Lines Matching refs:ret

60     krb5_error_code ret;
62 ASN1_MALLOC_ENCODE(KDC_REQ_BODY, buf, buf_size, body, &len, ret);
63 if (ret)
70 ret = _krb5_mk_req_internal(context, &ac, 0, &in_data, creds,
76 if(ret)
77 return ret;
96 krb5_error_code ret;
99 &len, ret);
100 if (ret)
101 return ret;
112 ret = krb5_crypto_init(context, subkey, 0, &crypto);
113 if (ret) {
117 return ret;
154 krb5_error_code ret = 0;
162 ret = ENOMEM;
163 krb5_set_error_message(context, ret,
169 ret = _krb5_init_etype(context,
175 if (ret)
179 ret = copy_Realm(&in_creds->server->realm, &t->req_body.realm);
180 if (ret)
184 ret = ENOMEM;
185 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
192 ret = copy_PrincipalName(&in_creds->server->name, t->req_body.sname);
193 if (ret)
200 ret = ENOMEM;
201 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
210 ret = ENOMEM;
211 krb5_set_error_message(context, ret,
217 ret = ENOMEM;
218 krb5_set_error_message(context, ret,
222 ret = copy_Ticket(second_ticket, t->req_body.additional_tickets->val);
223 if (ret)
228 ret = ENOMEM;
229 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
234 ret = ENOMEM;
235 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
241 ret = copy_PA_DATA(&padata->val[i], &t->padata->val[i + 1]);
242 if (ret) {
243 krb5_set_error_message(context, ret,
250 ret = krb5_auth_con_init(context, &ac);
251 if(ret)
254 ret = krb5_auth_con_generatelocalsubkey(context, ac, &krbtgt->session);
255 if (ret)
258 ret = set_auth_data (context, &t->req_body, &in_creds->authdata,
260 if (ret)
263 ret = make_pa_tgs_req(context,
268 if(ret)
271 ret = krb5_auth_con_getlocalsubkey(context, ac, subkey);
272 if (ret)
278 if (ret) {
282 return ret;
291 krb5_error_code ret;
296 ret = krb5_cc_get_principal(context, id, &tmp_cred.client);
297 if (ret)
298 return ret;
300 ret = krb5_make_principal(context,
306 if(ret) {
308 return ret;
310 ret = krb5_get_credentials(context,
317 if(ret)
318 return ret;
331 krb5_error_code ret = 0;
344 ret = krb5_crypto_init(context, subkey, 0, &crypto);
345 if (ret)
346 return ret;
347 ret = krb5_decrypt_EncryptedData (context,
356 if (ret && subkey->keytype == ETYPE_ARCFOUR_HMAC_MD5) {
357 ret = krb5_decrypt_EncryptedData(context,
365 if (subkey == NULL || ret) {
366 ret = krb5_crypto_init(context, key, 0, &crypto);
367 if (ret)
368 return ret;
369 ret = krb5_decrypt_EncryptedData (context,
376 if (ret)
377 return ret;
379 ret = decode_EncASRepPart(data.data,
383 if (ret)
384 ret = decode_EncTGSRepPart(data.data,
388 if (ret)
389 krb5_set_error_message(context, ret,
392 return ret;
411 krb5_error_code ret;
427 ret = decode_Ticket(in_creds->second_ticket.data,
430 if(ret)
431 return ret;
447 ret = _krb5_s4u2self_to_checksumdata(context, &self, &data);
448 if (ret) {
453 ret = krb5_crypto_init(context, &krbtgt->session, 0, &crypto);
454 if (ret) {
460 ret = krb5_create_checksum(context,
469 if (ret) {
474 ASN1_MALLOC_ENCODE(PA_S4U2Self, buf, len, &self, &size, ret);
477 if (ret)
482 ret = krb5_padata_add(context, &padata, KRB5_PADATA_FOR_USER, buf, len);
483 if (ret)
487 ret = init_tgs_req (context,
498 if (ret)
501 ASN1_MALLOC_ENCODE(TGS_REQ, enc.data, enc.length, &req, &len, ret);
502 if (ret)
516 ret = krb5_sendto_ctx_alloc(context, &stctx);
517 if (ret)
518 return ret;
521 ret = krb5_sendto_context (context, stctx, &enc,
526 if(ret)
533 ret = krb5_copy_principal(context,
536 if(ret)
538 ret = krb5_copy_principal(context,
541 if(ret)
550 ret = _krb5_extract_ticket(context,
564 ret = krb5_error_from_rd_error(context, &error, in_creds);
567 ret = KRB5KRB_AP_ERR_V4_REPLY;
570 ret = KRB5KRB_AP_ERR_MSG_TYPE;
582 return ret;
602 krb5_error_code ret;
624 ret = get_cred_kdc(context, id, flags, addrs, in_creds,
628 return ret;
641 krb5_error_code ret;
650 ret = _krb5_get_krbtgt (context,
654 if(ret) {
657 return ret;
659 ret = get_cred_kdc(context, id, flags, addresses,
662 if(ret) {
666 return ret;
672 krb5_error_code ret;
675 ret = krb5_unparse_name(context, p, &str);
676 if(ret) {
693 krb5_error_code ret;
698 ret = krb5_cc_retrieve_cred(context, id, KRB5_TC_DONT_MATCH_REALM,
700 if(ret == 0)
