/netbsd-current/external/mpl/bind/dist/bin/tests/system/inline/ |
H A D | tests.sh | 37 ret=0 39 $RNDCCMD 10.53.0.3 signing -nsec3param 1 0 0 - nsec3 >/dev/null 2>&1 || ret=1 42 nsec3param=$($DIG $DIGOPTS +nodnssec +short @10.53.0.3 nsec3param nsec3.) || ret=1 47 if [ $ret != 0 ]; then 54 ret=0 55 grep -q "algorithm is unsupported" ns3/named.run || ret=1 56 if [ $ret != 0 ]; then echo_i "failed"; fi 57 status=$((status + ret)) 61 ret=0 63 | awk '/RRSIG NSEC3/ {a[$1]++} END { for (i in a) {if (a[i] != 1) exit (1)}}' || ret [all...] |
/netbsd-current/external/mpl/bind/dist/bin/tests/system/builtin/ |
H A D | tests.sh | 126 ret=0 132 ret=1 138 ret=1 141 if [ $ret != 0 ]; then status=$((status + ret)); fi 146 ret=0 147 grep "automatic empty zone" ns1/named.run >/dev/null || ret=1 148 grep "received control channel command 'reconfig'" ns1/named.run >/dev/null || ret=1 149 grep "reloading configuration succeeded" ns1/named.run >/dev/null || ret=1 151 grep "zone serial (0) unchanged." ns1/named.run >/dev/null && ret [all...] |
/netbsd-current/external/mpl/bind/dist/bin/tests/system/tcp/ |
H A D | tests.sh | 32 ret=0 33 rndccmd 10.53.0.1 stats || ret=1 34 rndccmd 10.53.0.2 stats || ret=1 39 if [ $ret != 0 ]; then echo_i "failed"; fi 40 status=$((status + ret)) 44 ret=0 47 rndccmd 10.53.0.1 stats || ret=1 48 rndccmd 10.53.0.2 stats || ret=1 53 if [ "$ntcp10" -ge "$ntcp11" ]; then ret=1; fi 54 if [ "$ntcp20" -ne "$ntcp21" ]; then ret [all...] |
/netbsd-current/crypto/external/bsd/heimdal/dist/kuser/ |
H A D | kgetcred.c | 90 usage(int ret) argument 96 exit (ret); 102 krb5_error_code ret; local 114 ret = krb5_init_context(&context); 115 if (ret) 116 errx(1, "krb5_init_context failed: %d", ret); 133 ret = krb5_set_debug_dest(context, getprogname(), "STDERR"); 134 if (ret) 135 krb5_warn(context, ret, "krb5_set_debug_dest"); 139 ret [all...] |
/netbsd-current/external/mpl/bind/dist/bin/tests/system/unknown/ |
H A D | tests.sh | 31 ret=0 33 echo 10.0.0.1 | diff - dig.out.$i.test$n || ret=1 34 if [ $ret != 0 ]; then 37 status=$((status + ret)) 43 ret=0 45 echo '"hello"' | diff - dig.out.$i.test$n || ret=1 46 if [ $ret != 0 ]; then 49 status=$((status + ret)) 55 ret=0 57 echo '\# 1 00' | diff - dig.out.$i.test$n || ret [all...] |
/netbsd-current/external/mpl/bind/dist/bin/tests/system/legacy/ |
H A D | tests.sh | 52 ret=0 53 $DIG $DIGOPTS +edns @10.53.0.8 ednsformerr soa >dig.out.1.test$n || ret=1 54 grep "status: FORMERR" dig.out.1.test$n >/dev/null || ret=1 55 grep "EDNS: version:" dig.out.1.test$n >/dev/null && ret=1 56 $DIG $DIGOPTS +noedns @10.53.0.8 ednsformerr soa >dig.out.2.test$n || ret=1 57 grep "status: NOERROR" dig.out.2.test$n >/dev/null || ret=1 58 grep "EDNS: version:" dig.out.2.test$n >/dev/null && ret=1 59 if [ $ret != 0 ]; then echo_i "failed"; fi 60 status=$((status + ret)) 64 ret [all...] |
/netbsd-current/external/gpl2/lvm2/dist/libdm/mm/ |
H A D | pool.c | 32 char *ret = dm_pool_alloc(p, strlen(str) + 1); local 34 if (ret) 35 strcpy(ret, str); 37 return ret; 42 char *ret = dm_pool_alloc(p, n + 1); local 44 if (ret) { 45 strncpy(ret, str, n); 46 ret[n] = '\0'; 49 return ret;
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hdb/ |
H A D | test_hdbplugin.c | 85 krb5_error_code ret; local 91 ret = krb5_init_context(&context); 92 if (ret) 95 ret = krb5_plugin_register(context, 98 if(ret) { 99 krb5_err(context, 1, ret, "krb5_plugin_register"); 102 ret = hdb_create(context, &db, "test:test&1234"); 103 if(ret) { 104 krb5_err(context, 1, ret, "hdb_create");
