/freebsd-11.0-release/crypto/heimdal/lib/ntlm/ |
H A D | test_ntlm.c | 55 int ret, flags; local 65 ret = heim_ntlm_encode_type1(&type1, &data); 66 if (ret) 71 ret = heim_ntlm_decode_type1(&data, &type1); 73 if (ret) 92 ret = heim_ntlm_encode_type2(&type2, &data); 93 if (ret) 98 ret = heim_ntlm_decode_type2(&data, &type2); 100 if (ret) 126 ret 192 int ret; local 250 int ret; local 297 int ret; local 335 usage(int ret) argument 345 int ret = 0, optind = 0; local [all...] |
/freebsd-11.0-release/contrib/xz/src/liblzma/common/ |
H A D | stream_buffer_decoder.c | 37 lzma_ret ret = lzma_stream_decoder_init( local 40 if (ret == LZMA_OK) { 47 ret = stream_decoder.code(stream_decoder.coder, allocator, 51 if (ret == LZMA_STREAM_END) { 52 ret = LZMA_OK; 58 if (ret == LZMA_OK) { 70 ret = LZMA_DATA_ERROR; 72 ret = LZMA_BUF_ERROR; 74 } else if (ret == LZMA_MEMLIMIT_ERROR) { 90 return ret; [all...] |
/freebsd-11.0-release/crypto/openssl/crypto/x509/ |
H A D | x509_r2x.c | 70 X509 *ret = NULL; local 76 if ((ret = X509_new()) == NULL) { 82 xi = ret->cert_info; 94 if (X509_set_subject_name(ret, xn) == 0) 96 if (X509_set_issuer_name(ret, xn) == 0) 106 res = X509_set_pubkey(ret, pubkey); 109 if (!res || !X509_sign(ret, pkey, EVP_md5())) 113 X509_free(ret); 114 ret = NULL; 116 return (ret); [all...] |
/freebsd-11.0-release/crypto/openssh/openbsd-compat/ |
H A D | bsd-setres_id.c | 33 int ret = 0, saved_errno; local 44 ret = -1; 51 ret = -1; 57 ret = -1; 60 return ret; 68 int ret = 0, saved_errno; local 79 ret = -1; 88 ret = -1; 95 ret = -1; 98 return ret; [all...] |
/freebsd-11.0-release/sys/dev/drm2/ttm/ |
H A D | ttm_lock.c | 97 int flags, ret; local 99 ret = 0; 109 ret = -msleep(lock, &lock->lock, flags, wmsg, 0); 110 if (ret == -EINTR || ret == -ERESTART) 111 ret = -ERESTARTSYS; 112 if (ret != 0) 115 return (ret); 142 int flags, ret; local 145 ret 197 int flags, ret; local 234 int ret = 0; local 250 int ret; local 276 int flags, ret; local [all...] |
/freebsd-11.0-release/crypto/openssl/crypto/buffer/ |
H A D | buf_str.c | 82 char *ret; local 92 ret = OPENSSL_malloc(siz + 1); 93 if (ret == NULL) { 98 memcpy(ret, str, siz); 99 ret[siz] = '\0'; 101 return (ret); 106 void *ret; local 111 ret = OPENSSL_malloc(siz); 112 if (ret == NULL) { 116 return memcpy(ret, dat [all...] |
/freebsd-11.0-release/crypto/openssl/crypto/ecdsa/ |
H A D | ecs_lib.c | 117 ECDSA_DATA *ret; local 119 ret = (ECDSA_DATA *)OPENSSL_malloc(sizeof(ECDSA_DATA)); 120 if (ret == NULL) { 125 ret->init = NULL; 127 ret->meth = ECDSA_get_default_method(); 128 ret->engine = engine; 130 if (!ret->engine) 131 ret->engine = ENGINE_get_default_ECDSA(); 132 if (ret->engine) { 133 ret 222 int ret, i; local 281 ECDSA_METHOD *ret; local [all...] |
/freebsd-11.0-release/crypto/heimdal/kdc/ |
H A D | kx509.c | 100 krb5_error_code ret; local 107 ret = krb5_data_alloc(rep->hash, HMAC_size(&ctx)); 108 if (ret) { 150 int ret; local 157 ret = hx509_env_add(context->hx509ctx, &env, "principal-name", 159 if (ret) 166 ret = hx509_certs_init(context->hx509ctx, config->kx509_ca, 0, 168 if (ret) { 173 ret = hx509_query_alloc(context->hx509ctx, &q); 174 if (ret) { 285 krb5_error_code ret; local [all...] |
/freebsd-11.0-release/crypto/heimdal/lib/krb5/ |
