/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | keytab_keyfile.c | 70 int ret; local 74 ret = errno; 76 strerror(ret)); 77 return ret; 127 int ret; local 136 ret = get_cell_and_realm (context, d); 137 if (ret) { 139 return ret; 194 int32_t ret; local 199 ret 228 int ret; local 288 krb5_error_code ret; local [all...] |
H A D | mit_glue.c | 49 krb5_error_code ret; local 52 ret = krb5_crypto_init(context, key, 0, &crypto); 53 if (ret) 54 return ret; 56 ret = krb5_create_checksum(context, crypto, usage, cksumtype, 60 return ret ; 68 krb5_error_code ret; local 73 ret = krb5_c_make_checksum(context, cksum->cksumtype, 75 if (ret) 76 return ret; 92 krb5_error_code ret; local 186 krb5_error_code ret; local 212 krb5_error_code ret; local 252 krb5_error_code ret; local 292 krb5_error_code ret; local 335 krb5_error_code ret; local 359 krb5_error_code ret; local [all...] |
H A D | recvauth.c | 76 krb5_error_code ret; local 91 ret = krb5_auth_con_init (context, auth_context); 92 if (ret) 93 return ret; 96 ret = krb5_auth_con_setaddrs_from_fd (context, 99 if (ret) 100 return ret; 105 ret = errno; 107 return ret; 126 ret [all...] |
H A D | test_hostname.c | 46 krb5_error_code ret; local 49 ret = krb5_expand_hostname(context, host, &h); 50 if (ret) 51 krb5_err(context, 1, ret, "krb5_expand_hostname(%s)", host); 58 ret = krb5_expand_hostname_realms(context, host, &h, &r); 59 if (ret) 60 krb5_err(context, 1, ret, "krb5_expand_hostname_realms(%s)", host); 82 krb5_error_code ret; member in struct:t 107 usage (int ret) argument 110 exit (ret); 118 krb5_error_code ret; local [all...] |
/freebsd-9.3-release/contrib/ofed/librdmacm/examples/ |
H A D | rping.c | 164 int ret = 0; local 174 ret = rdma_resolve_route(cma_id, 2000); 175 if (ret) { 214 ret = -1; 225 ret = -1; 234 return ret; 277 int ret; local 279 while ((ret = ibv_poll_cq(cb->cq, 1, &wc)) == 1) { 280 ret = 0; 286 ret 345 int ret; local 393 int ret; local 480 int ret; local 514 int ret; local 568 int ret; local 588 int ret; local 631 int ret; local 730 int ret; local 773 int ret; local 824 int ret; local 850 int ret; local 902 int ping, start, cc, i, ret = 0; local 972 int ret; local 997 int ret; local 1024 int ret; local 1069 int ret; local 1110 int ret = 0; local [all...] |
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_otp.c | 35 struct eap_method_ret *ret, 45 ret->ignore = TRUE; 62 ret->ignore = TRUE; 66 ret->ignore = FALSE; 68 ret->methodState = METHOD_DONE; 69 ret->decision = DECISION_COND_SUCC; 70 ret->allowNotifications = FALSE; 92 int ret; local 103 ret = eap_peer_method_register(eap); 104 if (ret) 34 eap_otp_process(struct eap_sm *sm, void *priv, struct eap_method_ret *ret, const struct wpabuf *reqData) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/tests/plugin/ |
H A D | windc.c | 22 krb5_error_code ret; local 30 ret = krb5_pac_init(context, pac); 31 if (ret) 32 return ret; 34 ret = krb5_pac_add_buffer(context, *pac, 1, &data); 35 if (ret) 36 return ret; 48 krb5_error_code ret; local 53 ret = krb5_pac_get_buffer(context, *pac, 1, &data); 54 if (ret) [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/asn1/ |