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | test_expand_toks.c | 48 usage (int ret) argument 54 exit (ret); 61 krb5_error_code ret; local 81 ret = krb5_init_context(&context); 82 if (ret) 83 errx (1, "krb5_init_context failed: %d", ret); 85 ret = _krb5_expand_path_tokensv(context, "/tmp/%{foo}/%{bar}%{baz}/x", 0, 91 if (ret) 92 krb5_err(context, ret, 1, "Token expansion failed");
|
H A D | recvauth.c | 99 krb5_error_code ret; local 114 ret = krb5_auth_con_init (context, auth_context); 115 if (ret) 116 return ret; 119 ret = krb5_auth_con_setaddrs_from_fd (context, 122 if (ret) 123 return ret; 131 ret = errno ? errno : EINVAL; 132 krb5_set_error_message(context, ret, "read: %s", strerror(ret)); [all...] |
H A D | test_ap-req.c | 61 usage (int ret) argument 64 exit (ret); 76 krb5_error_code ret; local 83 ret = krb5_mk_req_exact(context, 90 if (ret) 91 krb5_err(context, 1, ret, "krb5_mk_req_exact"); 93 ret = krb5_rd_req(context, 100 if (ret) 101 krb5_err(context, 1, ret, "krb5_rd_req"); 112 ret 168 krb5_error_code ret; local [all...] |
/netbsd-current/crypto/external/bsd/heimdal/dist/admin/ |
H A D | copy.c | 54 krb5_error_code ret; local 61 ret = krb5_kt_resolve (context, from, &src_keytab); 62 if (ret) { 63 krb5_warn (context, ret, "resolving src keytab `%s'", from); 67 ret = krb5_kt_resolve (context, to, &dst_keytab); 68 if (ret) { 70 krb5_warn (context, ret, "resolving dst keytab `%s'", to); 74 ret = krb5_kt_start_seq_get (context, src_keytab, &cursor); 75 if (ret) { 76 krb5_warn (context, ret, "krb5_kt_start_seq_ge [all...] |
/netbsd-current/external/bsd/ntp/dist/lib/isc/pthreads/ |
H A D | thread.c | 39 int ret; local 45 ret = pthread_attr_getstacksize(&attr, &stacksize); 46 if (ret != 0) 50 ret = pthread_attr_setstacksize(&attr, THREAD_MINSTACKSIZE); 51 if (ret != 0) 57 ret = pthread_attr_setscope(&attr, PTHREAD_SCOPE_SYSTEM); 58 if (ret != 0) 62 ret = pthread_create(thread, &attr, func, arg); 63 if (ret != 0)
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
H A D | get_princs_c.c | 47 kadm5_ret_t ret; local 53 ret = _kadm5_connect(server_handle); 54 if(ret) 55 return ret; 64 ret = _kadm5_client_send(context, sp); 66 if (ret) 67 return ret; 68 ret = _kadm5_client_recv(context, &reply); 69 if(ret) 70 return ret; [all...] |
H A D | init_s.c | 49 kadm5_ret_t ret; local 55 ret = _kadm5_s_init_context(&ctx, realm_params, context); 56 if (ret) 57 return ret; 79 ret = hdb_create(ctx->context, &ctx->db, dbname); 80 if (ret == 0) 81 ret = hdb_set_master_keyfile(ctx->context, 83 if (ret) { 85 return ret; 101 ret 140 kadm5_ret_t ret; local 192 kadm5_ret_t ret; local 244 kadm5_ret_t ret; local [all...] |
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/roken/ |
H A D | strptime.c | 179 int ret = 4; local 182 ret = (ret + (is_leap_year (year) ? 366 : 365)) % 7; 183 return ret; 249 int ret; local 260 ret = match_string (&buf, full_weekdays); 261 if (ret < 0) 263 timeptr->tm_wday = ret; 266 ret = match_string (&buf, abb_weekdays); 267 if (ret < [all...] |
/netbsd-current/external/bsd/libfido2/dist/openbsd-compat/ |
H A D | bsd-asprintf.c | 37 int ret; local 46 ret = vsnprintf(string, INIT_SZ, fmt, ap2); 48 if (ret >= 0 && ret < INIT_SZ) { /* succeeded with initial alloc */ 50 } else if (ret == INT_MAX || ret < 0) { /* Bad length */ 54 len = (size_t)ret + 1; 60 ret = vsnprintf(newstr, len, fmt, ap2); 62 if (ret < 0 || (size_t)ret > 79 int ret; local [all...] |
/netbsd-current/external/mpl/bind/dist/bin/tests/system/ecdsa/ |
H A D | tests.sh | 28 ret=0 29 dig_with_opts . @10.53.0.1 soa >dig.out.ns1.test$n || ret=1 30 dig_with_opts . @10.53.0.2 soa >dig.out.ns2.test$n || ret=1 31 $PERL ../digcomp.pl dig.out.ns1.test$n dig.out.ns2.test$n || ret=1 32 grep "flags:.*ad.*QUERY" dig.out.ns2.test$n >/dev/null || ret=1 33 if [ $ret != 0 ]; then echo_i "failed"; fi 34 status=$((status + ret)) 42 ret=0 43 dig_with_opts . @10.53.0.1 soa >dig.out.ns1.test$n || ret=1 44 dig_with_opts . @10.53.0.3 soa >dig.out.ns3.test$n || ret [all...] |
