Lines Matching defs:ret
237 int ret = 0;
345 ret = 1;
376 return ret;
528 int ret;
540 ret = 1;
542 ret = DTLS_VERSION_LE(minversion, ginfo->maxdtls);
544 ret &= DTLS_VERSION_GE(maxversion, ginfo->mindtls);
549 ret = 1;
551 ret = (minversion <= ginfo->maxtls);
553 ret &= (maxversion >= ginfo->mintls);
554 if (ret && okfortls13 != NULL && maxversion == TLS1_3_VERSION)
558 ret &= !isec
563 return ret;
747 int ret = 0;
758 ret = 1;
772 ret = 1;
775 return ret;
1154 int ret = 0;
1194 ret = 1;
1198 return ret;
1730 * ret: (output) on return, if a ticket was decrypted, then this is set to
1734 SSL_SESSION **ret)
1739 *ret = NULL;
1757 hello->session_id, hello->session_id_len, ret);
1791 SSL_TICKET_STATUS ret = SSL_TICKET_FATAL_ERR_OTHER;
1803 ret = SSL_TICKET_EMPTY;
1813 ret = SSL_TICKET_NO_DECRYPT;
1819 ret = SSL_TICKET_NO_DECRYPT;
1826 ret = SSL_TICKET_FATAL_ERR_MALLOC;
1831 ret = SSL_TICKET_FATAL_ERR_MALLOC;
1857 ret = SSL_TICKET_FATAL_ERR_OTHER;
1861 ret = SSL_TICKET_NO_DECRYPT;
1872 ret = SSL_TICKET_NO_DECRYPT;
1886 ret = SSL_TICKET_FATAL_ERR_OTHER;
1899 ret = SSL_TICKET_FATAL_ERR_OTHER;
1905 ret = SSL_TICKET_FATAL_ERR_OTHER;
1911 ret = SSL_TICKET_NO_DECRYPT;
1918 ret = SSL_TICKET_FATAL_ERR_OTHER;
1923 ret = SSL_TICKET_NO_DECRYPT;
1934 ret = SSL_TICKET_FATAL_ERR_OTHER;
1939 ret = SSL_TICKET_NO_DECRYPT;
1953 ret = SSL_TICKET_NO_DECRYPT;
1967 ret = SSL_TICKET_SUCCESS_RENEW;
1969 ret = SSL_TICKET_SUCCESS;
1976 ret = SSL_TICKET_NO_DECRYPT;
1984 * detected above. The callback is responsible for checking |ret| before it
1988 && (ret == SSL_TICKET_EMPTY
1989 || ret == SSL_TICKET_NO_DECRYPT
1990 || ret == SSL_TICKET_SUCCESS
1991 || ret == SSL_TICKET_SUCCESS_RENEW)) {
1998 ret,
2002 ret = SSL_TICKET_FATAL_ERR_OTHER;
2006 ret = SSL_TICKET_NONE;
2012 if (ret != SSL_TICKET_EMPTY && ret != SSL_TICKET_NO_DECRYPT)
2013 ret = SSL_TICKET_NO_DECRYPT;
2014 /* else the value of |ret| will already do the right thing */
2021 if (ret != SSL_TICKET_SUCCESS
2022 && ret != SSL_TICKET_SUCCESS_RENEW)
2023 ret = SSL_TICKET_FATAL_ERR_OTHER;
2025 ret = SSL_TICKET_SUCCESS;
2027 ret = SSL_TICKET_SUCCESS_RENEW;
2031 ret = SSL_TICKET_FATAL_ERR_OTHER;
2036 switch (ret) {
2046 return ret;
3391 SSL_HMAC *ret = OPENSSL_zalloc(sizeof(*ret));
3394 if (ret == NULL)
3399 if (!ssl_hmac_old_new(ret))
3401 return ret;
3405 if (mac == NULL || (ret->ctx = EVP_MAC_CTX_new(mac)) == NULL)
3408 return ret;
3410 EVP_MAC_CTX_free(ret->ctx);
3412 OPENSSL_free(ret);