/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
H A D | modify_c.c | 46 kadm5_ret_t ret; local 52 ret = _kadm5_connect(server_handle); 53 if(ret) 54 return ret; 64 ret = _kadm5_client_send(context, sp); 66 if(ret) 67 return ret; 68 ret = _kadm5_client_recv(context, &reply); 69 if(ret) 70 return ret; [all...] |
H A D | chpass_s.c | 48 kadm5_ret_t ret; local 54 ret = context->db->hdb_open(context->context, context->db, O_RDWR, 0); 55 if(ret) 56 return ret; 58 ret = context->db->hdb_fetch_kvno(context->context, context->db, princ, 60 if(ret) 64 ret = context->db->hdb_password(context->context, context->db, 66 if (ret) 76 ret = _kadm5_set_keys(context, &ent.entry, password); 77 if(ret) { 165 kadm5_ret_t ret; local [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/dlv/ |
H A D | tests.sh | 30 ret=0 31 $DIG $DIGOPTS child1.utld dnskey @10.53.0.5 > dig.out.ns5.test$n || ret=1 32 grep "flags:.*ad.*QUERY" dig.out.ns5.test$n > /dev/null || ret=1 34 if [ $ret != 0 ]; then echo "I:failed"; fi 35 status=`expr $status + $ret` 38 ret=0 39 $DIG $DIGOPTS grand.child1.utld dnskey @10.53.0.5 > dig.out.ns5.test$n || ret=1 40 grep "flags:.*ad.*QUERY" dig.out.ns5.test$n > /dev/null || ret=1 42 if [ $ret != 0 ]; then echo "I:failed"; fi 43 status=`expr $status + $ret` [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/tsig/ |
H A D | tests.sh | 35 ret=0 37 -y "md5:$md5" @10.53.0.1 soa -p 5300 > dig.out.md5.old || ret=1 38 grep -i "md5.*TSIG.*NOERROR" dig.out.md5.old > /dev/null || ret=1 39 if [ $ret -eq 1 ] ; then 44 ret=0 46 -y "hmac-md5:md5:$md5" @10.53.0.1 soa -p 5300 > dig.out.md5.new || ret=1 47 grep -i "md5.*TSIG.*NOERROR" dig.out.md5.new > /dev/null || ret=1 48 if [ $ret -eq 1 ] ; then 53 ret=0 55 -y "hmac-sha1:sha1:$sha1" @10.53.0.1 soa -p 5300 > dig.out.sha1 || ret [all...] |
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/gcc.target/x86_64/abi/callabi/ |
H A D | func-1.c | 14 long double ret; local 15 ret = a + (long double) b + (long double) c; 16 ret *= (long double) (d + (long) e); 18 ret += func_cross (a,b,c,d,e,-f); 19 return ret; 26 long double ret; local 27 ret = a + (long double) b + (long double) c; 28 ret *= (long double) (d + (long) e); 30 ret += func_native (a,b,c,d,e,-f); 31 return ret; [all...] |
H A D | func-2a.c | 12 long double ret; local 13 ret = a + (long double) b + (long double) c; 14 ret *= (long double) (d + (long) e); 16 ret += func_native (a,b,c,d,e,-f); 17 return ret;
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | hpropd.c | 64 usage(int ret) argument 67 exit (ret); 73 krb5_error_code ret; local 88 ret = krb5_init_context(&context); 89 if(ret) 92 ret = krb5_openlog(context, "hpropd", &fac); 93 if(ret) 158 ret = krb5_kt_register(context, &hdb_kt_ops); 159 if(ret) 160 krb5_err(context, 1, ret, "krb5_kt_registe [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | test_gic.c | 55 krb5_error_code ret; local 59 ret = krb5_get_init_creds_opt_alloc(context, &opt); 60 if (ret) 61 krb5_err(context, 1, ret, "krb5_get_init_creds_opt_alloc"); 64 ret = krb5_get_init_creds_opt_set_process_last_req(context, 68 if (ret) 69 krb5_err(context, 1, ret, 72 ret = krb5_get_init_creds_password(context, 81 if (ret) 82 krb5_err(context, 1, ret, "krb5_get_init_creds_passwor 106 usage(int ret) argument 117 krb5_error_code ret; local [all...] |
H A D | test_renew.c | 51 usage (int ret) argument 57 exit (ret); 67 krb5_error_code ret; local 92 ret = krb5_init_context(&context); 93 if (ret) 94 krb5_err(context, 1, ret, "krb5_init_context"); 96 ret = krb5_cc_default(context, &id); 97 if (ret) 98 krb5_err(context, 1, ret, "krb5_cc_default"); 100 ret [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/dh/ |
H A D | dh_depr.c | 71 DH *ret=NULL; local 73 if((ret=DH_new()) == NULL) 78 if(DH_generate_parameters_ex(ret, prime_len, generator, &cb)) 79 return ret; 80 DH_free(ret);
