Lines Matching refs:ret

138    int ret;
140 ret = cmp_gss_names(n1, n2);
142 return ret;
503 static generic_ret ret;
515 xdr_free(xdr_generic_ret, (char *) &ret);
517 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle)))
518 return &ret;
520 if ((ret.code = check_handle((void *)handle)))
522 ret.api_version = handle->api_version;
525 ret.code = KADM5_FAILURE;
529 ret.code = KADM5_BAD_PRINCIPAL;
533 ret.code = KADM5_FAILURE;
549 ret.code = KADM5_AUTH_ADD;
557 ret.code = kadm5_create_principal((void *)handle,
561 if( ret.code != 0 )
562 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
566 prime_arg, client_name, ret.code);
574 if (policy_migrate && (ret.code == 0)) {
604 return (&ret);
610 static generic_ret ret;
622 xdr_free(xdr_generic_ret, (char *) &ret);
624 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle)))
625 return &ret;
627 if ((ret.code = check_handle((void *)handle)))
629 ret.api_version = handle->api_version;
632 ret.code = KADM5_FAILURE;
636 ret.code = KADM5_BAD_PRINCIPAL;
640 ret.code = KADM5_FAILURE;
656 ret.code = KADM5_AUTH_ADD;
660 ret.code = kadm5_create_principal_3((void *)handle,
666 if( ret.code != 0 )
667 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
676 if (policy_migrate && (ret.code == 0)) {
705 return &ret;
711 static generic_ret ret;
721 xdr_free(xdr_generic_ret, (char *) &ret);
723 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle)))
724 return &ret;
726 if ((ret.code = check_handle((void *)handle)))
728 ret.api_version = handle->api_version;
731 ret.code = KADM5_FAILURE;
735 ret.code = KADM5_BAD_PRINCIPAL;
739 ret.code = KADM5_FAILURE;
746 ret.code = KADM5_AUTH_DELETE;
754 ret.code = kadm5_delete_principal((void *)handle, arg->princ);
756 if( ret.code != 0 )
757 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
761 prime_arg, client_name, ret.code);
781 return &ret;
787 static generic_ret ret;
796 xdr_free(xdr_generic_ret, (char *) &ret);
798 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle)))
799 return &ret;
801 if ((ret.code = check_handle((void *)handle)))
804 ret.code = KADM5_FAILURE;
808 ret.code = KADM5_BAD_PRINCIPAL;
812 ret.code = KADM5_FAILURE;
821 ret.code = KADM5_AUTH_MODIFY;
829 ret.code = kadm5_modify_principal((void *)handle, &arg->rec,
832 if( ret.code != 0 )
833 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
837 prime_arg, client_name, ret.code);
856 return &ret;
862 static generic_ret ret;
874 xdr_free(xdr_generic_ret, (char *) &ret);
876 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle)))
877 return &ret;
879 if ((ret.code = check_handle((void *)handle)))
882 ret.code = KADM5_FAILURE;
887 ret.code = KADM5_BAD_PRINCIPAL;
902 ret.code = KADM5_OK;
905 ret.code = KADM5_FAILURE;
912 ret.code = KADM5_AUTH_DELETE;
916 if (ret.code == KADM5_AUTH_DELETE)
917 ret.code = KADM5_AUTH_INSUFFICIENT;
919 ret.code = KADM5_AUTH_ADD;
922 ret.code = KADM5_AUTH_INSUFFICIENT;
923 if (ret.code != KADM5_OK) {
938 ret.code = kadm5_rename_principal((void *)handle, arg->src,
941 if( ret.code != 0 )
942 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
946 prime_arg, client_name, ret.code);
974 return &ret;
980 static gprinc_ret ret;
989 xdr_free(xdr_gprinc_ret, (char *) &ret);
991 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle)))
992 return &ret;
994 if ((ret.code = check_handle((void *)handle)))
996 ret.api_version = handle->api_version;
1002 ret.code = KADM5_FAILURE;
