Searched refs:ret (Results 476 - 500 of 4059) sorted by relevance

<<11121314151617181920>>

/freebsd-13-stable/crypto/heimdal/kcm/
H A Devents.c50 krb5_error_code ret; local
57 ret = kcm_enqueue_event_internal(context, event);
60 return ret;
139 krb5_error_code ret; local
146 ret = kcm_enqueue_event(context, &e);
148 return ret;
206 krb5_error_code ret = 0; local
239 return ret;
248 krb5_error_code ret; local
253 ret
268 krb5_error_code ret; local
324 krb5_error_code ret; local
399 krb5_error_code ret; local
[all...]
/freebsd-13-stable/crypto/heimdal/lib/gssapi/krb5/
H A Dverify_mic.c58 OM_uint32 ret; local
62 ret = _gsskrb5_verify_header (&p,
66 if (ret)
67 return ret;
131 ret = _gssapi_msg_order_check(context_handle->order, seq_number);
132 if (ret) {
134 return ret;
158 OM_uint32 ret; local
167 ret = _gsskrb5_verify_header (&p,
171 if (ret)
298 OM_uint32 ret; local
355 OM_uint32 ret; local
[all...]
H A Dadd_cred.c50 OM_uint32 ret, lifetime; local
114 ret = GSS_S_FAILURE;
128 ret = GSS_S_FAILURE;
149 ret = GSS_S_FAILURE;
158 ret = krb5_cc_new_unique(context, type,
160 if (ret) {
161 *minor_status = ret;
165 ret = krb5_cc_copy_cache(context, cred->ccache,
167 if (ret) {
168 *minor_status = ret;
[all...]
/freebsd-13-stable/crypto/openssl/crypto/dso/
H A Ddso_lib.c17 DSO *ret; local
27 ret = OPENSSL_zalloc(sizeof(*ret));
28 if (ret == NULL) {
32 ret->meth_data = sk_void_new_null();
33 if (ret->meth_data == NULL) {
36 OPENSSL_free(ret);
39 ret->meth = default_DSO_meth;
40 ret->references = 1;
41 ret
121 DSO *ret; local
175 DSO_FUNC_TYPE ret = NULL; local
324 DSO *ret = NULL; local
[all...]
/freebsd-13-stable/crypto/heimdal/lib/krb5/
H A Dcrypto-pk.c48 krb5_error_code ret; local
102 ret = krb5_random_to_key(context, type, keydata, keylen, key);
105 return ret;
112 krb5_error_code ret; local
119 &pn, &size, ret);
120 if (ret) {
122 krb5_set_error_message(context, ret,
124 return ret;
144 krb5_error_code ret; local
157 &pubinfo, &size, ret);
211 krb5_error_code ret; local
[all...]
H A Drd_priv.c43 krb5_error_code ret; local
66 ret = decode_KRB_PRIV (inbuf->data, inbuf->length, &priv, &len);
67 if (ret) {
73 ret = KRB5KRB_AP_ERR_BADVERSION;
78 ret = KRB5KRB_AP_ERR_MSG_TYPE;
89 ret = krb5_crypto_init(context, key, 0, &crypto);
90 if (ret)
92 ret = krb5_decrypt_EncryptedData(context,
98 if (ret)
101 ret
[all...]
H A Dsend_to_kdc.c58 int ret; local
73 ret = select (fd + 1, &fdset, NULL, NULL, &timeout);
74 if (ret < 0) {
78 } else if (ret == 0) {
99 ret = recv (fd, (char*)tmp + rep->length, nbytes, 0);
100 if (ret < 0) {
104 rep->length += ret;
188 int ret; local
193 ret = asprintf(&request, "GET %s%s HTTP/1.0\r\n\r\n", prefix, str);
195 if (ret <
268 int ret; local
329 krb5_error_code ret; local
372 krb5_error_code ret; local
472 krb5_error_code ret; local
583 krb5_error_code ret; local
655 krb5_error_code ret; local
[all...]
