Lines Matching refs:retval

814     krb5_error_code retval;
839 retval = (ap->get_edata)(kdc_context, request, client, server,
841 if (retval) {
855 retval = encode_krb5_padata_sequence((krb5_pa_data * const *) pa_data,
857 if (retval)
929 krb5_error_code retval = 0;
964 retval = pa_sys->verify_padata(context, client, req_pkt, request,
968 if (retval) {
969 emsg = krb5_get_error_message (context, retval);
984 use_saved_retval = 0; /* Make sure we use the current retval */
999 saved_retval = retval;
1046 retval = saved_retval;
1059 emsg = krb5_get_error_message(context, retval);
1066 switch(retval) {
1090 return retval;
1106 krb5_error_code retval;
1135 retval = krb5_copy_keyblock_contents(context, encrypting_key,
1137 if (retval) {
1140 return retval;
1174 if ((retval = ap->return_padata(context, pa, client, req_pkt, request, reply,
1186 retval = 0;
1201 return (retval);
1247 krb5_error_code retval;
1263 if ((retval = decode_krb5_enc_data(&scratch, &enc_data)) != 0)
1273 if ((retval = krb5_dbe_search_enctype(context, client,
1278 if ((retval = krb5_dbekd_decrypt_key_data(context, &master_keyblock,
1284 retval = krb5_c_decrypt(context, &key, KRB5_KEYUSAGE_AS_REQ_PA_ENC_TS,
1287 if (retval == 0)
1290 decrypt_err = retval;
1293 if ((retval = decode_krb5_pa_enc_ts(&enc_ts_data, &pa_enc)) != 0)
1296 if ((retval = krb5_timeofday(context, &timenow)) != 0)
1300 retval = KRB5KRB_AP_ERR_SKEW;
1306 retval = 0;
1322 if (retval == KRB5_KDB_NO_MATCHING_KEY && decrypt_err != 0)
1323 retval = decrypt_err;
1324 return retval;
1335 krb5_error_code retval;
1348 retval = get_salt_from_key(context, request->client,
1350 if (retval)
1360 retval = ENOMEM;
1387 return retval;
1402 krb5_error_code retval;
1415 retval = krb5_dbe_search_enctype(context, client, &start, -1,
1417 if (retval == KRB5_KDB_NO_MATCHING_KEY)
1419 if (retval)
1428 if ((retval = _make_etype_info_entry(context, request, client_key,
1453 if ((retval = _make_etype_info_entry(context, request,
1464 retval = encode_krb5_etype_info2((krb5_etype_info_entry * const*) entry,
1466 else retval = encode_krb5_etype_info((krb5_etype_info_entry * const*) entry,
1468 if (retval)
1474 retval = 0;
1479 return retval;
1519 krb5_error_code retval;
1547 retval = ENOMEM;
1552 retval = _make_etype_info_entry(context, request,
1555 if (retval)
1559 retval = encode_krb5_etype_info2((krb5_etype_info_entry * const*) entry, &scratch);
1561 retval = encode_krb5_etype_info((krb5_etype_info_entry * const*) entry, &scratch);
1563 if (retval)
1577 if (retval) {
1583 return retval;
1628 krb5_error_code retval;
1654 if ((retval = krb5_principal2salt_norealm(kdc_context,
1670 retval = ENOMEM;
1680 retval = ENOMEM;
1689 retval = ENOMEM;
1706 return retval;
1718 krb5_error_code retval;
1738 if ((retval = decode_krb5_sam_response(&scratch, &sr))) {
1739 com_err("krb5kdc", retval,
1752 retval = ENOMEM;
1756 if ((retval = krb5_c_decrypt(context, &psr_key, /* XXX */ 0, 0,
1758 com_err("krb5kdc", retval,
1765 if ((retval = decode_krb5_predicted_sam_response(&scratch, &psr))) {
1766 com_err("krb5kdc", retval,
1775 com_err("krb5kdc", retval = KRB5KDC_ERR_PREAUTH_FAILED,
1828 com_err("krb5kdc", retval = KRB5KDC_ERR_PREAUTH_FAILED,
1840 return retval;
1861 krb5_error_code retval;
1897 retval = krb5_copy_principal(kdc_context, request->client, &newp);
1898 if (retval) {
1900 retval,
1902 return retval;
