Lines Matching defs:ret

1358     int ret = -1;
1364 BIO_get_fd(r, &ret);
1365 return ret;
1370 int ret = -1;
1376 BIO_get_fd(r, &ret);
1377 return ret;
1383 int ret = 0;
1403 ret = 1;
1405 return ret;
1464 size_t ret = 0;
1466 ret = s->s3.tmp.finish_md_len;
1467 if (count > ret)
1468 count = ret;
1470 return ret;
1476 size_t ret = 0;
1478 ret = s->s3.tmp.peer_finish_md_len;
1479 if (count > ret)
1480 count = ret;
1482 return ret;
1781 int ret;
1793 switch (ASYNC_start_job(&s->job, s->waitctx, &ret, func, args,
1807 return ret;
1863 int ret;
1871 ret = ssl_start_async_job(s, &args, ssl_io_intern);
1873 return ret;
1881 int ret;
1889 ret = ssl_read_internal(s, buf, (size_t)num, &readbytes);
1892 * The cast is safe here because ret should be <= INT_MAX because num is
1895 if (ret > 0)
1896 ret = (int)readbytes;
1898 return ret;
1903 int ret = ssl_read_internal(s, buf, num, readbytes);
1905 if (ret < 0)
1906 ret = 0;
1907 return ret;
1912 int ret;
1929 ret = SSL_accept(s);
1930 if (ret <= 0) {
1940 ret = SSL_read_ex(s, buf, num, readbytes);
1946 if (ret > 0 || (ret <= 0 && s->early_data_state
1949 return ret > 0 ? SSL_READ_EARLY_DATA_SUCCESS
1981 int ret;
1989 ret = ssl_start_async_job(s, &args, ssl_io_intern);
1991 return ret;
1999 int ret;
2007 ret = ssl_peek_internal(s, buf, (size_t)num, &readbytes);
2010 * The cast is safe here because ret should be <= INT_MAX because num is
2013 if (ret > 0)
2014 ret = (int)readbytes;
2016 return ret;
2022 int ret = ssl_peek_internal(s, buf, num, readbytes);
2024 if (ret < 0)
2025 ret = 0;
2026 return ret;
2052 int ret;
2061 ret = ssl_start_async_job(s, &args, ssl_io_intern);
2063 return ret;
2071 ossl_ssize_t ret;
2091 ret = (ossl_ssize_t)s->method->ssl_dispatch_alert(s);
2092 if (ret <= 0) {
2094 return ret;
2116 ret = ktls_sendfile(SSL_get_wfd(s), fd, offset, size, flags);
2117 if (ret < 0) {
2126 return ret;
2129 return ret;
2135 int ret;
2143 ret = ssl_write_internal(s, buf, (size_t)num, &written);
2146 * The cast is safe here because ret should be <= INT_MAX because num is
2149 if (ret > 0)
2150 ret = (int)written;
2152 return ret;
2157 int ret = ssl_write_internal(s, buf, num, written);
2159 if (ret < 0)
2160 ret = 0;
2161 return ret;
2166 int ret, early_data_state;
2183 ret = SSL_connect(s);
2184 if (ret <= 0) {
2200 ret = SSL_write_ex(s, buf, num, &writtmp);
2202 if (!ret) {
2204 return ret;
2222 ret = SSL_write_ex(s, buf, num, written);
2224 if (ret)
2227 return ret;
3225 SSL_CTX *ret = NULL;
3239 ret = OPENSSL_zalloc(sizeof(*ret));
3240 if (ret == NULL)
3244 ret->references = 1;
3245 ret->lock = CRYPTO_THREAD_lock_new();
3246 if (ret->lock == NULL) {
3248 OPENSSL_free(ret);
3253 ret->tsan_lock = CRYPTO_THREAD_lock_new();
3254 if (ret->tsan_lock == NULL) {
3260 ret->libctx = libctx;
3262 ret->propq = OPENSSL_strdup(propq);
3263 if (ret->propq == NULL)
3267 ret->method = meth;
3268 ret->min_proto_version = 0;
3269 ret->max_proto_version = 0;
3270 ret->mode = SSL_MODE_AUTO_RETRY;
3271 ret->session_cache_mode = SSL_SESS_CACHE_SERVER;
3272 ret->session_cache_size = SSL_SESSION_CACHE_MAX_SIZE_DEFAULT;
3274 ret->session_timeout = meth->get_timeout();
3275 ret->max_cert_list = SSL_MAX_CERT_LIST_DEFAULT;
3276 ret->verify_mode = SSL_VERIFY_NONE;
3277 if ((ret->cert = ssl_cert_new()) == NULL)
3280 ret->sessions = lh_SSL_SESSION_new(ssl_session_hash, ssl_session_cmp);
3281 if (ret->sessions == NULL)
3283 ret->cert_store = X509_STORE_new();
3284 if (ret->cert_store == NULL)
3287 ret->ctlog_store = CTLOG_STORE_new_ex(libctx, propq);
3288 if (ret->ctlog_store == NULL)
3293 if (!ssl_load_ciphers(ret))
3296 if (!ssl_setup_sig_algs(ret))
3300 if (!ssl_load_groups(ret))
3303 if (!SSL_CTX_set_ciphersuites(ret, OSSL_default_ciphersuites()))
3306 if (!ssl_create_cipher_list(ret,
3307 ret->tls13_ciphersuites,
3308 &ret->cipher_list, &ret->cipher_list_by_id,
3309 OSSL_default_cipher_list(), ret->cert)
3310 || sk_SSL_CIPHER_num(ret->cipher_list) <= 0) {
