Lines Matching refs:ret

103     krb5_error_code ret;
119 ret = krb5_string_to_key_data_salt_opaque(context, type, password,
121 if (ret) {
125 return ret;
163 int ret;
165 ret = krb5_config_get_time (context, NULL,
170 if (ret >= 0)
171 return ret;
172 ret = krb5_config_get_time (context, NULL,
176 if (ret >= 0)
177 return ret;
188 krb5_error_code ret;
199 ret = krb5_get_default_principal (context,
201 if (ret)
223 return ret;
354 krb5_error_code ret;
370 ret = krb5_init_creds_set_password(context, ctx,
372 if (ret)
396 ret = init_cred(context, &ctx->cred, client, start_time, options);
397 if (ret) {
400 return ret;
403 ret = krb5_init_creds_set_service(context, ctx, NULL);
404 if (ret)
443 ret = ENOMEM;
444 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
456 ret = ENOMEM;
457 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
473 return ret;
487 krb5_error_code ret;
499 ret = krb5_get_init_creds_opt_alloc(context, &options);
500 if (ret)
501 return ret;
513 ret = krb5_get_init_creds_password (context,
523 if (ret)
543 ret = (*prompter) (context, data, NULL, "Changing password",
545 if (ret) {
557 ret = krb5_set_password (context,
564 if (ret)
571 ret = ENOMEM;
581 ret = 0;
583 ret = ENOTTY;
584 krb5_set_error_message(context, ret,
594 return ret;
620 krb5_error_code ret;
629 ret = ENOMEM;
630 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
635 ret = ENOMEM;
636 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
640 ret = _krb5_principal2principalname (a->req_body.cname, creds->client);
641 if (ret)
643 ret = copy_Realm(&creds->client->realm, &a->req_body.realm);
644 if (ret)
647 ret = _krb5_principal2principalname (a->req_body.sname, creds->server);
648 if (ret)
654 ret = ENOMEM;
655 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
667 ret = ENOMEM;
668 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
674 ret = _krb5_init_etype(context,
679 if (ret)
691 ret = ENOMEM;
692 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
697 ret = krb5_copy_addresses(context, addrs, a->req_body.addresses);
699 ret = krb5_get_all_client_addrs (context, a->req_body.addresses);
700 if(ret == 0 && a->req_body.addresses->len == 0) {
705 if (ret)
718 return ret;
739 krb5_error_code ret;
741 ret = krb5_copy_data(context, s2kparams, &paid->s2kparams);
742 if (ret) {
745 return ret;
760 krb5_error_code ret;
766 ret = decode_ETYPE_INFO2(data->data, data->length, &e, &sz);
767 if (ret)
776 ret = krb5_get_pw_salt(context, client, &salt);
780 ret = 0;
782 if (ret == 0)
783 ret = set_paid(paid, context, e.val[i].etype,
790 if (ret == 0) {
809 krb5_error_code ret;
815 ret = decode_ETYPE_INFO(data->data, data->length, &e, &sz);
816 if (ret)
826 ret = krb5_get_pw_salt(context, client, &salt);
829 ret = 0;
833 if (ret == 0) {
834 ret = set_paid(paid, context, e.val[i].etype,
842 if (ret == 0) {
861 krb5_error_code ret;
864 ret = set_paid(paid, context,
870 if (ret)
934 krb5_error_code ret;
943 ASN1_MALLOC_ENCODE(PA_ENC_TS_ENC, buf, buf_size, &p, &len, ret);
944 if (ret)
945 return ret;
949 ret = krb5_crypto_init(context, key, 0, &crypto);
950 if (ret) {
952 return ret;
954 ret = krb5_encrypt_EncryptedData(context,
963 if (ret)
964 return ret;
966 ASN1_MALLOC_ENCODE(EncryptedData, buf, buf_size, &encdata, &len, ret);
968 if (ret)
969 return ret;
973 ret = krb5_padata_add(context, md, KRB5_PADATA_ENC_TIMESTAMP, buf, len);
974 if (ret)
976 return ret;
990 krb5_error_code ret;
997 ret = krb5_get_pw_salt (context, client, &salt2);
998 if (ret)
999 return ret;
1014 ret = (*keyproc)(context, enctypes[i], keyseed,
1016 if (ret)
1018 ret = make_pa_enc_timestamp (context, md, enctypes[i], key);
1020 if (ret)
1021 return ret;
1075 krb5_error_code ret;
1077 ret = (*ctx->keyproc)(context, etype, ctx->keyseed,
1079 return ret;
1114 krb5_error_code ret;
1129 &req, &len, ret);
1130 if (ret)
1131 return ret;
1135 ret = krb5_padata_add(context, md, KRB5_PADATA_PA_PAC_REQUEST, buf, len);
1136 if (ret)
1156 krb5_error_code ret;
1190 ret = pa_data_to_md_pkinit(context, a, creds->client,
1193 if (ret)
1194 return ret;
1258 krb5_error_code ret;
1274 ret = krb5_get_pw_salt (context, creds->client, &paid.salt);