1915 retval = krb5_db_get_principal(kdc_context, newp, &assoc, &npr, (uint *)&more);
1916 if(!retval && npr) {
1933 retval = krb5_dbe_find_enctype(kdc_context, &assoc,
1938 if (retval) {
1942 retval,
1946 return retval;
1949 retval = krb5_dbekd_decrypt_key_data(kdc_context,
1953 if (retval) {
1955 retval,
1957 return retval;
1970 if ((retval = krb5_copy_principal(context, request->client, &psr.client)))
1971 return retval;
1973 if ((retval = krb5_us_timeofday(context, &psr.stime, &psr.susec)))
1974 return retval;
1996 if ((retval = krb5_c_string_to_key(context, type, &sc.sam_challenge,
2000 if ((retval = encode_krb5_predicted_sam_response(&psr, &scratch)))
2007 if ((retval = krb5_c_encrypt_length(context,
2013 retval = ENOMEM;
2018 if ((retval = krb5_c_encrypt(context, &psr_key,
2041 retval = krb5_calculate_checksum(context, CKSUMTYPE_RSA_MD5_DES,
2047 if (retval) { free(sc.sam_cksum.contents); return(retval); }
2050 retval = encode_krb5_sam_challenge(&sc, &scratch);
2051 if (retval) goto cleanup;
2057 retval = 0;
2077 retval = krb5_c_make_random_key(kdc_context, ENCTYPE_DES_CBC_CRC,
2080 if (retval) {
2083 retval,
2085 return retval;
2090 retval = KRB5KDC_ERR_ETYPE_NOSUPP,
2092 retval = KRB5KDC_ERR_ETYPE_NOSUPP,
2094 return retval;
2102 /* retval = krb5_finish_key(kdc_context, &eblock); */
2109 if (retval) {
2111 retval,
2128 if ((retval = krb5_c_encrypt(kdc_context, &encrypting_key,
2131 retval,
2133 return retval;
2170 retval = krb5_c_string_to_key(context, ENCTYPE_DES_CBC_MD5,
2173 if (retval) goto cleanup;
2175 retval = encode_krb5_predicted_sam_response(&psr, &scratch);
2176 if (retval) goto cleanup;
2182 if ((retval = krb5_c_encrypt_length(context,
2188 retval = ENOMEM;
2193 if ((retval = krb5_c_encrypt(context, &psr_key,
2199 if (retval) goto cleanup;
2217 retval = krb5_calculate_checksum(context, CKSUMTYPE_RSA_MD5_DES,
2223 if (retval) { free(sc.sam_cksum.contents); return(retval); }
2226 retval = encode_krb5_sam_challenge(&sc, &scratch);
2227 if (retval) goto cleanup;
2233 retval = 0;
2239 return retval;
2253 krb5_error_code retval;
2264 if ((retval = decode_krb5_sam_response(&scratch, &sr))) {
2266 com_err("krb5kdc", retval, gettext("decode_krb5_sam_response failed"));
2280 retval = ENOMEM;
2284 if ((retval = krb5_c_decrypt(context, &psr_key, /* XXX */ 0, 0,
2287 retval,
2293 if ((retval = decode_krb5_predicted_sam_response(&scratch, &psr))) {
2294 com_err(gettext("krb5kdc"), retval,
2300 if ((retval = krb5_unparse_name(context, request->client, &princ_req)))
2302 if ((retval = krb5_unparse_name(context, psr->client, &princ_psr)))
2305 com_err("krb5kdc", retval = KRB5KDC_ERR_PREAUTH_FAILED,
2310 if ((retval = krb5_timeofday(context, &timenow)))
2323 com_err("krb5kdc", retval = KRB5KDC_ERR_PREAUTH_FAILED,
2333 retval = krb5_rc_store(kdc_context, kdc_rcache, &rep);
2334 if (retval) {
2335 com_err("krb5kdc", retval, gettext("SAM psr replay attack!"));
2346 retval = ENOMEM;
2350 if ((retval = krb5_c_decrypt(context, &psr->sam_key, /* XXX */ 0,
2352 com_err("krb5kdc", retval, gettext("decrypt nonce_or_ts failed"));
2357 if ((retval = decode_krb5_enc_sam_response_enc(&scratch, &esre))) {
2358 com_err("krb5kdc", retval, gettext("decode_krb5_enc_sam_response_enc failed"));
2363 retval = KRB5KDC_ERR_PREAUTH_FAILED;
2368 retval = KRB5KRB_AP_ERR_SKEW;
2375 if (retval) com_err(gettext("krb5kdc"),
2376 retval,
2385 return retval;