/freebsd-13-stable/crypto/heimdal/kcm/ |
H A D | events.c | 50 krb5_error_code ret; local 57 ret = kcm_enqueue_event_internal(context, event); 60 return ret; 139 krb5_error_code ret; local 146 ret = kcm_enqueue_event(context, &e); 148 return ret; 206 krb5_error_code ret = 0; local 239 return ret; 248 krb5_error_code ret; local 253 ret 268 krb5_error_code ret; local 324 krb5_error_code ret; local 399 krb5_error_code ret; local [all...] |
/freebsd-13-stable/crypto/heimdal/lib/gssapi/krb5/ |
H A D | verify_mic.c | 58 OM_uint32 ret; local 62 ret = _gsskrb5_verify_header (&p, 66 if (ret) 67 return ret; 131 ret = _gssapi_msg_order_check(context_handle->order, seq_number); 132 if (ret) { 134 return ret; 158 OM_uint32 ret; local 167 ret = _gsskrb5_verify_header (&p, 171 if (ret) 298 OM_uint32 ret; local 355 OM_uint32 ret; local [all...] |
H A D | add_cred.c | 50 OM_uint32 ret, lifetime; local 114 ret = GSS_S_FAILURE; 128 ret = GSS_S_FAILURE; 149 ret = GSS_S_FAILURE; 158 ret = krb5_cc_new_unique(context, type, 160 if (ret) { 161 *minor_status = ret; 165 ret = krb5_cc_copy_cache(context, cred->ccache, 167 if (ret) { 168 *minor_status = ret; [all...] |
/freebsd-13-stable/crypto/openssl/crypto/dso/ |
H A D | dso_lib.c | 17 DSO *ret; local 27 ret = OPENSSL_zalloc(sizeof(*ret)); 28 if (ret == NULL) { 32 ret->meth_data = sk_void_new_null(); 33 if (ret->meth_data == NULL) { 36 OPENSSL_free(ret); 39 ret->meth = default_DSO_meth; 40 ret->references = 1; 41 ret 121 DSO *ret; local 175 DSO_FUNC_TYPE ret = NULL; local 324 DSO *ret = NULL; local [all...] |
/freebsd-13-stable/crypto/heimdal/lib/krb5/ |
H A D | crypto-pk.c | 48 krb5_error_code ret; local 102 ret = krb5_random_to_key(context, type, keydata, keylen, key); 105 return ret; 112 krb5_error_code ret; local 119 &pn, &size, ret); 120 if (ret) { 122 krb5_set_error_message(context, ret, 124 return ret; 144 krb5_error_code ret; local 157 &pubinfo, &size, ret); 211 krb5_error_code ret; local [all...] |
H A D | rd_priv.c | 43 krb5_error_code ret; local 66 ret = decode_KRB_PRIV (inbuf->data, inbuf->length, &priv, &len); 67 if (ret) { 73 ret = KRB5KRB_AP_ERR_BADVERSION; 78 ret = KRB5KRB_AP_ERR_MSG_TYPE; 89 ret = krb5_crypto_init(context, key, 0, &crypto); 90 if (ret) 92 ret = krb5_decrypt_EncryptedData(context, 98 if (ret) 101 ret [all...] |
H A D | send_to_kdc.c | 58 int ret; local 73 ret = select (fd + 1, &fdset, NULL, NULL, &timeout); 74 if (ret < 0) { 78 } else if (ret == 0) { 99 ret = recv (fd, (char*)tmp + rep->length, nbytes, 0); 100 if (ret < 0) { 104 rep->length += ret; 188 int ret; local 193 ret = asprintf(&request, "GET %s%s HTTP/1.0\r\n\r\n", prefix, str); 195 if (ret < 268 int ret; local 329 krb5_error_code ret; local 372 krb5_error_code ret; local 472 krb5_error_code ret; local 583 krb5_error_code ret; local 655 krb5_error_code ret; local [all...] |
/freebsd-13-stable/crypto/openssh/ |
