/hostap-latest/wpa_supplicant/ |
D | eap_register.c | 26 int ret = 0; in eap_register_methods() local 29 if (ret == 0) in eap_register_methods() 30 ret = eap_peer_md5_register(); in eap_register_methods() 34 if (ret == 0) in eap_register_methods() 35 ret = eap_peer_tls_register(); in eap_register_methods() 39 if (ret == 0) in eap_register_methods() 40 ret = eap_peer_unauth_tls_register(); in eap_register_methods() 45 if (ret == 0) in eap_register_methods() 46 ret = eap_peer_wfa_unauth_tls_register(); in eap_register_methods() 51 if (ret == 0) in eap_register_methods() [all …]
|
D | wpa_cli_zephyr.c | 48 int ret; in _wpa_ctrl_command() local 62 ret = wpa_ctrl_request(ctrl, cmd, os_strlen(cmd), buf, &len, wpa_cli_msg_cb); in _wpa_ctrl_command() 63 if (ret == -2) { in _wpa_ctrl_command() 66 } else if (ret < 0) { in _wpa_ctrl_command() 104 int ret; in wpa_cli_close_connection() local 109 ret = wpa_ctrl_detach(ctrl_conn); in wpa_cli_close_connection() 110 if (ret < 0) { in wpa_cli_close_connection() 186 int ret; in wpa_cli_open_connection() local 195 ret = socketpair(AF_UNIX, SOCK_STREAM, 0, wpa_s->ctrl_iface->mon_sock_pair); in wpa_cli_open_connection() 196 if (ret != 0) { in wpa_cli_open_connection() [all …]
|
D | ctrl_iface.c | 286 int ret; in wpas_ctrl_pno() local 299 ret = wpas_start_pno(wpa_s); in wpas_ctrl_pno() 301 ret = wpas_stop_pno(wpa_s); in wpas_ctrl_pno() 303 return ret; in wpas_ctrl_pno() 499 int ret = 0; in wpa_supplicant_ctrl_iface_set() local 530 ret = -1; in wpa_supplicant_ctrl_iface_set() 535 ret = -1; in wpa_supplicant_ctrl_iface_set() 544 ret = -1; in wpa_supplicant_ctrl_iface_set() 552 ret = -1; in wpa_supplicant_ctrl_iface_set() 564 ret = -1; in wpa_supplicant_ctrl_iface_set() [all …]
|
D | main_winsvc.c | 68 LONG ret; in read_interface() local 72 ret = RegOpenKeyEx(_hk, name, 0, KEY_QUERY_VALUE, &hk); in read_interface() 73 if (ret != ERROR_SUCCESS) { in read_interface() 82 ret = RegQueryValueEx(hk, TEXT("ctrl_interface"), NULL, NULL, in read_interface() 84 if (ret == ERROR_SUCCESS) { in read_interface() 93 ret = RegQueryValueEx(hk, TEXT("adapter"), NULL, NULL, in read_interface() 95 if (ret == ERROR_SUCCESS) { in read_interface() 104 ret = RegQueryValueEx(hk, TEXT("config"), NULL, NULL, in read_interface() 106 if (ret == ERROR_SUCCESS) { in read_interface() 115 ret = RegQueryValueEx(hk, TEXT("skip_on_error"), NULL, NULL, in read_interface() [all …]
|
D | config_winreg.c | 55 LONG ret; in wpa_config_read_blobs() local 58 ret = RegOpenKeyEx(hk, TEXT("blobs"), 0, KEY_QUERY_VALUE, &bhk); in wpa_config_read_blobs() 59 if (ret != ERROR_SUCCESS) { in wpa_config_read_blobs() 73 ret = RegEnumValue(bhk, i, name, &namelen, NULL, &type, in wpa_config_read_blobs() 76 if (ret == ERROR_NO_MORE_ITEMS) in wpa_config_read_blobs() 79 if (ret != ERROR_SUCCESS) { in wpa_config_read_blobs() 81 (unsigned int) ret); in wpa_config_read_blobs() 122 LONG ret; in wpa_config_read_reg_dword() local 125 ret = RegQueryValueEx(hk, name, NULL, NULL, (LPBYTE) &val, &buflen); in wpa_config_read_reg_dword() 126 if (ret == ERROR_SUCCESS && buflen == sizeof(val)) { in wpa_config_read_reg_dword() [all …]