/netbsd-current/external/mpl/bind/dist/bin/tests/system/additional/ |
H A D | tests.sh | 27 ret=0 28 $DIG $DIGOPTS +rec -t RT rt.rt.example @10.53.0.1 >dig.out.$n || ret=1 29 if [ $ret -eq 1 ]; then 36 ret=0 37 $DIG $DIGOPTS +rec -t RT rt.rt2.example @10.53.0.1 >dig.out.$n || ret=1 38 if [ $ret -eq 1 ]; then 45 ret=0 46 $DIG $DIGOPTS +rec -t NAPTR nap.naptr.example @10.53.0.1 >dig.out.$n || ret=1 47 if [ $ret -eq 1 ]; then 54 ret [all...] |
/netbsd-current/lib/libc/iconv/ |
H A D | iconv.c | 61 int ret; local 64 ret = _citrus_iconv_open(&handle, _PATH_ICONV, in, out); 65 if (ret) { 66 errno = ret == ENOENT? EINVAL : ret; 90 size_t ret; local 99 (const char **)(void *)in, szin, out, szout, 0, &ret); 102 ret = (size_t)-1; 105 return (ret); 113 size_t ret; local 136 int ret; local [all...] |
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/ |
H A D | creds.c | 45 krb5_error_code ret; local 70 ret = krb5_store_uint32(sp, 0); 71 if (ret) { 73 *minor_status = ret; 77 ret = krb5_cc_get_config(context, handle->ccache, NULL, "start_realm", 79 if (ret == 0) { 93 ret = _krb5_get_krbtgt(context, handle->ccache, start_realm, &creds); 96 if (ret) { 98 *minor_status = ret; 102 ret 184 krb5_error_code ret; local [all...] |
/netbsd-current/external/mpl/bind/dist/bin/tests/system/smartsign/ |
H A D | tests.sh | 93 ret=0 94 echo "$pzoneout" | grep 'KSKs: 1 active, 0 stand-by, 0 revoked' >/dev/null || ret=1 95 echo "$pzoneout" | grep 'ZSKs: 1 active, 0 stand-by, 0 revoked' >/dev/null || ret=1 96 echo "$czoneout" | grep 'KSKs: 1 active, 1 stand-by, 1 revoked' >/dev/null || ret=1 97 echo "$czoneout" | grep 'ZSKs: 1 active, 2 stand-by, 0 revoked' >/dev/null || ret=1 98 if [ $ret != 0 ]; then 103 status=$((status + ret)) 106 ret=0 110 echo "$pzoneout" | grep 'KSKs: 1 active, 0 stand-by, 0 revoked' >/dev/null || ret=1 111 echo "$pzoneout" | grep 'ZSKs: 1 active, 0 present, 0 revoked' >/dev/null || ret [all...] |
/netbsd-current/external/mpl/bind/dist/bin/tests/system/auth/ |
H A D | tests.sh | 26 ret=0 28 $DIG $DIGOPTS @10.53.0.2 soa $zone >dig.out.test$n || ret=1 29 grep "ANSWER: 1," dig.out.test$n >/dev/null || ret=1 31 [ $ret -eq 0 ] && break 34 [ $ret -eq 0 ] || echo_i "failed" 35 status=$((status + ret)) 43 ret=0 44 $DIG $DIGOPTS +norec @10.53.0.1 www.example.com >dig.out.test$n || ret=1 45 grep "ANSWER: 1," dig.out.test$n >/dev/null || ret=1 46 grep "flags: qr aa;" dig.out.test$n >/dev/null || ret [all...] |
/netbsd-current/external/mpl/bind/dist/bin/tests/system/mirror/ |
H A D | tests.sh | 40 ret=1 60 ret=1 80 ret=0 82 $DIG $DIGOPTS @10.53.0.3 +norec verify-unsigned SOA >dig.out.ns3.test$n 2>&1 || ret=1 83 grep "ANSWER: 0" dig.out.ns3.test$n >/dev/null || ret=1 84 grep "${ORIGINAL_SERIAL}.*; serial" dig.out.ns3.test$n >/dev/null && ret=1 85 nextpartpeek ns3/named.run | grep "verify-unsigned.*Zone contains no DNSSEC keys" >/dev/null || ret=1 86 nextpartpeek ns3/named.run | grep "verify-unsigned.*mirror zone is now in use" >/dev/null && ret=1 87 if [ $ret != 0 ]; then echo_i "failed"; fi 88 status=$((status + ret)) [all...] |
/netbsd-current/crypto/external/bsd/heimdal/dist/kcm/ |
H A D | client.c | 47 krb5_error_code ret; local 50 ret = kcm_ccache_resolve(context, name, ccache); 51 if (ret) { 52 estr = krb5_get_error_message(context, ret); 55 return ret; 58 ret = kcm_access(context, client, opcode, *ccache); 59 if (ret) { 60 ret = KRB5_FCC_NOFILE; /* don't disclose */ 64 return ret; 72 krb5_error_code ret; local 99 krb5_error_code ret; local [all...] |