H A D | auth-options.c | 71 char *ret; local 80 if ((ret = malloc(strlen((s)) + 1)) == NULL) { 87 ret[i++] = *s++; 91 free(ret); 94 ret[i] = '\0'; 97 return ret; 147 int r, ret = -1, found; local 245 ret = 0; 251 return ret; 257 struct sshauthopt *ret; local 297 struct sshauthopt *ret = NULL; local 388 struct sshauthopt *ret = NULL; local 544 struct sshauthopt *ret; local 576 struct sshauthopt *ret; local 698 struct sshauthopt *ret; local [all...] |
H A D | utf8.c | 115 int ret; /* Number of bytes needed to format src. */ local 120 if ((ret = vasprintf(&src, fmt, ap)) <= 0) 126 ret = -1; 135 ret = 0; 143 ret = -1; 158 ret = -1; 171 ret = -1; 179 if (ret >= 0) 180 ret += len; 193 ret 245 int ret; local 267 int ret; local 281 int ret; local 293 int ret; local [all...] |
/freebsd-13-stable/crypto/heimdal/kdc/ |
H A D | kerberos5.c | 131 krb5_error_code ret; local 138 ret = krb5_get_pw_salt(context, princ->entry.principal, &def_salt); 139 if (ret) 140 return ret; 142 ret = KRB5KDC_ERR_ETYPE_NOSUPP; 174 ret = hdb_enctype2key(context, &princ->entry, p[i], &key); 175 if (ret) 185 ret = KRB5KDC_ERR_ETYPE_NOSUPP; 186 if (ret == 0 && ret_enctype != NULL) 188 if (ret 335 krb5_error_code ret; local 526 krb5_error_code ret = 0; local 639 krb5_error_code ret = 0; local 681 krb5_error_code ret; local 875 krb5_error_code ret; local 918 krb5_error_code ret; local 976 krb5_error_code ret = 0; local 1871 krb5_error_code ret; local [all...] |
/freebsd-13-stable/contrib/wpa/src/drivers/ |
H A D | driver_macsec_qca.c | 87 int ret = 0; local 94 ret = nss_macsec_secy_en_set(drv->secy_id, TRUE); 95 if (ret) 98 ret = nss_macsec_secy_sc_sa_mapping_mode_set(drv->secy_id, 100 if (ret) 109 ret = nss_macsec_secy_rx_ctl_filt_set(drv->secy_id, 0, &rx_ctl_filt); 110 if (ret) 118 ret = nss_macsec_secy_tx_ctl_filt_set(drv->secy_id, 0, &tx_ctl_filt); 119 if (ret) 428 int ret local 442 int ret = 0; local 486 int ret = 0; local 561 int ret = 0; local 592 int ret = 0; local 611 int ret = 0; local 630 int ret = 0; local 659 int ret = 0; local 713 int ret; local 736 int ret; local 786 int ret; local 806 int ret; local 852 int ret; local 892 int ret; local 915 int ret; local 980 int ret; local 1000 int ret; local [all...] |
/freebsd-13-stable/sys/dev/smartpqi/ |
H A D | smartpqi_init.c | 39 int ret = PQI_STATUS_SUCCESS; local 53 ret = PQI_STATUS_FAILURE; 65 ret = os_dma_mem_alloc(softs, &pqi_cap_dma_buf); 66 if (ret) { 67 DBG_ERR("Failed to allocate capability DMA buffer : %d\n", ret); 77 ret = pqisrc_submit_admin_req(softs, &admin_req, &admin_resp); 78 if( PQI_STATUS_SUCCESS == ret) { 120 return ret; 160 int ret = PQI_STATUS_SUCCESS; local 184 ret 302 int ret = PQI_STATUS_SUCCESS; local 333 int ret = PQI_STATUS_FAILURE; local 394 int ret = PQI_STATUS_FAILURE; local 590 int ret = PQI_STATUS_FAILURE; local 679 int ret = PQI_STATUS_SUCCESS; local 711 int ret = PQI_STATUS_SUCCESS; local 756 int ret = PQI_STATUS_SUCCESS; local 858 int ret = PQI_STATUS_SUCCESS; local 896 int ret = PQI_STATUS_SUCCESS; local 955 int i, ret; local 1027 int ret = 0; local [all...] |
/freebsd-13-stable/usr.bin/posixshmcontrol/ |
