Lines Matching defs:ret

179   ssize_t ret = 0;
193 ret = outl;
198 ret = data->pdu_len;
205 ret = MBEDTLS_ERR_SSL_WANT_READ;
209 return ret;
329 get_error_string(int ret) {
331 mbedtls_strerror(ret, buf, sizeof(buf)-1);
473 int ret = mbedtls_x509_crt_verify_info(buf, sizeof(buf), "", *flags);
475 if (ret >= 0) {
486 -ret, get_error_string(ret));
505 int ret;
521 ret = mbedtls_x509_crt_parse_file(public_cert,
523 if (ret < 0) {
525 -ret, get_error_string(ret));
526 return ret;
530 ret = mbedtls_pk_parse_keyfile(private_key,
533 ret = mbedtls_pk_parse_keyfile(private_key,
537 if (ret < 0) {
539 -ret, get_error_string(ret));
540 return ret;
543 ret = mbedtls_ssl_conf_own_cert(&m_env->conf, public_cert, private_key);
544 if (ret < 0) {
546 -ret, get_error_string(ret));
547 return ret;
558 ret = mbedtls_x509_crt_parse_file(cacert,
560 if (ret < 0) {
562 -ret, get_error_string(ret));
563 return ret;
590 ret = mbedtls_x509_crt_parse(public_cert, buffer, length);
593 ret = mbedtls_x509_crt_parse(public_cert,
597 if (ret < 0) {
599 -ret, get_error_string(ret));
600 return ret;
615 ret = mbedtls_pk_parse_key(private_key, buffer, length, NULL, 0);
617 ret = mbedtls_pk_parse_key(private_key, buffer, length,
623 ret = mbedtls_pk_parse_key(private_key,
627 ret = mbedtls_pk_parse_key(private_key,
633 if (ret < 0) {
635 -ret, get_error_string(ret));
636 return ret;
639 ret = mbedtls_ssl_conf_own_cert(&m_env->conf, public_cert, private_key);
640 if (ret < 0) {
642 -ret, get_error_string(ret));
643 return ret;
668 ret = mbedtls_x509_crt_parse(cacert, buffer, length);
671 ret = mbedtls_x509_crt_parse(cacert,
675 if (ret < 0) {
677 -ret, get_error_string(ret));
678 return ret;
691 ret = mbedtls_x509_crt_parse(public_cert,
694 if (ret < 0) {
696 -ret, get_error_string(ret));
697 return ret;
701 ret = mbedtls_pk_parse_key(private_key,
705 ret = mbedtls_pk_parse_key(private_key,
710 if (ret < 0) {
712 -ret, get_error_string(ret));
713 return ret;
716 ret = mbedtls_ssl_conf_own_cert(&m_env->conf, public_cert, private_key);
717 if (ret < 0) {
719 -ret, get_error_string(ret));
720 return ret;
731 ret = mbedtls_x509_crt_parse(cacert,
734 if (ret < 0) {
736 -ret, get_error_string(ret));
737 return ret;
754 ret = mbedtls_x509_crt_parse_file(cacert, m_context->root_ca_file);
755 if (ret < 0) {
757 -ret, get_error_string(ret));
758 return ret;
763 ret = mbedtls_x509_crt_parse_file(cacert, m_context->root_ca_path);
764 if (ret < 0) {
766 -ret, get_error_string(ret));
767 return ret;
804 int ret = 0;
849 if ((ret = setup_pki_credentials(&m_context->pki_sni_entry_list[i].cacert,
945 int ret = 0;
949 if ((ret = mbedtls_ssl_config_defaults(&m_env->conf,
956 -ret, get_error_string(ret));
979 ret = setup_pki_credentials(&m_env->cacert, &m_env->public_cert,
983 if (ret < 0) {
985 return ret;
992 if ((ret = mbedtls_ssl_cookie_setup(&m_env->cookie_ctx,
996 -ret, get_error_string(ret));
1019 return ret;
1120 int ret;
1127 if ((ret = mbedtls_ssl_config_defaults(&m_env->conf,
1134 -ret, get_error_string(ret));
1156 ret = MBEDTLS_ERR_SSL_ALLOC_FAILED;
1160 if ((ret = mbedtls_ssl_conf_psk(&m_env->conf, psk_key->s,
1164 -ret, get_error_string(ret));
1168 if ((ret = mbedtls_ssl_set_hostname(&m_env->ssl,
1171 -ret, get_error_string(ret));
1188 ret = setup_pki_credentials(&m_env->cacert, &m_env->public_cert,
1192 if (ret < 0) {
1194 return ret;
1201 ret = mbedtls_ssl_conf_alpn_protocols(&m_env->conf, alpn_list);
1202 if (ret != 0) {
1203 coap_log_err("ALPN setup failed %d)\n", ret);
1220 return ret;
1284 int ret;
1287 ret = mbedtls_ssl_handshake(&m_env->ssl);
1288 switch (ret) {
1293 ret = 1;
1298 ret = 0;
1332 ret = -1;
1337 -ret, get_error_string(ret));
1338 ret = -1;
1341 return ret;
1352 get_error_string(ret));
1401 int ret = MBEDTLS_ERR_SSL_CONN_EOF;
1405 ret = (int)c_session->sock.lfunc[COAP_LAYER_TLS].l_read(c_session, out, outl);
1407 if (ret == -1) {
1410 ret = MBEDTLS_ERR_SSL_CONN_EOF;
1412 ret = MBEDTLS_ERR_NET_RECV_FAILED;