/freebsd-13-stable/crypto/openssh/
H A Dauth-options.c71 char *ret; local
80 if ((ret = malloc(strlen((s)) + 1)) == NULL) {
87 ret[i++] = *s++;
91 free(ret);
94 ret[i] = '\0';
97 return ret;
147 int r, ret = -1, found; local
245 ret = 0;
251 return ret;
257 struct sshauthopt *ret; local
297 struct sshauthopt *ret = NULL; local
388 struct sshauthopt *ret = NULL; local
544 struct sshauthopt *ret; local
576 struct sshauthopt *ret; local
698 struct sshauthopt *ret; local
[all...]
H A Dutf8.c115 int ret; /* Number of bytes needed to format src. */ local
120 if ((ret = vasprintf(&src, fmt, ap)) <= 0)
126 ret = -1;
135 ret = 0;
143 ret = -1;
158 ret = -1;
171 ret = -1;
179 if (ret >= 0)
180 ret += len;
193 ret
245 int ret; local
267 int ret; local
281 int ret; local
293 int ret; local
[all...]
/freebsd-13-stable/crypto/heimdal/kdc/
H A Dkerberos5.c131 krb5_error_code ret; local
138 ret = krb5_get_pw_salt(context, princ->entry.principal, &def_salt);
139 if (ret)
140 return ret;
142 ret = KRB5KDC_ERR_ETYPE_NOSUPP;
174 ret = hdb_enctype2key(context, &princ->entry, p[i], &key);
175 if (ret)
185 ret = KRB5KDC_ERR_ETYPE_NOSUPP;
186 if (ret == 0 && ret_enctype != NULL)
188 if (ret
335 krb5_error_code ret; local
526 krb5_error_code ret = 0; local
639 krb5_error_code ret = 0; local
681 krb5_error_code ret; local
875 krb5_error_code ret; local
918 krb5_error_code ret; local
976 krb5_error_code ret = 0; local
1871 krb5_error_code ret; local
[all...]
/freebsd-13-stable/contrib/wpa/src/drivers/
H A Ddriver_macsec_qca.c87 int ret = 0; local
94 ret = nss_macsec_secy_en_set(drv->secy_id, TRUE);
95 if (ret)
98 ret = nss_macsec_secy_sc_sa_mapping_mode_set(drv->secy_id,
100 if (ret)
109 ret = nss_macsec_secy_rx_ctl_filt_set(drv->secy_id, 0, &rx_ctl_filt);
110 if (ret)
118 ret = nss_macsec_secy_tx_ctl_filt_set(drv->secy_id, 0, &tx_ctl_filt);
119 if (ret)
428 int ret local
442 int ret = 0; local
486 int ret = 0; local
561 int ret = 0; local
592 int ret = 0; local
611 int ret = 0; local
630 int ret = 0; local
659 int ret = 0; local
713 int ret; local
736 int ret; local
786 int ret; local
806 int ret; local
852 int ret; local
892 int ret; local
915 int ret; local
980 int ret; local
1000 int ret; local
[all...]
/freebsd-13-stable/sys/dev/smartpqi/
H A Dsmartpqi_init.c39 int ret = PQI_STATUS_SUCCESS; local
53 ret = PQI_STATUS_FAILURE;
65 ret = os_dma_mem_alloc(softs, &pqi_cap_dma_buf);
66 if (ret) {
67 DBG_ERR("Failed to allocate capability DMA buffer : %d\n", ret);
77 ret = pqisrc_submit_admin_req(softs, &admin_req, &admin_resp);
78 if( PQI_STATUS_SUCCESS == ret) {
120 return ret;
160 int ret = PQI_STATUS_SUCCESS; local
184 ret
302 int ret = PQI_STATUS_SUCCESS; local
333 int ret = PQI_STATUS_FAILURE; local
394 int ret = PQI_STATUS_FAILURE; local
590 int ret = PQI_STATUS_FAILURE; local
679 int ret = PQI_STATUS_SUCCESS; local
711 int ret = PQI_STATUS_SUCCESS; local
756 int ret = PQI_STATUS_SUCCESS; local
858 int ret = PQI_STATUS_SUCCESS; local
896 int ret = PQI_STATUS_SUCCESS; local
955 int i, ret; local
1027 int ret = 0; local
[all...]
