/freebsd-13-stable/crypto/openssl/crypto/dsa/ |
H A D | dsa_depr.c | 42 DSA *ret; 44 if ((ret = DSA_new()) == NULL) 52 if (DSA_generate_parameters_ex(ret, bits, seed_in, seed_len, 55 return ret; 59 DSA_free(ret);
|
/freebsd-13-stable/crypto/heimdal/kcm/ |
H A D | config.c | 157 usage(int ret) argument 160 exit (ret); 228 krb5_error_code ret; local 233 ret = kcm_ccache_new(kcm_context, 236 if (ret) 237 return ret; 242 ret = parse_owners(ccache); 243 if (ret) 244 return ret; 246 ret 330 krb5_error_code ret; local [all...] |
H A D | glue.c | 71 krb5_error_code ret; local 76 ret = kcm_zero_ccache_data_internal(context, c); 77 if (ret) 78 return ret; 80 ret = krb5_copy_principal(context, primary_principal, 83 return ret; 104 krb5_error_code ret; local 109 ret = kcm_ccache_destroy(context, CACHENAME(id)); 111 return ret; 119 krb5_error_code ret; local 137 krb5_error_code ret; local 160 krb5_error_code ret; local 191 krb5_error_code ret; local 224 krb5_error_code ret; local [all...] |
/freebsd-13-stable/crypto/heimdal/lib/krb5/ |
H A D | keytab_any.c | 60 krb5_error_code ret; local 66 ret = ENOMEM; 73 ret = ENOMEM; 74 krb5_set_error_message(context, ret, N_("malloc: out of memory", "")); 82 ret = krb5_kt_resolve (context, buf, &a->kt); 83 if (ret) 95 return ret; 131 krb5_error_code ret; local 140 ret = krb5_kt_start_seq_get(context, ed->a->kt, &ed->cursor); 141 if (ret 159 krb5_error_code ret, ret2; local 190 krb5_error_code ret = 0; local 207 krb5_error_code ret; local 227 krb5_error_code ret; local [all...] |
H A D | get_default_principal.c | 63 krb5_error_code ret; local 75 ret = krb5_make_principal(context, princ, NULL, user, "root", NULL); 77 ret = krb5_make_principal(context, princ, NULL, "root", NULL); 93 ret = krb5_make_principal(context, princ, NULL, user, NULL); 95 return ret; 151 krb5_error_code ret; local 156 ret = krb5_cc_default (context, &id); 157 if (ret == 0) { 158 ret = krb5_cc_get_principal (context, id, princ); 160 if (ret [all...] |
H A D | test_pkinit_dh2key.c | 46 krb5_error_code ret; local 49 ret = _krb5_pk_octetstring2key(context, 55 if (ret != 0) 56 krb5_err(context, 1, ret, "_krb5_pk_octetstring2key: %d", i); 171 usage (int ret) argument 177 exit (ret); 185 krb5_error_code ret; local 204 ret = krb5_init_context(&context); 205 if (ret) 206 errx (1, "krb5_init_context failed: %d", ret); [all...] |
H A D | rd_cred.c | 62 krb5_error_code ret; local 80 ret = decode_KRB_CRED(in_data->data, in_data->length, 82 if(ret) { 84 return ret; 88 ret = KRB5KRB_AP_ERR_BADVERSION; 94 ret = KRB5KRB_AP_ERR_MSG_TYPE; 112 ret = krb5_crypto_init(context, auth_context->remote_subkey, 114 if (ret) 117 ret = krb5_decrypt_EncryptedData(context, 130 if (auth_context->remote_subkey == NULL || ret 332 krb5_error_code ret; local [all...] |
H A D | crypto-aes.c | 95 krb5_error_code ret; local 100 ret = krb5_data_alloc(&result.checksum, ct->checksumsize); 101 if (ret) { 102 krb5_set_error_message(context, ret, N_("malloc: out memory", "")); 103 return ret; 106 ret = (*ct->checksum)(context, NULL, in->data, in->length, 0, &result); 107 if (ret) { 109 return ret; 116 ret = krb5_derive_key(context, crypto->key.key, 118 if (ret) [all...] |
H A D | expand_hostname.c | 110 krb5_error_code ret; local 112 ret = copy_hostname (context, orig_hostname, new_hostname); 113 if (ret) 114 return ret; 117 ret = krb5_get_host_realm (context, *new_hostname, realms); 118 if (ret) { 120 return ret; 151 krb5_error_code ret = 0; local 167 ret = copy_hostname (context, a->ai_canonname, new_hostname); 168 if (ret) { [all...] |