705 ret = krb5_copy_creds_contents(context, *tgts, out_creds);
706 return ret;
717 krb5_error_code ret;
728 ret = krb5_copy_creds(context, tkt, &tmp[i]);
730 return ret;
744 krb5_error_code ret;
754 ret = krb5_copy_principal(context, in_creds->client, &tmp_creds.client);
755 if(ret)
756 return ret;
758 ret = krb5_make_principal(context,
764 if(ret){
766 return ret;
771 ret = find_cred(context, ccache, tmp_creds.server,
773 if(ret == 0){
780 ret = ENOMEM;
781 krb5_set_error_message(context, ret,
784 ret = get_cred_kdc_address(context, ccache, flags, NULL,
789 if (ret) {
798 return ret;
808 ret = get_cred_kdc_capath(context, flags, ccache, &tmp_creds,
810 if(ret) {
813 return ret;
824 ret = add_cred(context, tgt, ret_tgts);
825 if(ret) {
828 return ret;
835 ret = krb5_make_principal(context, &tmp_creds.server,
837 if(ret) {
840 return ret;
842 ret = krb5_free_creds(context, tgt);
843 if(ret) {
846 return ret;
854 ret = ENOMEM;
855 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
857 ret = get_cred_kdc_address (context, ccache, flags, NULL,
860 if (ret) {
866 return ret;
894 krb5_error_code ret;
901 ret = get_cred_kdc_capath_worker(context, flags, ccache, in_creds, try_realm,
905 if (ret == KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN) {
910 ret = get_cred_kdc_capath_worker(context, flags, ccache, in_creds,
916 return ret;
930 krb5_error_code ret;
954 ret = krb5_make_principal(context, &tgtname,
959 if(ret)
960 return ret;
962 ret = find_cred(context, ccache, tgtname, *ret_tgts, &tgt);
964 if (ret)
965 return ret;
969 ret = krb5_copy_principal(context, in_creds->server, &referral.server);
970 if (ret) {
972 return ret;
974 ret = krb5_principal_set_realm(context, referral.server, client_realm);
975 if (ret) {
978 return ret;
990 ret = krb5_cc_retrieve_cred(context, ccache, 0, &mcreds, &ticket);
992 ret = EINVAL;
994 if (ret) {
995 ret = get_cred_kdc_address(context, ccache, flags, NULL,
998 if (ret)
1012 ret = KRB5KRB_AP_ERR_NOT_US;
1035 ret = KRB5_GET_IN_TKT_LOOP;
1051 ret = add_cred(context, &ticket, ret_tgts);
1052 if (ret)
1056 ret = krb5_principal_set_realm(context,
1062 if (ret)
1066 ret = krb5_copy_creds(context, &ticket, out_creds);
1072 return ret;
1091 krb5_error_code ret;
1094 ret = krb5_cc_get_kdc_offset(context, ccache, &offset);
1095 if (ret) {
1100 ret = get_cred_kdc_referral(context,
1108 if (ret == 0 || flags.b.canonicalize)
1109 return ret;
1129 krb5_error_code ret;
1135 ret = krb5_enctype_valid(context, in_creds->session.keytype);
1136 if (ret)
1137 return ret;
1155 ret = krb5_cc_retrieve_cred(context,
1164 if (ret == 0) {
1181 } else if(ret != KRB5_CC_END) {
1183 return ret;
1195 ret = _krb5_get_cred_kdc_any(context, flags, ccache,
1202 if(ret == 0 && (options & KRB5_GC_NO_STORE) == 0)
1204 return ret;
1298 krb5_error_code ret;
1306 ret = copy_Ticket(ticket, opt->ticket);
1307 if (ret) {
1310 krb5_set_error_message(context, ret,
1312 return ret;
1330 krb5_error_code ret;
1336 ret = krb5_enctype_valid(context, opt->enctype);
1337 if (ret)
1338 return ret;
1344 ret = krb5_cc_get_principal(context, ccache, &in_creds.client);
1345 if (ret)
1346 return ret;
1372 ret = krb5_cc_retrieve_cred(context,
1380 if (ret == 0) {
1399 } else if(ret != KRB5_CC_END) {
1407 ret = not_found(context, in_creds.server, KRB5_CC_NOTFOUND);
1426 ret = _krb5_get_cred_kdc_any(context, flags, ccache,
1435 if(ret == 0 && (options & KRB5_GC_NO_STORE) == 0)
1439 _krb5_debug(context, 5, "krb5_get_creds: ret = %d", ret);
1441 return ret;
1455 krb5_error_code ret;
1462 ret = krb5_copy_principal(context, client, &in.client);
1463 if (ret)
1464 return ret;
1467 ret = krb5_parse_name(context, in_tkt_service, &in.server);
1468 if (ret) {
1470 return ret;
1475 ret = krb5_make_principal(context, &in.server, realm, KRB5_TGS_NAME,
1477 if (ret) {
1479 return ret;
1490 ret = krb5_get_credentials(context, KRB5_GC_CACHED, ccache, &in, &template);
1491 if (ret == 0) {
1497 ret = krb5_get_kdc_cred(context, ccache, flags, NULL, NULL, &in, &out);
1500 if (ret)
1501 return ret;
1503 ret = krb5_copy_creds_contents(context, out, creds);
1506 return ret;