Home
last modified time | relevance | path

Searched refs:ret (Results 1 – 25 of 280) sorted by relevance

12345678910>>...12

/hostap-latest/wpa_supplicant/
Deap_register.c26 int ret = 0; in eap_register_methods() local
29 if (ret == 0) in eap_register_methods()
30 ret = eap_peer_md5_register(); in eap_register_methods()
34 if (ret == 0) in eap_register_methods()
35 ret = eap_peer_tls_register(); in eap_register_methods()
39 if (ret == 0) in eap_register_methods()
40 ret = eap_peer_unauth_tls_register(); in eap_register_methods()
45 if (ret == 0) in eap_register_methods()
46 ret = eap_peer_wfa_unauth_tls_register(); in eap_register_methods()
51 if (ret == 0) in eap_register_methods()
[all …]
Dwpa_cli_zephyr.c48 int ret; in _wpa_ctrl_command() local
62 ret = wpa_ctrl_request(ctrl, cmd, os_strlen(cmd), buf, &len, wpa_cli_msg_cb); in _wpa_ctrl_command()
63 if (ret == -2) { in _wpa_ctrl_command()
66 } else if (ret < 0) { in _wpa_ctrl_command()
104 int ret; in wpa_cli_close_connection() local
109 ret = wpa_ctrl_detach(ctrl_conn); in wpa_cli_close_connection()
110 if (ret < 0) { in wpa_cli_close_connection()
186 int ret; in wpa_cli_open_connection() local
195 ret = socketpair(AF_UNIX, SOCK_STREAM, 0, wpa_s->ctrl_iface->mon_sock_pair); in wpa_cli_open_connection()
196 if (ret != 0) { in wpa_cli_open_connection()
[all …]
Dctrl_iface.c286 int ret; in wpas_ctrl_pno() local
299 ret = wpas_start_pno(wpa_s); in wpas_ctrl_pno()
301 ret = wpas_stop_pno(wpa_s); in wpas_ctrl_pno()
303 return ret; in wpas_ctrl_pno()
499 int ret = 0; in wpa_supplicant_ctrl_iface_set() local
530 ret = -1; in wpa_supplicant_ctrl_iface_set()
535 ret = -1; in wpa_supplicant_ctrl_iface_set()
544 ret = -1; in wpa_supplicant_ctrl_iface_set()
552 ret = -1; in wpa_supplicant_ctrl_iface_set()
564 ret = -1; in wpa_supplicant_ctrl_iface_set()
[all …]
Dmain_winsvc.c68 LONG ret; in read_interface() local
72 ret = RegOpenKeyEx(_hk, name, 0, KEY_QUERY_VALUE, &hk); in read_interface()
73 if (ret != ERROR_SUCCESS) { in read_interface()
82 ret = RegQueryValueEx(hk, TEXT("ctrl_interface"), NULL, NULL, in read_interface()
84 if (ret == ERROR_SUCCESS) { in read_interface()
93 ret = RegQueryValueEx(hk, TEXT("adapter"), NULL, NULL, in read_interface()
95 if (ret == ERROR_SUCCESS) { in read_interface()
104 ret = RegQueryValueEx(hk, TEXT("config"), NULL, NULL, in read_interface()
106 if (ret == ERROR_SUCCESS) { in read_interface()
115 ret = RegQueryValueEx(hk, TEXT("skip_on_error"), NULL, NULL, in read_interface()
[all …]
Dconfig_winreg.c55 LONG ret; in wpa_config_read_blobs() local
58 ret = RegOpenKeyEx(hk, TEXT("blobs"), 0, KEY_QUERY_VALUE, &bhk); in wpa_config_read_blobs()
59 if (ret != ERROR_SUCCESS) { in wpa_config_read_blobs()
73 ret = RegEnumValue(bhk, i, name, &namelen, NULL, &type, in wpa_config_read_blobs()
76 if (ret == ERROR_NO_MORE_ITEMS) in wpa_config_read_blobs()
79 if (ret != ERROR_SUCCESS) { in wpa_config_read_blobs()
81 (unsigned int) ret); in wpa_config_read_blobs()
122 LONG ret; in wpa_config_read_reg_dword() local
