments "
+                      "(availability period, availability interval; in "
+                      "millisecods).\n"
+                      "Extended Listen Timing can be cancelled with this "
+                      "command when used without parameters.\n");
+               return -1;
+       }
+
+       if (argc == 2)
+               res = os_snprintf(cmd, sizeof(cmd), "P2P_EXT_LISTEN %s %s",
+                                 argv[0], argv[1]);
+       else
+               res = os_snprintf(cmd, sizeof(cmd), "P2P_EXT_LISTEN");
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+#endif /* CONFIG_P2P */
+
+
+#ifdef CONFIG_INTERWORKING
+static int wpa_cli_cmd_fetch_anqp(struct wpa_ctrl *ctrl, int argc,
+                                 char *argv[])
+{
+       return wpa_ctrl_command(ctrl, "FETCH_ANQP");
+}
+
+
+static int wpa_cli_cmd_stop_fetch_anqp(struct wpa_ctrl *ctrl, int argc,
+                                      char *argv[])
+{
+       return wpa_ctrl_command(ctrl, "STOP_FETCH_ANQP");
+}
+
+
+static int wpa_cli_cmd_interworking_select(struct wpa_ctrl *ctrl, int argc,
+                                          char *argv[])
+{
+       char cmd[100];
+       int res;
+
+       if (argc == 0)
+               return wpa_ctrl_command(ctrl, "INTERWORKING_SELECT");
+
+       res = os_snprintf(cmd, sizeof(cmd), "INTERWORKING_SELECT %s", argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_interworking_connect(struct wpa_ctrl *ctrl, int argc,
+                                           char *argv[])
+{
+       char cmd[100];
+       int res;
+
+       if (argc != 1) {
+               printf("Invalid INTERWORKING_CONNECT commands: needs one "
+                      "argument (BSSID)\n");
+               return -1;
+       }
+
+       res = os_snprintf(cmd, sizeof(cmd), "INTERWORKING_CONNECT %s",
+                         argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_anqp_get(struct wpa_ctrl *ctrl, int argc, char *argv[])
+{
+       char cmd[100];
+       int res;
+
+       if (argc != 2) {
+               printf("Invalid ANQP_GET command: needs two arguments "
+                      "(addr and info id list)\n");
+               return -1;
+       }
+
+       res = os_snprintf(cmd, sizeof(cmd), "ANQP_GET %s %s",
+                         argv[0], argv[1]);
+       if (res < 0 || (size_t) res >= sizeof(cmd))
+               return -1;
+       cmd[sizeof(cmd) - 1] = '\0';
+       return wpa_ctrl_command(ctrl, cmd);
+}
+#endif /* CONFIG_INTERWORKING */
+
+
+static int wpa_cli_cmd_sta_autoconnect(struct wpa_ctrl *ctrl, int argc,
+                                      char *argv[])
+{
+       char cmd[256];
+       int res;
+
+       if (argc != 1) {
+               printf("Invalid STA_AUTOCONNECT command: needs one argument "
+                      "(0/1 = disable/enable automatic reconnection)\n");
+               return -1;
+       }
+       res = os_snprintf(cmd, sizeof(cmd), "STA_AUTOCONNECT %s", argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+               printf("Too long STA_AUTOCONNECT command.\n");
+               return -1;
+       }
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_tdls_discover(struct wpa_ctrl *ctrl, int argc,
+                                    char *argv[])
+{
+       char cmd[256];
+       int res;
+
+       if (argc != 1) {
+               printf("Invalid TDLS_DISCOVER command: needs one argument "
+                      "(Peer STA MAC address)\n");
+               return -1;
+       }
+
+       res = os_snprintf(cmd, sizeof(cmd), "TDLS_DISCOVER %s", argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+               printf("Too long TDLS_DISCOVER command.\n");
+               return -1;
+       }
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_tdls_setup(struct wpa_ctrl *ctrl, int argc,
+                                 char *argv[])
+{
+       char cmd[256];
+       int res;
+
+       if (argc != 1) {
+               printf("Invalid TDLS_SETUP command: needs one argument "
+                      "(Peer STA MAC address)\n");
+               return -1;
+       }
+
+       res = os_snprintf(cmd, sizeof(cmd), "TDLS_SETUP %s", argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+               printf("Too long TDLS_SETUP command.\n");
+               return -1;
+       }
+       return wpa_ctrl_command(ctrl, cmd);
+}
+
+
+static int wpa_cli_cmd_tdls_teardown(struct wpa_ctrl *ctrl, int argc,
+                                    char *argv[])
+{
+       char cmd[256];
        int res;
 
-       if (argc < 1 || argc > 2) {
-               printf("Invalid GET_CAPABILITY command: need either one or "
-                      "two arguments\n");
+       if (argc != 1) {
+               printf("Invalid TDLS_TEARDOWN command: needs one argument "
+                      "(Peer STA MAC address)\n");
                return -1;
        }
 
-       if ((argc == 2) && os_strcmp(argv[1], "strict") != 0) {
-               printf("Invalid GET_CAPABILITY command: second argument, "
-                      "if any, must be 'strict'\n");
+       res = os_snprintf(cmd, sizeof(cmd), "TDLS_TEARDOWN %s", argv[0]);
+       if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+               printf("Too long TDLS_TEARDOWN command.\n");
                return -1;
        }
-
-       res = os_snprintf(cmd, sizeof(cmd), "GET_CAPABILITY %s%s", argv[0],
-                         (argc == 2) ? " strict" : "");
-       if (res < 0 || (size_t) res >= sizeof(cmd))
-               return -1;
-       cmd[sizeof(cmd) - 1] = '\0';
-
        return wpa_ctrl_command(ctrl, cmd);
 }
 
 
-static int wpa_cli_list_interfaces(struct wpa_ctrl *ctrl)
+static int wpa_cli_cmd_signal_poll(struct wpa_ctrl *ctrl, int argc,
+                                  char *argv[])
 {
-       printf("Available interfaces:\n");
-       return wpa_ctrl_command(ctrl, "INTERFACES");
+       return wpa_ctrl_command(ctrl, "SIGNAL_POLL");
 }
 
 
-static int wpa_cli_cmd_interface(struct wpa_ctrl *ctrl, int argc, char *argv[])
+static int wpa_cli_cmd_reauthenticate(struct wpa_ctrl *ctrl, int argc,
+                                     char *argv[])
 {
-       if (argc < 1) {
-               wpa_cli_list_interfaces(ctrl);
-               return 0;
-       }
+       return wpa_ctrl_command(ctrl, "REAUTHENTICATE");
+}
 
-       wpa_cli_close_connection();
-       os_free(ctrl_ifname);
-       ctrl_ifname = os_strdup(argv[0]);
 