H A D | posixshmcontrol.c | 93 int c, i, idx, pn, ret, ret1; local 158 ret = 0; 161 if (ret1 != 0 && ret == 0) 162 ret = ret1; 164 return (ret); 170 int error, ret; local 175 ret = 1; 177 ret = 0; 179 return (ret); 185 int i, ret, ret local 227 int c, error, fd, mib[3], ret; local 324 int fd, ret; local 358 int i, ret, ret1; local 379 int error, fd, ret; local 429 int c, i, ret, ret1; local 468 int error, fd, ret; local 489 int c, i, ret, ret1; local 539 int i, ret; local [all...] |
/freebsd-13-stable/sys/x86/cpufreq/ |
H A D | hwpstate_intel.c | 128 int ret; local 148 ret = 0; 191 ret = sbuf_finish(sb); 192 if (ret == 0) 193 ret = SYSCTL_OUT(req, sbuf_data(sb), sbuf_len(sb)); 196 return (ret); 255 int ret; local 280 ret = rdmsr_safe(MSR_IA32_ENERGY_PERF_BIAS, &epb); 281 if (ret) 293 ret 375 int ret; local 482 int ret; local 535 int ret; local 583 int ret; local [all...] |
/freebsd-13-stable/crypto/openssl/crypto/evp/ |
H A D | p_lib.c | 56 int ret = pkey->save_parameters; local 60 return ret; 65 int ret = pkey->save_parameters; local 69 return ret; 125 int ret; local 128 ret = a->ameth->param_cmp(a, b); 129 if (ret <= 0) 130 return ret; 142 EVP_PKEY *ret = OPENSSL_zalloc(sizeof(*ret)); local 227 EVP_PKEY *ret = EVP_PKEY_new(); local 257 EVP_PKEY *ret = EVP_PKEY_new(); local 321 EVP_PKEY *ret = EVP_PKEY_new(); local 460 int ret = EVP_PKEY_assign_RSA(pkey, key); local 477 RSA *ret = EVP_PKEY_get0_RSA(pkey); local 487 int ret = EVP_PKEY_assign_DSA(pkey, key); local 504 DSA *ret = EVP_PKEY_get0_DSA(pkey); local 515 int ret = EVP_PKEY_assign_EC_KEY(pkey, key); local 532 EC_KEY *ret = EVP_PKEY_get0_EC_KEY(pkey); local 544 int ret = EVP_PKEY_assign(pkey, type, key); local 562 DH *ret = EVP_PKEY_get0_DH(pkey); local 571 int ret; local [all...] |
/freebsd-13-stable/tools/tools/umastat/ |
H A D | umastat.c | 66 ssize_t ret; local 68 ret = kvm_read(kvm, (unsigned long)kvm_pointer + offset, address, 70 if (ret < 0) 72 if ((size_t)ret != size) 80 ssize_t ret; local 84 ret = kvm_read(kvm, (unsigned long)kvm_pointer + i, 86 if (ret < 0) 88 if ((size_t)ret != sizeof(char)) 102 ssize_t ret; local 104 ret 214 int count, ret; local 244 int ret; local 287 int all_cpus, cpu, mp_maxcpus, mp_maxid, ret, ub_cnt, ub_entries; local [all...] |
/freebsd-13-stable/sys/contrib/openzfs/module/zfs/ |
H A D | dsl_crypt.c | 139 int ret; local 175 ret = SET_ERROR(EINVAL); 183 ret = SET_ERROR(EINVAL); 191 ret = SET_ERROR(EINVAL); 198 ret = SET_ERROR(EINVAL); 207 ret = SET_ERROR(EINVAL); 240 return (ret); 360 int ret; local 363 ret = dsl_dir_get_encryption_version(dd, &version); 364 if (ret ! 374 int ret; local 405 int ret; local 443 int ret = 0; local 528 int ret; local 607 int ret; local 638 int ret; local 708 int ret; local 735 int ret; local 847 int ret; local 883 int ret = 0; local 991 int ret; local 1049 int ret; local 1088 int ret; local 1128 int ret; local 1224 int ret; local 1406 int ret; local 1618 int ret; local 1657 int ret; local 1759 int ret; local 1960 int ret; local 2140 int ret; local 2306 int ret; local 2384 int ret; local 2645 int ret; local 2676 int ret; local 2725 int ret; local 2777 int ret; local [all...] |