125 ret = RegQueryValueEx(hk, name, NULL, NULL, (LPBYTE) &val, &buflen); in wpa_config_read_reg_dword()
126 if (ret == ERROR_SUCCESS && buflen == sizeof(val)) { in wpa_config_read_reg_dword()
[all …]
/hostap-latest/hostapd/
Deap_register.c25 int ret = 0; in eap_server_register_methods() local
28 if (ret == 0) in eap_server_register_methods()
29 ret = eap_server_identity_register(); in eap_server_register_methods()
33 if (ret == 0) in eap_server_register_methods()
34 ret = eap_server_md5_register(); in eap_server_register_methods()
38 if (ret == 0) in eap_server_register_methods()
39 ret = eap_server_tls_register(); in eap_server_register_methods()
43 if (ret == 0) in eap_server_register_methods()
44 ret = eap_server_unauth_tls_register(); in eap_server_register_methods()
49 if (ret == 0) in eap_server_register_methods()
[all …]
Dctrl_iface.c199 int ret; in hostapd_ctrl_iface_wps_check_pin() local
223 ret = os_snprintf(buf, buflen, "FAIL-CHECKSUM\n"); in hostapd_ctrl_iface_wps_check_pin()
224 if (os_snprintf_error(buflen, ret)) in hostapd_ctrl_iface_wps_check_pin()
226 return ret; in hostapd_ctrl_iface_wps_check_pin()
230 ret = os_snprintf(buf, buflen, "%s", pin); in hostapd_ctrl_iface_wps_check_pin()
231 if (os_snprintf_error(buflen, ret)) in hostapd_ctrl_iface_wps_check_pin()
234 return ret; in hostapd_ctrl_iface_wps_check_pin()
244 int ret; in hostapd_ctrl_iface_wps_nfc_tag_read() local
259 ret = hostapd_wps_nfc_tag_read(hapd, buf); in hostapd_ctrl_iface_wps_nfc_tag_read()
262 return ret; in hostapd_ctrl_iface_wps_nfc_tag_read()
[all …]
/hostap-latest/eap_example/
Deap_example_server.c102 int ret = 0; in eap_server_register_methods() local
105 if (ret == 0) in eap_server_register_methods()
106 ret = eap_server_identity_register(); in eap_server_register_methods()
110 if (ret == 0) in eap_server_register_methods()
111 ret = eap_server_md5_register(); in eap_server_register_methods()
115 if (ret == 0) in eap_server_register_methods()
116 ret = eap_server_tls_register(); in eap_server_register_methods()
120 if (ret == 0) in eap_server_register_methods()
121 ret = eap_server_mschapv2_register(); in eap_server_register_methods()
125 if (ret == 0) in eap_server_register_methods()
[all …]
Deap_example_peer.c181 int ret = 0; in eap_peer_register_methods() local
184 if (ret == 0) in eap_peer_register_methods()
185 ret = eap_peer_md5_register(); in eap_peer_register_methods()
189 if (ret == 0) in eap_peer_register_methods()
190 ret = eap_peer_tls_register(); in eap_peer_register_methods()
194 if (ret == 0) in eap_peer_register_methods()
195 ret = eap_peer_mschapv2_register(); in eap_peer_register_methods()
199 if (ret == 0) in eap_peer_register_methods()
200 ret = eap_peer_peap_register(); in eap_peer_register_methods()
204 if (ret == 0) in eap_peer_register_methods()
[all …]
/hostap-latest/src/ap/
Dctrl_iface_ap.c33 int ret; in hostapd_write_ht_mcs_bitmask() local
36 ret = os_snprintf(buf + len, buflen - len, in hostapd_write_ht_mcs_bitmask()
38 if (os_snprintf_error(buflen - len, ret)) in hostapd_write_ht_mcs_bitmask()
40 len += ret; in hostapd_write_ht_mcs_bitmask()