H A D | rd_error.c | 43 krb5_error_code ret; local 45 ret = decode_KRB_ERROR(msg->data, msg->length, result, &len); 46 if(ret) { 48 return ret; 75 krb5_error_code ret; local 77 ret = error->error_code; 79 krb5_set_error_message(context, ret, "%s", *error->e_text); 90 switch (ret) { 92 krb5_set_error_message(context, ret, 99 krb5_set_error_message(context, ret, [all...] |
H A D | get_addrs.c | 49 krb5_error_code ret; local 54 ret = errno; 55 krb5_set_error_message(context, ret, "gethostname: %s", strerror(ret)); 56 return ret; 60 ret = errno; 61 krb5_set_error_message (context, ret, "gethostbyname %s: %s", 62 hostname, strerror(ret)); 63 return ret; 74 ret 101 krb5_error_code ret = ENXIO; local 223 krb5_error_code ret = -1; local [all...] |
H A D | rd_req.c | 43 krb5_error_code ret; local 48 ret = krb5_crypto_init(context, key, 0, &crypto); 49 if (ret) 50 return ret; 51 ret = krb5_decrypt_EncryptedData (context, 57 if (ret) 58 return ret; 60 ret = decode_EncTicketPart(plain.data, plain.length, decr_part, &len); 61 if (ret) 62 krb5_set_error_message(context, ret, 76 krb5_error_code ret; local 111 krb5_error_code ret; local 139 krb5_error_code ret; local 175 krb5_error_code ret; local 231 krb5_error_code ret; local 278 krb5_error_code ret; local 348 krb5_error_code ret; local 696 krb5_error_code ret; local 741 krb5_error_code ret; local 785 krb5_error_code ret; local 848 krb5_error_code ret; local [all...] |
H A D | get_default_realm.c | 46 krb5_error_code ret = krb5_set_default_realm (context, NULL); local 47 if (ret) 64 krb5_error_code ret; local 70 ret = krb5_set_default_realm (context, NULL); 71 if (ret) 72 return ret;
|
H A D | rd_safe.c | 41 krb5_error_code ret; local 54 ASN1_MALLOC_ENCODE(KRB_SAFE, buf, buf_size, safe, &len, ret); 55 if(ret) 56 return ret; 67 ret = krb5_crypto_init(context, key, 0, &crypto); 68 if (ret) 70 ret = krb5_verify_checksum (context, 80 return ret; 90 krb5_error_code ret; local 110 ret [all...] |
/freebsd-11.0-release/contrib/wpa/src/eap_peer/ |
H A D | eap_md5.c | 30 struct eap_method_ret *ret, 42 ret->ignore = TRUE; 50 ret->ignore = TRUE; 63 ret->ignore = TRUE; 66 ret->ignore = FALSE; 72 ret->methodState = METHOD_DONE; 73 ret->decision = DECISION_COND_SUCC; 74 ret->allowNotifications = TRUE; 92 ret->ignore = TRUE; 105 int ret; local 29 eap_md5_process(struct eap_sm *sm, void *priv, struct eap_method_ret *ret, const struct wpabuf *reqData) argument [all...] |
/freebsd-11.0-release/contrib/wpa/wpa_supplicant/dbus/ |
H A D | dbus_old_handlers_wps.c | 33 int ret = 0; local 40 ret = wpas_wps_start_pbc(wpa_s, NULL, 0); 42 ret = wpas_wps_start_pbc(wpa_s, bssid, 0); 48 if (ret < 0) { 74 int ret = 0; local 91 ret = wpas_wps_start_pin(wpa_s, _bssid, pin, 0, 94 ret = wpas_wps_start_pin(wpa_s, _bssid, NULL, 0, 97 if (ret < 0) { 107 if (ret > 0) { 108 os_snprintf(npin, sizeof(npin), "%08d", ret); 132 int ret = 0; local [all...] |
/freebsd-11.0-release/lib/libc/iconv/ |
H A D | citrus_esdb.c | 81 int ret; local 84 ret = _db_open(&db, fr, _CITRUS_ESDB_MAGIC, &_db_hash_std, NULL); 85 if (ret) 89 ret = _db_lookup32_by_s(db, _CITRUS_ESDB_SYM_VERSION, &version, NULL); 90 if (ret) 98 ret = EFTYPE; 103 ret = _db_lookupstr_by_s(db, _CITRUS_ESDB_SYM_ENCODING, &str, NULL); 104 if (ret) 108 ret = errno; 114 ret 197 int ret; local 264 int ret; local [all...] |
/freebsd-11.0-release/contrib/netbsd-tests/lib/libc/locale/ |
H A D | t_mbtowc.c | 75 size_t stateful, ret; local 96 ret = mbtowc(NULL, NULL, 0); 97 ATF_REQUIRE(stateful ? ret : !ret); 102 ret = mbtowc(NULL, illegal, strlen(illegal)); 103 (void)printf("mbtowc() returned: %zd\n", ret); 104 ATF_REQUIRE_EQ(ret, (size_t)-1); 111 ret = mbtowc(NULL, NULL, 0); 112 ATF_REQUIRE(stateful ? ret : !ret); [all...] |