/freebsd-13-stable/crypto/heimdal/lib/hdb/ |
H A D | keytab.c | 140 krb5_error_code ret; local 145 ret = hdb_get_dbinfo(context, &head); 146 if (ret) 147 return ret; 181 krb5_error_code ret; local 192 ret = find_db(context, &fdbname, &fmkey, principal); 193 if (ret) 194 return ret; 199 ret = hdb_create (context, &db, dbname); 200 if (ret) 265 krb5_error_code ret; local 320 krb5_error_code ret; local [all...] |
/freebsd-13-stable/crypto/heimdal/lib/hx509/ |
H A D | keyset.c | 122 int ret; local 159 ret = (*ops->init)(context, c, &c->ops_data, flags, residue, lock); 160 if (ret) { 162 return ret; 258 int ret; local 267 ret = (*certs->ops->iter_start)(context, certs, certs->ops_data, cursor); 268 if (ret) 269 return ret; 344 int ret; local 346 ret 503 int ret; local 567 int ret, found = 0; local 665 int ret; local 691 int ret; local [all...] |
/freebsd-13-stable/crypto/openssl/ssl/ |
H A D | ssl_asn1.c | 246 SSL_SESSION *ret = NULL; 254 ret = SSL_SESSION_new(); 255 if (ret == NULL) 258 ret = *a; 273 ret->ssl_version = (int)as->ssl_version; 283 ret->cipher_id = id; 284 ret->cipher = ssl3_get_cipher_by_id(id); 285 if (ret->cipher == NULL) 288 if (!ssl_session_memcpy(ret->session_id, &ret [all...] |
/freebsd-13-stable/contrib/xz/src/common/ |
H A D | tuklib_physmem.c | 79 uint64_t ret = 0; local 96 ret = meminfo.ullTotalPhys; 101 if (ret == 0) { 108 ret = meminfo.dwTotalPhys; 115 ret = mem; 122 ret = (uint64_t)meminfo.total_number_of_physical_pages * 4096; 128 ret = (uint64_t)vms_mem * 8192; 131 ret = AvailMem(MEMF_TOTAL); 140 ret += entries[i].end - entries[i].start + 1; 143 ret [all...] |
/freebsd-13-stable/crypto/heimdal/kpasswd/ |
H A D | kpasswd-generator.c | 80 krb5_error_code ret; local 85 ret = krb5_init_context (&context); 86 if (ret) 87 errx (1, "krb5_init_context failed: %d", ret); 105 ret = krb5_parse_name (context, name, &principal); 106 if (ret) 107 krb5_err (context, 1, ret, "krb5_parse_name %s", name); 112 ret = krb5_get_init_creds_password (context, 121 if( ret == KRB5KRB_AP_ERR_BAD_INTEGRITY 122 || ret 171 usage(int ret) argument [all...] |
/freebsd-13-stable/crypto/openssl/crypto/ |
H A D | o_str.c | 19 int ret = 0; local 21 while (n && (ret = *c1 - *c2) == 0) 24 return ret; 29 char *ret; local 33 ret = CRYPTO_malloc(strlen(str) + 1, file, line); 34 if (ret != NULL) 35 strcpy(ret, str); 36 return ret; 42 char *ret; local 49 ret 59 void *ret; local [all...] |
/freebsd-13-stable/cddl/contrib/opensolaris/cmd/dtrace/test/tst/i386/pid/ |
H A D | tst.ret.s | 35 ret 40 ret 44 ret $0 49 ret $0 54 ret $4 60 ret $4 70 ret 107 ret 113 ret
|
/freebsd-13-stable/crypto/openssl/crypto/bio/ |
H A D | bf_nbio.c | 84 int ret = 0; local 102 ret = -1; 105 ret = BIO_read(b->next_bio, out, outl); 106 if (ret < 0) 109 return ret; 115 int ret = 0; local 140 ret = -1; 143 ret = BIO_write(b->next_bio, in, inl); 144 if (ret < 0) { 149 return ret; 154 long ret; local 176 long ret = 1; local [all...] |