| /freebsd/crypto/krb5/src/lib/krad/ |
| H A D | t_client.c | 70 noerror(krb5_init_context(&kctx)); in main() 73 noerror(krad_client_new(kctx, vctx, &rc)); in main() 76 noerror(krad_attrset_new(kctx, &attrs)); in main() 77 noerror(krad_attrset_add(attrs, KRAD_ATTR_USER_NAME, &tmp)); in main() 81 noerror(krad_attrset_add(attrs, KRAD_ATTR_USER_PASSWORD, &tmp)); in main() 82 noerror(krad_client_send(rc, KRAD_CODE_ACCESS_REQUEST, attrs, "localhost", in main() 89 noerror(krad_attrset_add(attrs, KRAD_ATTR_USER_PASSWORD, &tmp)); in main() 90 noerror(krad_client_send(rc, KRAD_CODE_ACCESS_REQUEST, attrs, "localhost", in main() 96 noerror(krad_client_send(rc, KRAD_CODE_ACCESS_REQUEST, attrs, "localhost", in main() 101 noerror(krad_client_send(rc, KRAD_CODE_ACCESS_REQUEST, attrs, "localhost", in main()
|
| H A D | t_remote.c | 67 noerror(gai_error_code(getaddrinfo("127.0.0.1", "radius", &hints, &ai))); in remote_new() 69 noerror(kr_remote_new(kctx, vctx, ai, "foo", remote)); in remote_new() 101 noerror(do_auth("accept", &pkt)); in test_timeout() 117 noerror(krb5_init_context(&kctx)); in main() 123 noerror(krad_attrset_new(kctx, &set)); in main() 125 noerror(krad_attrset_add(set, KRAD_ATTR_USER_NAME, &tmp)); in main() 128 noerror(do_auth("accept", NULL)); in main() 132 noerror(do_auth("reject", NULL)); in main() 142 noerror(do_auth("accept", NULL)); in main() 146 noerror(do_auth("accept", NULL)); in main()
|
| H A D | t_attrset.c | 53 noerror(krb5_init_context(&ctx)); in main() 54 noerror(krad_attrset_new(ctx, &set)); in main() 58 noerror(krad_attrset_add(set, KRAD_ATTR_USER_NAME, &tmp)); in main() 62 noerror(krad_attrset_add(set, KRAD_ATTR_USER_PASSWORD, &tmp)); in main() 65 noerror(kr_attrset_encode(set, "foo", auth, FALSE, buffer, &encode_len)); in main() 86 noerror(kr_attrset_decode(ctx, &tmp, "foo", auth, &set)); in main()
|
| H A D | t_packet.c | 184 noerror(krb5_init_context(&ctx)); in main() 187 noerror(make_packet(ctx, &username, &password, &packets[ACCEPT_PACKET])); in main() 189 noerror(krad_packet_decode_request(ctx, "foo", encpkt, NULL, NULL, in main() 194 noerror(make_packet(ctx, &username, &password, &packets[REJECT_PACKET])); in main() 196 noerror(krad_packet_decode_request(ctx, "foo", encpkt, NULL, NULL, in main() 203 noerror(gai_error_code(getaddrinfo("127.0.0.1", "radius", &hints, &ai))); in main() 205 noerror(do_auth(ctx, ai, "foo", packets[ACCEPT_PACKET], &auth)); in main() 208 noerror(do_auth(ctx, ai, "foo", packets[REJECT_PACKET], &auth)); in main()
|
| H A D | t_attr.c | 54 noerror(krb5_init_context(&ctx)); in main() 66 noerror(kr_attr_decode(ctx, secret, auth, KRAD_ATTR_USER_PASSWORD, in main()
|
| H A D | t_test.h | 43 #define noerror(x) noerror_impl(__FILE__, __LINE__, #x, x) macro
|
| /freebsd/contrib/lib9p/pytest/ |
| H A D | sequencer.py | 97 def unpack(self, vdict, cdict, bstring, offset, noerror=False): argument 234 def _unpack1(self, via, bstring, offset, noerror): argument 240 if noerror: 250 def unpack(self, vdict, cdict, bstring, offset, noerror=False): argument 253 return self._unpack1(self.struct, bstring, offset, noerror) 255 noerror) 260 if noerror: 353 def unpack(self, vdict, cdict, bstring, offset, noerror=False): argument 361 offset = self.sequence.unpack_from(obj, cdict, bstring, offset, noerror) 442 def unpack(self, vdict, cdict, bstring, offset, noerror=False): argument [all …]
|
| H A D | protocol.py | 708 def unpack_header(bstring, noerror=False): argument 721 _9p_data.header_unpack_seq.unpack(vdict, None, bstring, noerror) 724 def unpack(self, bstring, noerror=False): argument 726 vdict = self.unpack_header(bstring, noerror) 753 seq.unpack(vdict, self.conditions, data, noerror) 764 def unpack_wirestat(self, bstring, offset, noerror=False): argument 772 offset, noerror) 783 0, noerror) 795 def unpack_dirent(self, bstring, offset, noerror=False): argument 802 offset, noerror)
|
| H A D | p9conn.py | 604 resp = self.proto.unpack(pkt, noerror=True) 606 header = self.proto.unpack_header(pkt, noerror=True) 1143 def decode_stat_objects(self, bstring, noerror=False): argument 1154 obj, offset = self.proto.unpack_wirestat(bstring, offset, noerror) 1158 def decode_readdir_dirents(self, bstring, noerror=False): argument 1168 obj, offset = self.proto.unpack_dirent(bstring, offset, noerror)
|
| /freebsd/sys/cam/ata/ |
| H A D | ata_xpt.c | 779 goto noerror; in aprobedone() 788 goto noerror; in aprobedone() 798 goto noerror; in aprobedone() 806 goto noerror; in aprobedone() 837 noerror: in aprobedone()
|
| /freebsd/contrib/tcsh/ |
| H A D | complete.tcsh | 223 lcase notrunc ucase swab noerror sync)"/,\ 225 lcase notrunc ucase swab noerror sync)"/,\
|
| /freebsd/contrib/unbound/doc/ |
| H A D | Changelog | 1361 - Fix #946: Forwarder returns servfail on upstream response noerror no 1673 This turns completely empty responses, a type of noerror/nodata into 11486 - hardening, if error reply with rcode=0 (noerror) send servfail. 11863 - nsec3 support for cname chain ending in noerror or nodata.
|