Lines Matching defs:ret
1067 /** Return true if \p ret is a status code indicating that there is an
1077 static int mbedtls_status_is_ssl_in_progress(int ret)
1079 return ret == MBEDTLS_ERR_SSL_WANT_READ ||
1080 ret == MBEDTLS_ERR_SSL_WANT_WRITE ||
1081 ret == MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS;
1250 int ret;
1262 ret = mbedtls_pk_decrypt(key_slot->pk,
1268 ret = mbedtls_pk_sign(key_slot->pk,
1294 ctx->slot, op_name, ret);
1296 return ret;
1338 int ret;
1348 ret = mbedtls_ssl_get_peer_cid(ssl, &cid_negotiated,
1350 if (ret != 0) {
1352 (unsigned int) -ret);
1353 return ret;
1390 int ret;
1403 if ((ret = mbedtls_ssl_session_save(session, p, end - p,
1405 return ret;
1416 int ret;
1419 if ((ret = mbedtls_ssl_session_load(session, buf + 4, len - 4)) != 0) {
1420 return ret;
1468 return ret;
1510 int ret = 0, len, written, frags, exchanges_left;
1667 ret = MBEDTLS_ERR_SSL_HW_ACCEL_FAILED;
1797 if (ret == 0) {
1798 ret = 1;
1812 ret = 0;
1823 ret = 0;
1920 ret = 2;
1974 ret = 2;
2338 ret = 3;
2346 ret = 2;
2353 ret = 2;
2361 ret = 2;
2368 ret = 2;
2382 ret = 2;
2388 ret = 2;
2514 ret = -1;
2560 ret = rng_seed(&rng, opt.reproducible, pers);
2561 if (ret != 0) {
2575 ret = 0;
2579 ret = mbedtls_x509_crt_parse_path(&cacert, opt.ca_path);
2581 ret = mbedtls_x509_crt_parse_file(&cacert, opt.ca_file);
2587 ret = mbedtls_x509_crt_parse(&cacert,
2590 if (ret != 0) {
2595 if (ret == 0) {
2597 ret = mbedtls_x509_crt_parse_der(&cacert,
2600 if (ret != 0) {
2606 if (ret < 0) {
2608 (unsigned int) -ret);
2612 mbedtls_printf(" ok (%d skipped)\n", ret);
2623 if ((ret = mbedtls_x509_crt_parse_file(&srvcert, opt.crt_file)) != 0) {
2625 (unsigned int) -ret);
2631 if ((ret = mbedtls_pk_parse_keyfile(&pkey, opt.key_file,
2634 (unsigned int) -ret);
2645 if ((ret = mbedtls_x509_crt_parse_file(&srvcert2, opt.crt_file2)) != 0) {
2647 (unsigned int) -ret);
2653 if ((ret = mbedtls_pk_parse_keyfile(&pkey2, opt.key_file2,
2656 (unsigned int) -ret);
2672 if ((ret = mbedtls_x509_crt_parse(&srvcert,
2676 (unsigned int) -ret);
2679 if ((ret = mbedtls_pk_parse_key(&pkey,
2684 (unsigned int) -ret);
2690 if ((ret = mbedtls_x509_crt_parse(&srvcert2,
2694 (unsigned int) -ret);
2697 if ((ret = mbedtls_pk_parse_key(&pkey2,
2702 (unsigned int) -ret);
2719 ret = pk_wrap_as_opaque(&pkey, psa_alg, psa_alg2, psa_usage, &key_slot);
2720 if (ret != 0) {
2723 (unsigned int) -ret);
2736 ret = pk_wrap_as_opaque(&pkey2, psa_alg, psa_alg2, psa_usage, &key_slot2);
2737 if (ret != 0) {
2740 (unsigned int) -ret);
2757 if ((ret = mbedtls_dhm_parse_dhmfile(&dhm, opt.dhm_file)) != 0) {
2759 (unsigned int) -ret);
2787 if ((ret = mbedtls_ssl_config_defaults(&conf,
2792 (unsigned int) -ret);
2845 if ((ret = mbedtls_ssl_conf_max_frag_len(&conf, opt.mfl_code)) != 0) {
2846 mbedtls_printf(" failed\n ! mbedtls_ssl_conf_max_frag_len returned %d\n\n", ret);
2861 ret = mbedtls_ssl_conf_cid(&conf, cid_len,
2864 ret = mbedtls_ssl_conf_cid(&conf, cid_renego_len,
2868 if (ret != 0) {
2870 (unsigned int) -ret);
2881 ret = mbedtls_ssl_conf_dtls_srtp_protection_profiles(&conf, forced_profile);
2883 ret = mbedtls_ssl_conf_dtls_srtp_protection_profiles(&conf, default_profiles);
2886 if (ret != 0) {
2889 ret);
2918 if ((ret = mbedtls_ssl_conf_alpn_protocols(&conf, alpn_list)) != 0) {
2919 mbedtls_printf(" failed\n ! mbedtls_ssl_conf_alpn_protocols returned %d\n\n", ret);
2964 if ((ret = mbedtls_ssl_ticket_setup(&ticket_ctx,
