Lines Matching defs:ret
1440 int ret = -1;
1446 BIO_get_fd(r, &ret);
1447 return ret;
1452 int ret = -1;
1458 BIO_get_fd(r, &ret);
1459 return ret;
1465 int ret = 0;
1485 ret = 1;
1487 return ret;
1546 size_t ret = 0;
1548 ret = s->s3.tmp.finish_md_len;
1549 if (count > ret)
1550 count = ret;
1552 return ret;
1558 size_t ret = 0;
1560 ret = s->s3.tmp.peer_finish_md_len;
1561 if (count > ret)
1562 count = ret;
1564 return ret;
1863 int ret;
1875 switch (ASYNC_start_job(&s->job, s->waitctx, &ret, func, args,
1889 return ret;
1951 int ret;
1959 ret = ssl_start_async_job(s, &args, ssl_io_intern);
1961 return ret;
1969 int ret;
1977 ret = ssl_read_internal(s, buf, (size_t)num, &readbytes);
1980 * The cast is safe here because ret should be <= INT_MAX because num is
1983 if (ret > 0)
1984 ret = (int)readbytes;
1986 return ret;
1991 int ret = ssl_read_internal(s, buf, num, readbytes);
1993 if (ret < 0)
1994 ret = 0;
1995 return ret;
2000 int ret;
2017 ret = SSL_accept(s);
2018 if (ret <= 0) {
2028 ret = SSL_read_ex(s, buf, num, readbytes);
2034 if (ret > 0 || (ret <= 0 && s->early_data_state
2037 return ret > 0 ? SSL_READ_EARLY_DATA_SUCCESS
2075 int ret;
2083 ret = ssl_start_async_job(s, &args, ssl_io_intern);
2085 return ret;
2093 int ret;
2101 ret = ssl_peek_internal(s, buf, (size_t)num, &readbytes);
2104 * The cast is safe here because ret should be <= INT_MAX because num is
2107 if (ret > 0)
2108 ret = (int)readbytes;
2110 return ret;
2116 int ret = ssl_peek_internal(s, buf, num, readbytes);
2118 if (ret < 0)
2119 ret = 0;
2120 return ret;
2152 int ret;
2161 ret = ssl_start_async_job(s, &args, ssl_io_intern);
2163 return ret;
2171 ossl_ssize_t ret;
2191 ret = (ossl_ssize_t)s->method->ssl_dispatch_alert(s);
2192 if (ret <= 0) {
2194 return ret;
2216 ret = ktls_sendfile(SSL_get_wfd(s), fd, offset, size, flags);
2217 if (ret < 0) {
2226 return ret;
2229 return ret;
2235 int ret;
2243 ret = ssl_write_internal(s, buf, (size_t)num, &written);
2246 * The cast is safe here because ret should be <= INT_MAX because num is
2249 if (ret > 0)
2250 ret = (int)written;
2252 return ret;
2257 int ret = ssl_write_internal(s, buf, num, written);
2259 if (ret < 0)
2260 ret = 0;
2261 return ret;
2266 int ret, early_data_state;
2283 ret = SSL_connect(s);
2284 if (ret <= 0) {
2300 ret = SSL_write_ex(s, buf, num, &writtmp);
2302 if (!ret) {
2304 return ret;
2322 ret = SSL_write_ex(s, buf, num, written);
2324 if (ret)
2327 return ret;
3325 SSL_CTX *ret = NULL;
3339 ret = OPENSSL_zalloc(sizeof(*ret));
3340 if (ret == NULL)
3344 ret->references = 1;
3345 ret->lock = CRYPTO_THREAD_lock_new();
3346 if (ret->lock == NULL) {
3348 OPENSSL_free(ret);
3353 ret->tsan_lock = CRYPTO_THREAD_lock_new();
3354 if (ret->tsan_lock == NULL) {
3360 ret->libctx = libctx;
3362 ret->propq = OPENSSL_strdup(propq);
3363 if (ret->propq == NULL)
3367 ret->method = meth;
3368 ret->min_proto_version = 0;
3369 ret->max_proto_version = 0;
3370 ret->mode = SSL_MODE_AUTO_RETRY;
3371 ret->session_cache_mode = SSL_SESS_CACHE_SERVER;
3372 ret->session_cache_size = SSL_SESSION_CACHE_MAX_SIZE_DEFAULT;
3374 ret->session_timeout = meth->get_timeout();
3375 ret->max_cert_list = SSL_MAX_CERT_LIST_DEFAULT;
3376 ret->verify_mode = SSL_VERIFY_NONE;
3377 if ((ret->cert = ssl_cert_new()) == NULL)
3380 ret->sessions = lh_SSL_SESSION_new(ssl_session_hash, ssl_session_cmp);
3381 if (ret->sessions == NULL)
3383 ret->cert_store = X509_STORE_new();
3384 if (ret->cert_store == NULL)
3387 ret->ctlog_store = CTLOG_STORE_new_ex(libctx, propq);
3388 if (ret->ctlog_store == NULL)
3393 if (!ssl_load_ciphers(ret))
3396 if (!ssl_setup_sig_algs(ret))
3400 if (!ssl_load_groups(ret))
3403 if (!SSL_CTX_set_ciphersuites(ret, OSSL_default_ciphersuites()))
3406 if (!ssl_create_cipher_list(ret,
3407 ret->tls13_ciphersuites,
3408 &ret->cipher_list, &ret->cipher_list_by_id,
3409 OSSL_default_cipher_list(), ret->cert)
3410 || sk_SSL_CIPHER_num(ret->cipher_list) <= 0) {
3415 ret->param = X509_VERIFY_PARAM_new();