3315 ret->param = X509_VERIFY_PARAM_new();
3316 if (ret->param == NULL)
3323 ret->md5 = ssl_evp_md_fetch(libctx, NID_md5, propq);
3324 ret->sha1 = ssl_evp_md_fetch(libctx, NID_sha1, propq);
3326 if ((ret->ca_names = sk_X509_NAME_new_null()) == NULL)
3329 if ((ret->client_ca_names = sk_X509_NAME_new_null()) == NULL)
3332 if (!CRYPTO_new_ex_data(CRYPTO_EX_INDEX_SSL_CTX, ret, &ret->ex_data))
3335 if ((ret->ext.secure = OPENSSL_secure_zalloc(sizeof(*ret->ext.secure))) == NULL)
3340 ret->comp_methods = SSL_COMP_get_compression_methods();
3342 ret->max_send_fragment = SSL3_RT_MAX_PLAIN_LENGTH;
3343 ret->split_send_fragment = SSL3_RT_MAX_PLAIN_LENGTH;
3346 if ((RAND_bytes_ex(libctx, ret->ext.tick_key_name,
3347 sizeof(ret->ext.tick_key_name), 0) <= 0)
3348 || (RAND_priv_bytes_ex(libctx, ret->ext.secure->tick_hmac_key,
3349 sizeof(ret->ext.secure->tick_hmac_key), 0) <= 0)
3350 || (RAND_priv_bytes_ex(libctx, ret->ext.secure->tick_aes_key,
3351 sizeof(ret->ext.secure->tick_aes_key), 0) <= 0))
3352 ret->options |= SSL_OP_NO_TICKET;
3354 if (RAND_priv_bytes_ex(libctx, ret->ext.cookie_hmac_key,
3355 sizeof(ret->ext.cookie_hmac_key), 0) <= 0)
3359 if (!ssl_ctx_srp_ctx_init_intern(ret))
3375 if (!eng || !SSL_CTX_set_client_cert_engine(ret, eng))
3388 ret->options |= SSL_OP_NO_COMPRESSION | SSL_OP_ENABLE_MIDDLEBOX_COMPAT;
3390 ret->ext.status_type = TLSEXT_STATUSTYPE_nothing;
3408 ret->max_early_data = 0;
3418 ret->recv_max_early_data = SSL3_RT_MAX_PLAIN_LENGTH;
3421 ret->num_tickets = 2;
3423 ssl_ctx_system_config(ret);
3425 return ret;
3429 SSL_CTX_free(ret);
3820 int ret = 1;
3831 ret = s->method->ssl_new(s);
3839 return ret;
3939 int ret = 1;
3957 ret = ssl_start_async_job(s, &args, ssl_do_handshake_intern);
3959 ret = s->handshake_func(s);
3962 return ret;
4076 SSL *ret;
4088 if ((ret = SSL_new(SSL_get_SSL_CTX(s))) == NULL)
4096 if (!SSL_copy_session_id(ret, s))
4101 * s->cert or ret->cert will be changed later -- they should not both
4105 if (!SSL_set_ssl_method(ret, s->method))
4109 ssl_cert_free(ret->cert);
4110 ret->cert = ssl_cert_dup(s->cert);
4111 if (ret->cert == NULL)
4115 if (!SSL_set_session_id_context(ret, s->sid_ctx,
4120 if (!ssl_dane_dup(ret, s))
4122 ret->version = s->version;
4123 ret->options = s->options;
4124 ret->min_proto_version = s->min_proto_version;
4125 ret->max_proto_version = s->max_proto_version;
4126 ret->mode = s->mode;
4127 SSL_set_max_cert_list(ret, SSL_get_max_cert_list(s));
4128 SSL_set_read_ahead(ret, SSL_get_read_ahead(s));
4129 ret->msg_callback = s->msg_callback;
4130 ret->msg_callback_arg = s->msg_callback_arg;
4131 SSL_set_verify(ret, SSL_get_verify_mode(s), SSL_get_verify_callback(s));
4132 SSL_set_verify_depth(ret, SSL_get_verify_depth(s));
4133 ret->generate_session_id = s->generate_session_id;
4135 SSL_set_info_callback(ret, SSL_get_info_callback(s));
4138 if (!CRYPTO_dup_ex_data(CRYPTO_EX_INDEX_SSL, &ret->ex_data, &s->ex_data))
4141 ret->server = s->server;
4144 SSL_set_accept_state(ret);
4146 SSL_set_connect_state(ret);
4148 ret->shutdown = s->shutdown;
4149 ret->hit = s->hit;
4151 ret->default_passwd_callback = s->default_passwd_callback;
4152 ret->default_passwd_callback_userdata = s->default_passwd_callback_userdata;
4154 X509_VERIFY_PARAM_inherit(ret->param, s->param);
4158 if ((ret->cipher_list = sk_SSL_CIPHER_dup(s->cipher_list)) == NULL)
4162 if ((ret->cipher_list_by_id = sk_SSL_CIPHER_dup(s->cipher_list_by_id))
4167 if (!dup_ca_names(&ret->ca_names, s->ca_names)
4168 || !dup_ca_names(&ret->client_ca_names, s->client_ca_names))
4171 return ret;
4174 SSL_free(ret);
4834 int ret = 0;
4855 ret = 1;
4858 return ret;
5228 int ret = 0;
5297 ret = s->ct_validation_callback(ctx, scts, s->ct_validation_callback_arg);
5298 if (ret < 0)
5299 ret = 0; /* This function returns 0 on failure */
5300 if (!ret)
5320 if (ret <= 0)
5322 return ret;
5844 int ret;
5853 ret = SSL_accept(s);
5856 if (ret > 0 && s->ext.cookieok)