1006 ret.code = KADM5_BAD_PRINCIPAL;
1010 ret.code = KADM5_FAILURE;
1020 ret.code = KADM5_AUTH_GET;
1029 ret.code = kadm5_get_principal_v1((void *)handle,
1031 if(ret.code == KADM5_OK) {
1032 memcpy(&ret.rec, e, sizeof(kadm5_principal_ent_rec_v1));
1036 ret.code = kadm5_get_principal((void *)handle,
1037 arg->princ, &ret.rec,
1042 if( ret.code != 0 )
1043 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
1047 prime_arg, client_name, ret.code);
1065 return &ret;
1071 static gprincs_ret ret;
1079 xdr_free(xdr_gprincs_ret, (char *) &ret);
1081 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle)))
1082 return &ret;
1084 if ((ret.code = check_handle((void *)handle)))
1086 ret.api_version = handle->api_version;
1089 ret.code = KADM5_FAILURE;
1097 ret.code = KADM5_FAILURE;
1106 ret.code = KADM5_AUTH_LIST;
1114 ret.code = kadm5_get_principals((void *)handle,
1115 arg->exp, &ret.princs,
1116 &ret.count);
1118 if( ret.code != 0 )
1119 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
1123 prime_arg, client_name, ret.code);
1140 return (&ret);
1146 static generic_ret ret;
1154 xdr_free(xdr_generic_ret, (char *) &ret);
1156 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle)))
1157 return &ret;
1159 if ((ret.code = check_handle((void *)handle)))
1161 ret.api_version = handle->api_version;
1164 ret.code = KADM5_FAILURE;
1168 ret.code = KADM5_BAD_PRINCIPAL;
1172 ret.code = KADM5_FAILURE;
1177 ret.code = chpass_principal_wrapper_3((void *)handle, arg->princ,
1182 ret.code = kadm5_chpass_principal((void *)handle, arg->princ,
1190 ret.code = KADM5_AUTH_CHANGEPW;
1193 if(ret.code != KADM5_AUTH_CHANGEPW) {
1195 if( ret.code != 0 )
1196 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
1200 prime_arg, client_name, ret.code);
1219 return (&ret);
1225 static generic_ret ret;
1234 xdr_free(xdr_generic_ret, (char *) &ret);
1236 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle)))
1237 return &ret;
1239 if ((ret.code = check_handle((void *)handle)))
1241 ret.api_version = handle->api_version;
1244 ret.code = KADM5_FAILURE;
1248 ret.code = KADM5_BAD_PRINCIPAL;
1252 ret.code = KADM5_FAILURE;
1257 ret.code = chpass_principal_wrapper_3((void *)handle, arg->princ,
1265 ret.code = kadm5_chpass_principal_3((void *)handle, arg->princ,
1273 ret.code = KADM5_AUTH_CHANGEPW;
1276 if(ret.code != KADM5_AUTH_CHANGEPW) {
1278 if( ret.code != 0 )
1279 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
1299 return (&ret);
1306 static generic_ret ret;
1315 xdr_free(xdr_generic_ret, (char *) &ret);
1317 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle)))
1318 return &ret;
1320 if ((ret.code = check_handle((void *)handle)))
1322 ret.api_version = handle->api_version;
1325 ret.code = KADM5_FAILURE;
1329 ret.code = KADM5_BAD_PRINCIPAL;
1333 ret.code = KADM5_FAILURE;
1340 ret.code = kadm5_setv4key_principal((void *)handle, arg->princ,
1345 ret.code = KADM5_AUTH_SETKEY;
1348 if(ret.code != KADM5_AUTH_SETKEY) {
1350 if( ret.code != 0 )
1351 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
1371 return (&ret);
1378 static generic_ret ret;
1387 xdr_free(xdr_generic_ret, (char *) &ret);
1389 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle)))
1390 return &ret;
1392 if ((ret.code = check_handle((void *)handle)))
1394 ret.api_version = handle->api_version;
1397 ret.code = KADM5_FAILURE;
1401 ret.code = KADM5_BAD_PRINCIPAL;
1405 ret.code = KADM5_FAILURE;