1414 } else if (ret == 0) {
1416 ret = MBEDTLS_ERR_SSL_WANT_READ;
1419 return ret;
1430 int ret = 0;
1433 ret = c_session->sock.lfunc[COAP_LAYER_TLS].l_write(c_session,
1437 if (ret < 0) {
1452 ret = inl;
1458 ret = MBEDTLS_ERR_SSL_WANT_WRITE;
1460 ret = MBEDTLS_ERR_NET_CONN_RESET;
1464 ret = MBEDTLS_ERR_SSL_WANT_WRITE;
1466 ret = MBEDTLS_ERR_NET_CONN_RESET;
1470 ret = MBEDTLS_ERR_NET_SEND_FAILED;
1477 if (ret == 0) {
1479 ret = MBEDTLS_ERR_SSL_WANT_WRITE;
1481 return ret;
1489 int ret = 0;
1509 if ((ret = mbedtls_ctr_drbg_seed(&m_env->ctr_drbg,
1512 -ret, get_error_string(ret));
1543 if ((ret = mbedtls_ssl_setup(&m_env->ssl, &m_env->conf)) != 0) {
1833 int ret;
1851 ret = do_mbedtls_handshake(c_session, m_env);
1852 if (ret == -1) {
1914 int ret;
1924 ret = mbedtls_ssl_write(&m_env->ssl, (const unsigned char *) data, data_len);
1925 if (ret <= 0) {
1926 switch (ret) {
1929 ret = 0;
1933 ret = -1;
1938 -ret, get_error_string(ret));
1939 ret = -1;
1942 if (ret == -1) {
1947 ret = do_mbedtls_handshake(c_session, m_env);
1948 if (ret == 1) {
1952 ret = -1;
1962 ret = -1;
1965 if (ret > 0) {
1966 if (ret == (ssize_t)data_len)
1968 coap_session_str(c_session), ret);
1971 coap_session_str(c_session), ret, data_len);
1973 return ret;
1989 int ret = mbedtls_timing_get_delay(&m_env->timer);
1993 switch (ret) {
2053 int ret = 1;
2087 ret = mbedtls_ssl_read(&m_env->ssl, pdu, sizeof(pdu));
2088 if (ret > 0) {
2089 ret = coap_handle_dgram(c_session->context, c_session, pdu, (size_t)ret);
2095 switch (ret) {
2106 -ret, get_error_string(ret), data_len);
2112 ret = -1;
2114 ret = do_mbedtls_handshake(c_session, m_env);
2115 if (ret == 1) {
2121 ret = do_mbedtls_handshake(c_session, m_env);
2122 if (ret == 1) {
2126 ret = -1;
2129 ret = -1;
2140 ret = -1;
2146 coap_log_debug("coap_dtls_receive: ret %d: remaining data %u\n", ret, ssl_data->pdu_len);
2150 if (ret > 0) {
2152 coap_session_str(c_session), ret);
2154 return ret;
2178 int ret;
2191 if ((ret = mbedtls_ssl_set_client_transport_id(&m_env->ssl,
2195 -ret, get_error_string(ret));
2207 ret = do_mbedtls_handshake(c_session, m_env);
2208 if (ret == 0 || m_env->seen_client_hello) {
2215 ret = 1;
2217 ret = 0;
2222 coap_log_debug("coap_dtls_hello: ret %d: remaining data %u\n", ret, ssl_data->pdu_len);
2226 return ret;
2257 int ret;
2266 ret = do_mbedtls_handshake(c_session, m_env);
2267 if (ret == 1) {
2291 int ret;
2297 ret = do_mbedtls_handshake(c_session, m_env);
2298 if (ret == 1) {
2321 int ret = 0;
2334 ret = mbedtls_ssl_write(&m_env->ssl, &data[amount_sent],
2336 if (ret <= 0) {
2337 switch (ret) {
2341 ret = amount_sent;
2343 ret = 0;
2353 -ret, get_error_string(ret));
2354 ret = -1;
2357 if (ret == -1) {
2362 amount_sent += ret;
2365 ret = do_mbedtls_handshake(c_session, m_env);
2366 if (ret == 1) {
2371 ret = -1;
2382 ret = -1;
2385 if (ret > 0) {
2386 if (ret == (ssize_t)data_len)
2388 coap_session_str(c_session), ret);
2391 coap_session_str(c_session), ret, data_len);
2393 return ret;
2403 int ret = -1;
2415 ret = do_mbedtls_handshake(c_session, m_env);
2416 if (ret == 1) {
2424 ret = mbedtls_ssl_read(&m_env->ssl, data, data_len);
2425 if (ret <= 0) {
2426 switch (ret) {
2430 ret = -1;
2439 ret = 0;
2444 -ret, get_error_string(ret), data_len);
2445 ret = -1;
2448 } else if (ret < (int)data_len) {
2460 ret = -1;
2463 if (ret > 0) {
2465 coap_session_str(c_session), ret);
2467 return ret;
2586 int ret = mbedtls_sha256_update_ret(digest_ctx, data, data_len);
2588 int ret = mbedtls_sha256_update(digest_ctx, data, data_len);
2591 return ret == 0;
2598 int ret = mbedtls_sha256_finish_ret(digest_ctx, (uint8_t *)digest_buffer);
2600 int ret = mbedtls_sha256_finish(digest_ctx, (uint8_t *)digest_buffer);
2604 return ret == 0;
2675 int ret = 0;
2704 ret = 1;
2707 return ret;
2838 int ret = 0;
2888 ret = 1;
2903 ret = 1;
2908 return ret;
2922 int ret = 0;
2988 ret = 1;
2991 return ret;
3000 int ret = 0;
3033 ret = 1;
3036 return ret;