/freebsd-13-stable/usr.bin/posixshmcontrol/
H A Dposixshmcontrol.c93 int c, i, idx, pn, ret, ret1; local
158 ret = 0;
161 if (ret1 != 0 && ret == 0)
162 ret = ret1;
164 return (ret);
170 int error, ret; local
175 ret = 1;
177 ret = 0;
179 return (ret);
185 int i, ret, ret local
227 int c, error, fd, mib[3], ret; local
324 int fd, ret; local
358 int i, ret, ret1; local
379 int error, fd, ret; local
429 int c, i, ret, ret1; local
468 int error, fd, ret; local
489 int c, i, ret, ret1; local
539 int i, ret; local
[all...]
/freebsd-13-stable/sys/x86/cpufreq/
H A Dhwpstate_intel.c128 int ret; local
148 ret = 0;
191 ret = sbuf_finish(sb);
192 if (ret == 0)
193 ret = SYSCTL_OUT(req, sbuf_data(sb), sbuf_len(sb));
196 return (ret);
255 int ret; local
280 ret = rdmsr_safe(MSR_IA32_ENERGY_PERF_BIAS, &epb);
281 if (ret)
293 ret
375 int ret; local
482 int ret; local
535 int ret; local
583 int ret; local
[all...]
/freebsd-13-stable/crypto/openssl/crypto/evp/
H A Dp_lib.c56 int ret = pkey->save_parameters; local
60 return ret;
65 int ret = pkey->save_parameters; local
69 return ret;
125 int ret; local
128 ret = a->ameth->param_cmp(a, b);
129 if (ret <= 0)
130 return ret;
142 EVP_PKEY *ret = OPENSSL_zalloc(sizeof(*ret)); local
227 EVP_PKEY *ret = EVP_PKEY_new(); local
257 EVP_PKEY *ret = EVP_PKEY_new(); local
321 EVP_PKEY *ret = EVP_PKEY_new(); local
460 int ret = EVP_PKEY_assign_RSA(pkey, key); local
477 RSA *ret = EVP_PKEY_get0_RSA(pkey); local
487 int ret = EVP_PKEY_assign_DSA(pkey, key); local
504 DSA *ret = EVP_PKEY_get0_DSA(pkey); local
515 int ret = EVP_PKEY_assign_EC_KEY(pkey, key); local
532 EC_KEY *ret = EVP_PKEY_get0_EC_KEY(pkey); local
544 int ret = EVP_PKEY_assign(pkey, type, key); local
562 DH *ret = EVP_PKEY_get0_DH(pkey); local
571 int ret; local
[all...]
/freebsd-13-stable/tools/tools/umastat/
H A Dumastat.c66 ssize_t ret; local
68 ret = kvm_read(kvm, (unsigned long)kvm_pointer + offset, address,
70 if (ret < 0)
72 if ((size_t)ret != size)
80 ssize_t ret; local
84 ret = kvm_read(kvm, (unsigned long)kvm_pointer + i,
86 if (ret < 0)
88 if ((size_t)ret != sizeof(char))
102 ssize_t ret; local
104 ret
214 int count, ret; local
244 int ret; local
287 int all_cpus, cpu, mp_maxcpus, mp_maxid, ret, ub_cnt, ub_entries; local
[all...]
/freebsd-13-stable/sys/contrib/openzfs/module/zfs/
H A Ddsl_crypt.c139 int ret; local
175 ret = SET_ERROR(EINVAL);
183 ret = SET_ERROR(EINVAL);
191 ret = SET_ERROR(EINVAL);
198 ret = SET_ERROR(EINVAL);
207 ret = SET_ERROR(EINVAL);
240 return (ret);
360 int ret; local
363 ret = dsl_dir_get_encryption_version(dd, &version);
364 if (ret !
374 int ret; local
405 int ret; local
443 int ret = 0; local
528 int ret; local
607 int ret; local
638 int ret; local
708 int ret; local
735 int ret; local
847 int ret; local
883 int ret = 0; local
991 int ret; local
1049 int ret; local
1088 int ret; local
1128 int ret; local
1224 int ret; local
1406 int ret; local
1618 int ret; local
1657 int ret; local
1759 int ret; local
1960 int ret; local
2140 int ret; local
2306 int ret; local
2384 int ret; local
2645 int ret; local
2676 int ret; local
2725 int ret; local
2777 int ret; local
[all...]