H A D | mk_safe.c | 43 krb5_error_code ret; local 102 ASN1_MALLOC_ENCODE(KRB_SAFE, buf, buf_size, &s, &len, ret); 103 if (ret) 104 return ret; 107 ret = krb5_crypto_init(context, key, 0, &crypto); 108 if (ret) { 110 return ret; 112 ret = krb5_create_checksum(context, 120 if (ret) { 122 return ret; [all...] |
/freebsd-13-stable/crypto/openssl/crypto/bn/ |
H A D | bn_sqrt.c | 15 * Returns 'ret' such that ret^2 == a (mod p), using the Tonelli/Shanks 20 BIGNUM *ret = in; local 28 if (ret == NULL) 29 ret = BN_new(); 30 if (ret == NULL) 32 if (!BN_set_word(ret, BN_is_bit_set(a, 0))) { 33 if (ret != in) 34 BN_free(ret); 37 bn_check_top(ret); [all...] |
/freebsd-13-stable/crypto/openssl/crypto/asn1/ |
H A D | a_int.c | 25 int neg, ret; local 35 ret = ASN1_STRING_cmp(x, y); 38 return -ret; 40 return ret; 95 size_t ret, i; local 99 ret = blen; 119 ret += pad; 121 ret = 1; 126 return ret; 138 *pp += ret; 283 ASN1_INTEGER *ret = NULL; local 390 ASN1_INTEGER *ret = NULL; local 452 ASN1_INTEGER *ret; local 496 BIGNUM *ret; local 606 c2i_uint64_int(uint64_t *ret, int *neg, const unsigned char **pp, long len) argument [all...] |
/freebsd-13-stable/contrib/libedit/ |
H A D | eln.c | 91 int ret; local 97 ret = el_wparse(el, argc, wargv); 100 return ret; 108 int ret; local 118 ret = prompt_set(el, p, 0, op, 0); 125 ret = ch_resizefun(el, p, arg); 132 ret = ch_aliasfun(el, p, arg); 141 ret = prompt_set(el, p, c, op, 0); 146 ret = el_wset(el, op, va_arg(ap, char *)); 150 ret 277 int ret; local [all...] |
/freebsd-13-stable/sys/contrib/openzfs/lib/libzutil/os/freebsd/ |
H A D | zutil_compat.c | 50 int newrequest, ret; local 76 ret = ioctl(fd, ncmd, &zp); 77 if (ret) { 80 return (ret); 86 return (ret); 98 int ret, cflag = ZFS_CMD_COMPAT_NONE; local 116 ret = zcmd_ioctl_compat(fd, request, zc, cflag); 118 if (ret == 0 && oldsize < zc->zc_nvlist_dst_size) { 119 ret = -1; 123 return (ret); [all...] |
/freebsd-13-stable/contrib/netbsd-tests/lib/libc/string/ |
H A D | t_strcmp.c | 28 int ret; local 33 int ret; member in struct:tab 84 ret = f(&buf0[a0], &buf1[a1]); 86 if ((ret == 0 && tab[t].ret != 0) || 87 (ret < 0 && tab[t].ret >= 0) || 88 (ret > 0 && tab[t].ret <= 0)) { 92 &buf0[a0], &buf1[a1], ret); [all...] |
/freebsd-13-stable/crypto/openssl/crypto/bio/ |
H A D | bss_acpt.c | 93 BIO_ACCEPT *ret; local 95 if ((ret = OPENSSL_zalloc(sizeof(*ret))) == NULL) { 99 ret->accept_family = BIO_FAMILY_IPANY; 100 ret->accept_sock = (int)INVALID_SOCKET; 101 return ret; 153 int s = -1, ret = -1; local 269 ret = 1; 301 ret = s; 332 ret 360 int ret = 0; local 379 int ret; local 399 long ret = 1; local 548 int n, ret; local 557 BIO *ret; local [all...] |
/freebsd-13-stable/crypto/heimdal/lib/kadm5/ |
H A D | set_keys.c | 49 kadm5_ret_t ret; local 51 ret = hdb_generate_key_set_password(context->context, 54 if (ret) 55 return ret; 66 ret = hdb_entry_set_password(context->context, context->db, 68 if (ret) 69 return ret; 85 krb5_error_code ret; local 100 ret = krb5_data_copy(&keys[i].key.keyvalue, 103 if(ret) 144 krb5_error_code ret; local 203 kadm5_ret_t ret = 0; local [all...] |
/freebsd-13-stable/crypto/heimdal/lib/asn1/ |
H A D | asn1_print.c | 56 int ret; local 66 ret = der_get_tag (buf, len, &class, &type, &tag, &sz); 67 if (ret) 68 errx (1, "der_get_tag: %s", error_message (ret)); 85 ret = der_get_length (buf, len, &length, &sz); 86 if (ret) 87 errx (1, "der_get_tag: %s", error_message (ret)); 145 ret = der_get_integer (buf, length, &val, NULL); 146 if (ret) 147 errx (1, "der_get_integer: %s", error_message (ret)); 298 int ret; local [all...] |