|
/hostap-latest/hostapd/ |
D | eap_register.c | 25 int ret = 0; in eap_server_register_methods() local 28 if (ret == 0) in eap_server_register_methods() 29 ret = eap_server_identity_register(); in eap_server_register_methods() 33 if (ret == 0) in eap_server_register_methods() 34 ret = eap_server_md5_register(); in eap_server_register_methods() 38 if (ret == 0) in eap_server_register_methods() 39 ret = eap_server_tls_register(); in eap_server_register_methods() 43 if (ret == 0) in eap_server_register_methods() 44 ret = eap_server_unauth_tls_register(); in eap_server_register_methods() 49 if (ret == 0) in eap_server_register_methods() [all …]
|
D | ctrl_iface.c | 199 int ret; in hostapd_ctrl_iface_wps_check_pin() local 223 ret = os_snprintf(buf, buflen, "FAIL-CHECKSUM\n"); in hostapd_ctrl_iface_wps_check_pin() 224 if (os_snprintf_error(buflen, ret)) in hostapd_ctrl_iface_wps_check_pin() 226 return ret; in hostapd_ctrl_iface_wps_check_pin() 230 ret = os_snprintf(buf, buflen, "%s", pin); in hostapd_ctrl_iface_wps_check_pin() 231 if (os_snprintf_error(buflen, ret)) in hostapd_ctrl_iface_wps_check_pin() 234 return ret; in hostapd_ctrl_iface_wps_check_pin() 244 int ret; in hostapd_ctrl_iface_wps_nfc_tag_read() local 259 ret = hostapd_wps_nfc_tag_read(hapd, buf); in hostapd_ctrl_iface_wps_nfc_tag_read() 262 return ret; in hostapd_ctrl_iface_wps_nfc_tag_read() [all …]
|
/hostap-latest/eap_example/ |
D | eap_example_server.c | 102 int ret = 0; in eap_server_register_methods() local 105 if (ret == 0) in eap_server_register_methods() 106 ret = eap_server_identity_register(); in eap_server_register_methods() 110 if (ret == 0) in eap_server_register_methods() 111 ret = eap_server_md5_register(); in eap_server_register_methods() 115 if (ret == 0) in eap_server_register_methods() 116 ret = eap_server_tls_register(); in eap_server_register_methods() 120 if (ret == 0) in eap_server_register_methods() 121 ret = eap_server_mschapv2_register(); in eap_server_register_methods() 125 if (ret == 0) in eap_server_register_methods() [all …]
|
D | eap_example_peer.c | 181 int ret = 0; in eap_peer_register_methods() local 184 if (ret == 0) in eap_peer_register_methods() 185 ret = eap_peer_md5_register(); in eap_peer_register_methods() 189 if (ret == 0) in eap_peer_register_methods() 190 ret = eap_peer_tls_register(); in eap_peer_register_methods() 194 if (ret == 0) in eap_peer_register_methods() 195 ret = eap_peer_mschapv2_register(); in eap_peer_register_methods() 199 if (ret == 0) in eap_peer_register_methods() 200 ret = eap_peer_peap_register(); in eap_peer_register_methods() 204 if (ret == 0) in eap_peer_register_methods() [all …]
|
/hostap-latest/src/ap/ |