-       if (wpa_cli_open_connection(ctrl_ifname)) {
-               printf("Connected to interface '%s.\n", ctrl_ifname);
-               if (wpa_ctrl_attach(ctrl_conn) == 0) {
-                       wpa_cli_attached = 1;
-               } else {
-                       printf("Warning: Failed to attach to "
-                              "wpa_supplicant.\n");
-               }
-       } else {
-               printf("Could not connect to interface '%s' - re-trying\n",
-                      ctrl_ifname);
+enum wpa_cli_cmd_flags {
+       cli_cmd_flag_none               = 0x00,
+       cli_cmd_flag_sensitive          = 0x01
+};
+
+struct wpa_cli_cmd {
+       const char *cmd;
+       int (*handler)(struct wpa_ctrl *ctrl, int argc, char *argv[]);
+       enum wpa_cli_cmd_flags flags;
+       const char *usage;
+};
+
+static struct wpa_cli_cmd wpa_cli_commands[] = {
+       { "status", wpa_cli_cmd_status,
+         cli_cmd_flag_none,
+         "[verbose] = get current WPA/EAPOL/EAP status" },
+       { "ping", wpa_cli_cmd_ping,
+         cli_cmd_flag_none,
+         "= pings wpa_supplicant" },
+       { "relog", wpa_cli_cmd_relog,
+         cli_cmd_flag_none,
+         "= re-open log-file (allow rolling logs)" },
+       { "note", wpa_cli_cmd_note,
+         cli_cmd_flag_none,
+         "<text> = add a note to wpa_supplicant debug log" },
+       { "mib", wpa_cli_cmd_mib,
+         cli_cmd_flag_none,
+         "= get MIB variables (dot1x, dot11)" },
+       { "help", wpa_cli_cmd_help,
+         cli_cmd_flag_none,
+         "= show this usage help" },
+       { "interface", wpa_cli_cmd_interface,
+         cli_cmd_flag_none,
+         "[ifname] = show interfaces/select interface" },
+       { "level", wpa_cli_cmd_level,
+         cli_cmd_flag_none,
+         "<debug level> = change debug level" },
+       { "license", wpa_cli_cmd_license,
+         cli_cmd_flag_none,
+         "= show full wpa_cli license" },
+       { "quit", wpa_cli_cmd_quit,
+         cli_cmd_flag_none,
+         "= exit wpa_cli" },
+       { "set", wpa_cli_cmd_set,
+         cli_cmd_flag_none,
+         "= set variables (shows list of variables when run without "
+         "arguments)" },
+       { "get", wpa_cli_cmd_get,
+         cli_cmd_flag_none,
+         "<name> = get information" },
+       { "logon", wpa_cli_cmd_logon,
+         cli_cmd_flag_none,
+         "= IEEE 802.1X EAPOL state machine logon" },
+       { "logoff", wpa_cli_cmd_logoff,
+         cli_cmd_flag_none,
+         "= IEEE 802.1X EAPOL state machine logoff" },
+       { "pmksa", wpa_cli_cmd_pmksa,
+         cli_cmd_flag_none,
+         "= show PMKSA cache" },
+       { "reassociate", wpa_cli_cmd_reassociate,
+         cli_cmd_flag_none,
+         "= force reassociation" },
+       { "preauthenticate", wpa_cli_cmd_preauthenticate,
+         cli_cmd_flag_none,
+         "<BSSID> = force preauthentication" },
+       { "identity", wpa_cli_cmd_identity,
+         cli_cmd_flag_none,
+         "<network id> <identity> = configure identity for an SSID" },
+       { "password", wpa_cli_cmd_password,
+         cli_cmd_flag_sensitive,
+         "<network id> <password> = configure password for an SSID" },
+       { "new_password", wpa_cli_cmd_new_password,
+         cli_cmd_flag_sensitive,
+         "<network id> <password> = change password for an SSID" },
+       { "pin", wpa_cli_cmd_pin,
+         cli_cmd_flag_sensitive,
+         "<network id> <pin> = configure pin for an SSID" },
+       { "otp", wpa_cli_cmd_otp,
+         cli_cmd_flag_sensitive,
+         "<network id> <password> = configure one-time-password for an SSID"
+       },
+       { "passphrase", wpa_cli_cmd_passphrase,
+         cli_cmd_flag_sensitive,
+         "<network id> <passphrase> = configure private key passphrase\n"
+         "  for an SSID" },
+       { "bssid", wpa_cli_cmd_bssid,
+         cli_cmd_flag_none,
+         "<network id> <BSSID> = set preferred BSSID for an SSID" },
+       { "blacklist", wpa_cli_cmd_blacklist,
+         cli_cmd_flag_none,
+         "<BSSID> = add a BSSID to the blacklist\n"
+         "blacklist clear = clear the blacklist\n"
+         "blacklist = display the blacklist" },
+       { "log_level", wpa_cli_cmd_log_level,
+         cli_cmd_flag_none,
+         "<level> [<timestamp>] = update the log level/timestamp\n"
+         "log_level = display the current log level and log options" },
+       { "list_networks", wpa_cli_cmd_list_networks,
+         cli_cmd_flag_none,
+         "= list configured networks" },
+       { "select_network", wpa_cli_cmd_select_network,
+         cli_cmd_flag_none,
+         "<network id> = select a network (disable others)" },
+       { "enable_network", wpa_cli_cmd_enable_network,
+         cli_cmd_flag_none,
+         "<network id> = enable a network" },
+       { "disable_network", wpa_cli_cmd_disable_network,
+         cli_cmd_flag_none,
+         "<network id> = disable a network" },
+       { "add_network", wpa_cli_cmd_add_network,
+         cli_cmd_flag_none,
+         "= add a network" },
+       { "remove_network", wpa_cli_cmd_remove_network,
+         cli_cmd_flag_none,
+         "<network id> = remove a network" },
+       { "set_network", wpa_cli_cmd_set_network,
+         cli_cmd_flag_sensitive,
+         "<network id> <variable> <value> = set network variables (shows\n"
+         "  list of variables when run without arguments)" },
+       { "get_network", wpa_cli_cmd_get_network,
+         cli_cmd_flag_none,
+         "<network id> <variable> = get network variables" },
+       { "save_config", wpa_cli_cmd_save_config,
+         cli_cmd_flag_none,
+         "= save the current configuration" },