1275 if (ret)
1276 return ret;
1301 ret = _krb5_pk_rd_pa_reply(context,
1311 ret = EINVAL;
1312 krb5_set_error_message(context, ret, N_("no support for PKINIT compiled in", ""));
1316 ret = pa_data_to_key_plain(context, creds->client, ctx,
1319 ret = EINVAL;
1320 krb5_set_error_message(context, ret, N_("No usable pa data type", ""));
1324 return ret;
1355 krb5_error_code ret;
1365 ret = get_init_creds_common(context, client, start_time, options, ctx);
1366 if (ret) {
1368 return ret;
1382 return ret;
1406 krb5_error_code ret;
1411 ret = krb5_parse_name (context, service, &principal);
1412 if (ret)
1413 return ret;
1416 ret = krb5_make_principal(context, &principal,
1419 if (ret)
1420 return ret;
1483 krb5_error_code ret;
1492 ret = krb5_kt_get_entry (context, real_keytab, principal,
1498 if (ret)
1499 return ret;
1501 ret = krb5_copy_keyblock (context, &entry.keyblock, key);
1503 return ret;
1527 krb5_error_code ret;
1552 ret = krb5_kt_start_seq_get(context, keytab, &cursor);
1553 if(ret)
1650 krb5_error_code ret;
1657 ret = init_as_req(context, ctx->flags, &ctx->cred,
1659 if (ret) {
1661 return ret;
1685 ret = decode_AS_REP(in->data, in->length, &rep.kdc_rep, &size);
1686 if (ret == 0) {
1697 ret = process_pa_data_to_key(context, ctx, &ctx->cred,
1699 if (ret) {
1706 ret = _krb5_extract_ticket(context,
1721 if (ret == 0)
1722 ret = copy_EncKDCRepPart(&rep.enc_part, &ctx->enc_part);
1727 return ret;
1736 ret = krb5_rd_error(context, in, &ctx->error);
1737 if(ret && in->length && ((char*)in->data)[0] == 4)
1738 ret = KRB5KRB_AP_ERR_V4_REPLY;
1739 if (ret) {
1744 ret = krb5_error_from_rd_error(context, &ctx->error, &ctx->cred);
1746 _krb5_debug(context, 5, "krb5_get_init_creds: KRB-ERROR %d", ret);
1753 if (ret == KRB5KDC_ERR_PREAUTH_REQUIRED) {
1759 ret = decode_METHOD_DATA(ctx->error.e_data->data,
1763 if (ret)
1764 krb5_set_error_message(context, ret,
1767 krb5_set_error_message(context, ret,
1771 } else if (ret == KRB5KRB_AP_ERR_SKEW && context->kdc_sec_offset == 0) {
1778 ret = 0;
1785 } else if (ret == KRB5_KDC_ERR_WRONG_REALM && ctx->flags.canonicalize) {
1789 krb5_set_error_message(context, ret,
1797 ret = krb5_principal_set_realm(context,
1803 if (ret)
1818 ret = process_pa_data_to_md(context, &ctx->cred, &ctx->as_req, ctx,
1821 if (ret)
1828 &ctx->as_req, &len, ret);
1829 if (ret)
1841 return ret;
1876 krb5_error_code ret;
1878 ret = copy_KRB_ERROR(&ctx->error, error);
1879 if (ret)
1880 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
1882 return ret;
1916 krb5_error_code ret;
1923 ret = krb5_sendto_ctx_alloc(context, &stctx);
1924 if (ret)
1930 ret = krb5_init_creds_step(context, ctx, &in, &out, hostinfo, &flags);
1932 if (ret)
1938 ret = krb5_sendto_context (context, stctx, &out,
1940 if (ret)
1949 return ret;
1972 krb5_error_code ret;
1976 ret = krb5_init_creds_init(context, client, prompter, data, start_time, options, &ctx);
1977 if (ret)
1980 ret = krb5_init_creds_set_service(context, ctx, in_tkt_service);
1981 if (ret)
1999 ret = (*prompter) (context, data, NULL, NULL, 1, &prompt);
2001 if (ret) {
2003 ret = KRB5_LIBOS_PWDINTR;
2011 ret = krb5_init_creds_set_password(context, ctx, password);
2012 if (ret)
2016 ret = krb5_init_creds_get(context, ctx);
2018 if (ret == 0)
2022 if (ret == KRB5KDC_ERR_KEY_EXPIRED && chpw == 0) {
2033 ret = change_password (context,
2041 if (ret)
2049 if (ret == 0)
2056 return ret;
2075 krb5_error_code ret;
2079 ret = krb5_init_creds_init(context, client, NULL, NULL, start_time, options, &ctx);
2080 if (ret)
2083 ret = krb5_init_creds_set_service(context, ctx, in_tkt_service);
2084 if (ret)
2087 ret = krb5_init_creds_set_keyblock(context, ctx, keyblock);
2088 if (ret)
2091 ret = krb5_init_creds_get(context, ctx);
2093 if (ret == 0)
2097 if (ret == 0)
2103 return ret;
2122 krb5_error_code ret;
2126 ret = krb5_init_creds_init(context, client, NULL, NULL, start_time, options, &ctx);
2127 if (ret)
2130 ret = krb5_init_creds_set_service(context, ctx, in_tkt_service);
2131 if (ret)
2134 ret = krb5_init_creds_set_keytab(context, ctx, keytab);
2135 if (ret)
2138 ret = krb5_init_creds_get(context, ctx);
2139 if (ret == 0)
2143 if (ret == 0)
2149 return ret;