Searched refs:ret (Results 226 - 250 of 10346) sorted by relevance

1234567891011>>

/netbsd-current/external/mpl/bind/dist/bin/tests/system/inline/
H A Dtests.sh37 ret=0
39 $RNDCCMD 10.53.0.3 signing -nsec3param 1 0 0 - nsec3 >/dev/null 2>&1 || ret=1
42 nsec3param=$($DIG $DIGOPTS +nodnssec +short @10.53.0.3 nsec3param nsec3.) || ret=1
47 if [ $ret != 0 ]; then
54 ret=0
55 grep -q "algorithm is unsupported" ns3/named.run || ret=1
56 if [ $ret != 0 ]; then echo_i "failed"; fi
57 status=$((status + ret))
61 ret=0
63 | awk '/RRSIG NSEC3/ {a[$1]++} END { for (i in a) {if (a[i] != 1) exit (1)}}' || ret
[all...]
/netbsd-current/external/mpl/bind/dist/bin/tests/system/builtin/
H A Dtests.sh126 ret=0
132 ret=1
138 ret=1
141 if [ $ret != 0 ]; then status=$((status + ret)); fi
146 ret=0
147 grep "automatic empty zone" ns1/named.run >/dev/null || ret=1
148 grep "received control channel command 'reconfig'" ns1/named.run >/dev/null || ret=1
149 grep "reloading configuration succeeded" ns1/named.run >/dev/null || ret=1
151 grep "zone serial (0) unchanged." ns1/named.run >/dev/null && ret
[all...]
/netbsd-current/external/mpl/bind/dist/bin/tests/system/tcp/
H A Dtests.sh32 ret=0
33 rndccmd 10.53.0.1 stats || ret=1
34 rndccmd 10.53.0.2 stats || ret=1
39 if [ $ret != 0 ]; then echo_i "failed"; fi
40 status=$((status + ret))
44 ret=0
47 rndccmd 10.53.0.1 stats || ret=1
48 rndccmd 10.53.0.2 stats || ret=1
53 if [ "$ntcp10" -ge "$ntcp11" ]; then ret=1; fi
54 if [ "$ntcp20" -ne "$ntcp21" ]; then ret
[all...]
/netbsd-current/crypto/external/bsd/heimdal/dist/kuser/
H A Dkgetcred.c90 usage(int ret) argument
96 exit (ret);
102 krb5_error_code ret; local
114 ret = krb5_init_context(&context);
115 if (ret)
116 errx(1, "krb5_init_context failed: %d", ret);
133 ret = krb5_set_debug_dest(context, getprogname(), "STDERR");
134 if (ret)
135 krb5_warn(context, ret, "krb5_set_debug_dest");
139 ret
[all...]
/netbsd-current/external/mpl/bind/dist/bin/tests/system/unknown/
H A Dtests.sh31 ret=0
33 echo 10.0.0.1 | diff - dig.out.$i.test$n || ret=1
34 if [ $ret != 0 ]; then
37 status=$((status + ret))
43 ret=0
45 echo '"hello"' | diff - dig.out.$i.test$n || ret=1
46 if [ $ret != 0 ]; then
49 status=$((status + ret))
55 ret=0
57 echo '\# 1 00' | diff - dig.out.$i.test$n || ret
[all...]
/netbsd-current/external/mpl/bind/dist/bin/tests/system/legacy/
H A Dtests.sh52 ret=0
53 $DIG $DIGOPTS +edns @10.53.0.8 ednsformerr soa >dig.out.1.test$n || ret=1
54 grep "status: FORMERR" dig.out.1.test$n >/dev/null || ret=1
55 grep "EDNS: version:" dig.out.1.test$n >/dev/null && ret=1
56 $DIG $DIGOPTS +noedns @10.53.0.8 ednsformerr soa >dig.out.2.test$n || ret=1
57 grep "status: NOERROR" dig.out.2.test$n >/dev/null || ret=1
58 grep "EDNS: version:" dig.out.2.test$n >/dev/null && ret=1
59 if [ $ret != 0 ]; then echo_i "failed"; fi
60 status=$((status + ret))
64 ret
[all...]
/netbsd-current/external/gpl2/lvm2/dist/libdm/mm/
H A Dpool.c32 char *ret = dm_pool_alloc(p, strlen(str) + 1); local
34 if (ret)
35 strcpy(ret, str);
37 return ret;
42 char *ret = dm_pool_alloc(p, n + 1); local
44 if (ret) {
45 strncpy(ret, str, n);
46 ret[n] = '\0';
49 return ret;
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hdb/
H A Dtest_hdbplugin.c85 krb5_error_code ret; local
91 ret = krb5_init_context(&context);
92 if (ret)
95 ret = krb5_plugin_register(context,
98 if(ret) {
99 krb5_err(context, 1, ret, "krb5_plugin_register");
102 ret = hdb_create(context, &db, "test:test&1234");
103 if(ret) {
104 krb5_err(context, 1, ret, "hdb_create");
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/krb5/
H A Dtest_expand_toks.c48 usage (int ret) argument
54 exit (ret);
61 krb5_error_code ret; local
81 ret = krb5_init_context(&context);
82 if (ret)
83 errx (1, "krb5_init_context failed: %d", ret);
85 ret = _krb5_expand_path_tokensv(context, "/tmp/%{foo}/%{bar}%{baz}/x", 0,
91 if (ret)
92 krb5_err(context, ret, 1, "Token expansion failed");
H A Drecvauth.c99 krb5_error_code ret; local
114 ret = krb5_auth_con_init (context, auth_context);
115 if (ret)
116 return ret;
119 ret = krb5_auth_con_setaddrs_from_fd (context,
122 if (ret)
123 return ret;
131 ret = errno ? errno : EINVAL;
132 krb5_set_error_message(context, ret, "read: %s", strerror(ret));
[all...]