45 ret = os_snprintf(buf + len, buflen - len, "\n"); in hostapd_write_ht_mcs_bitmask()
46 if (os_snprintf_error(buflen - len, ret)) in hostapd_write_ht_mcs_bitmask()
48 len += ret; in hostapd_write_ht_mcs_bitmask()
60 int ret; in hostapd_get_sta_conn_time() local
73 ret = os_snprintf(buf, buflen, "connected_time=%lu\n", secs); in hostapd_get_sta_conn_time()
74 if (os_snprintf_error(buflen, ret)) in hostapd_get_sta_conn_time()
[all …]
Dvlan_init.c25 int ret; in vlan_if_add() local
40 ret = hostapd_vlan_if_add(hapd, vlan->ifname); in vlan_if_add()
44 ret = 0; in vlan_if_add()
46 if (ret) in vlan_if_add()
47 return ret; in vlan_if_add()
52 ret = wpa_auth_ensure_group(hapd->wpa_auth, vlan->vlan_id); in vlan_if_add()
54 if (ret == 0) in vlan_if_add()
55 return ret; in vlan_if_add()
58 vlan->vlan_id, ret); in vlan_if_add()
66 return ret; in vlan_if_add()
[all …]
/hostap-latest/src/drivers/
Ddriver_macsec_qca.c87 int ret = 0; in __macsec_drv_init() local
94 ret = nss_macsec_secy_en_set(drv->secy_id, true); in __macsec_drv_init()
95 if (ret) in __macsec_drv_init()
98 ret = nss_macsec_secy_sc_sa_mapping_mode_set(drv->secy_id, in __macsec_drv_init()
100 if (ret) in __macsec_drv_init()
109 ret = nss_macsec_secy_rx_ctl_filt_set(drv->secy_id, 0, &rx_ctl_filt); in __macsec_drv_init()
110 if (ret) in __macsec_drv_init()
118 ret = nss_macsec_secy_tx_ctl_filt_set(drv->secy_id, 0, &tx_ctl_filt); in __macsec_drv_init()
119 if (ret) in __macsec_drv_init()
450 int ret = 0; in macsec_qca_enable_protect_frames() local
[all …]
Ddriver_zephyr.c418 int ret = -1; in wpa_drv_zep_abort_scan() local
430 ret = dev_ops->scan_abort(if_ctx->dev_priv); in wpa_drv_zep_abort_scan()
432 return ret; in wpa_drv_zep_abort_scan()
820 int ret; in phy_info_band_cfg() local
870 ret = phy_info_freqs_cfg(phy_info, mode, band_info); in phy_info_band_cfg()
872 if (ret == 0) in phy_info_band_cfg()
873 ret = phy_info_rates_cfg(mode, band_info); in phy_info_band_cfg()
875 if (ret != 0) { in phy_info_band_cfg()
877 return ret; in phy_info_band_cfg()
917 int ret = 0; in wpa_drv_mgmt_subscribe_non_ap() local
[all …]
Ddriver_macsec_linux.c668 int ret; in nl_send_recv() local
670 ret = nl_send_auto_complete(sk, msg); in nl_send_recv()
671 if (ret < 0) { in nl_send_recv()
673 __func__, ret, nl_geterror(-ret)); in nl_send_recv()
674 return ret; in nl_send_recv()
677 ret = nl_recvmsgs_default(sk); in nl_send_recv()
678 if (ret < 0) { in nl_send_recv()
680 __func__, ret, nl_geterror(-ret)); in nl_send_recv()
683 return ret; in nl_send_recv()
692 int ret = 1; in do_dump() local
[all …]
Ddriver_nl80211.c339 int *ret = arg; in finish_handler() local
340 *ret = 0; in finish_handler()
640 int ret; in nl_get_multicast_id() local
653 ret = send_and_recv(global, global->nl, msg, family_handler, &res, in nl_get_multicast_id()
655 if (ret == 0) in nl_get_multicast_id()
656 ret = res.id; in nl_get_multicast_id()
657 return ret; in nl_get_multicast_id()
837 int ret; in nl80211_register_beacons() local
849 ret = send_and_recv(drv->global, w->nl_beacons, msg, NULL, NULL, in nl80211_register_beacons()
