• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-13-stable/crypto/heimdal/lib/krb5/

Lines Matching refs:ret

91     krb5_error_code ret;
95 ret = krb5_copy_keyblock(context, key, &local_key.key);
96 if (ret)
97 return ret;
99 ret = krb5_data_alloc (&result->checksum, 16);
100 if (ret) {
102 return ret;
106 ret = _krb5_HMAC_MD5_checksum(context, &local_key, data, len, usage, result);
107 if (ret)
111 return ret;
123 krb5_error_code ret;
130 ret = krb5_enomem(context);
136 ret = krb5_enomem(context);
141 CHECK(ret, krb5_ret_uint32(sp, &tmp), out);
142 CHECK(ret, krb5_ret_uint32(sp, &tmp2), out);
144 ret = EINVAL; /* Too few buffers */
145 krb5_set_error_message(context, ret, N_("PAC have too few buffer", ""));
149 ret = EINVAL; /* Wrong version */
150 krb5_set_error_message(context, ret,
159 ret = krb5_enomem(context);
168 ret = EINVAL;
173 CHECK(ret, krb5_ret_uint32(sp, &p->pac->buffers[i].type), out);
174 CHECK(ret, krb5_ret_uint32(sp, &p->pac->buffers[i].buffersize), out);
175 CHECK(ret, krb5_ret_uint32(sp, &p->pac->buffers[i].offset_lo), out);
176 CHECK(ret, krb5_ret_uint32(sp, &p->pac->buffers[i].offset_hi), out);
180 ret = EINVAL;
181 krb5_set_error_message(context, ret,
186 ret = EINVAL;
187 krb5_set_error_message(context, ret,
192 ret = EINVAL;
193 krb5_set_error_message(context, ret,
198 ret = EINVAL;
199 krb5_set_error_message(context, ret,
206 ret = EINVAL;
207 krb5_set_error_message(context, ret, N_("PAC length off end", ""));
214 ret = EINVAL;
215 krb5_set_error_message(context, ret,
222 ret = EINVAL;
223 krb5_set_error_message(context, ret,
230 ret = EINVAL;
231 krb5_set_error_message(context, ret,
239 ret = krb5_data_copy(&p->data, ptr, len);
240 if (ret)
258 return ret;
264 krb5_error_code ret;
278 ret = krb5_data_alloc(&p->data, PACTYPE_SIZE);
279 if (ret) {
293 krb5_error_code ret;
327 ret = krb5_data_realloc(&p->data, len);
328 if (ret) {
329 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
330 return ret;
374 krb5_error_code ret;
384 ret = krb5_data_copy(data, (unsigned char *)p->data.data + offset, len);
385 if (ret) {
386 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
387 return ret;
445 krb5_error_code ret;
457 CHECK(ret, krb5_ret_uint32(sp, &type), out);
463 ret = krb5_enomem(context);
466 ret = krb5_storage_read(sp, cksum.checksum.data, cksum.checksum.length);
467 if (ret != (int)cksum.checksum.length) {
468 ret = EINVAL;
469 krb5_set_error_message(context, ret, "PAC checksum missing checksum");
474 ret = EINVAL;
475 krb5_set_error_message(context, ret, "Checksum type %d not keyed",
494 ret = HMAC_MD5_any_checksum(context, key, ptr, len,
497 if (ret != 0 || krb5_data_ct_cmp(&local_checksum.checksum, &cksum.checksum) != 0) {
498 ret = KRB5KRB_AP_ERR_BAD_INTEGRITY;
499 krb5_set_error_message(context, ret,
508 ret = krb5_crypto_init(context, key, 0, &crypto);
509 if (ret)
512 ret = krb5_verify_checksum(context, crypto, KRB5_KU_OTHER_CKSUM,
519 return ret;
526 return ret;
537 krb5_error_code ret;
550 ret = HMAC_MD5_any_checksum(context, key, data, datalen,
553 ret = krb5_crypto_init(context, key, 0, &crypto);
554 if (ret)
555 return ret;
557 ret = krb5_create_checksum(context, crypto, KRB5_KU_OTHER_CKSUM, 0,
560 if (ret)
561 return ret;
597 krb5_error_code ret;
611 CHECK(ret, krb5_ret_uint32(sp, &time1), out);
612 CHECK(ret, krb5_ret_uint32(sp, &time2), out);
624 CHECK(ret, krb5_ret_uint16(sp, &len), out);
636 ret = krb5_storage_read(sp, s, len);
637 if (ret != len) {
653 ret = wind_ucs2read(s, len, &flags, ucs2, &ucs2len);
655 if (ret) {
657 krb5_set_error_message(context, ret, "Failed to convert string to UCS-2");