H A Dtest_ap-req.c61 usage (int ret) argument
64 exit (ret);
76 krb5_error_code ret; local
83 ret = krb5_mk_req_exact(context,
90 if (ret)
91 krb5_err(context, 1, ret, "krb5_mk_req_exact");
93 ret = krb5_rd_req(context,
100 if (ret)
101 krb5_err(context, 1, ret, "krb5_rd_req");
112 ret
168 krb5_error_code ret; local
[all...]
/netbsd-current/crypto/external/bsd/heimdal/dist/admin/
H A Dcopy.c54 krb5_error_code ret; local
61 ret = krb5_kt_resolve (context, from, &src_keytab);
62 if (ret) {
63 krb5_warn (context, ret, "resolving src keytab `%s'", from);
67 ret = krb5_kt_resolve (context, to, &dst_keytab);
68 if (ret) {
70 krb5_warn (context, ret, "resolving dst keytab `%s'", to);
74 ret = krb5_kt_start_seq_get (context, src_keytab, &cursor);
75 if (ret) {
76 krb5_warn (context, ret, "krb5_kt_start_seq_ge
[all...]
/netbsd-current/external/bsd/ntp/dist/lib/isc/pthreads/
H A Dthread.c39 int ret; local
45 ret = pthread_attr_getstacksize(&attr, &stacksize);
46 if (ret != 0)
50 ret = pthread_attr_setstacksize(&attr, THREAD_MINSTACKSIZE);
51 if (ret != 0)
57 ret = pthread_attr_setscope(&attr, PTHREAD_SCOPE_SYSTEM);
58 if (ret != 0)
62 ret = pthread_create(thread, &attr, func, arg);
63 if (ret != 0)
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/kadm5/
H A Dget_princs_c.c47 kadm5_ret_t ret; local
53 ret = _kadm5_connect(server_handle);
54 if(ret)
55 return ret;
64 ret = _kadm5_client_send(context, sp);
66 if (ret)
67 return ret;
68 ret = _kadm5_client_recv(context, &reply);
69 if(ret)
70 return ret;
[all...]
H A Dinit_s.c49 kadm5_ret_t ret; local
55 ret = _kadm5_s_init_context(&ctx, realm_params, context);
56 if (ret)
57 return ret;
79 ret = hdb_create(ctx->context, &ctx->db, dbname);
80 if (ret == 0)
81 ret = hdb_set_master_keyfile(ctx->context,
83 if (ret) {
85 return ret;
101 ret
140 kadm5_ret_t ret; local
192 kadm5_ret_t ret; local
244 kadm5_ret_t ret; local
[all...]
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/roken/
H A Dstrptime.c179 int ret = 4; local
182 ret = (ret + (is_leap_year (year) ? 366 : 365)) % 7;
183 return ret;
249 int ret; local
260 ret = match_string (&buf, full_weekdays);
261 if (ret < 0)
263 timeptr->tm_wday = ret;
266 ret = match_string (&buf, abb_weekdays);
267 if (ret <
[all...]
/netbsd-current/external/bsd/libfido2/dist/openbsd-compat/
H A Dbsd-asprintf.c37 int ret; local
46 ret = vsnprintf(string, INIT_SZ, fmt, ap2);
48 if (ret >= 0 && ret < INIT_SZ) { /* succeeded with initial alloc */
50 } else if (ret == INT_MAX || ret < 0) { /* Bad length */
54 len = (size_t)ret + 1;
60 ret = vsnprintf(newstr, len, fmt, ap2);
62 if (ret < 0 || (size_t)ret >
79 int ret; local
[all...]
/netbsd-current/external/mpl/bind/dist/bin/tests/system/ecdsa/
H A Dtests.sh28 ret=0
29 dig_with_opts . @10.53.0.1 soa >dig.out.ns1.test$n || ret=1
30 dig_with_opts . @10.53.0.2 soa >dig.out.ns2.test$n || ret=1
31 $PERL ../digcomp.pl dig.out.ns1.test$n dig.out.ns2.test$n || ret=1
32 grep "flags:.*ad.*QUERY" dig.out.ns2.test$n >/dev/null || ret=1
33 if [ $ret != 0 ]; then echo_i "failed"; fi
34 status=$((status + ret))
42 ret=0
43 dig_with_opts . @10.53.0.1 soa >dig.out.ns1.test$n || ret=1
44 dig_with_opts . @10.53.0.3 soa >dig.out.ns3.test$n || ret
[all...]
