Lines Matching refs:ret
56 int ret;
66 ret = PTR_ERR(ci);
86 ret = -EKEYREJECTED;
91 ret = 0;
93 _leave(" = %d", ret);
94 return ret;
286 int ret;
297 ret = key_validate(call->conn->params.key);
298 if (ret < 0)
299 return ret;
329 ret = 0;
332 ret = rxkad_secure_packet_auth(call, skb, data_size, sechdr,
336 ret = rxkad_secure_packet_encrypt(call, skb, data_size,
340 ret = -EPERM;
344 _leave(" = %d [set %hx]", ret, y);
345 return ret;
362 int ret;
376 ret = skb_to_sgvec(skb, sg, offset, 8);
377 if (unlikely(ret < 0))
378 return ret;
440 int nsg, ret;
464 ret = skb_to_sgvec(skb, sg, offset, len);
465 if (unlikely(ret < 0)) {
468 return ret;
649 int ret;
653 ret = key_validate(conn->server_key);
654 if (ret < 0)
655 return ret;
692 ret = kernel_sendmsg(conn->params.local->socket, &msg, iov, 2, len);
693 if (ret < 0) {
694 trace_rxrpc_tx_fail(conn->debug_id, serial, ret,
719 int ret;
750 ret = kernel_sendmsg(conn->params.local->socket, &msg, iov, 3, len);
751 if (ret < 0) {
752 trace_rxrpc_tx_fail(conn->debug_id, serial, ret,
818 int ret;
828 ret = key_validate(conn->params.key);
829 if (ret < 0)
851 ret = -EACCES;
877 ret = rxkad_encrypt_response(conn, resp, token->kad);
878 if (ret == 0)
879 ret = rxkad_send_response(conn, &sp->hdr, resp, token->kad);
881 return ret;
885 ret = -EPROTO;
888 return ret;
910 int ret;
918 ret = key_validate(conn->server_key);
919 if (ret < 0) {
920 switch (ret) {
935 ret = -ENOMEM;
1017 ret = -EKEYREJECTED;
1023 ret = -EKEYEXPIRED;
1041 ret = -EPROTO;
1044 return ret;
1046 return ret;
1098 int ret, i;
1102 ret = -ENOMEM;
1137 ret = -ENOMEM;
1148 ret = rxkad_decrypt_ticket(conn, skb, ticket, ticket_len, &session_key,
1150 if (ret < 0)
1212 ret = rxrpc_get_server_data_key(conn, &session_key, expiry, kvno);
1213 if (ret < 0)
1240 return ret;