2970 ret);
2989 if ((ret = rng_get(&rng, name, sizeof(name))) != 0 ||
2990 (ret = rng_get(&rng, kbuf, sizeof(kbuf))) != 0 ||
2991 (ret = mbedtls_ssl_ticket_rotate(&ticket_ctx,
2994 mbedtls_printf(" failed\n ! mbedtls_ssl_ticket_rotate returned %d\n\n", ret);
3005 if ((ret = mbedtls_ssl_cookie_setup(&cookie_ctx,
3007 mbedtls_printf(" failed\n ! mbedtls_ssl_cookie_setup returned %d\n\n", ret);
3074 ret = ssl_async_set_key(&ssl_async_keys, &srvcert, pk, 0,
3076 if (ret < 0) {
3078 ret);
3084 if ((ret = mbedtls_ssl_conf_own_cert(&conf, &srvcert, pk)) != 0) {
3085 mbedtls_printf(" failed\n ! mbedtls_ssl_conf_own_cert returned %d\n\n", ret);
3093 ret = ssl_async_set_key(&ssl_async_keys, &srvcert2, pk, 0,
3095 if (ret < 0) {
3097 ret);
3103 if ((ret = mbedtls_ssl_conf_own_cert(&conf, &srvcert2, pk)) != 0) {
3104 mbedtls_printf(" failed\n ! mbedtls_ssl_conf_own_cert returned %d\n\n", ret);
3147 ret = ssl_async_set_key(&ssl_async_keys,
3150 if (ret < 0) {
3152 ret);
3186 ret = MBEDTLS_ERR_SSL_HW_ACCEL_FAILED;
3189 if ((ret = mbedtls_ssl_conf_psk_opaque(&conf, psk_slot,
3193 ret);
3199 ret = mbedtls_ssl_conf_psk(&conf, psk, psk_len,
3202 if (ret != 0) {
3204 (unsigned int) -ret);
3220 ret = MBEDTLS_ERR_SSL_HW_ACCEL_FAILED;
3237 ret = mbedtls_ssl_conf_dh_param_ctx(&conf, &dhm);
3240 if (ret != 0) {
3242 (unsigned int) -ret);
3255 if ((ret = mbedtls_ssl_setup(&ssl, &conf)) != 0) {
3256 mbedtls_printf(" failed\n ! mbedtls_ssl_setup returned -0x%x\n\n", (unsigned int) -ret);
3282 if ((ret = mbedtls_ssl_set_cid(&ssl, opt.cid_enabled,
3285 ret);
3313 if ((ret = mbedtls_net_bind(&listen_fd, opt.server_addr, opt.server_port,
3316 mbedtls_printf(" failed\n ! mbedtls_net_bind returned -0x%x\n\n", (unsigned int) -ret);
3325 if (ret == MBEDTLS_ERR_NET_INVALID_CONTEXT) {
3326 ret = 0;
3333 if (ret == MBEDTLS_ERR_SSL_CLIENT_RECONNECT) {
3339 if (ret != 0) {
3341 mbedtls_strerror(ret, error_buf, 100);
3342 mbedtls_printf("Last error was: %d - %s\n\n", ret, error_buf);
3356 if ((ret = mbedtls_net_accept(&listen_fd, &client_fd,
3361 if (ret == MBEDTLS_ERR_NET_ACCEPT_FAILED) {
3362 ret = 0;
3369 mbedtls_printf(" failed\n ! mbedtls_net_accept returned -0x%x\n\n", (unsigned int) -ret);
3374 ret = mbedtls_net_set_nonblock(&client_fd);
3376 ret = mbedtls_net_set_block(&client_fd);
3378 if (ret != 0) {
3379 mbedtls_printf(" failed\n ! net_set_(non)block() returned -0x%x\n\n", (unsigned int) -ret);
3387 if ((ret = mbedtls_ssl_set_client_transport_id(&ssl,
3390 (unsigned int) -ret);
3415 if ((ret = mbedtls_ssl_set_hs_ecjpake_password_opaque(&ssl,
3419 ret);
3426 if ((ret = mbedtls_ssl_set_hs_ecjpake_password(&ssl,
3430 ret);
3459 while ((ret = mbedtls_ssl_handshake(&ssl)) != 0) {
3461 if (ret == MBEDTLS_ERR_SSL_RECEIVED_EARLY_DATA) {
3463 ret = mbedtls_ssl_read_early_data(&ssl, buf, opt.buffer_size);
3464 if (ret > 0) {
3465 buf[ret] = '\0';
3467 ret, (char *) buf);
3474 if (ret == MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS &&
3481 if (!mbedtls_status_is_ssl_in_progress(ret)) {
3488 ret = idle(&client_fd, &timer, ret);
3490 ret = idle(&client_fd, ret);
3492 if (ret != 0) {
3498 if (ret == MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED) {
3500 ret = 0;
3502 } else if (ret != 0) {
3504 (unsigned int) -ret);
3507 if (ret == MBEDTLS_ERR_X509_CERT_VERIFY_FAILED) {
3524 } else { /* ret == 0 */
3538 if ((ret = mbedtls_ssl_get_record_expansion(&ssl)) >= 0) {
