Lines Matching refs:ret
142 int ret;
145 ret = mbedtls_entropy_func(data, output, len);
148 return ret;
342 int ret = -1;
357 ret = mbedtls_ctr_drbg_seed(&backend->ctr_drbg, entropy_func_mutex,
359 if(ret) {
360 mbedtls_strerror(ret, errorbuf, sizeof(errorbuf));
362 -ret, errorbuf);
369 ret = mbedtls_ctr_drbg_seed(&backend->ctr_drbg, mbedtls_entropy_func,
371 if(ret) {
372 mbedtls_strerror(ret, errorbuf, sizeof(errorbuf));
374 -ret, errorbuf);
390 ret = mbedtls_x509_crt_parse(&backend->cacert, newblob,
393 if(ret<0) {
394 mbedtls_strerror(ret, errorbuf, sizeof(errorbuf));
396 -ret, errorbuf);
403 ret = mbedtls_x509_crt_parse_file(&backend->cacert, ssl_cafile);
405 if(ret<0) {
406 mbedtls_strerror(ret, errorbuf, sizeof(errorbuf));
408 ssl_cafile, -ret, errorbuf);
419 ret = mbedtls_x509_crt_parse_path(&backend->cacert, ssl_capath);
421 if(ret<0) {
422 mbedtls_strerror(ret, errorbuf, sizeof(errorbuf));
424 ssl_capath, -ret, errorbuf);
440 ret = mbedtls_x509_crt_parse_file(&backend->clicert, ssl_cert);
442 if(ret) {
443 mbedtls_strerror(ret, errorbuf, sizeof(errorbuf));
445 ssl_cert, -ret, errorbuf);
463 ret = mbedtls_x509_crt_parse(&backend->clicert, newblob,
467 if(ret) {
468 mbedtls_strerror(ret, errorbuf, sizeof(errorbuf));
470 ssl_config->key, -ret, errorbuf);
482 ret = mbedtls_pk_parse_keyfile(&backend->pk, ssl_config->key,
487 ret = mbedtls_pk_parse_keyfile(&backend->pk, ssl_config->key,
491 if(ret) {
492 mbedtls_strerror(ret, errorbuf, sizeof(errorbuf));
494 ssl_config->key, -ret, errorbuf);
508 ret = mbedtls_pk_parse_key(&backend->pk, key_data, ssl_key_blob->len,
514 ret = mbedtls_pk_parse_key(&backend->pk, key_data, ssl_key_blob->len,
519 if(ret) {
520 mbedtls_strerror(ret, errorbuf, sizeof(errorbuf));
522 -ret, errorbuf);
527 if(ret == 0 && !(mbedtls_pk_can_do(&backend->pk, MBEDTLS_PK_RSA) ||
529 ret = MBEDTLS_ERR_PK_TYPE_MISMATCH;
538 ret = mbedtls_x509_crl_parse_file(&backend->crl, ssl_crlfile);
540 if(ret) {
541 mbedtls_strerror(ret, errorbuf, sizeof(errorbuf));
543 ssl_crlfile, -ret, errorbuf);
562 ret = mbedtls_ssl_config_defaults(&backend->config,
566 if(ret) {
633 ret = mbedtls_ssl_set_session(&backend->ssl, old_session);
634 if(ret) {
636 failf(data, "mbedtls_ssl_set_session returned -0x%x", -ret);
700 ret = (*data->set.ssl.fsslctx)(data, &backend->config,
702 if(ret) {
704 return ret;
716 int ret;
728 ret = mbedtls_ssl_handshake(&backend->ssl);
730 if(ret == MBEDTLS_ERR_SSL_WANT_READ) {
734 else if(ret == MBEDTLS_ERR_SSL_WANT_WRITE) {
738 else if(ret) {
740 mbedtls_strerror(ret, errorbuf, sizeof(errorbuf));
742 -ret, errorbuf);
749 ret = mbedtls_ssl_get_verify_result(&backend->ssl);
753 ret &= ~MBEDTLS_X509_BADCERT_CN_MISMATCH;
755 if(ret && conn_config->verifypeer) {
756 if(ret & MBEDTLS_X509_BADCERT_EXPIRED)
759 else if(ret & MBEDTLS_X509_BADCERT_REVOKED)
762 else if(ret & MBEDTLS_X509_BADCERT_CN_MISMATCH)
765 else if(ret & MBEDTLS_X509_BADCERT_NOT_TRUSTED)
768 else if(ret & MBEDTLS_X509_BADCERT_FUTURE)
890 int ret;
901 ret = mbedtls_ssl_get_session(&backend->ssl, our_ssl_sessionid);
902 if(ret) {
903 if(ret != MBEDTLS_ERR_SSL_ALLOC_FAILED)
906 failf(data, "mbedtls_ssl_get_session returned -0x%x", -ret);
940 int ret = -1;
944 ret = mbedtls_ssl_write(&backend->ssl, (unsigned char *)mem, len);
946 if(ret < 0) {
947 *curlcode = (ret == MBEDTLS_ERR_SSL_WANT_WRITE) ?
949 ret = -1;
952 return ret;
995 int ret = -1;
1001 ret = mbedtls_ssl_read(&backend->ssl, (unsigned char *)buf,
1004 if(ret <= 0) {
1005 if(ret == MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY)
1008 *curlcode = (ret == MBEDTLS_ERR_SSL_WANT_READ) ?
1013 len = ret;
1040 int ret = -1;
1047 ret = mbedtls_ctr_drbg_seed(&ctr_drbg, mbedtls_entropy_func,
1050 if(ret) {
1051 mbedtls_strerror(ret, errorbuf, sizeof(errorbuf));
1053 -ret, errorbuf);
1056 ret = mbedtls_ctr_drbg_random(&ctr_drbg, entropy, length);
1058 if(ret) {
1059 mbedtls_strerror(ret, errorbuf, sizeof(errorbuf));
1061 -ret, errorbuf);
1068 return ret == 0 ? CURLE_OK : CURLE_FAILED_INIT;