• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-13-stable/crypto/heimdal/lib/krb5/

Lines Matching refs:ret

47     krb5_error_code ret;
56 ASN1_MALLOC_ENCODE(PA_ENC_TS_ENC, buf, buf_size, &p, &len, ret);
57 if (ret)
58 return ret;
61 ret = krb5_crypto_init(context, key, 0, &crypto);
62 if (ret) {
64 return ret;
66 ret = krb5_encrypt_EncryptedData(context,
75 if (ret)
76 return ret;
78 ASN1_MALLOC_ENCODE(EncryptedData, buf, buf_size, &encdata, &len, ret);
80 if (ret)
81 return ret;
100 krb5_error_code ret;
108 ret = krb5_get_pw_salt (context, client, &salt2);
109 if (ret)
110 return ret;
129 ret = (*key_proc)(context, enctypes[i], *salt, keyseed, &key);
130 if (ret)
132 ret = make_pa_enc_timestamp (context, &md->val[md->len],
135 if (ret)
136 return ret;
157 krb5_error_code ret;
167 ret = ENOMEM;
168 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
173 ret = ENOMEM;
174 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
177 ret = _krb5_principal2principalname (a->req_body.cname, creds->client);
178 if (ret)
180 ret = _krb5_principal2principalname (a->req_body.sname, creds->server);
181 if (ret)
183 ret = copy_Realm(&creds->client->realm, &a->req_body.realm);
184 if (ret)
190 ret = ENOMEM;
191 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
203 ret = ENOMEM;
204 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
210 ret = _krb5_init_etype(context,
215 if (ret)
227 ret = ENOMEM;
228 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
233 ret = krb5_copy_addresses(context, addrs, a->req_body.addresses);
235 ret = krb5_get_all_client_addrs (context, a->req_body.addresses);
236 if(ret == 0 && a->req_body.addresses->len == 0) {
241 if (ret)
242 return ret;
252 ret = ENOMEM;
253 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
275 ret = add_padata(context, a->padata, creds->client,
279 if (ret == 0)
291 ret = ENOMEM;
292 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
310 ret = KRB5_PREAUTH_BAD_TYPE;
311 krb5_set_error_message (context, ret,
319 return ret;
378 krb5_error_code ret;
400 ret = init_as_req (context,
416 if (ret)
417 return ret;
419 ASN1_MALLOC_ENCODE(AS_REQ, req.data, req.length, &a, &len, ret);
421 if (ret)
422 return ret;
426 ret = krb5_sendto_kdc (context, &req, &creds->client->realm, &resp);
428 if (ret)
429 return ret;
432 ret = decode_AS_REP(resp.data, resp.length, &rep.kdc_rep, &size);
433 if(ret) {
440 ret = KRB5KRB_AP_ERR_V4_REPLY;
443 ret = krb5_error_from_rd_error(context, &error, creds);
447 && ret == KRB5KDC_ERR_PREAUTH_REQUIRED
449 || ret == KRB5KDC_ERR_BADOPTION
462 return ret;
464 return ret;
486 ret = (*key_proc)(context, etype, salt, keyseed, &key);
489 ret = krb5_get_pw_salt (context, creds->client, &salt);
491 if (ret)
493 ret = (*key_proc)(context, etype, salt, keyseed, &key);
496 if (ret)
504 ret = _krb5_extract_ticket(context,
521 if (ret == 0 && ret_as_reply)
525 return ret;
543 krb5_error_code ret;
545 ret = krb5_get_in_cred (context,
557 if(ret)
558 return ret;
560 ret = krb5_cc_store_cred (context, ccache, creds);
561 return ret;