3416 if (ret->param == NULL)
3423 ret->md5 = ssl_evp_md_fetch(libctx, NID_md5, propq);
3424 ret->sha1 = ssl_evp_md_fetch(libctx, NID_sha1, propq);
3426 if ((ret->ca_names = sk_X509_NAME_new_null()) == NULL)
3429 if ((ret->client_ca_names = sk_X509_NAME_new_null()) == NULL)
3432 if (!CRYPTO_new_ex_data(CRYPTO_EX_INDEX_SSL_CTX, ret, &ret->ex_data))
3435 if ((ret->ext.secure = OPENSSL_secure_zalloc(sizeof(*ret->ext.secure))) == NULL)
3440 ret->comp_methods = SSL_COMP_get_compression_methods();
3442 ret->max_send_fragment = SSL3_RT_MAX_PLAIN_LENGTH;
3443 ret->split_send_fragment = SSL3_RT_MAX_PLAIN_LENGTH;
3446 if ((RAND_bytes_ex(libctx, ret->ext.tick_key_name,
3447 sizeof(ret->ext.tick_key_name), 0) <= 0)
3448 || (RAND_priv_bytes_ex(libctx, ret->ext.secure->tick_hmac_key,
3449 sizeof(ret->ext.secure->tick_hmac_key), 0) <= 0)
3450 || (RAND_priv_bytes_ex(libctx, ret->ext.secure->tick_aes_key,
3451 sizeof(ret->ext.secure->tick_aes_key), 0) <= 0))
3452 ret->options |= SSL_OP_NO_TICKET;
3454 if (RAND_priv_bytes_ex(libctx, ret->ext.cookie_hmac_key,
3455 sizeof(ret->ext.cookie_hmac_key), 0) <= 0)
3459 if (!ssl_ctx_srp_ctx_init_intern(ret))
3475 if (!eng || !SSL_CTX_set_client_cert_engine(ret, eng))
3488 ret->options |= SSL_OP_NO_COMPRESSION | SSL_OP_ENABLE_MIDDLEBOX_COMPAT;
3490 ret->ext.status_type = TLSEXT_STATUSTYPE_nothing;
3508 ret->max_early_data = 0;
3518 ret->recv_max_early_data = SSL3_RT_MAX_PLAIN_LENGTH;
3521 ret->num_tickets = 2;
3523 ssl_ctx_system_config(ret);
3525 return ret;
3529 SSL_CTX_free(ret);
3919 int ret = 1;
3930 ret = s->method->ssl_new(s);
3938 return ret;
4043 int ret = 1;
4061 ret = ssl_start_async_job(s, &args, ssl_do_handshake_intern);
4063 ret = s->handshake_func(s);
4067 if (SSL_IS_QUIC(s) && ret == 1) {
4072 ret = 0;
4077 ret = 0;
4081 return ret;
4195 SSL *ret;
4207 if ((ret = SSL_new(SSL_get_SSL_CTX(s))) == NULL)
4215 if (!SSL_copy_session_id(ret, s))
4220 * s->cert or ret->cert will be changed later -- they should not both
4224 if (!SSL_set_ssl_method(ret, s->method))
4228 ssl_cert_free(ret->cert);
4229 ret->cert = ssl_cert_dup(s->cert);
4230 if (ret->cert == NULL)
4234 if (!SSL_set_session_id_context(ret, s->sid_ctx,
4239 if (!ssl_dane_dup(ret, s))
4241 ret->version = s->version;
4242 ret->options = s->options;
4243 ret->min_proto_version = s->min_proto_version;
4244 ret->max_proto_version = s->max_proto_version;
4245 ret->mode = s->mode;
4246 SSL_set_max_cert_list(ret, SSL_get_max_cert_list(s));
4247 SSL_set_read_ahead(ret, SSL_get_read_ahead(s));
4248 ret->msg_callback = s->msg_callback;
4249 ret->msg_callback_arg = s->msg_callback_arg;
4250 SSL_set_verify(ret, SSL_get_verify_mode(s), SSL_get_verify_callback(s));
4251 SSL_set_verify_depth(ret, SSL_get_verify_depth(s));
4252 ret->generate_session_id = s->generate_session_id;
4254 SSL_set_info_callback(ret, SSL_get_info_callback(s));
4257 if (!CRYPTO_dup_ex_data(CRYPTO_EX_INDEX_SSL, &ret->ex_data, &s->ex_data))
4260 ret->server = s->server;
4263 SSL_set_accept_state(ret);
4265 SSL_set_connect_state(ret);
4267 ret->shutdown = s->shutdown;
4268 ret->hit = s->hit;
4270 ret->default_passwd_callback = s->default_passwd_callback;
4271 ret->default_passwd_callback_userdata = s->default_passwd_callback_userdata;
4273 X509_VERIFY_PARAM_inherit(ret->param, s->param);
4277 if ((ret->cipher_list = sk_SSL_CIPHER_dup(s->cipher_list)) == NULL)
4281 if ((ret->cipher_list_by_id = sk_SSL_CIPHER_dup(s->cipher_list_by_id))
4286 if (!dup_ca_names(&ret->ca_names, s->ca_names)
4287 || !dup_ca_names(&ret->client_ca_names, s->client_ca_names))
4290 return ret;
4293 SSL_free(ret);
4953 int ret = 0;
4974 ret = 1;
4977 return ret;
5347 int ret = 0;
5416 ret = s->ct_validation_callback(ctx, scts, s->ct_validation_callback_arg);
5417 if (ret < 0)
5418 ret = 0; /* This function returns 0 on failure */
5419 if (!ret)
5439 if (ret <= 0)
5441 return ret;
5960 int ret;
5969 ret = SSL_accept(s);
5972 if (ret > 0 && s->ext.cookieok)