1411 ret.code = kadm5_setkey_principal((void *)handle, arg->princ,
1416 ret.code = KADM5_AUTH_SETKEY;
1419 if(ret.code != KADM5_AUTH_SETKEY) {
1421 if( ret.code != 0 )
1422 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
1442 return (&ret);
1448 static generic_ret ret;
1457 xdr_free(xdr_generic_ret, (char *) &ret);
1459 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle)))
1460 return &ret;
1462 if ((ret.code = check_handle((void *)handle)))
1464 ret.api_version = handle->api_version;
1467 ret.code = KADM5_FAILURE;
1471 ret.code = KADM5_BAD_PRINCIPAL;
1475 ret.code = KADM5_FAILURE;
1482 ret.code = kadm5_setkey_principal_3((void *)handle, arg->princ,
1490 ret.code = KADM5_AUTH_SETKEY;
1493 if(ret.code != KADM5_AUTH_SETKEY) {
1495 if( ret.code != 0 )
1496 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
1516 return &ret;
1522 static chrand_ret ret;
1532 xdr_free(xdr_chrand_ret, (char *) &ret);
1534 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle)))
1535 return &ret;
1537 if ((ret.code = check_handle((void *)handle)))
1540 ret.api_version = handle->api_version;
1546 ret.code = KADM5_FAILURE;
1550 ret.code = KADM5_BAD_PRINCIPAL;
1554 ret.code = KADM5_FAILURE;
1559 ret.code = randkey_principal_wrapper((void *)handle, arg->princ, &k,
1564 ret.code = kadm5_randkey_principal((void *)handle, arg->princ,
1571 ret.code = KADM5_AUTH_CHANGEPW;
1574 if(ret.code == KADM5_OK) {
1576 krb5_copy_keyblock_contents(handle->context, k, &ret.key);
1579 ret.keys = k;
1580 ret.n_keys = nkeys;
1584 if(ret.code != KADM5_AUTH_CHANGEPW) {
1586 if( ret.code != 0 )
1587 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
1590 funcname, prime_arg, client_name, ret.code);
1608 return &ret;
1614 static chrand_ret ret;
1625 xdr_free(xdr_chrand_ret, (char *) &ret);
1627 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle)))
1628 return &ret;
1630 if ((ret.code = check_handle((void *)handle)))
1632 ret.api_version = handle->api_version;
1638 ret.code = KADM5_FAILURE;
1642 ret.code = KADM5_BAD_PRINCIPAL;
1646 ret.code = KADM5_FAILURE;
1651 ret.code = randkey_principal_wrapper_3((void *)handle, arg->princ,
1659 ret.code = kadm5_randkey_principal_3((void *)handle, arg->princ,
1667 ret.code = KADM5_AUTH_CHANGEPW;
1670 if(ret.code == KADM5_OK) {
1672 krb5_copy_keyblock_contents(handle->context, k, &ret.key);
1675 ret.keys = k;
1676 ret.n_keys = nkeys;
1680 if(ret.code != KADM5_AUTH_CHANGEPW) {
1682 if( ret.code != 0 )
1683 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
1702 return (&ret);
1708 static generic_ret ret;
1716 xdr_free(xdr_generic_ret, (char *) &ret);
1718 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle)))
1719 return &ret;
1721 if ((ret.code = check_handle((void *)handle)))
1724 ret.api_version = handle->api_version;
1727 ret.code = KADM5_FAILURE;
1733 ret.code = KADM5_FAILURE;
1740 ret.code = KADM5_AUTH_ADD;
1749 ret.code = kadm5_create_policy((void *)handle, &arg->rec,
1752 if( ret.code != 0 )
1753 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
1757 prime_arg, client_name, ret.code);
1775 return &ret;
1781 static generic_ret ret;
1789 xdr_free(xdr_generic_ret, (char *) &ret);
1791 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle)))
1792 return &ret;
1794 if ((ret.code = check_handle((void *)handle)))
1796 ret.api_version = handle->api_version;
1799 ret.code = KADM5_FAILURE;
1805 ret.code = KADM5_FAILURE;