851 if (ret) { in nl80211_register_beacons()
[all …]
/hostap-latest/src/crypto/
Dcrypto_wolfssl.c80 WC_RNG *ret; in wc_rng_init() local
83 ret = os_zalloc(sizeof(WC_RNG)); in wc_rng_init()
84 if (!ret) { in wc_rng_init()
89 err = wc_InitRng(ret); in wc_rng_init()
92 os_free(ret); in wc_rng_init()
93 ret = NULL; in wc_rng_init()
97 ret = wc_rng_new(NULL, 0, NULL); in wc_rng_init()
98 if (!ret) in wc_rng_init()
102 return ret; in wc_rng_init()
119 ecc_key *ret; in ecc_key_init() local
[all …]
Dtls_gnutls.c202 int ret; in tls_gnutls_init_session() local
204 ret = gnutls_init(&conn->session, in tls_gnutls_init_session()
206 if (ret < 0) { in tls_gnutls_init_session()
208 "connection: %s", gnutls_strerror(ret)); in tls_gnutls_init_session()
212 ret = gnutls_set_default_priority(conn->session); in tls_gnutls_init_session()
213 if (ret < 0) in tls_gnutls_init_session()
216 ret = gnutls_priority_set_direct(conn->session, "NORMAL:-VERS-SSL3.0", in tls_gnutls_init_session()
218 if (ret < 0) { in tls_gnutls_init_session()
233 gnutls_strerror(ret)); in tls_gnutls_init_session()
243 int ret; in tls_connection_init() local
[all …]
/hostap-latest/src/fst/
Dfst_ctrl_iface.c215 int ret; in session_set() local
230 ret = fst_session_set_str_ifname(s, q + 1, true); in session_set()
232 ret = fst_session_set_str_ifname(s, q + 1, false); in session_set()
234 ret = fst_session_set_str_peer_addr(s, q + 1, true); in session_set()
236 ret = fst_session_set_str_peer_addr(s, q + 1, false); in session_set()
238 ret = fst_session_set_str_llt(s, q + 1); in session_set()
244 return os_snprintf(buf, buflen, "%s\n", ret ? "FAIL" : "OK"); in session_set()
415 int ret; in test_request() local
419 ret = fst_test_req_send_fst_request( in test_request()
423 ret = fst_test_req_send_fst_response( in test_request()
[all …]
/hostap-latest/src/eapol_auth/
Deapol_auth_dump.c125 int ret; in eapol_auth_dump_state() local
130 ret = os_snprintf(pos, end - pos, "aWhile=%d\nquietWhile=%d\n" in eapol_auth_dump_state()
133 if (os_snprintf_error(end - pos, ret)) in eapol_auth_dump_state()
135 pos += ret; in eapol_auth_dump_state()
138 ret = os_snprintf(pos, end - pos, in eapol_auth_dump_state()
176 if (os_snprintf_error(end - pos, ret)) in eapol_auth_dump_state()
178 pos += ret; in eapol_auth_dump_state()
180 ret = os_snprintf(pos, end - pos, in eapol_auth_dump_state()
218 if (os_snprintf_error(end - pos, ret)) in eapol_auth_dump_state()
220 pos += ret; in eapol_auth_dump_state()
[all …]
/hostap-latest/tests/
Dtest-aes.c235 int ret = 0; in test_gcm() local
247 ret++; in test_gcm()
254 ret++; in test_gcm()
261 ret++; in test_gcm()
268 ret++; in test_gcm()
274 ret++; in test_gcm()
280 ret++; in test_gcm()
287 ret++; in test_gcm()
293 ret++; in test_gcm()
298 ret++; in test_gcm()
[all …]
/hostap-latest/src/eap_peer/
Deap_leap.c60 struct eap_method_ret *ret, in eap_leap_process_request() argument
80 ret->ignore = true; in eap_leap_process_request()
87 ret->ignore = true; in eap_leap_process_request()
99 ret->ignore = true; in eap_leap_process_request()