+       { "disconnect", wpa_cli_cmd_disconnect,
+         cli_cmd_flag_none,
+         "= disconnect and wait for reassociate/reconnect command before\n"
+         "  connecting" },
+       { "reconnect", wpa_cli_cmd_reconnect,
+         cli_cmd_flag_none,
+         "= like reassociate, but only takes effect if already disconnected"
+       },
+       { "scan", wpa_cli_cmd_scan,
+         cli_cmd_flag_none,
+         "= request new BSS scan" },
+       { "scan_results", wpa_cli_cmd_scan_results,
+         cli_cmd_flag_none,
+         "= get latest scan results" },
+       { "bss", wpa_cli_cmd_bss,
+         cli_cmd_flag_none,
+         "<<idx> | <bssid>> = get detailed scan result info" },
+       { "get_capability", wpa_cli_cmd_get_capability,
+         cli_cmd_flag_none,
+         "<eap/pairwise/group/key_mgmt/proto/auth_alg> = get capabilies" },
+       { "reconfigure", wpa_cli_cmd_reconfigure,
+         cli_cmd_flag_none,
+         "= force wpa_supplicant to re-read its configuration file" },
+       { "terminate", wpa_cli_cmd_terminate,
+         cli_cmd_flag_none,
+         "= terminate wpa_supplicant" },
+       { "interface_add", wpa_cli_cmd_interface_add,
+         cli_cmd_flag_none,
+         "<ifname> <confname> <driver> <ctrl_interface> <driver_param>\n"
+         "  <bridge_name> = adds new interface, all parameters but <ifname>\n"
+         "  are optional" },
+       { "interface_remove", wpa_cli_cmd_interface_remove,
+         cli_cmd_flag_none,
+         "<ifname> = removes the interface" },
+       { "interface_list", wpa_cli_cmd_interface_list,
+         cli_cmd_flag_none,
+         "= list available interfaces" },
+       { "ap_scan", wpa_cli_cmd_ap_scan,
+         cli_cmd_flag_none,
+         "<value> = set ap_scan parameter" },
+       { "scan_interval", wpa_cli_cmd_scan_interval,
+         cli_cmd_flag_none,
+         "<value> = set scan_interval parameter (in seconds)" },
+       { "bss_expire_age", wpa_cli_cmd_bss_expire_age,
+         cli_cmd_flag_none,
+         "<value> = set BSS expiration age parameter" },
+       { "bss_expire_count", wpa_cli_cmd_bss_expire_count,
+         cli_cmd_flag_none,
+         "<value> = set BSS expiration scan count parameter" },
+       { "stkstart", wpa_cli_cmd_stkstart,
+         cli_cmd_flag_none,
+         "<addr> = request STK negotiation with <addr>" },
+       { "ft_ds", wpa_cli_cmd_ft_ds,
+         cli_cmd_flag_none,
+         "<addr> = request over-the-DS FT with <addr>" },
+       { "wps_pbc", wpa_cli_cmd_wps_pbc,
+         cli_cmd_flag_none,
+         "[BSSID] = start Wi-Fi Protected Setup: Push Button Configuration" },
+       { "wps_pin", wpa_cli_cmd_wps_pin,
+         cli_cmd_flag_sensitive,
+         "<BSSID> [PIN] = start WPS PIN method (returns PIN, if not "
+         "hardcoded)" },
+       { "wps_check_pin", wpa_cli_cmd_wps_check_pin,
+         cli_cmd_flag_sensitive,
+         "<PIN> = verify PIN checksum" },
+       { "wps_cancel", wpa_cli_cmd_wps_cancel, cli_cmd_flag_none,
+         "Cancels the pending WPS operation" },
+#ifdef CONFIG_WPS_OOB
+       { "wps_oob", wpa_cli_cmd_wps_oob,
+         cli_cmd_flag_sensitive,
+         "<DEV_TYPE> <PATH> <METHOD> [DEV_NAME] = start WPS OOB" },
+#endif /* CONFIG_WPS_OOB */
+       { "wps_reg", wpa_cli_cmd_wps_reg,
+         cli_cmd_flag_sensitive,
+         "<BSSID> <AP PIN> = start WPS Registrar to configure an AP" },
+       { "wps_ap_pin", wpa_cli_cmd_wps_ap_pin,
+         cli_cmd_flag_sensitive,
+         "[params..] = enable/disable AP PIN" },
+       { "wps_er_start", wpa_cli_cmd_wps_er_start,
+         cli_cmd_flag_none,
+         "[IP address] = start Wi-Fi Protected Setup External Registrar" },
+       { "wps_er_stop", wpa_cli_cmd_wps_er_stop,
+         cli_cmd_flag_none,
+         "= stop Wi-Fi Protected Setup External Registrar" },
+       { "wps_er_pin", wpa_cli_cmd_wps_er_pin,
+         cli_cmd_flag_sensitive,
+         "<UUID> <PIN> = add an Enrollee PIN to External Registrar" },
+       { "wps_er_pbc", wpa_cli_cmd_wps_er_pbc,
+         cli_cmd_flag_none,
+         "<UUID> = accept an Enrollee PBC using External Registrar" },
+       { "wps_er_learn", wpa_cli_cmd_wps_er_learn,
+         cli_cmd_flag_sensitive,
+         "<UUID> <PIN> = learn AP configuration" },
+       { "wps_er_set_config", wpa_cli_cmd_wps_er_set_config,
+         cli_cmd_flag_none,
+         "<UUID> <network id> = set AP configuration for enrolling" },
+       { "wps_er_config", wpa_cli_cmd_wps_er_config,
+         cli_cmd_flag_sensitive,
+         "<UUID> <PIN> <SSID> <auth> <encr> <key> = configure AP" },
+       { "ibss_rsn", wpa_cli_cmd_ibss_rsn,
+         cli_cmd_flag_none,
+         "<addr> = request RSN authentication with <addr> in IBSS" },
+#ifdef CONFIG_AP
+       { "sta", wpa_cli_cmd_sta,
+         cli_cmd_flag_none,
+         "<addr> = get information about an associated station (AP)" },
+       { "all_sta", wpa_cli_cmd_all_sta,
+         cli_cmd_flag_none,
+         "= get information about all associated stations (AP)" },
+#endif /* CONFIG_AP */
+       { "suspend", wpa_cli_cmd_suspend, cli_cmd_flag_none,
+         "= notification of suspend/hibernate" },
+       { "resume", wpa_cli_cmd_resume, cli_cmd_flag_none,
+         "= notification of resume/thaw" },
+       { "drop_sa", wpa_cli_cmd_drop_sa, cli_cmd_flag_none,
+         "= drop SA without deauth/disassoc (test command)" },
+       { "roam", wpa_cli_cmd_roam,
+         cli_cmd_flag_none,
+         "<addr> = roam to the specified BSS" },
+#ifdef CONFIG_P2P
+       { "p2p_find", wpa_cli_cmd_p2p_find, cli_cmd_flag_none,
+         "[timeout] [type=*] = find P2P Devices for up-to timeout seconds" },