D | ctrl_iface_ap.c | 33 int ret; in hostapd_write_ht_mcs_bitmask() local 36 ret = os_snprintf(buf + len, buflen - len, in hostapd_write_ht_mcs_bitmask() 38 if (os_snprintf_error(buflen - len, ret)) in hostapd_write_ht_mcs_bitmask() 40 len += ret; in hostapd_write_ht_mcs_bitmask() 45 ret = os_snprintf(buf + len, buflen - len, "\n"); in hostapd_write_ht_mcs_bitmask() 46 if (os_snprintf_error(buflen - len, ret)) in hostapd_write_ht_mcs_bitmask() 48 len += ret; in hostapd_write_ht_mcs_bitmask() 60 int ret; in hostapd_get_sta_conn_time() local 73 ret = os_snprintf(buf, buflen, "connected_time=%lu\n", secs); in hostapd_get_sta_conn_time() 74 if (os_snprintf_error(buflen, ret)) in hostapd_get_sta_conn_time() [all …]
|
D | vlan_init.c | 25 int ret; in vlan_if_add() local 40 ret = hostapd_vlan_if_add(hapd, vlan->ifname); in vlan_if_add() 44 ret = 0; in vlan_if_add() 46 if (ret) in vlan_if_add() 47 return ret; in vlan_if_add() 52 ret = wpa_auth_ensure_group(hapd->wpa_auth, vlan->vlan_id); in vlan_if_add() 54 if (ret == 0) in vlan_if_add() 55 return ret; in vlan_if_add() 58 vlan->vlan_id, ret); in vlan_if_add() 66 return ret; in vlan_if_add() [all …]
|
/hostap-latest/src/drivers/ |
D | driver_macsec_qca.c | 87 int ret = 0; in __macsec_drv_init() local 94 ret = nss_macsec_secy_en_set(drv->secy_id, true); in __macsec_drv_init() 95 if (ret) in __macsec_drv_init() 98 ret = nss_macsec_secy_sc_sa_mapping_mode_set(drv->secy_id, in __macsec_drv_init() 100 if (ret) in __macsec_drv_init() 109 ret = nss_macsec_secy_rx_ctl_filt_set(drv->secy_id, 0, &rx_ctl_filt); in __macsec_drv_init() 110 if (ret) in __macsec_drv_init() 118 ret = nss_macsec_secy_tx_ctl_filt_set(drv->secy_id, 0, &tx_ctl_filt); in __macsec_drv_init() 119 if (ret) in __macsec_drv_init() 450 int ret = 0; in macsec_qca_enable_protect_frames() local [all …]
|
D | driver_zephyr.c | 418 int ret = -1; in wpa_drv_zep_abort_scan() local 430 ret = dev_ops->scan_abort(if_ctx->dev_priv); in wpa_drv_zep_abort_scan() 432 return ret; in wpa_drv_zep_abort_scan() 820 int ret; in phy_info_band_cfg() local 870 ret = phy_info_freqs_cfg(phy_info, mode, band_info); in phy_info_band_cfg() 872 if (ret == 0) in phy_info_band_cfg() 873 ret = phy_info_rates_cfg(mode, band_info); in phy_info_band_cfg() 875 if (ret != 0) { in phy_info_band_cfg() 877 return ret; in phy_info_band_cfg() 917 int ret = 0; in wpa_drv_mgmt_subscribe_non_ap() local [all …]
|
D | driver_macsec_linux.c | 668 int ret; in nl_send_recv() local 670 ret = nl_send_auto_complete(sk, msg); in nl_send_recv() 671 if (ret < 0) { in nl_send_recv() 673 __func__, ret, nl_geterror(-ret)); in nl_send_recv() 674 return ret; in nl_send_recv() 677 ret = nl_recvmsgs_default(sk); in nl_send_recv() 678 if (ret < 0) { in nl_send_recv() 680 __func__, ret, nl_geterror(-ret)); in nl_send_recv() 683 return ret; in nl_send_recv() 692 int ret = 1; in do_dump() local [all …]
|
D | driver_nl80211.c | 339 int *ret = arg; in finish_handler() local 340 *ret = 0; in finish_handler() 640 int ret; in nl_get_multicast_id() local 653 ret = send_and_recv(global, global->nl, msg, family_handler, &res, in nl_get_multicast_id() 655 if (ret == 0) in nl_get_multicast_id() 656 ret = res.id; in nl_get_multicast_id() 657 return ret; in nl_get_multicast_id() 837 int ret; in nl80211_register_beacons() local 849 ret = send_and_recv(drv->global, w->nl_beacons, msg, NULL, NULL, in nl80211_register_beacons() 851 if (ret) { in nl80211_register_beacons() [all …]