1818 ret.code = KADM5_AUTH_DELETE;
1820 ret.code = kadm5_delete_policy((void *)handle, arg->name);
1822 if( ret.code != 0 )
1823 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
1827 prime_arg, client_name, ret.code);
1845 return &ret;
1851 static generic_ret ret;
1859 xdr_free(xdr_generic_ret, (char *) &ret);
1861 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle)))
1862 return &ret;
1864 if ((ret.code = check_handle((void *)handle)))
1866 ret.api_version = handle->api_version;
1869 ret.code = KADM5_FAILURE;
1875 ret.code = KADM5_FAILURE;
1888 ret.code = KADM5_AUTH_MODIFY;
1890 ret.code = kadm5_modify_policy((void *)handle, &arg->rec,
1893 if( ret.code != 0 )
1894 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
1898 prime_arg, client_name, ret.code);
1916 return (&ret);
1922 static gpol_ret ret;
1934 xdr_free(xdr_gpol_ret, (char *) &ret);
1936 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle)))
1937 return &ret;
1939 if ((ret.code = check_handle((void *) handle)))
1942 ret.api_version = handle->api_version;
1948 ret.code = KADM5_FAILURE;
1952 ret.code = KADM5_AUTH_GET;
1955 ret.code = KADM5_FAILURE;
1962 ret.code = KADM5_OK;
1964 ret.code = kadm5_get_principal(handle->lhandle,
1968 if (ret.code == KADM5_OK) {
1971 ret.code = KADM5_OK;
1972 } else ret.code = KADM5_AUTH_GET;
1975 ret.code = ret.code ? ret.code : ret2;
1979 if (ret.code == KADM5_OK) {
1981 ret.code = kadm5_get_policy_v1((void *)handle, arg->name, &e);
1982 if(ret.code == KADM5_OK) {
1983 memcpy(&ret.rec, e, sizeof(kadm5_policy_ent_rec));
1987 ret.code = kadm5_get_policy((void *)handle, arg->name,
1988 &ret.rec);
1992 if( ret.code != 0 )
1993 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
1996 funcname, prime_arg, client_name, ret.code);
2020 return (&ret);
2027 static gpols_ret ret;
2035 xdr_free(xdr_gpols_ret, (char *) &ret);
2037 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle)))
2038 return &ret;
2040 if ((ret.code = check_handle((void *)handle)))
2043 ret.api_version = handle->api_version;
2046 ret.code = KADM5_FAILURE;
2054 ret.code = KADM5_FAILURE;
2061 ret.code = KADM5_AUTH_LIST;
2069 ret.code = kadm5_get_policies((void *)handle,
2070 arg->exp, &ret.pols,
2071 &ret.count);
2073 if( ret.code != 0 )
2074 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
2078 prime_arg, client_name, ret.code);
2095 return (&ret);
2100 static getprivs_ret ret;
2107 xdr_free(xdr_getprivs_ret, (char *) &ret);
2109 if ((ret.code = new_server_handle(*arg, rqstp, &handle)))
2110 return &ret;
2112 if ((ret.code = check_handle((void *)handle)))
2115 ret.api_version = handle->api_version;
2118 ret.code = KADM5_FAILURE;
2122 ret.code = KADM5_FAILURE;
2126 ret.code = __kadm5_get_priv((void *) handle, &ret.privs, name);
2128 if( ret.code != 0 )
2129 errmsg = krb5_get_error_message(handle ? handle->context : NULL, ret.code);
2133 ret.code);
2149 return (&ret);
2154 static generic_ret ret;
2161 xdr_free(xdr_generic_ret, (char *) &ret);
2163 if ((ret.code = new_server_handle(*arg, rqstp, &handle)))
2164 return &ret;
2165 if (! (ret.code = check_handle((void *)handle))) {
2166 ret.api_version = handle->api_version;
2172 ret.code = KADM5_FAILURE;
2173 return &ret;
2177 if (ret.code != 0)
2178 errmsg = krb5_get_error_message(NULL, ret.code);
2181 (ret.api_version == KADM5_API_VERSION_1 ?
2183 NULL, client_name, ret.code);
2191 (ret.api_version == KADM5_API_VERSION_1 ?
2204 return (&ret);