+       { "p2p_stop_find", wpa_cli_cmd_p2p_stop_find, cli_cmd_flag_none,
+         "= stop P2P Devices search" },
+       { "p2p_connect", wpa_cli_cmd_p2p_connect, cli_cmd_flag_none,
+         "<addr> <\"pbc\"|PIN> = connect to a P2P Devices" },
+       { "p2p_listen", wpa_cli_cmd_p2p_listen, cli_cmd_flag_none,
+         "[timeout] = listen for P2P Devices for up-to timeout seconds" },
+       { "p2p_group_remove", wpa_cli_cmd_p2p_group_remove, cli_cmd_flag_none,
+         "<ifname> = remove P2P group interface (terminate group if GO)" },
+       { "p2p_group_add", wpa_cli_cmd_p2p_group_add, cli_cmd_flag_none,
+         "= add a new P2P group (local end as GO)" },
+       { "p2p_prov_disc", wpa_cli_cmd_p2p_prov_disc, cli_cmd_flag_none,
+         "<addr> <method> = request provisioning discovery" },
+       { "p2p_get_passphrase", wpa_cli_cmd_p2p_get_passphrase,
+         cli_cmd_flag_none,
+         "= get the passphrase for a group (GO only)" },
+       { "p2p_serv_disc_req", wpa_cli_cmd_p2p_serv_disc_req,
+         cli_cmd_flag_none,
+         "<addr> <TLVs> = schedule service discovery request" },
+       { "p2p_serv_disc_cancel_req", wpa_cli_cmd_p2p_serv_disc_cancel_req,
+         cli_cmd_flag_none,
+         "<id> = cancel pending service discovery request" },
+       { "p2p_serv_disc_resp", wpa_cli_cmd_p2p_serv_disc_resp,
+         cli_cmd_flag_none,
+         "<freq> <addr> <dialog token> <TLVs> = service discovery response" },
+       { "p2p_service_update", wpa_cli_cmd_p2p_service_update,
+         cli_cmd_flag_none,
+         "= indicate change in local services" },
+       { "p2p_serv_disc_external", wpa_cli_cmd_p2p_serv_disc_external,
+         cli_cmd_flag_none,
+         "<external> = set external processing of service discovery" },
+       { "p2p_service_flush", wpa_cli_cmd_p2p_service_flush,
+         cli_cmd_flag_none,
+         "= remove all stored service entries" },
+       { "p2p_service_add", wpa_cli_cmd_p2p_service_add,
+         cli_cmd_flag_none,
+         "<bonjour|upnp> <query|version> <response|service> = add a local "
+         "service" },
+       { "p2p_service_del", wpa_cli_cmd_p2p_service_del,
+         cli_cmd_flag_none,
+         "<bonjour|upnp> <query|version> [|service] = remove a local "
+         "service" },
+       { "p2p_reject", wpa_cli_cmd_p2p_reject,
+         cli_cmd_flag_none,
+         "<addr> = reject connection attempts from a specific peer" },
+       { "p2p_invite", wpa_cli_cmd_p2p_invite,
+         cli_cmd_flag_none,
+         "<cmd> [peer=addr] = invite peer" },
+       { "p2p_peers", wpa_cli_cmd_p2p_peers, cli_cmd_flag_none,
+         "[discovered] = list known (optionally, only fully discovered) P2P "
+         "peers" },
+       { "p2p_peer", wpa_cli_cmd_p2p_peer, cli_cmd_flag_none,
+         "<address> = show information about known P2P peer" },
+       { "p2p_set", wpa_cli_cmd_p2p_set, cli_cmd_flag_none,
+         "<field> <value> = set a P2P parameter" },
+       { "p2p_flush", wpa_cli_cmd_p2p_flush, cli_cmd_flag_none,
+         "= flush P2P state" },
+       { "p2p_cancel", wpa_cli_cmd_p2p_cancel, cli_cmd_flag_none,
+         "= cancel P2P group formation" },
+       { "p2p_unauthorize", wpa_cli_cmd_p2p_unauthorize, cli_cmd_flag_none,
+         "<address> = unauthorize a peer" },
+       { "p2p_presence_req", wpa_cli_cmd_p2p_presence_req, cli_cmd_flag_none,
+         "[<duration> <interval>] [<duration> <interval>] = request GO "
+         "presence" },
+       { "p2p_ext_listen", wpa_cli_cmd_p2p_ext_listen, cli_cmd_flag_none,
+         "[<period> <interval>] = set extended listen timing" },
+#endif /* CONFIG_P2P */
+
+#ifdef CONFIG_INTERWORKING
+       { "fetch_anqp", wpa_cli_cmd_fetch_anqp, cli_cmd_flag_none,
+         "= fetch ANQP information for all APs" },
+       { "stop_fetch_anqp", wpa_cli_cmd_stop_fetch_anqp, cli_cmd_flag_none,
+         "= stop fetch_anqp operation" },
+       { "interworking_select", wpa_cli_cmd_interworking_select,
+         cli_cmd_flag_none,
+         "[auto] = perform Interworking network selection" },
+       { "interworking_connect", wpa_cli_cmd_interworking_connect,
+         cli_cmd_flag_none,
+         "<BSSID> = connect using Interworking credentials" },
+       { "anqp_get", wpa_cli_cmd_anqp_get, cli_cmd_flag_none,
+         "<addr> <info id>[,<info id>]... = request ANQP information" },
+#endif /* CONFIG_INTERWORKING */
+       { "sta_autoconnect", wpa_cli_cmd_sta_autoconnect, cli_cmd_flag_none,
+         "<0/1> = disable/enable automatic reconnection" },
+       { "tdls_discover", wpa_cli_cmd_tdls_discover,
+         cli_cmd_flag_none,
+         "<addr> = request TDLS discovery with <addr>" },
+       { "tdls_setup", wpa_cli_cmd_tdls_setup,
+         cli_cmd_flag_none,
+         "<addr> = request TDLS setup with <addr>" },
+       { "tdls_teardown", wpa_cli_cmd_tdls_teardown,
+         cli_cmd_flag_none,
+         "<addr> = tear down TDLS with <addr>" },
+       { "signal_poll", wpa_cli_cmd_signal_poll,
+         cli_cmd_flag_none,
+         "= get signal parameters" },
+       { "reauthenticate", wpa_cli_cmd_reauthenticate, cli_cmd_flag_none,
+         "= trigger IEEE 802.1X/EAPOL reauthentication" },
+       { NULL, NULL, cli_cmd_flag_none, NULL }
+};
+
+
+/*
+ * Prints command usage, lines are padded with the specified string.
+ */
+static void print_cmd_help(struct wpa_cli_cmd *cmd, const char *pad)
+{
+       char c;
+       size_t n;
+
+       printf("%s%s ", pad, cmd->cmd);
+       for (n = 0; (c = cmd->usage[n]); n++) {
+               printf("%c", c);
+               if (c == '\n')
+                       printf("%s", pad);
        }
-       return 0;
+       printf("\n");
 }
 