|
/hostap-latest/src/crypto/ |
D | crypto_wolfssl.c | 80 WC_RNG *ret; in wc_rng_init() local 83 ret = os_zalloc(sizeof(WC_RNG)); in wc_rng_init() 84 if (!ret) { in wc_rng_init() 89 err = wc_InitRng(ret); in wc_rng_init() 92 os_free(ret); in wc_rng_init() 93 ret = NULL; in wc_rng_init() 97 ret = wc_rng_new(NULL, 0, NULL); in wc_rng_init() 98 if (!ret) in wc_rng_init() 102 return ret; in wc_rng_init() 119 ecc_key *ret; in ecc_key_init() local [all …]
|
D | tls_gnutls.c | 202 int ret; in tls_gnutls_init_session() local 204 ret = gnutls_init(&conn->session, in tls_gnutls_init_session() 206 if (ret < 0) { in tls_gnutls_init_session() 208 "connection: %s", gnutls_strerror(ret)); in tls_gnutls_init_session() 212 ret = gnutls_set_default_priority(conn->session); in tls_gnutls_init_session() 213 if (ret < 0) in tls_gnutls_init_session() 216 ret = gnutls_priority_set_direct(conn->session, "NORMAL:-VERS-SSL3.0", in tls_gnutls_init_session() 218 if (ret < 0) { in tls_gnutls_init_session() 233 gnutls_strerror(ret)); in tls_gnutls_init_session() 243 int ret; in tls_connection_init() local [all …]
|
/hostap-latest/src/fst/ |
D | fst_ctrl_iface.c | 215 int ret; in session_set() local 230 ret = fst_session_set_str_ifname(s, q + 1, true); in session_set() 232 ret = fst_session_set_str_ifname(s, q + 1, false); in session_set() 234 ret = fst_session_set_str_peer_addr(s, q + 1, true); in session_set() 236 ret = fst_session_set_str_peer_addr(s, q + 1, false); in session_set() 238 ret = fst_session_set_str_llt(s, q + 1); in session_set() 244 return os_snprintf(buf, buflen, "%s\n", ret ? "FAIL" : "OK"); in session_set() 415 int ret; in test_request() local 419 ret = fst_test_req_send_fst_request( in test_request() 423 ret = fst_test_req_send_fst_response( in test_request() [all …]
|
/hostap-latest/src/eapol_auth/ |
D | eapol_auth_dump.c | 125 int ret; in eapol_auth_dump_state() local 130 ret = os_snprintf(pos, end - pos, "aWhile=%d\nquietWhile=%d\n" in eapol_auth_dump_state() 133 if (os_snprintf_error(end - pos, ret)) in eapol_auth_dump_state() 135 pos += ret; in eapol_auth_dump_state() 138 ret = os_snprintf(pos, end - pos, in eapol_auth_dump_state() 176 if (os_snprintf_error(end - pos, ret)) in eapol_auth_dump_state() 178 pos += ret; in eapol_auth_dump_state() 180 ret = os_snprintf(pos, end - pos, in eapol_auth_dump_state() 218 if (os_snprintf_error(end - pos, ret)) in eapol_auth_dump_state() 220 pos += ret; in eapol_auth_dump_state() [all …]
|
/hostap-latest/tests/ |
D | test-aes.c | 235 int ret = 0; in test_gcm() local 247 ret++; in test_gcm() 254 ret++; in test_gcm() 261 ret++; in test_gcm() 268 ret++; in test_gcm() 274 ret++; in test_gcm() 280 ret++; in test_gcm() 287 ret++; in test_gcm() 293 ret++; in test_gcm() 298 ret++; in test_gcm() [all …]
|
/hostap-latest/src/eap_peer/ |