658 return ret;
660 ret = wind_ucs2utf8_length(ucs2, ucs2len, &u8len);
661 if (ret) {
663 krb5_set_error_message(context, ret, "Failed to count length of UCS-2 string");
664 return ret;
672 ret = wind_ucs2utf8(ucs2, ucs2len, s, &u8len);
674 if (ret) {
676 krb5_set_error_message(context, ret, "Failed to convert to UTF-8");
677 return ret;
680 ret = krb5_parse_name_flags(context, s, KRB5_PRINCIPAL_PARSE_NO_REALM, &p2);
682 if (ret)
683 return ret;
686 ret = EINVAL;
687 krb5_set_error_message(context, ret, "PAC logon name mismatch");
690 return ret;
692 return ret;
705 krb5_error_code ret;
721 CHECK(ret, krb5_store_uint32(sp, t & 0xffffffff), out);
722 CHECK(ret, krb5_store_uint32(sp, t >> 32), out);
724 ret = krb5_unparse_name_flags(context, principal,
726 if (ret)
734 ret = wind_utf8ucs2_length(s, &ucs2_len);
735 if (ret) {
737 krb5_set_error_message(context, ret, "Failed to count length of UTF-8 string");
738 return ret;
747 ret = wind_utf8ucs2(s, ucs2, &ucs2_len);
749 if (ret) {
751 krb5_set_error_message(context, ret, "Failed to convert string to UCS-2");
752 return ret;
763 ret = wind_ucs2write(ucs2, ucs2_len,
766 if (ret) {
768 krb5_set_error_message(context, ret, "Failed to write to UCS-2 buffer");
769 return ret;
778 CHECK(ret, krb5_store_uint16(sp, s2_len), out);
780 ret = krb5_storage_write(sp, s2, s2_len);
782 if (ret != (int)s2_len) {
783 ret = krb5_enomem(context);
786 ret = krb5_storage_to_data(sp, logon);
787 if (ret)
794 return ret;
822 krb5_error_code ret;
837 ret = verify_logonname(context,
842 if (ret)
843 return ret;
852 ret = krb5_copy_data(context, &pac->data, &copy);
853 if (ret)
854 return ret;
869 ret = verify_checksum(context,
876 if (ret)
877 return ret;
881 ret = verify_checksum(context,
888 if (ret)
889 return ret;
925 krb5_error_code ret;
928 ret = krb5_crypto_init(context, key, 0, &crypto);
929 if (ret)
930 return ret;
932 ret = krb5_crypto_get_checksum_type(context, crypto, &cktype);
934 if (ret)
935 return ret;
942 ret = krb5_checksumsize(context, cktype, cksumsize);
943 if (ret)
944 return ret;
960 krb5_error_code ret;
1006 ret = build_logon_name(context, authtime, principal, &logon);
1007 if (ret)
1011 ret = pac_checksum(context, server_key, &server_cksumtype, &server_size);
1012 if (ret)
1014 ret = pac_checksum(context, priv_key, &priv_cksumtype, &priv_size);
1015 if (ret)
1032 CHECK(ret, krb5_store_uint32(sp, p->pac->numbuffers), out);
1033 CHECK(ret, krb5_store_uint32(sp, p->pac->version), out);
1047 CHECK(ret, krb5_store_uint32(spdata, server_cksumtype), out);
1048 CHECK(ret, fill_zeros(context, spdata, server_size), out);
1052 CHECK(ret, krb5_store_uint32(spdata, priv_cksumtype), out);
1053 CHECK(ret, fill_zeros(context, spdata, priv_size), out);
1057 ret = EINVAL;
1066 ret = krb5_enomem(context);
1073 CHECK(ret, krb5_store_uint32(sp, p->pac->buffers[i].type), out);
1074 CHECK(ret, krb5_store_uint32(sp, len), out);
1075 CHECK(ret, krb5_store_uint32(sp, end), out);
1076 CHECK(ret, krb5_store_uint32(sp, 0), out);
1085 CHECK(ret, fill_zeros(context, spdata, e - end), out);
1095 ret = krb5_storage_to_data(spdata, &d);
1096 if (ret) {
1097 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
1100 ret = krb5_storage_write(sp, d.data, d.length);
1101 if (ret != (int)d.length) {
1103 ret = krb5_enomem(context);
1108 ret = krb5_storage_to_data(sp, &d);
1109 if (ret) {
1110 ret = krb5_enomem(context);
1115 ret = create_checksum(context, server_key, server_cksumtype,
1118 if (ret) {
1122 ret = create_checksum(context, priv_key, priv_cksumtype,
1125 if (ret) {
1144 return ret;