Lines Matching defs:ret
329 krb5_error_code ret = 0;
344 ret = decode_krb5_enc_data( &scratch, &enc);
345 if (ret)
347 scratch.data = k5alloc(enc->ciphertext.length, &ret);
348 if (ret)
351 ret = krb5_c_decrypt(context, as_key, KRB5_KEYUSAGE_PA_PKINIT_KX,
353 if (ret) {
357 ret = decode_krb5_encryption_key( &scratch, &kdc_key);
360 if (ret)
362 ret = krb5_c_fx_cf2_simple(context, kdc_key, "PKINIT",
364 if (ret)
377 return ret;
379 ret = KRB5_KDCREP_MODIFIED;
380 krb5_set_error_message(context, ret, "Reply has wrong form of session key "
1005 krb5_error_code ret;
1016 ret = krb5int_libdefault_string(context, realm, KRB5_CONF_PREFERRED_PREAUTH_TYPES,
1018 if ((ret != 0) || (preauth_types == NULL)) {
1077 krb5_error_code ret;
1086 if ((ret = krb5_parse_name(context, in_tkt_service, server)))
1087 return ret;
1105 ret = krb5_build_principal_ext(context, server,
1114 return ret;
1249 krb5_error *ret = NULL;
1256 ret = k5alloc(sizeof(*ret), &code);
1260 ret->magic = KV5M_ERROR;
1261 ret->ctime = ctx->err_reply->ctime;
1262 ret->cusec = ctx->err_reply->cusec;
1263 ret->susec = ctx->err_reply->susec;
1264 ret->stime = ctx->err_reply->stime;
1265 ret->error = ctx->err_reply->error;
1269 &ret->client);
1274 code = krb5_copy_principal(context, ctx->err_reply->server, &ret->server);
1279 &ret->text);
1284 &ret->e_data);
1288 *error = ret;
1292 krb5_free_error(context, ret);