 
-static int wpa_cli_cmd_reconfigure(struct wpa_ctrl *ctrl, int argc,
-                                  char *argv[])
+static void print_help(void)
 {
-       return wpa_ctrl_command(ctrl, "RECONFIGURE");
+       int n;
+       printf("commands:\n");
+       for (n = 0; wpa_cli_commands[n].cmd; n++)
+               print_cmd_help(&wpa_cli_commands[n], "  ");
 }
 
 
-static int wpa_cli_cmd_terminate(struct wpa_ctrl *ctrl, int argc,
-                                char *argv[])
+static int wpa_cli_edit_filter_history_cb(void *ctx, const char *cmd)
 {
-       return wpa_ctrl_command(ctrl, "TERMINATE");
+       const char *c, *delim;
+       int n;
+       size_t len;
+
+       delim = os_strchr(cmd, ' ');
+       if (delim)
+               len = delim - cmd;
+       else
+               len = os_strlen(cmd);
+
+       for (n = 0; (c = wpa_cli_commands[n].cmd); n++) {
+               if (os_strncasecmp(cmd, c, len) == 0 && len == os_strlen(c))
+                       return (wpa_cli_commands[n].flags &
+                               cli_cmd_flag_sensitive);
+       }
+       return 0;
 }
 
 
-static int wpa_cli_cmd_interface_add(struct wpa_ctrl *ctrl, int argc,
-                                    char *argv[])
+static char ** wpa_list_cmd_list(void)
 {
-       char cmd[256];
-       int res;
+       char **res;
+       int i, count;
 
-       if (argc < 1) {
-               printf("Invalid INTERFACE_ADD command: needs at least one "
-                      "argument (interface name)\n"
-                      "All arguments: ifname confname driver ctrl_interface "
-                      "driver_param bridge_name\n");
-               return -1;
+       count = sizeof(wpa_cli_commands) / sizeof(wpa_cli_commands[0]);
+       res = os_zalloc(count * sizeof(char *));
+       if (res == NULL)
+               return NULL;
+
+       for (i = 0; wpa_cli_commands[i].cmd; i++) {
+               res[i] = os_strdup(wpa_cli_commands[i].cmd);
+               if (res[i] == NULL)
+                       break;
        }
 
-       /*
-        * INTERFACE_ADD <ifname>TAB<confname>TAB<driver>TAB<ctrl_interface>TAB
-        * <driver_param>TAB<bridge_name>
-        */
-       res = os_snprintf(cmd, sizeof(cmd),
-                         "INTERFACE_ADD %s\t%s\t%s\t%s\t%s\t%s",
-                         argv[0],
-                         argc > 1 ? argv[1] : "", argc > 2 ? argv[2] : "",
-                         argc > 3 ? argv[3] : "", argc > 4 ? argv[4] : "",
-                         argc > 5 ? argv[5] : "");
-       if (res < 0 || (size_t) res >= sizeof(cmd))
-               return -1;
-       cmd[sizeof(cmd) - 1] = '\0';
-       return wpa_ctrl_command(ctrl, cmd);
+       return res;
 }
 
 
-static int wpa_cli_cmd_interface_remove(struct wpa_ctrl *ctrl, int argc,
-                                       char *argv[])
+static char ** wpa_cli_cmd_completion(const char *cmd, const char *str,
+                                     int pos)
 {
-       char cmd[128];
-       int res;
+       int i;
 
-       if (argc != 1) {
-               printf("Invalid INTERFACE_REMOVE command: needs one argument "
-                      "(interface name)\n");
-               return -1;
+       if (os_strcasecmp(cmd, "bss") == 0)
+               return wpa_cli_complete_bss(str, pos);
+#ifdef CONFIG_P2P
+       if (os_strcasecmp(cmd, "p2p_connect") == 0)
+               return wpa_cli_complete_p2p_connect(str, pos);
+       if (os_strcasecmp(cmd, "p2p_peer") == 0)
+               return wpa_cli_complete_p2p_peer(str, pos);
+       if (os_strcasecmp(cmd, "p2p_group_remove") == 0)
+               return wpa_cli_complete_p2p_group_remove(str, pos);
+#endif /* CONFIG_P2P */
+
+       for (i = 0; wpa_cli_commands[i].cmd; i++) {
+               if (os_strcasecmp(wpa_cli_commands[i].cmd, cmd) == 0) {
+                       edit_clear_line();
+                       printf("\r%s\n", wpa_cli_commands[i].usage);
+                       edit_redraw();
+                       break;
+               }
        }
 
-       res = os_snprintf(cmd, sizeof(cmd), "INTERFACE_REMOVE %s", argv[0]);
-       if (res < 0 || (size_t) res >= sizeof(cmd))
-               return -1;
-       cmd[sizeof(cmd) - 1] = '\0';
-       return wpa_ctrl_command(ctrl, cmd);
+       return NULL;
 }
 
 
-static int wpa_cli_cmd_interface_list(struct wpa_ctrl *ctrl, int argc,
-                                     char *argv[])
+static char ** wpa_cli_edit_completion_cb(void *ctx, const char *str, int pos)
 {
-       return wpa_ctrl_command(ctrl, "INTERFACE_LIST");
-}
-
+       char **res;
+       const char *end;
+       char *cmd;
 
-struct wpa_cli_cmd {
-       const char *cmd;
-       int (*handler)(struct wpa_ctrl *ctrl, int argc, char *argv[]);
-};
+       end = os_strchr(str, ' ');
+       if (end == NULL || str + pos < end)
+               return wpa_list_cmd_list();
 
-static struct wpa_cli_cmd wpa_cli_commands[] = {
-       { "status", wpa_cli_cmd_status },
-       { "ping", wpa_cli_cmd_ping },
-       { "mib", wpa_cli_cmd_mib },
-       { "help", wpa_cli_cmd_help },
-       { "interface", wpa_cli_cmd_interface },
-       { "level", wpa_cli_cmd_level },
-       { "license", wpa_cli_cmd_license },
-       { "quit", wpa_cli_cmd_quit },
-       { "set", wpa_cli_cmd_set },
-       { "logon", wpa_cli_cmd_logon },
-       { "logoff", wpa_cli_cmd_logoff },
-       { "pmksa", wpa_cli_cmd_pmksa },
-       { "reassociate", wpa_cli_cmd_reassociate },
-       { "preauthenticate", wpa_cli_cmd_preauthenticate },
-       { "identity", wpa_cli_cmd_identity },
-       { "password", wpa_cli_cmd_password },
-       { "new_password", wpa_cli_cmd_new_password },
-       { "pin", wpa_cli_cmd_pin },
-       { "otp", wpa_cli_cmd_otp },
-       { "passphrase", wpa_cli_cmd_passphrase },
-       { "bssid", wpa_cli_cmd_bssid },
-       { "list_networks", wpa_cli_cmd_list_networks },
-       { "select_network", wpa_cli_cmd_select_network },
-       { "enable_network", wpa_cli_cmd_enable_network },
-       { "disable_network", wpa_cli_cmd_disable_network },
-       { "add_network", wpa_cli_cmd_add_network },
-       { "remove_network", wpa_cli_cmd_remove_network },
-       { "set_network", wpa_cli_cmd_set_network },
-       { "get_network", wpa_cli_cmd_get_network },
-       { "save_config", wpa_cli_cmd_save_config },
-       { "disconnect", wpa_cli_cmd_disconnect },
-       { "reconnect", wpa_cli_cmd_reconnect },
-       { "scan", wpa_cli_cmd_scan },
-       { "scan_results", wpa_cli_cmd_scan_results },
-       { "bss", wpa_cli_cmd_bss },
-       { "get_capability", wpa_cli_cmd_get_capability },
-       { "reconfigure", wpa_cli_cmd_reconfigure },
-       { "terminate", wpa_cli_cmd_terminate },
-       { "interface_add", wpa_cli_cmd_interface_add },
-       { "interface_remove", wpa_cli_cmd_interface_remove },
-       { "interface_list", wpa_cli_cmd_interface_list },
-       { "ap_scan", wpa_cli_cmd_ap_scan },
-       { "stkstart", wpa_cli_cmd_stkstart },
-       { "ft_ds", wpa_cli_cmd_ft_ds },
-       { "wps_pbc", wpa_cli_cmd_wps_pbc },
-       { "wps_pin", wpa_cli_cmd_wps_pin },
-       { "wps_reg", wpa_cli_cmd_wps_reg },
-       { NULL, NULL }
-};
+       cmd = os_malloc(pos + 1);
+       if (cmd == NULL)
+               return NULL;
+       os_memcpy(cmd, str, pos);
+       cmd[end - str] = '\0';
+       res = wpa_cli_cmd_completion(cmd, str, pos);
+       os_free(cmd);
+       return res;
+}
 
