Lines Matching refs:code

80  *   * Redistributions of source code must retain the above copyright notice,
131 krb5_error_code code;
145 code = encode_krb5_ticket(ticket, &data);
146 if (code) {
147 *minor_status = code;
198 * subkey, so this code works fine against a JCSI client.) Up to the
199 * present, though, GSSAPI clients linked against the MIT code (which
205 * unencrypted. (The MIT code doesn't actually send the KRB_CRED
337 krb5_error_code code;
356 code = krb5_timeofday(ctx->k5_context, &now);
357 if (code != 0) {
363 code = 0;
371 code = krb5_rd_rep_dce(ctx->k5_context,
375 if (code != 0) {
383 if ((code = kg_duplicate_name(ctx->k5_context, ctx->there,
407 /* real failure code follows */
412 *minor_status = code;
444 krb5_error_code code;
479 code = krb5int_accessor (&kaccess, KRB5INT_ACCESS_VERSION);
480 if (code) {
481 *minor_status = code;
485 code = krb5_gss_init_context(&context);
486 if (code) {
487 *minor_status = code;
517 code = *minor_status;
524 code = *minor_status;
536 code = 0;
547 if (!(code = g_verify_token_header(gss_mech_krb5,
552 } else if ((code == G_WRONG_MECH)
553 &&!(code = g_verify_token_header((gss_OID) gss_mech_krb5_wrong,
558 } else if ((code == G_WRONG_MECH) &&
559 !(code = g_verify_token_header(gss_mech_krb5_old,
571 } else if (code == G_WRONG_TOKID) {
573 code = KRB5KRB_AP_ERR_MSG_TYPE;
576 } else if (code == G_BAD_TOK_HEADER) {
595 * below in the "handle default cred handle" code block.
598 code = KRB5KRB_AP_ERR_MSG_TYPE;
602 if ((code = decode_krb5_ap_req(&ap_req, &request))) {
603 if (code == KRB5_BADMSGTYPE)
604 code = KRB5KRB_AP_ERR_BADVERSION;
630 if ((code = krb5_copy_principal(context, request->ticket->server,
641 code = G_VALIDATE_FAILED;
645 major_status = krb5_gss_acquire_cred((OM_uint32*) &code,
667 major_status = krb5_gss_validate_cred((OM_uint32*) &code,
685 code = 0;
709 if ((code = krb5_auth_con_init(context, &auth_context))) {
711 save_error_info((OM_uint32)code, context);
721 if ((code = krb5_auth_con_setrcache(context, auth_context, cred->rcache))) {
726 if ((code = krb5_auth_con_setaddrs(context, auth_context, NULL, paddr))) {
733 if ((code = krb5_rd_req(context, &auth_context, &ap_req,
743 if ((code = krb5_rd_req_decoded_ext(context, &auth_context, request, &ap_req,
747 if (code == KRB5KRB_AP_ERR_SKEW) {
748 save_error_info(code, context);
750 if (code == KRB5_KT_KVNONOTFOUND) {
762 code = KRB5KRB_AP_ERR_BADKEYVER;
763 } else if (code == KRB5_KT_NOTFOUND) {
773 code = KRB5KRB_AP_ERR_NOKEY;
775 else if (code == KRB5KRB_AP_WRONG_PRINC) {
777 code = KRB5KRB_AP_ERR_NOT_US;
779 else if (code == KRB5KRB_AP_ERR_REPEAT)
791 code = krb5_auth_con_getauthenticator(context, auth_context, &authdat);
792 if (code) {
802 code = KG_NO_SUBKEY;
810 code = KRB5KRB_AP_ERR_INAPP_CKSUM;
821 code = krb5_auth_con_getkey_k(context, auth_context, &subkey);
822 if (code) {
830 code = krb5_k_verify_checksum(context,
837 if (code || !valid) {
849 code = krb5_c_checksum_length(context, CKSUMTYPE_RSA_MD5, &md5len);
850 if (code) {
866 code = 0;
876 This code will let this acceptor interoperate with an initiator
892 code = KG_BAD_LENGTH;
903 The following section of code attempts to implement the
915 if ((code = kg_checksum_channel_bindings(context,
930 if ((code = kg_checksum_channel_bindings(context,
937 code = 0;
974 code = KG_BAD_LENGTH;
994 code = rd_and_store_for_creds(context, auth_context, &option,
997 if (code) {
1045 code = ENOMEM;
1069 code = G_VALIDATE_FAILED;
1075 if ( (code = krb5_merge_authdata(context,
1082 if ((code = kg_init_name(context, ticket->server, NULL, 0, &ctx->here))) {
1086 if ((code = krb5_auth_con_get_authdata_context(context, auth_context,
1091 if ((code = kg_init_name(context, authdat->client,
1100 if ((code = krb5_auth_con_getrecvsubkey_k(context, auth_context,
1109 if ((code = krb5_auth_con_getkey_k(context, auth_context,
1120 code = KRB5KDC_ERR_NULL_KEY;
1129 code = kg_setup_keys(context, ctx, ctx->subkey, &ctx->cksumtype);
1130 if (code) {
1163 if ((code = krb5_timeofday(context, &now))) {
1169 code = 0;
1200 code = (*kaccess.auth_con_get_subkey_enctype)(context,
1203 if (code != 0) {
1228 code = krb5_auth_con_getflags(context, auth_context, &acflags);
1229 if (code == 0) {
1231 code = krb5_auth_con_setflags(context, auth_context, acflags);
1233 if (code) {
1239 if ((code = krb5_mk_rep(context, auth_context, &ap_rep))) {
1248 /* Get the new acceptor subkey. With the code above, there
1250 code = krb5_auth_con_getsendsubkey_k(context, auth_context,
1252 if (code != 0) {
1258 code = kg_setup_keys(context, ctx, ctx->acceptor_subkey,
1260 if (code) {
1295 code = ENOMEM;
1320 if ((code = krb5_copy_principal(context, ctx->there->princ, &client_name))) {
1324 if ((code = krb5_copy_principal(context, ctx->here->princ, &server_name))) {
1330 if ((code = kg_duplicate_name(context, ctx->there,
1358 code = G_VALIDATE_FAILED;
1401 (major_status == GSS_S_CONTINUE_NEEDED && code != KRB5KRB_AP_ERR_MSG_TYPE)) {
1407 /* from here on is the real "fail" code */
1425 *minor_status = code;
1466 if ((code == KRB5KRB_AP_ERR_BAD_INTEGRITY ||
1467 code == KRB5KRB_AP_ERR_NOKEY || code == KRB5KRB_AP_ERR_BADKEYVER)
1469 code = KRB5KRB_AP_ERR_MODIFIED;
1481 if (code == KRB5KRB_AP_ERR_SKEW && krb5_getenv("MS_INTEROP")) {
1494 code -= ERROR_TABLE_BASE_krb5;
1495 if (code < 0 || code > 128)
1496 code = 60 /* KRB_ERR_GENERIC */;
1498 krb_error_data.error = code;
1503 code = krb5_mk_error(context, &krb_error_data, &scratch);
1504 if (code)
1619 * Solaris kerberos: the original Solaris code returned
1623 * returns. Note the MIT code doesn't return GSS_S_NO_CONTEXT at