/freebsd-13-stable/sys/dev/mlx5/mlx5_fpga_tools/ |
H A D | mlx5fpga_tools_char.c | 71 int ret; local 73 ret = sx_xlock_sig(&tdev->lock); 74 if (ret != 0) 75 return (ret); 76 ret = mlx5_fpga_mem_read(tdev->fdev, count, address, buf, access_type); 78 if (ret < 0) { 81 count, (uintmax_t)address, ret); local 82 return (-ret); 84 *retcnt = ret; 92 int ret; local 102 count, (uintmax_t)address, ret); local 138 int ret; local 167 int ret; local 295 int ret; local [all...] |
/freebsd-13-stable/crypto/heimdal/kdc/ |
H A D | misc.c | 48 krb5_error_code ret = HDB_ERR_NOENTRY; local 68 ret = KRB5_PARSE_MALFORMED; 69 krb5_set_error_message(context, ret, 74 return ret; 76 ret = krb5_parse_name(context, principal->name.name_string.val[0], 78 if (ret) { 80 return ret; 86 ret = config->db[i]->hdb_open(context, config->db[i], O_RDONLY, 0); 87 if (ret) { 88 const char *msg = krb5_get_error_message(context, ret); 137 krb5_error_code ret; local [all...] |
/freebsd-13-stable/crypto/heimdal/kuser/ |
H A D | kswitch.c | 62 krb5_error_code ret; local 84 ret = krb5_cc_cache_get_first(kcc_context, NULL, &cursor); 85 if (ret) 86 krb5_err(kcc_context, 1, ret, "krb5_cc_cache_get_first"); 92 ret = krb5_cc_get_principal(kcc_context, id, &p); 93 if (ret) 96 ret = krb5_unparse_name(kcc_context, p, &name); 133 ret = krb5_parse_name(kcc_context, opt->principal_string, &p); 134 if (ret) 135 krb5_err(kcc_context, 1, ret, "krb5_parse_nam [all...] |
/freebsd-13-stable/sys/dev/drm2/ttm/ |
H A D | ttm_bo.c | 80 int i, ret, mem_type; local 86 ret = ttm_mem_type_from_flags(placement->placement[i], 88 if (ret) 139 int flags, ret; local 141 ret = 0; 150 ret = -msleep(bo, &bo->glob->lru_lock, flags, wmsg, 0); 151 if (ret == -EINTR || ret == -ERESTART) 152 ret = -ERESTARTSYS; 153 if (ret ! 206 int ret; local 285 int ret; local 304 int ret; local 338 int put_count, ret; local 374 int ret = 0; local 422 int ret = 0; local 557 int ret; local 616 int ret; local 697 int ret = 0; local 811 int ret = 0; local 868 int ret = -EBUSY, put_count; local 928 int ret; local 1012 int i, ret; local 1111 int ret = 0; local 1172 int ret; local 1229 int ret = 0; local 1349 int ret; local 1367 int ret; local 1393 int ret = -EINVAL; local 1440 int ret = -EINVAL; local 1491 int req, ret; local 1537 int ret = 0; local 1587 int ret = -EINVAL; local 1686 int ret; local 1726 int ret = 0; local 1777 int ret = 0; local 1810 int ret = -EBUSY; local [all...] |
/freebsd-13-stable/lib/libc/iconv/ |
H A D | citrus_stdenc.c | 60 int ret; local 68 ret = errno; 76 ret = _citrus_load_module(&handle, encname); 77 if (ret) 85 ret = EINVAL; 91 ret = errno; 95 ret = (*getops)(ce->ce_ops, sizeof(*ce->ce_ops)); 96 if (ret) 108 ret = EINVAL; 115 ret [all...] |
/freebsd-13-stable/crypto/openssl/crypto/perlasm/ |
H A D | arm-xlate.pl | 39 my $ret; 42 $ret = ".comm\t_$name,@args[1]\n"; 43 $ret .= ".non_lazy_symbol_pointer\n"; 44 $ret .= "$name:\n"; 45 $ret .= ".indirect_symbol\t_$name\n"; 46 $ret .= ".long\t0"; 48 } else { $ret = ".comm\t".join(',',@args); } 51 $ret; 56 my $ret; 64 $ret [all...] |
/freebsd-13-stable/usr.sbin/cxgbetool/ |
H A D | tcb_common.c | 143 int ret; local 146 ret = 0; 147 for (i = 0; i < n && 0 == ret && !(EOS == *cs && EOS == *ct); ++i) { 151 ret = tolower(*cs++) - tolower(*ct++); 153 return ret; 243 int ret=0; local 249 ret=(A[ix] >> shift) & 1; 250 return ret; 256 ui64 ret=0; local 265 ret 344 char *ret="UNKNOWN"; local 370 char *ret="UNKNOWN"; local 384 char *ret="UNKNOWN"; local 407 char *ret="UNKNOWN"; local [all...] |