/freebsd-11.0-release/sys/riscv/include/ |
H A D | endian.h | 65 __uint64_t ret; local 67 ret = (_x >> 56); 68 ret |= ((_x >> 40) & 0xff00); 69 ret |= ((_x >> 24) & 0xff0000); 70 ret |= ((_x >> 8) & 0xff000000); 71 ret |= ((_x << 8) & ((__uint64_t)0xff << 32)); 72 ret |= ((_x << 24) & ((__uint64_t)0xff << 40)); 73 ret |= ((_x << 40) & ((__uint64_t)0xff << 48)); 74 ret |= (_x << 56); 76 return (ret); 90 __uint32_t ret; local [all...] |
/freebsd-11.0-release/usr.sbin/ctm/ctm/ |
H A D | ctm_ed.c | 19 int ln, ln2, iln, ret=0, c; local 37 if(cmd != 'a' && cmd != 'd') { ret = 1; goto bye; } 43 if(*ep++ != ' ') { ret = 1; goto bye; } 49 if(*ep++ != '\n') { ret = 1; goto bye; } 55 if(c == EOF) { ret = 1; goto bye; } 62 if(c == EOF) { ret = 1; goto bye; } 73 if(c == EOF) { ret = 1; goto bye; } 87 ret = 1; 95 ret = 0; 100 ret [all...] |
/freebsd-11.0-release/crypto/openssl/crypto/bio/ |
H A D | bss_sock.c | 102 BIO *ret; local 104 ret = BIO_new(BIO_s_socket()); 105 if (ret == NULL) 107 BIO_set_fd(ret, fd, close_flag); 108 return (ret); 136 int ret = 0; local 140 ret = readsocket(b->num, out, outl); 142 if (ret <= 0) { 143 if (BIO_sock_should_retry(ret)) 147 return (ret); 152 int ret; local 166 long ret = 1; local 204 int n, ret; local [all...] |
/freebsd-11.0-release/tools/tools/vop_table/ |
H A D | vop_table.pl | 113 $ret = "<TD BGCOLOR=\"#00ddd0\"> "; 116 $ret .= "b"; 117 return $ret; 120 $ret .= "!"; 121 return $ret; 124 $ret .= "-"; 125 return $ret; 128 $ret .= "S"; 129 return $ret; 132 $ret [all...] |
/freebsd-11.0-release/sys/dev/drm2/i915/ |
H A D | i915_gem_context.c | 108 int ret; local 114 ret = GEN6_CXT_TOTAL_SIZE(reg) * 64; 119 ret = HSW_CXT_TOTAL_SIZE(reg) * 64; 121 ret = GEN7_CXT_TOTAL_SIZE(reg) * 64; 128 return ret; 155 int ret, id; local 169 ret = i915_gem_object_set_cache_level(ctx->obj, 171 if (ret) 191 ret = drm_gem_name_create(&file_priv->context_idr, ctx, &id); 192 if (ret 221 int ret; local 343 int ret; local 390 int ret; local 504 int ret; local 533 int ret; local [all...] |
/freebsd-11.0-release/crypto/heimdal/lib/kadm5/ |
H A D | init_c.c | 71 krb5_error_code ret; local 82 ret = 0; 85 ret = ENOMEM; 87 ret = krb5_get_default_realm((*ctx)->context, &(*ctx)->realm); 88 if (ret) { 90 return ret; 97 ret = krb5_get_krb_admin_hst (context, &(*ctx)->realm, &hostlist); 98 if (ret) { 101 return ret; 137 krb5_error_code ret; local 161 krb5_error_code ret; local 246 krb5_error_code ret; local 325 krb5_error_code ret; local 408 kadm5_ret_t ret; local 569 kadm5_ret_t ret; local 619 kadm5_ret_t ret; local [all...] |
H A D | rename_s.c | 44 kadm5_ret_t ret; local 51 ret = context->db->hdb_open(context->context, context->db, O_RDWR, 0); 52 if(ret) 53 return ret; 54 ret = context->db->hdb_fetch_kvno(context->context, context->db, 56 if(ret){ 60 ret = _kadm5_set_modifier(context, &ent.entry); 61 if(ret) 78 ret = copy_Salt(&salt, ent.entry.keys.val[i].salt); 79 if(ret) [all...] |
/freebsd-11.0-release/crypto/heimdal/lib/gssapi/krb5/ |
H A D | inquire_cred_by_oid.c | 43 krb5_error_code ret; local 62 ret = krb5_cc_get_full_name(context, cred->ccache, &str); 64 if (ret) { 65 *minor_status = ret; 72 ret = gss_add_buffer_set_member(minor_status, &buffer, data_set); 73 if (ret != GSS_S_COMPLETE)
|