Lines Matching refs:result
307 CURLcode io_result; /* result of last BIO cfilter operation */
419 CURLcode result;
434 result = Curl_ssl_init_certinfo(data, (int)numcerts);
435 if(result) {
436 return result;
733 CURLcode result = CURLE_SEND_ERROR;
736 nwritten = Curl_conn_cf_send(cf->next, data, buf, blen, &result);
738 blen, (int)nwritten, result);
740 backend->io_result = result;
742 if(CURLE_AGAIN == result)
756 CURLcode result = CURLE_RECV_ERROR;
763 nread = Curl_conn_cf_recv(cf->next, data, buf, blen, &result);
765 blen, (int)nread, result);
767 backend->io_result = result;
769 if(CURLE_AGAIN == result)
776 result = Curl_ssl_setup_x509_store(cf, data, backend->ctx);
777 if(result) {
778 backend->io_result = result;
2145 CURLcode result = CURLE_OK;
2248 result = CURLE_PEER_FAILED_VERIFICATION;
2287 result = CURLE_OUT_OF_MEMORY;
2297 result = CURLE_PEER_FAILED_VERIFICATION;
2302 if(result)
2308 result = CURLE_PEER_FAILED_VERIFICATION;
2314 result = CURLE_PEER_FAILED_VERIFICATION;
2323 return result;
2339 CURLcode result = CURLE_OK;
2359 result = CURLE_SSL_INVALIDCERTSTATUS;
2366 result = CURLE_SSL_INVALIDCERTSTATUS;
2374 result = CURLE_SSL_INVALIDCERTSTATUS;
2381 result = CURLE_SSL_INVALIDCERTSTATUS;
2388 result = CURLE_SSL_INVALIDCERTSTATUS;
2413 result = CURLE_SSL_INVALIDCERTSTATUS;
2423 result = CURLE_SSL_INVALIDCERTSTATUS;
2431 result = CURLE_SSL_INVALIDCERTSTATUS;
2446 result = CURLE_SSL_INVALIDCERTSTATUS;
2456 result = CURLE_SSL_INVALIDCERTSTATUS;
2463 result = CURLE_SSL_INVALIDCERTSTATUS;
2475 result = CURLE_SSL_INVALIDCERTSTATUS;
2482 result = CURLE_SSL_INVALIDCERTSTATUS;
2491 return result;
3023 CURLcode result = CURLE_OK;
3039 skipped. 'result' is used to store only hard-fail conditions (such
3041 result = CURLE_OK;
3096 result = CURLE_OUT_OF_MEMORY;
3154 if(result)
3155 return result;
3158 return result;
3168 CURLcode result = CURLE_OK;
3200 result = import_windows_cert_store(data, storeNames[i], store,
3202 if(result)
3203 return result;
3215 result = load_cacert_from_memory(store, ca_info_blob);
3216 if(result) {
3218 return result;
3321 return result;
3416 CURLcode result = CURLE_OK;
3437 result = populate_x509_store(cf, data, store);
3438 if(result == CURLE_OK && cache_criteria_met) {
3443 return result;
3459 CURLcode result = CURLE_OK;
3481 result = ossl_seed(data);
3482 if(result)
3483 return result;
3616 result = ossl_set_ssl_version_min_max(cf, backend->ctx);
3618 result = ossl_set_ssl_version_min_max_legacy(&ctx_options, cf, data);
3620 if(result != CURLE_OK)
3621 return result;
3635 result = Curl_alpn_to_proto_buf(&proto, connssl->alpn);
3636 if(result ||
3647 if(!result &&
3652 result = CURLE_SSL_CERTPROBLEM;
3653 if(result)
3655 return result;
3726 * anyway. In the latter case the result of the verification is checked with
3753 result = Curl_ssl_setup_x509_store(cf, data, backend->ctx);
3754 if(result)
3755 return result;
3759 result = (*data->set.ssl.fsslctx)(data, backend->ctx,
3762 if(result) {
3764 return result;
3868 CURLcode result = Curl_ssl_setup_x509_store(cf, data, backend->ctx);
3869 if(result)
3870 return result;
3916 CURLcode result;
3935 result = CURLE_PEER_FAILED_VERIFICATION;
3956 result = CURLE_SSL_CLIENTCERT;
3961 result = CURLE_SSL_CONNECT_ERROR;
3971 if(CURLE_SSL_CONNECT_ERROR == result && errdetail == 0) {
3980 return result;
3986 return result;
4042 CURLcode result = CURLE_SSL_PINNEDPUBKEYNOTMATCH;
4049 return result;
4079 result = Curl_pin_peer_pubkey(data, pinnedpubkey, buff1, len1);
4085 return result;
4173 CURLcode result = CURLE_OK;
4235 result = Curl_ossl_verifyhost(data, conn, &connssl->peer,
4237 if(result) {
4240 return result;
4249 result = CURLE_PEER_FAILED_VERIFICATION;
4333 failf(data, "SSL certificate verify result: %s (%ld)",
4335 result = CURLE_PEER_FAILED_VERIFICATION;
4338 infof(data, " SSL certificate verify result: %s (%ld),"
4352 result = verifystatus(cf, data);
4353 if(result) {
4370 return result;
4377 result = CURLE_OK;
4382 if(!result && ptr) {
4383 result = ossl_pkp_pin_peer_pubkey(data, backend->server_cert, ptr);
4384 if(result)
4392 return result;
4398 CURLcode result = CURLE_OK;
4411 result = servercert(cf, data, conn_config->verifypeer ||
4414 if(!result)
4417 return result;
4425 CURLcode result = CURLE_OK;
4446 result = ossl_connect_step1(cf, data);
4447 if(result)
4461 result = CURLE_OPERATION_TIMEDOUT;
4480 result = CURLE_SSL_CONNECT_ERROR;
4486 result = CURLE_OPERATION_TIMEDOUT;
4498 result = ossl_connect_step2(cf, data);
4499 if(result || (nonblocking &&
4508 result = ossl_connect_step3(cf, data);
4509 if(result)
4524 return result;
4537 CURLcode result;
4540 result = ossl_connect_common(cf, data, FALSE, &done);
4541 if(result)
4542 return result;