D | eap_leap.c | 60 struct eap_method_ret *ret, in eap_leap_process_request() argument 80 ret->ignore = true; in eap_leap_process_request() 87 ret->ignore = true; in eap_leap_process_request() 99 ret->ignore = true; in eap_leap_process_request() 122 ret->ignore = true; in eap_leap_process_request() 138 struct eap_method_ret *ret, in eap_leap_process_success() argument 156 ret->ignore = true; in eap_leap_process_success() 173 ret->ignore = true; in eap_leap_process_success() 188 struct eap_method_ret *ret, in eap_leap_process_response() argument 207 ret->ignore = true; in eap_leap_process_response() [all …]
|
D | eap_eke.c | 196 struct eap_method_ret *ret, in eap_eke_build_fail() argument 212 ret->methodState = METHOD_DONE; in eap_eke_build_fail() 213 ret->decision = DECISION_FAIL; in eap_eke_build_fail() 214 ret->allowNotifications = false; in eap_eke_build_fail() 221 struct eap_method_ret *ret, in eap_eke_process_id() argument 234 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id() 242 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id() 255 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id() 295 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id() 303 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id() [all …]
|
D | eap_pax.c | 116 struct eap_method_ret *ret, u8 id, in eap_pax_process_std_1() argument 130 ret->ignore = true; in eap_pax_process_std_1() 137 ret->ignore = true; in eap_pax_process_std_1() 146 ret->ignore = true; in eap_pax_process_std_1() 155 ret->ignore = true; in eap_pax_process_std_1() 174 ret->ignore = true; in eap_pax_process_std_1() 183 ret->ignore = true; in eap_pax_process_std_1() 232 struct eap_method_ret *ret, u8 id, in eap_pax_process_std_3() argument 246 ret->ignore = true; in eap_pax_process_std_3() 253 ret->ignore = true; in eap_pax_process_std_3() [all …]
|
D | eap_ttls.c | 374 struct eap_method_ret *ret, in eap_ttls_phase2_eap_process() argument 390 ret->methodState = iret.methodState; in eap_ttls_phase2_eap_process() 391 ret->decision = iret.decision; in eap_ttls_phase2_eap_process() 400 struct eap_method_ret *ret, in eap_ttls_phase2_request_eap_method() argument 410 return eap_ttls_phase2_eap_process(sm, data, ret, hdr, len, in eap_ttls_phase2_request_eap_method() 469 return eap_ttls_phase2_eap_process(sm, data, ret, hdr, len, resp); in eap_ttls_phase2_request_eap_method() 475 struct eap_method_ret *ret, in eap_ttls_phase2_request_eap() argument 501 if (eap_ttls_phase2_request_eap_method(sm, data, ret, hdr, len, in eap_ttls_phase2_request_eap() 508 if (eap_ttls_phase2_request_eap_method(sm, data, ret, hdr, len, in eap_ttls_phase2_request_eap() 532 struct eap_method_ret *ret, in eap_ttls_phase2_request_mschapv2() argument [all …]
|
/hostap-latest/src/utils/ |
D | pcsc_funcs.c | 514 long ret; in scard_init() local 539 ret = SCardEstablishContext(SCARD_SCOPE_SYSTEM, NULL, NULL, in scard_init() 541 if (ret != SCARD_S_SUCCESS) { in scard_init() 543 "context (err=%ld)", ret); in scard_init() 547 ret = SCardListReaders(scard->ctx, NULL, NULL, &len); in scard_init() 548 if (ret != SCARD_S_SUCCESS) { in scard_init() 550 "(err=%ld)", ret); in scard_init() 563 ret = SCardListReaders(scard->ctx, NULL, readers, &len); in scard_init() 564 if (ret != SCARD_S_SUCCESS) { in scard_init() 566 "(err=%ld)", ret); in scard_init() [all …]
|