122 ret->ignore = true; in eap_leap_process_request()
138 struct eap_method_ret *ret, in eap_leap_process_success() argument
156 ret->ignore = true; in eap_leap_process_success()
173 ret->ignore = true; in eap_leap_process_success()
188 struct eap_method_ret *ret, in eap_leap_process_response() argument
207 ret->ignore = true; in eap_leap_process_response()
[all …]
Deap_eke.c196 struct eap_method_ret *ret, in eap_eke_build_fail() argument
212 ret->methodState = METHOD_DONE; in eap_eke_build_fail()
213 ret->decision = DECISION_FAIL; in eap_eke_build_fail()
214 ret->allowNotifications = false; in eap_eke_build_fail()
221 struct eap_method_ret *ret, in eap_eke_process_id() argument
234 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id()
242 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id()
255 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id()
295 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id()
303 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id()
[all …]
Deap_pax.c116 struct eap_method_ret *ret, u8 id, in eap_pax_process_std_1() argument
130 ret->ignore = true; in eap_pax_process_std_1()
137 ret->ignore = true; in eap_pax_process_std_1()
146 ret->ignore = true; in eap_pax_process_std_1()
155 ret->ignore = true; in eap_pax_process_std_1()
174 ret->ignore = true; in eap_pax_process_std_1()
183 ret->ignore = true; in eap_pax_process_std_1()
232 struct eap_method_ret *ret, u8 id, in eap_pax_process_std_3() argument
246 ret->ignore = true; in eap_pax_process_std_3()
253 ret->ignore = true; in eap_pax_process_std_3()
[all …]
Deap_ttls.c374 struct eap_method_ret *ret, in eap_ttls_phase2_eap_process() argument
390 ret->methodState = iret.methodState; in eap_ttls_phase2_eap_process()
391 ret->decision = iret.decision; in eap_ttls_phase2_eap_process()
400 struct eap_method_ret *ret, in eap_ttls_phase2_request_eap_method() argument
410 return eap_ttls_phase2_eap_process(sm, data, ret, hdr, len, in eap_ttls_phase2_request_eap_method()
469 return eap_ttls_phase2_eap_process(sm, data, ret, hdr, len, resp); in eap_ttls_phase2_request_eap_method()
475 struct eap_method_ret *ret, in eap_ttls_phase2_request_eap() argument
501 if (eap_ttls_phase2_request_eap_method(sm, data, ret, hdr, len, in eap_ttls_phase2_request_eap()
508 if (eap_ttls_phase2_request_eap_method(sm, data, ret, hdr, len, in eap_ttls_phase2_request_eap()
532 struct eap_method_ret *ret, in eap_ttls_phase2_request_mschapv2() argument
[all …]
/hostap-latest/src/utils/
Dpcsc_funcs.c514 long ret; in scard_init() local
539 ret = SCardEstablishContext(SCARD_SCOPE_SYSTEM, NULL, NULL, in scard_init()
541 if (ret != SCARD_S_SUCCESS) { in scard_init()
543 "context (err=%ld)", ret); in scard_init()
547 ret = SCardListReaders(scard->ctx, NULL, NULL, &len); in scard_init()
548 if (ret != SCARD_S_SUCCESS) { in scard_init()
550 "(err=%ld)", ret); in scard_init()
563 ret = SCardListReaders(scard->ctx, NULL, readers, &len); in scard_init()
564 if (ret != SCARD_S_SUCCESS) { in scard_init()
566 "(err=%ld)", ret); in scard_init()
[all …]

12345678910>>...12