 
 static int wpa_request(struct wpa_ctrl *ctrl, int argc, char *argv[])
@@ -1319,6 +3264,24 @@ static void wpa_cli_action_process(const char *msg)
                        wpa_cli_connected = 0;
                        wpa_cli_exec(action_file, ctrl_ifname, "DISCONNECTED");
                }
+       } else if (str_match(pos, P2P_EVENT_GROUP_STARTED)) {
+               wpa_cli_exec(action_file, ctrl_ifname, pos);
+       } else if (str_match(pos, P2P_EVENT_GROUP_REMOVED)) {
+               wpa_cli_exec(action_file, ctrl_ifname, pos);
+       } else if (str_match(pos, P2P_EVENT_CROSS_CONNECT_ENABLE)) {
+               wpa_cli_exec(action_file, ctrl_ifname, pos);
+       } else if (str_match(pos, P2P_EVENT_CROSS_CONNECT_DISABLE)) {
+               wpa_cli_exec(action_file, ctrl_ifname, pos);
+       } else if (str_match(pos, P2P_EVENT_GO_NEG_FAILURE)) {
+               wpa_cli_exec(action_file, ctrl_ifname, pos);
+       } else if (str_match(pos, WPS_EVENT_SUCCESS)) {
+               wpa_cli_exec(action_file, ctrl_ifname, pos);
+       } else if (str_match(pos, WPS_EVENT_FAIL)) {
+               wpa_cli_exec(action_file, ctrl_ifname, pos);
+       } else if (str_match(pos, AP_STA_CONNECTED)) {
+               wpa_cli_exec(action_file, ctrl_ifname, pos);
+       } else if (str_match(pos, AP_STA_DISCONNECTED)) {
+               wpa_cli_exec(action_file, ctrl_ifname, pos);
        } else if (str_match(pos, WPA_EVENT_TERMINATING)) {
                printf("wpa_supplicant is terminating - stop monitoring\n");
                wpa_cli_quit = 1;
@@ -1337,23 +3300,80 @@ static void wpa_cli_action_cb(char *msg, size_t len)
 static void wpa_cli_reconnect(void)
 {
        wpa_cli_close_connection();
-       ctrl_conn = wpa_cli_open_connection(ctrl_ifname);
-       if (ctrl_conn) {
-               printf("Connection to wpa_supplicant re-established\n");
-               if (wpa_ctrl_attach(ctrl_conn) == 0) {
-                       wpa_cli_attached = 1;
-               } else {
-                       printf("Warning: Failed to attach to "
-                              "wpa_supplicant.\n");
-               }
+       wpa_cli_open_connection(ctrl_ifname, 1);
+}
+
+
+static void cli_event(const char *str)
+{
+       const char *start, *s;
+
+       start = os_strchr(str, '>');
+       if (start == NULL)
+               return;
+
+       start++;
+
+       if (str_starts(start, WPA_EVENT_BSS_ADDED)) {
+               s = os_strchr(start, ' ');
+               if (s == NULL)
+                       return;
+               s = os_strchr(s + 1, ' ');
+               if (s == NULL)
+                       return;
+               cli_txt_list_add(&bsses, s + 1);
+               return;
+       }
+
+       if (str_starts(start, WPA_EVENT_BSS_REMOVED)) {
+               s = os_strchr(start, ' ');
+               if (s == NULL)
+                       return;
+               s = os_strchr(s + 1, ' ');
+               if (s == NULL)
+                       return;
+               cli_txt_list_del_addr(&bsses, s + 1);
+               return;
+       }
+
+#ifdef CONFIG_P2P
+       if (str_starts(start, P2P_EVENT_DEVICE_FOUND)) {
+               s = os_strstr(start, " p2p_dev_addr=");
+               if (s == NULL)
+                       return;
+               cli_txt_list_add_addr(&p2p_peers, s + 14);
+               return;
+       }
+
+       if (str_starts(start, P2P_EVENT_DEVICE_LOST)) {
+               s = os_strstr(start, " p2p_dev_addr=");
+               if (s == NULL)
+                       return;
+               cli_txt_list_del_addr(&p2p_peers, s + 14);
+               return;
        }
+
+       if (str_starts(start, P2P_EVENT_GROUP_STARTED)) {
+               s = os_strchr(start, ' ');
+               if (s == NULL)
+                       return;
+               cli_txt_list_add_word(&p2p_groups, s + 1);
+               return;
+       }
+
+       if (str_starts(start, P2P_EVENT_GROUP_REMOVED)) {
+               s = os_strchr(start, ' ');
+               if (s == NULL)
+                       return;
+               cli_txt_list_del_word(&p2p_groups, s + 1);
+               return;
+       }
+#endif /* CONFIG_P2P */
 }
 
 
-static void wpa_cli_recv_pending(struct wpa_ctrl *ctrl, int in_read,
-                                int action_monitor)
+static void wpa_cli_recv_pending(struct wpa_ctrl *ctrl, int action_monitor)
 {
-       int first = 1;
        if (ctrl_conn == NULL) {
                wpa_cli_reconnect();
                return;
@@ -1366,10 +3386,12 @@ static void wpa_cli_recv_pending(struct wpa_ctrl *ctrl, int in_read,
                        if (action_monitor)
                                wpa_cli_action_process(buf);
                        else {
-                               if (in_read && first)
-                                       printf("\n");
-                               first = 0;
-                               printf("%s\n", buf);
+                               cli_event(buf);
+                               if (wpa_cli_show_event(buf)) {
+                                       edit_clear_line();
+                                       printf("\r%s\n", buf);
+                                       edit_redraw();
+                               }
                        }
                } else {
                        printf("Could not read pending message.\n");
@@ -1384,164 +3406,108 @@ static void wpa_cli_recv_pending(struct wpa_ctrl *ctrl, int in_read,
        }
 }
 
+#define max_args 10
 
-#ifdef CONFIG_READLINE
-static char * wpa_cli_cmd_gen(const char *text, int state)
+static int tokenize_cmd(char *cmd, char *argv[])
 {
-       static int i, len;
-       const char *cmd;
+       char *pos;
+       int argc = 0;
 