H A D | p8_key.c | 87 M_ASN1_D2I_get(ret->cert_info, d2i_X509_CINF); 88 M_ASN1_D2I_get(ret->sig_alg, d2i_X509_ALGOR); 89 M_ASN1_D2I_get(ret->signature, d2i_ASN1_BIT_STRING); 95 X509_KEY *ret = NULL; local 97 M_ASN1_New_OPENSSL_malloc(ret, X509_KEY); 98 ret->references = 1; 99 ret->type = NID M_ASN1_New(ret->cert_info, X509_CINF_new); 100 M_ASN1_New(ret->sig_alg, X509_ALGOR_new); 101 M_ASN1_New(ret [all...] |
H A D | x_info.c | 67 X509_INFO *ret = NULL; local 69 ret = (X509_INFO *)OPENSSL_malloc(sizeof(X509_INFO)); 70 if (ret == NULL) { 75 ret->enc_cipher.cipher = NULL; 76 ret->enc_len = 0; 77 ret->enc_data = NULL; 79 ret->references = 1; 80 ret->x509 = NULL; 81 ret->crl = NULL; 82 ret [all...] |
H A D | d2i_pr.c | 78 EVP_PKEY *ret; local 81 if ((ret = EVP_PKEY_new()) == NULL) { 86 ret = *a; 88 ret->save_type = type; 89 ret->type = EVP_PKEY_type(type); 90 switch (ret->type) { 94 if ((ret->pkey.rsa = d2i_RSAPrivateKey(NULL, 105 if ((ret->pkey.dsa = d2i_DSAPrivateKey(NULL, 115 if ((ret->pkey.ec = d2i_ECPrivateKey(NULL, 129 (*a) = ret; [all...] |
/freebsd-9.3-release/contrib/gcc/config/ |
H A D | host-darwin.c | 50 int ret; local 55 ret = (addr == pch_address_space && sz <= sizeof (pch_address_space)); 56 if (! ret) 65 if (ret) 72 ret = mmap_result != (void *) MAP_FAILED; 75 gcc_assert (!ret || mmap_result == addr); 78 return ret;
|
/freebsd-9.3-release/crypto/heimdal/kadmin/ |
H A D | check.c | 46 krb5_error_code ret; local 49 ret = krb5_parse_name(context, name, &principal); 50 if (ret) { 51 krb5_warn(context, ret, "krb5_unparse_name: %s", name); 56 ret = kadm5_get_principal(kadm_handle, principal, ent, 0); 58 if(ret) 68 krb5_error_code ret; local 73 ret = krb5_unparse_name(context, principal, &name); 74 if (ret) 78 ret 109 krb5_error_code ret; local [all...] |
H A D | server.c | 43 kadm5_ret_t ret; local 66 ret = krb5_ret_principal(sp, &princ); 67 if(ret) 69 ret = krb5_ret_int32(sp, &mask); 70 if(ret){ 76 ret = _kadm5_acl_check_permission(context, KADM5_PRIV_GET, princ); 77 if(ret){ 81 ret = kadm5_get_principal(kadm_handle, princ, &ent, mask); 84 krb5_store_int32(sp, ret); 85 if(ret 441 krb5_error_code ret; local 479 krb5_error_code ret; local [all...] |
H A D | stash.c | 45 krb5_error_code ret; local 54 ret = krb5_string_to_enctype(context, opt->enctype_string, &enctype); 55 if(ret) { 56 krb5_warn(context, ret, "%s", opt->enctype_string); 66 ret = hdb_read_master_key(context, opt->key_file_string, &mkey); 67 if(ret && ret != ENOENT) { 68 krb5_warn(context, ret, "reading master key from %s", 74 if (ret) 75 krb5_warn(context, ret, "readin [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/roken/ |
H A D | strcollect.c | 86 char **ret = malloc (initial * sizeof(char *)); local 88 if (ret == NULL) 89 return ret; 91 ret[0] = first; 93 ret = sub (ret, 1, initial, &ap); 95 return ret;
|
/freebsd-9.3-release/lib/libkse/thread/ |
H A D | thr_fcntl.c | 48 int ret, check = 1; local 56 ret = __sys_fcntl(fd, cmd, va_arg(ap, int)); 61 check = (ret == -1); 65 ret = __sys_fcntl(fd, cmd, va_arg(ap, int)); 69 ret = __sys_fcntl(fd, cmd); 72 ret = __fcntl_compat(fd, cmd, va_arg(ap, void *)); 78 return (ret);
|
/freebsd-9.3-release/lib/libthr/thread/ |
H A D | thr_setschedparam.c | 54 int ret; local 58 else if ((ret = _thr_find_thread(curthread, pthread, 60 return (ret); 68 ret = _thr_setscheduler(pthread->tid, policy, param); 69 if (ret == -1) 70 ret = errno; 76 return (ret);
