• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-13-stable/crypto/heimdal/lib/krb5/

Lines Matching refs:ret

79     krb5_error_code ret;
89 if((ret = copy_EncTicketPart(&from->ticket, &tmp->ticket))){
91 return ret;
93 ret = krb5_copy_principal(context, from->client, &tmp->client);
94 if(ret){
97 return ret;
99 ret = krb5_copy_principal(context, from->server, &tmp->server);
100 if(ret){
104 return ret;
197 krb5_error_code ret = 0;
201 ret = ENOENT; /* XXX */
202 krb5_set_error_message(context, ret,
216 ret = der_copy_octet_string(&ad->val[i].ad_data, data);
217 if (ret) {
218 krb5_set_error_message(context, ret,
228 ret = decode_AuthorizationData(ad->val[i].ad_data.data,
232 if (ret) {
233 krb5_set_error_message(context, ret,
236 (int)ret);
239 ret = find_type_in_ad(context, type, data, found, FALSE,
242 if (ret)
250 ret = decode_AD_KDCIssued(ad->val[i].ad_data.data,
254 if (ret) {
255 krb5_set_error_message(context, ret,
258 ret);
267 &child.elements, &len, ret);
268 if (ret) {
276 ret = krb5_c_verify_checksum(context, sessionkey, 19, &buf,
279 if (ret) {
285 ret = ENOENT;
290 ret = find_type_in_ad(context, type, data, found, failp, sessionkey,
293 if (ret)
301 ret = ENOENT; /* XXX */
302 krb5_set_error_message(context, ret,
310 ret = ENOENT; /* XXX */
311 krb5_set_error_message(context, ret,
319 if (ret) {
325 return ret;
348 krb5_error_code ret;
360 ret = find_type_in_ad(context, type, data, &found, TRUE,
362 if (ret)
363 return ret;
382 krb5_error_code ret;
403 ret = decode_EncryptedData(pa->padata_value.data,
406 if (ret)
407 return ret;
416 ret = krb5_crypto_init(context, key, 0, &session);
417 if (ret) {
419 return ret;
422 ret = krb5_decrypt_EncryptedData(context, session,
427 if (ret)
428 return ret;
430 ret = decode_PA_ServerReferralData(data.data, data.length, &ref, &len);
431 if (ret) {
433 return ret;
484 return ret;
514 krb5_error_code ret;
531 ret = decode_PA_ClientCanonicalized(pa->padata_value.data,
534 if (ret) {
535 krb5_set_error_message(context, ret,
538 return ret;
542 &canon.names, &len, ret);
543 if (ret) {
545 return ret;
550 ret = krb5_crypto_init(context, key, 0, &crypto);
551 if (ret) {
554 return ret;
557 ret = krb5_verify_checksum(context, crypto, KRB5_KU_CANONICALIZED_NAMES,
562 if (ret) {
563 krb5_set_error_message(context, ret,
568 return ret;
612 krb5_error_code ret;
617 ret = krb5_crypto_init(context, key, 0, &crypto);
618 if (ret)
619 return ret;
621 ret = krb5_decrypt_EncryptedData (context,
628 if (ret)
629 return ret;
631 ret = decode_EncASRepPart(data.data,
635 if (ret)
636 ret = decode_EncTGSRepPart(data.data,
641 if (ret) {
642 krb5_set_error_message(context, ret,
644 return ret;
662 krb5_error_code ret;
673 ret = (*decrypt_proc)(context, key, key_usage, decryptarg, rep);
674 if (ret)
682 ret = krb5_data_copy (&creds->session.keyvalue,
685 if (ret) {
691 ret = _krb5_principalname2krb5_principal (context,
695 if (ret)
701 ret = check_client_referral(context, rep,
705 if (ret) {
714 ret = _krb5_principalname2krb5_principal (context,
718 if (ret)
721 ret = check_server_referral(context,
727 if (ret) {
743 ret = KRB5KRB_AP_ERR_MODIFIED;
752 ret = KRB5KRB_AP_ERR_MODIFIED;
753 krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
780 ret = KRB5KRB_AP_ERR_SKEW;
781 krb5_set_error_message (context, ret,
791 ret = KRB5KRB_AP_ERR_MODIFIED;
805 ret = KRB5KRB_AP_ERR_MODIFIED;
816 ret = KRB5KRB_AP_ERR_MODIFIED;
837 &rep->kdc_rep.ticket, &len, ret);
838 if(ret)
849 return ret;