/freebsd-13-stable/crypto/heimdal/lib/hdb/
H A Dkeytab.c140 krb5_error_code ret; local
145 ret = hdb_get_dbinfo(context, &head);
146 if (ret)
147 return ret;
181 krb5_error_code ret; local
192 ret = find_db(context, &fdbname, &fmkey, principal);
193 if (ret)
194 return ret;
199 ret = hdb_create (context, &db, dbname);
200 if (ret)
265 krb5_error_code ret; local
320 krb5_error_code ret; local
[all...]
/freebsd-13-stable/crypto/heimdal/lib/hx509/
H A Dkeyset.c122 int ret; local
159 ret = (*ops->init)(context, c, &c->ops_data, flags, residue, lock);
160 if (ret) {
162 return ret;
258 int ret; local
267 ret = (*certs->ops->iter_start)(context, certs, certs->ops_data, cursor);
268 if (ret)
269 return ret;
344 int ret; local
346 ret
503 int ret; local
567 int ret, found = 0; local
665 int ret; local
691 int ret; local
[all...]
/freebsd-13-stable/crypto/openssl/ssl/
H A Dssl_asn1.c246 SSL_SESSION *ret = NULL;
254 ret = SSL_SESSION_new();
255 if (ret == NULL)
258 ret = *a;
273 ret->ssl_version = (int)as->ssl_version;
283 ret->cipher_id = id;
284 ret->cipher = ssl3_get_cipher_by_id(id);
285 if (ret->cipher == NULL)
288 if (!ssl_session_memcpy(ret->session_id, &ret
[all...]
/freebsd-13-stable/contrib/xz/src/common/
H A Dtuklib_physmem.c79 uint64_t ret = 0; local
96 ret = meminfo.ullTotalPhys;
101 if (ret == 0) {
108 ret = meminfo.dwTotalPhys;
115 ret = mem;
122 ret = (uint64_t)meminfo.total_number_of_physical_pages * 4096;
128 ret = (uint64_t)vms_mem * 8192;
131 ret = AvailMem(MEMF_TOTAL);
140 ret += entries[i].end - entries[i].start + 1;
143 ret
[all...]
/freebsd-13-stable/crypto/heimdal/kpasswd/
H A Dkpasswd-generator.c80 krb5_error_code ret; local
85 ret = krb5_init_context (&context);
86 if (ret)
87 errx (1, "krb5_init_context failed: %d", ret);
105 ret = krb5_parse_name (context, name, &principal);
106 if (ret)
107 krb5_err (context, 1, ret, "krb5_parse_name %s", name);
112 ret = krb5_get_init_creds_password (context,
121 if( ret == KRB5KRB_AP_ERR_BAD_INTEGRITY
122 || ret
171 usage(int ret) argument
[all...]
/freebsd-13-stable/crypto/openssl/crypto/
H A Do_str.c19 int ret = 0; local
21 while (n && (ret = *c1 - *c2) == 0)
24 return ret;
29 char *ret; local
33 ret = CRYPTO_malloc(strlen(str) + 1, file, line);
34 if (ret != NULL)
35 strcpy(ret, str);
36 return ret;
42 char *ret; local
49 ret
59 void *ret; local
[all...]
/freebsd-13-stable/cddl/contrib/opensolaris/cmd/dtrace/test/tst/i386/pid/
H A Dtst.ret.s35 ret
40 ret
44 ret $0
49 ret $0
54 ret $4
60 ret $4
70 ret
107 ret
113 ret
/freebsd-13-stable/crypto/openssl/crypto/bio/
H A Dbf_nbio.c84 int ret = 0; local
102 ret = -1;
105 ret = BIO_read(b->next_bio, out, outl);
106 if (ret < 0)
109 return ret;
115 int ret = 0; local
140 ret = -1;
143 ret = BIO_write(b->next_bio, in, inl);
144 if (ret < 0) {
149 return ret;
154 long ret; local
176 long ret = 1; local
[all...]

Completed in 300 milliseconds

<<11121314151617181920>>