-       if (state == 0) {
-               i = 0;
-               len = os_strlen(text);
+       pos = cmd;
+       for (;;) {
+               while (*pos == ' ')
+                       pos++;
+               if (*pos == '\0')
+                       break;
+               argv[argc] = pos;
+               argc++;
+               if (argc == max_args)
+                       break;
+               if (*pos == '"') {
+                       char *pos2 = os_strrchr(pos, '"');
+                       if (pos2)
+                               pos = pos2 + 1;
+               }
+               while (*pos != '\0' && *pos != ' ')
+                       pos++;
+               if (*pos == ' ')
+                       *pos++ = '\0';
        }
 
-       while ((cmd = wpa_cli_commands[i].cmd)) {
-               i++;
-               if (os_strncasecmp(cmd, text, len) == 0)
-                       return os_strdup(cmd);
+       return argc;
+}
+
+
+static void wpa_cli_ping(void *eloop_ctx, void *timeout_ctx)
+{
+       if (ctrl_conn && _wpa_ctrl_command(ctrl_conn, "PING", 0)) {
+               printf("Connection to wpa_supplicant lost - trying to "
+                      "reconnect\n");
+               wpa_cli_close_connection();
        }
+       if (!ctrl_conn)
+               wpa_cli_reconnect();
+       eloop_register_timeout(ping_interval, 0, wpa_cli_ping, NULL, NULL);
+}
 
-       return NULL;
+
+static void wpa_cli_eloop_terminate(int sig, void *signal_ctx)
+{
+       eloop_terminate();
 }
 
 
-static char * wpa_cli_dummy_gen(const char *text, int state)
+static void wpa_cli_mon_receive(int sock, void *eloop_ctx, void *sock_ctx)
 {
-       return NULL;
+       wpa_cli_recv_pending(mon_conn, 0);
 }
 
 
-static char ** wpa_cli_completion(const char *text, int start, int end)
+static void wpa_cli_edit_cmd_cb(void *ctx, char *cmd)
 {
-       return rl_completion_matches(text, start == 0 ?
-                                    wpa_cli_cmd_gen : wpa_cli_dummy_gen);
+       char *argv[max_args];
+       int argc;
+       argc = tokenize_cmd(cmd, argv);
+       if (argc)
+               wpa_request(ctrl_conn, argc, argv);
+}
+
+
+static void wpa_cli_edit_eof_cb(void *ctx)
+{
+       eloop_terminate();
 }
-#endif /* CONFIG_READLINE */
 
 
 static void wpa_cli_interactive(void)
 {
-#define max_args 10
-       char cmdbuf[256], *cmd, *argv[max_args], *pos;
-       int argc;
-#ifdef CONFIG_READLINE
        char *home, *hfile = NULL;
-#endif /* CONFIG_READLINE */
 
        printf("\nInteractive mode\n\n");
 
-#ifdef CONFIG_READLINE
-       rl_attempted_completion_function = wpa_cli_completion;
        home = getenv("HOME");
        if (home) {
                const char *fname = ".wpa_cli_history";
                int hfile_len = os_strlen(home) + 1 + os_strlen(fname) + 1;
                hfile = os_malloc(hfile_len);
-               if (hfile) {
-                       int res;
-                       res = os_snprintf(hfile, hfile_len, "%s/%s", home,
-                                         fname);
-                       if (res >= 0 && res < hfile_len) {
-                               hfile[hfile_len - 1] = '\0';
-                               read_history(hfile);
-                               stifle_history(100);
-                       }
-               }
+               if (hfile)
+                       os_snprintf(hfile, hfile_len, "%s/%s", home, fname);
        }
-#endif /* CONFIG_READLINE */
 
-       do {
-               wpa_cli_recv_pending(ctrl_conn, 0, 0);
-#ifndef CONFIG_NATIVE_WINDOWS
-               alarm(1);
-#endif /* CONFIG_NATIVE_WINDOWS */
-#ifdef CONFIG_READLINE
-               cmd = readline("> ");
-               if (cmd && *cmd) {
-                       HIST_ENTRY *h;
-                       while (next_history())
-                               ;
-                       h = previous_history();
-                       if (h == NULL || os_strcmp(cmd, h->line) != 0)
-                               add_history(cmd);
-                       next_history();
-               }
-#else /* CONFIG_READLINE */
-               printf("> ");
-               cmd = fgets(cmdbuf, sizeof(cmdbuf), stdin);
-#endif /* CONFIG_READLINE */
-#ifndef CONFIG_NATIVE_WINDOWS
-               alarm(0);
-#endif /* CONFIG_NATIVE_WINDOWS */
-               if (cmd == NULL)
-                       break;
-               wpa_cli_recv_pending(ctrl_conn, 0, 0);
-               pos = cmd;
-               while (*pos != '\0') {
-                       if (*pos == '\n') {
-                               *pos = '\0';
-                               break;
-                       }
-                       pos++;
-               }
-               argc = 0;
-               pos = cmd;
-               for (;;) {
-                       while (*pos == ' ')
-                               pos++;
-                       if (*pos == '\0')
-                               break;
-                       argv[argc] = pos;
-                       argc++;
-                       if (argc == max_args)
-                               break;
-                       if (*pos == '"') {
-                               char *pos2 = os_strrchr(pos, '"');
-                               if (pos2)
-                                       pos = pos2 + 1;
-                       }
-                       while (*pos != '\0' && *pos != ' ')
-                               pos++;
-                       if (*pos == ' ')
-                               *pos++ = '\0';
-               }
-               if (argc)
-                       wpa_request(ctrl_conn, argc, argv);
-
-               if (cmd != cmdbuf)
-                       os_free(cmd);
-       } while (!wpa_cli_quit);
-
-#ifdef CONFIG_READLINE
-       if (hfile) {
-               /* Save command history, excluding lines that may contain
-                * passwords. */
-               HIST_ENTRY *h;
-               history_set_pos(0);
-               h = next_history();
-               while (h) {
-                       char *p = h->line;
-                       while (*p == ' ' || *p == '\t')
-                               p++;
-                       if (os_strncasecmp(p, "pa", 2) == 0 ||
-                           os_strncasecmp(p, "o", 1) == 0 ||
-                           os_strncasecmp(p, "n", 1)) {
-                               h = remove_history(where_history());
-                               if (h) {
-                                       os_free(h->line);
-                                       os_free(h->data);
-                                       os_free(h);
-                               }
-                               h = current_history();
-                       } else {
-                               h = next_history();
-                       }
-               }
-               write_history(hfile);
-               os_free(hfile);
-       }
-#endif /* CONFIG_READLINE */
+       eloop_register_signal_terminate(wpa_cli_eloop_terminate, NULL);
+       edit_init(wpa_cli_edit_cmd_cb, wpa_cli_edit_eof_cb,
+                 wpa_cli_edit_completion_cb, NULL, hfile);
+       eloop_register_timeout(ping_interval, 0, wpa_cli_ping, NULL, NULL);
+
+       eloop_run();
+
+       cli_txt_list_flush(&p2p_peers);
+       cli_txt_list_flush(&p2p_groups);
+       cli_txt_list_flush(&bsses);
+       edit_deinit(hfile, wpa_cli_edit_filter_history_cb);
+       os_free(hfile);
+       eloop_cancel_timeout(wpa_cli_ping, NULL, NULL);
+       wpa_cli_close_connection();
 }
 