3539 mbedtls_printf(" [ Record expansion is %d ]\n", ret);
3591 if ((ret = mbedtls_ssl_tls_prf(eap_tls_keying.tls_prf_type,
3601 (unsigned int) -ret);
3614 if ((ret = mbedtls_ssl_tls_prf(eap_tls_keying.tls_prf_type, NULL, 0,
3621 (unsigned int) -ret);
3646 if ((ret = mbedtls_ssl_tls_prf(dtls_srtp_keying.tls_prf_type,
3656 (unsigned int) -ret);
3694 ret = report_cid_usage(&ssl, "initial handshake");
3695 if (ret != 0) {
3700 if ((ret = mbedtls_ssl_set_cid(&ssl, opt.cid_enabled_renego,
3703 ret);
3736 ret = mbedtls_ssl_read(&ssl, buf, len);
3738 if (mbedtls_status_is_ssl_in_progress(ret)) {
3741 idle(&client_fd, &timer, ret);
3743 idle(&client_fd, ret);
3750 if (ret <= 0) {
3751 switch (ret) {
3759 ret = MBEDTLS_ERR_NET_CONN_RESET;
3763 mbedtls_printf(" mbedtls_ssl_read returned -0x%x\n", (unsigned int) -ret);
3769 len = ret;
3782 ori_len = ret;
3788 ret = 1;
3796 ret = mbedtls_ssl_read(&ssl, larger_buf + ori_len, extra_len);
3797 if (ret != extra_len ||
3800 ret = 1;
3819 ret = 0;
3849 ret = mbedtls_ssl_read(&ssl, buf, len);
3855 } while (mbedtls_status_is_ssl_in_progress(ret));
3857 if (ret <= 0) {
3858 switch (ret) {
3864 mbedtls_printf(" mbedtls_ssl_read returned -0x%x\n", (unsigned int) -ret);
3869 len = ret;
3872 ret = 0;
3884 while ((ret = mbedtls_ssl_renegotiate(&ssl)) != 0) {
3885 if (!mbedtls_status_is_ssl_in_progress(ret)) {
3886 mbedtls_printf(" failed\n ! mbedtls_ssl_renegotiate returned %d\n\n", ret);
3893 idle(&client_fd, &timer, ret);
3895 idle(&client_fd, ret);
3905 ret = report_cid_usage(&ssl, "after renegotiation");
3906 if (ret != 0) {
3944 for (written = 0, frags = 0; written < len; written += ret, frags++) {
3945 while ((ret = mbedtls_ssl_write(&ssl, buf + written, len - written))
3947 if (ret == MBEDTLS_ERR_NET_CONN_RESET) {
3952 if (!mbedtls_status_is_ssl_in_progress(ret)) {
3953 mbedtls_printf(" failed\n ! mbedtls_ssl_write returned %d\n\n", ret);
3960 idle(&client_fd, &timer, ret);
3962 idle(&client_fd, ret);
3969 ret = mbedtls_ssl_write(&ssl, buf, len);
3971 if (!mbedtls_status_is_ssl_in_progress(ret)) {
3978 idle(&client_fd, &timer, ret);
3980 idle(&client_fd, ret);
3985 if (ret < 0) {
3986 mbedtls_printf(" failed\n ! mbedtls_ssl_write returned %d\n\n", ret);
3991 written = ret;
3996 ret = 0;
4007 ret = mbedtls_ssl_context_save(&ssl, NULL, 0, &buf_len);
4008 if (ret != MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL) {
4010 "-0x%x\n\n", (unsigned int) -ret);
4023 if ((ret = mbedtls_ssl_context_save(&ssl, context_buf,
4026 "-0x%x\n\n", (unsigned int) -ret);
4049 if ((ret = mbedtls_base64_encode(b64_buf, b64_len, &b64_len,
4052 "-0x%x\n", (unsigned int) -ret);
4105 if ((ret = mbedtls_ssl_setup(&ssl, &conf)) != 0) {
4107 "-0x%x\n\n", (unsigned int) -ret);
4137 if ((ret = mbedtls_ssl_context_load(&ssl, context_buf,
4140 "-0x%x\n\n", (unsigned int) -ret);
4168 ret = mbedtls_ssl_close_notify(&ssl);
4169 } while (ret == MBEDTLS_ERR_SSL_WANT_WRITE);
4170 ret = 0;
4187 if (ret != 0) {
4189 mbedtls_strerror(ret, error_buf, 100);
4190 mbedtls_printf("Last error was: -0x%X - %s\n\n", (unsigned int) -ret, error_buf);
4227 ret = psk_free(psk_info);
4228 if ((ret != 0) && (opt.query_config_mode == DFL_QUERY_CONFIG_MODE)) {
4229 mbedtls_printf("Failed to list of opaque PSKs - error was %d\n", ret);
4289 if (ret == 0) {
4290 ret = 1;
4302 if (ret == 0) {
4303 ret = 1;
4326 if (ret == 0) {
4327 ret = 1;
4347 if (ret < 0) {
4348 ret = 1;
4352 mbedtls_exit(ret);