|
/netbsd-6-1-5-RELEASE/sys/external/bsd/drm/dist/tests/ |
H A D | gem_flink.c | 45 int ret; local 51 ret = ioctl(fd, DRM_IOCTL_I915_GEM_CREATE, &create); 52 assert(ret == 0); 55 ret = ioctl(fd, DRM_IOCTL_GEM_FLINK, &flink); 56 assert(ret == 0); 59 ret = ioctl(fd, DRM_IOCTL_GEM_OPEN, &open); 60 assert(ret == 0); 70 int ret; local 76 ret = ioctl(fd, DRM_IOCTL_I915_GEM_CREATE, &create); 77 assert(ret 93 int ret; local 106 int ret; local [all...] |
H A D | getclient.c | 36 int fd, ret; local 46 ret = ioctl(fd, DRM_IOCTL_GET_CLIENT, &client); 47 assert(ret == 0); 55 ret = ioctl(fd, DRM_IOCTL_GET_CLIENT, &client); 56 assert(ret == -1 && errno == EINVAL);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kcm/ |
H A D | protocol.c | 82 krb5_error_code ret; local 86 ret = krb5_ret_stringz(request, &name); 87 if (ret) 88 return ret; 92 ret = kcm_ccache_resolve_client(context, client, opcode, 94 if (ret) { 96 return ret; 99 ret = krb5_store_stringz(response, ccache->name); 100 if (ret) { 103 return ret; 124 krb5_error_code ret; local 157 krb5_error_code ret; local 221 krb5_error_code ret; local 255 krb5_error_code ret; local 314 krb5_error_code ret; local 403 krb5_error_code ret; local 447 krb5_error_code ret; local 492 krb5_error_code ret; local 551 krb5_error_code ret; local 608 krb5_error_code ret; local 656 krb5_error_code ret; local 709 krb5_error_code ret; local 762 krb5_error_code ret; local 854 krb5_error_code ret; local 937 krb5_error_code ret; local 1033 krb5_error_code ret; local 1072 krb5_error_code ret; local 1125 krb5_error_code ret; local 1163 krb5_error_code ret; local 1194 krb5_error_code ret; local 1278 krb5_error_code ret; local 1342 krb5_error_code ret; local 1386 krb5_error_code ret; local 1446 krb5_error_code ret; local 1678 krb5_error_code ret; local 1749 krb5_error_code ret; local [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/metadata/ |
H A D | tests.sh | 64 ret=0 65 grep "DNSKEY $ksk"'$' sigs > /dev/null || ret=1 66 grep "SOA $ksk"'$' sigs > /dev/null && ret=1 68 if [ $ret != 0 ]; then echo "I:failed"; fi 69 status=`expr $status + $ret` 72 ret=0 73 grep "SOA $zsk"'$' sigs > /dev/null || ret=1 75 if [ $ret != 0 ]; then echo "I:failed"; fi 76 status=`expr $status + $ret` 79 ret [all...] |
/netbsd-6-1-5-RELEASE/lib/libc/citrus/ |
H A D | citrus_csmapper.c | 87 int ret; local 90 ret = _db_lookup_by_s(db, src, &r, NULL); 91 if (ret) 92 return ret; 93 ret = _db_open(subdb, &r, _CITRUS_PIVOT_SUB_MAGIC, _db_hash_std, NULL); 94 if (ret) 95 return ret; 106 int ret, num, i; local 113 ret = _map_file(&fr, CS_PIVOT ".pvdb"); 114 if (ret) { 220 int ret; local 249 int ret; local 294 int ret; local 320 int ret; local 346 int ret; local [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/dns64/ |
H A D | tests.sh | 32 ret=0 33 $CHECKCONF "$conf" || ret=1 35 if [ $ret != 0 ]; then echo "I:failed"; fi 36 status=`expr $status + $ret` 42 ret=0 43 $CHECKCONF "$conf" >/dev/null && ret=1 45 if [ $ret != 0 ]; then echo "I:failed"; fi 46 status=`expr $status + $ret` 52 ret=0 53 $DIG $DIGOPTS aaaa-only.example. @10.53.0.2 -b 10.53.0.2 aaaa > dig.out.ns2.test$n || ret [all...] |
/netbsd-6-1-5-RELEASE/lib/libc/locale/ |
H A D | multibyte_c90.c | 58 int ret; local 61 err0 = _citrus_ctype_mblen(_CITRUS_CTYPE(), s, n, &ret); 65 return ret; 71 size_t ret; local 74 err0 = _citrus_ctype_mbstowcs(_CITRUS_CTYPE(), pwcs, s, n, &ret); 78 return ret; 84 int ret; local 87 err0 = _citrus_ctype_mbtowc(_CITRUS_CTYPE(), pw, s, n, &ret); 91 return ret; 97 size_t ret; local 110 int ret; local [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kadmin/ |
H A D | kadmin.c | 117 usage(int ret) argument 120 exit (ret); 128 kadm5_ret_t ret; local 130 ret = kadm5_get_privs(kadm_handle, &privs); 131 if(ret) 132 krb5_warn(context, ret, "kadm5_get_privs"); 134 ret =_kadm5_privs_to_string(privs, str, sizeof(str)); 135 if (ret == 0) 146 krb5_error_code ret; local 154 ret [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/bn/ |