|
H A D | thr_rwlock.c | 51 int ret; \ 52 ret = init_static(_get_curthread(), rwlock); \ 53 if (ret) \ 54 return (ret); \ 81 int ret; local 85 ret = 0; 87 ret = EINVAL; 92 ret = 0; 94 return (ret); 100 int ret; local 128 int ret; local 210 int ret; local 243 int ret; local 247 ret = _thr_rwlock_trywrlock(&prwlock->lock); local 259 int ret; local 267 ret = _thr_rwlock_trywrlock(&prwlock->lock); local 326 int ret; local [all...] |
/freebsd-9.3-release/sys/ofed/drivers/infiniband/hw/mthca/ |
H A D | mthca_uar.c | 56 int ret; local 58 ret = mthca_alloc_init(&dev->uar_table.alloc, 62 if (ret) 63 return ret; 65 ret = mthca_init_db_tab(dev); 66 if (ret) 69 return ret;
|
/freebsd-9.3-release/crypto/openssl/crypto/evp/ |
H A D | bio_md.c | 124 int ret = 0; local 134 ret = BIO_read(b->next_bio, out, outl); 136 if (ret > 0) { 137 EVP_DigestUpdate(ctx, (unsigned char *)out, (unsigned int)ret); 142 return (ret); 147 int ret = 0; local 155 ret = BIO_write(b->next_bio, in, inl); 157 if (ret > 0) { 159 (unsigned int)ret); 164 return (ret); 172 long ret = 1; local 230 long ret = 1; local 245 unsigned int ret; local [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/bio/ |
H A D | bss_fd.c | 104 BIO *ret; local 105 ret = BIO_new(BIO_s_fd()); 106 if (ret == NULL) 108 BIO_set_fd(ret, fd, close_flag); 109 return (ret); 137 int ret = 0; local 141 ret = UP_read(b->num, out, outl); 143 if (ret <= 0) { 144 if (BIO_fd_should_retry(ret)) 148 return (ret); 153 int ret; local 166 long ret = 1; local 217 int n, ret; local [all...] |
/freebsd-9.3-release/tools/regression/sbin/dhclient/ |
H A D | option-domain-search.c | 15 int ret; local 23 ret = setjmp(env); 24 if (ret == 0) 35 int ret; local 47 ret = setjmp(env); 48 if (ret == 0) 61 int ret; local 72 ret = setjmp(env); 73 if (ret == 0) 76 if (ret ! 85 int ret; local 109 int ret; local 135 int ret; local 159 int ret; local 183 int ret; local 209 int ret; local 233 int ret; local 257 int ret; local 281 int ret; local [all...] |
/freebsd-9.3-release/crypto/heimdal/kcm/ |
H A D | renew.c | 42 krb5_error_code ret; local 67 ret = krb5_copy_principal(context, ccache->server, &in.server); 68 if (ret) { 70 krb5_get_err_text(context, ret)); 75 ret = krb5_make_principal(context, &in.server, realm, 77 if (ret) { 79 realm, krb5_get_err_text(context, ret)); 93 ret = krb5_get_kdc_cred(context, 100 if (ret) { 102 ccache->name, krb5_get_err_text(context, ret)); [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/kadm5/ |
H A D | default_keys.c | 42 krb5_error_code ret; local 50 ret = krb5_enctype_to_string(context, keys[i].key.keytype, &str); 51 if (ret) 52 krb5_err(context, ret, 1, "krb5_enctype_to_string: %d\n", 84 krb5_error_code ret; local 88 ret = hdb_generate_key_set(context, principal, &keys, &nkeys, no_salt); 89 if (ret) 90 krb5_err(context, 1, ret, "hdb_generate_key_set"); 100 krb5_error_code ret; local 104 ret [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/bn/ |
H A D | bn_kron.c | 66 int ret = -2; /* avoid 'uninitialized' warning */ local 103 ret = BN_abs_is_word(A, 1); 110 ret = 0; 125 /* set 'ret' to $(-1)^{(A^2-1)/8}$ */ 126 ret = tab[BN_lsw(A) & 7]; 129 ret = 1; 135 ret = -ret; 140 * the Jacobi symbol (A/B) and multiply it by 'ret' 149 ret [all...] |