/netbsd-current/external/mpl/bind/dist/bin/tests/system/additional/
H A Dtests.sh27 ret=0
28 $DIG $DIGOPTS +rec -t RT rt.rt.example @10.53.0.1 >dig.out.$n || ret=1
29 if [ $ret -eq 1 ]; then
36 ret=0
37 $DIG $DIGOPTS +rec -t RT rt.rt2.example @10.53.0.1 >dig.out.$n || ret=1
38 if [ $ret -eq 1 ]; then
45 ret=0
46 $DIG $DIGOPTS +rec -t NAPTR nap.naptr.example @10.53.0.1 >dig.out.$n || ret=1
47 if [ $ret -eq 1 ]; then
54 ret
[all...]
/netbsd-current/lib/libc/iconv/
H A Diconv.c61 int ret; local
64 ret = _citrus_iconv_open(&handle, _PATH_ICONV, in, out);
65 if (ret) {
66 errno = ret == ENOENT? EINVAL : ret;
90 size_t ret; local
99 (const char **)(void *)in, szin, out, szout, 0, &ret);
102 ret = (size_t)-1;
105 return (ret);
113 size_t ret; local
136 int ret; local
[all...]
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/
H A Dcreds.c45 krb5_error_code ret; local
70 ret = krb5_store_uint32(sp, 0);
71 if (ret) {
73 *minor_status = ret;
77 ret = krb5_cc_get_config(context, handle->ccache, NULL, "start_realm",
79 if (ret == 0) {
93 ret = _krb5_get_krbtgt(context, handle->ccache, start_realm, &creds);
96 if (ret) {
98 *minor_status = ret;
102 ret
184 krb5_error_code ret; local
[all...]
/netbsd-current/external/mpl/bind/dist/bin/tests/system/smartsign/
H A Dtests.sh93 ret=0
94 echo "$pzoneout" | grep 'KSKs: 1 active, 0 stand-by, 0 revoked' >/dev/null || ret=1
95 echo "$pzoneout" | grep 'ZSKs: 1 active, 0 stand-by, 0 revoked' >/dev/null || ret=1
96 echo "$czoneout" | grep 'KSKs: 1 active, 1 stand-by, 1 revoked' >/dev/null || ret=1
97 echo "$czoneout" | grep 'ZSKs: 1 active, 2 stand-by, 0 revoked' >/dev/null || ret=1
98 if [ $ret != 0 ]; then
103 status=$((status + ret))
106 ret=0
110 echo "$pzoneout" | grep 'KSKs: 1 active, 0 stand-by, 0 revoked' >/dev/null || ret=1
111 echo "$pzoneout" | grep 'ZSKs: 1 active, 0 present, 0 revoked' >/dev/null || ret
[all...]
/netbsd-current/external/mpl/bind/dist/bin/tests/system/auth/
H A Dtests.sh26 ret=0
28 $DIG $DIGOPTS @10.53.0.2 soa $zone >dig.out.test$n || ret=1
29 grep "ANSWER: 1," dig.out.test$n >/dev/null || ret=1
31 [ $ret -eq 0 ] && break
34 [ $ret -eq 0 ] || echo_i "failed"
35 status=$((status + ret))
43 ret=0
44 $DIG $DIGOPTS +norec @10.53.0.1 www.example.com >dig.out.test$n || ret=1
45 grep "ANSWER: 1," dig.out.test$n >/dev/null || ret=1
46 grep "flags: qr aa;" dig.out.test$n >/dev/null || ret
[all...]
/netbsd-current/external/mpl/bind/dist/bin/tests/system/mirror/
H A Dtests.sh40 ret=1
60 ret=1
80 ret=0
82 $DIG $DIGOPTS @10.53.0.3 +norec verify-unsigned SOA >dig.out.ns3.test$n 2>&1 || ret=1
83 grep "ANSWER: 0" dig.out.ns3.test$n >/dev/null || ret=1
84 grep "${ORIGINAL_SERIAL}.*; serial" dig.out.ns3.test$n >/dev/null && ret=1
85 nextpartpeek ns3/named.run | grep "verify-unsigned.*Zone contains no DNSSEC keys" >/dev/null || ret=1
86 nextpartpeek ns3/named.run | grep "verify-unsigned.*mirror zone is now in use" >/dev/null && ret=1
87 if [ $ret != 0 ]; then echo_i "failed"; fi
88 status=$((status + ret))
[all...]
/netbsd-current/crypto/external/bsd/heimdal/dist/kcm/
H A Dclient.c47 krb5_error_code ret; local
50 ret = kcm_ccache_resolve(context, name, ccache);
51 if (ret) {
52 estr = krb5_get_error_message(context, ret);
55 return ret;
58 ret = kcm_access(context, client, opcode, *ccache);
59 if (ret) {
60 ret = KRB5_FCC_NOFILE; /* don't disclose */
64 return ret;
72 krb5_error_code ret; local
99 krb5_error_code ret; local
[all...]

Completed in 343 milliseconds

1234567891011>>