H A D | bn_blind.c | 139 BN_BLINDING *ret=NULL; local 143 if ((ret=(BN_BLINDING *)OPENSSL_malloc(sizeof(BN_BLINDING))) == NULL) 148 memset(ret,0,sizeof(BN_BLINDING)); 151 if ((ret->A = BN_dup(A)) == NULL) goto err; 155 if ((ret->Ai = BN_dup(Ai)) == NULL) goto err; 159 if ((ret->mod = BN_dup(mod)) == NULL) goto err; 161 BN_set_flags(ret->mod, BN_FLG_CONSTTIME); 166 ret->counter = -1; 167 CRYPTO_THREADID_current(&ret->tid); 168 return(ret); 188 int ret=0; local 226 int ret = 1; local 259 int ret; local 313 BN_BLINDING *ret = NULL; local [all...] |
/netbsd-6-1-5-RELEASE/sys/dev/pci/n8/common/api/ |
H A D | n8_system.c | 109 N8_Status_t ret = N8_STATUS_OK; local 114 ret = N8_preamble(); 115 CHECK_RETURN(ret); 118 CHECK_OBJECT(value_p, ret); 123 ret = setCount(value_p, N8_EA); 126 ret = setType(value_p, N8_EA); 129 ret = setCount(value_p, N8_PKP); 132 ret = setType(value_p, N8_PKP); 135 ret = setCount(value_p, N8_EA); 138 ret 218 N8_Status_t ret = N8_STATUS_OK; local 295 N8_Status_t ret = N8_STATUS_OK; local 368 N8_Status_t ret = N8_STATUS_OK; local 441 N8_Status_t ret = N8_STATUS_OK; local 500 N8_Status_t ret = N8_STATUS_OK; local 545 N8_Status_t ret = N8_STATUS_OK; local 602 N8_Status_t ret = N8_STATUS_OK; local 659 N8_Status_t ret = N8_STATUS_OK; local 723 N8_Status_t ret = N8_STATUS_OK; local 766 N8_Status_t ret = N8_STATUS_OK; local [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/ |
H A D | kdc.c | 67 krb5_error_code ret; local 77 ret = krb5_cc_resolve(context, cache, id); 78 if (ret) 84 ret = krb5_sname_to_principal(context, NULL, "host", 86 if (ret) 89 ret = krb5_cc_cache_match(context, principal, id); 90 if (ret == 0) 94 ret = krb5_kt_default(context, &kt); 95 if (ret) 105 ret 161 krb5_error_code ret; local 201 krb5_error_code ret; local 254 krb5_error_code ret; local 353 krb5_error_code ret; local [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/resolver/ |
H A D | tests.sh | 27 ret=0 28 $DIG +tcp nxdomain.example.net @10.53.0.1 a -p 5300 > dig.out || ret=1 29 grep "status: NXDOMAIN" dig.out > /dev/null || ret=1 30 if [ $ret != 0 ]; then echo "I:failed"; fi 31 status=`expr $status + $ret` 34 ret=0 35 $DIG +tcp nodata.example.net @10.53.0.1 a -p 5300 > dig.out || ret=1 36 grep "status: NOERROR" dig.out > /dev/null || ret=1 38 if [ $ret != 0 ]; then echo "I:failed"; fi 39 status=`expr $status + $ret` [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kuser/ |
H A D | kdestroy.c | 75 krb5_error_code ret; local 100 ret = krb5_init_context (&context); 101 if (ret) 102 errx (1, "krb5_init_context failed: %d", ret); 107 ret = krb5_cccol_cursor_new (context, &cursor); 108 if (ret) 109 krb5_err(context, 1, ret, "krb5_cccol_cursor_new"); 113 ret = krb5_cc_destroy (context, ccache); 114 if (ret) { 115 krb5_warn(context, ret, "krb5_cc_destro [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/ |
H A D | test_cfx.c | 55 krb5_error_code ret; local 67 ret = _gssapi_wrap_size_cfx(&minor, 74 if (ret) 75 krb5_errx(context, 1, "_gsskrb5cfx_max_wrap_length_cfx: %d", ret); 79 ret = _gsskrb5cfx_wrap_length_cfx(context, 85 if (ret) 86 krb5_errx(context, 1, "_gsskrb5cfx_wrap_length_cfx: %d", ret); 99 krb5_error_code ret; local 109 ret = _gssapi_wrap_size_cfx(&minor, 116 if (ret) 143 krb5_error_code ret; local [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/ap/ |
H A D | ctrl_iface_ap.c | 31 int len, res, ret; local 34 ret = os_snprintf(buf, buflen, "FAIL\n"); 35 if (ret < 0 || (size_t) ret >= buflen) 37 return ret; 41 ret = os_snprintf(buf + len, buflen - len, MACSTR "\n", 43 if (ret < 0 || (size_t) ret >= buflen - len) 45 len += ret; 76 int ret; local 94 int ret; local [all...] |