 
@@ -1562,7 +3528,7 @@ static void wpa_cli_action(struct wpa_ctrl *ctrl)
        while (!wpa_cli_quit) {
                FD_ZERO(&rfds);
                FD_SET(fd, &rfds);
-               tv.tv_sec = 2;
+               tv.tv_sec = ping_interval;
                tv.tv_usec = 0;
                res = select(fd + 1, &rfds, NULL, NULL, &tv);
                if (res < 0 && errno != EINTR) {
@@ -1571,7 +3537,7 @@ static void wpa_cli_action(struct wpa_ctrl *ctrl)
                }
 
                if (FD_ISSET(fd, &rfds))
-                       wpa_cli_recv_pending(ctrl, 0, 1);
+                       wpa_cli_recv_pending(ctrl, 1);
                else {
                        /* verify that connection is still working */
                        len = sizeof(buf) - 1;
@@ -1604,23 +3570,6 @@ static void wpa_cli_terminate(int sig)
 }
 
 
-#ifndef CONFIG_NATIVE_WINDOWS
-static void wpa_cli_alarm(int sig)
-{
-       if (ctrl_conn && _wpa_ctrl_command(ctrl_conn, "PING", 0)) {
-               printf("Connection to wpa_supplicant lost - trying to "
-                      "reconnect\n");
-               wpa_cli_close_connection();
-       }
-       if (!ctrl_conn)
-               wpa_cli_reconnect();
-       if (ctrl_conn)
-               wpa_cli_recv_pending(ctrl_conn, 1, 0);
-       alarm(1);
-}
-#endif /* CONFIG_NATIVE_WINDOWS */
-
-
 static char * wpa_cli_get_default_ifname(void)
 {
        char *ifname = NULL;
@@ -1628,8 +3577,17 @@ static char * wpa_cli_get_default_ifname(void)
 #ifdef CONFIG_CTRL_IFACE_UNIX
        struct dirent *dent;
        DIR *dir = opendir(ctrl_iface_dir);
-       if (!dir)
+       if (!dir) {
+#ifdef ANDROID
+               char ifprop[PROPERTY_VALUE_MAX];
+               if (property_get("wifi.interface", ifprop, NULL) != 0) {
+                       ifname = os_strdup(ifprop);
+                       printf("Using interface '%s'\n", ifname);
+                       return ifname;
+               }
+#endif /* ANDROID */
                return NULL;
+       }
        while ((dent = readdir(dir))) {
 #ifdef _DIRENT_HAVE_D_TYPE
                /*
@@ -1678,7 +3636,6 @@ static char * wpa_cli_get_default_ifname(void)
 
 int main(int argc, char *argv[])
 {
-       int interactive;
        int warning_displayed = 0;
        int c;
        int daemonize = 0;
@@ -1689,7 +3646,7 @@ int main(int argc, char *argv[])
                return -1;
 
        for (;;) {
-               c = getopt(argc, argv, "a:Bg:hi:p:P:v");
+               c = getopt(argc, argv, "a:Bg:G:hi:p:P:v");
                if (c < 0)
                        break;
                switch (c) {
@@ -1702,6 +3659,9 @@ int main(int argc, char *argv[])
                case 'g':
                        global = optarg;
                        break;
+               case 'G':
+                       ping_interval = atoi(optarg);
+                       break;
                case 'h':
                        usage();
                        return 0;
@@ -1729,6 +3689,9 @@ int main(int argc, char *argv[])
        if (interactive)
                printf("%s\n\n%s\n\n", wpa_cli_version, wpa_cli_license);
 
+       if (eloop_init())
+               return -1;
+
        if (global) {
 #ifdef CONFIG_CTRL_IFACE_NAMED_PIPE
                ctrl_conn = wpa_ctrl_open(NULL);
@@ -1742,47 +3705,46 @@ int main(int argc, char *argv[])
                }
        }
 
-       for (; !global;) {
-               if (ctrl_ifname == NULL)
-                       ctrl_ifname = wpa_cli_get_default_ifname();
-               ctrl_conn = wpa_cli_open_connection(ctrl_ifname);
-               if (ctrl_conn) {
-                       if (warning_displayed)
-                               printf("Connection established.\n");
-                       break;
-               }
+#ifndef _WIN32_WCE
+       signal(SIGINT, wpa_cli_terminate);
+       signal(SIGTERM, wpa_cli_terminate);
+#endif /* _WIN32_WCE */
+
+       if (ctrl_ifname == NULL)
+               ctrl_ifname = wpa_cli_get_default_ifname();
+
+       if (interactive) {
+               for (; !global;) {
+                       if (wpa_cli_open_connection(ctrl_ifname, 1) == 0) {
+                               if (warning_displayed)
+                                       printf("Connection established.\n");
+                               break;
+                       }
 
-               if (!interactive) {
+                       if (!warning_displayed) {
+                               printf("Could not connect to wpa_supplicant - "
+                                      "re-trying\n");
+                               warning_displayed = 1;
+                       }
+                       os_sleep(1, 0);
+                       continue;
+               }
+       } else {
+               if (!global &&
+                   wpa_cli_open_connection(ctrl_ifname, 0) < 0) {
                        perror("Failed to connect to wpa_supplicant - "
                               "wpa_ctrl_open");
                        return -1;
                }
 
-               if (!warning_displayed) {
-                       printf("Could not connect to wpa_supplicant - "
-                              "re-trying\n");
-                       warning_displayed = 1;
-               }
-               os_sleep(1, 0);
-               continue;
-       }
-
-#ifndef _WIN32_WCE
-       signal(SIGINT, wpa_cli_terminate);
-       signal(SIGTERM, wpa_cli_terminate);
-#endif /* _WIN32_WCE */
-#ifndef CONFIG_NATIVE_WINDOWS
-       signal(SIGALRM, wpa_cli_alarm);
-#endif /* CONFIG_NATIVE_WINDOWS */
-
-       if (interactive || action_file) {
-               if (wpa_ctrl_attach(ctrl_conn) == 0) {
-                       wpa_cli_attached = 1;
-               } else {
-                       printf("Warning: Failed to attach to "
-                              "wpa_supplicant.\n");
-                       if (!interactive)
+               if (action_file) {
+                       if (wpa_ctrl_attach(ctrl_conn) == 0) {
+                               wpa_cli_attached = 1;
+                       } else {
+                               printf("Warning: Failed to attach to "
+                                      "wpa_supplicant.\n");
                                return -1;
+                       }
                }
        }
 
@@ -1797,6 +3759,7 @@ int main(int argc, char *argv[])
                ret = wpa_request(ctrl_conn, argc - optind, &argv[optind]);
 
        os_free(ctrl_ifname);
+       eloop_destroy();
        wpa_cli_cleanup();
 
        return ret;