Lines Matching defs:ret

29     HANDSHAKE_RESULT *ret;
31 TEST_ptr(ret = OPENSSL_zalloc(sizeof(*ret)));
32 return ret;
80 static void info_cb(const SSL *s, int where, int ret)
86 ex_data->alert_sent = ret;
87 if (strcmp(SSL_alert_type_string(ret), "F") == 0
88 || strcmp(SSL_alert_desc_string(ret), "CN") == 0)
91 ex_data->alert_received = ret;
241 int ret;
258 ret = client_hello_select_server_ctx(s, arg, 0);
260 if (!ret) {
398 int ret;
400 ret = SSL_select_next_proto(out, outlen, in, inlen,
404 return TEST_true(ret == OPENSSL_NPN_NEGOTIATED || ret == OPENSSL_NPN_NO_OVERLAP)
429 int ret;
439 ret = SSL_select_next_proto(&tmp_out, outlen,
445 return ret == OPENSSL_NPN_NEGOTIATED ? SSL_TLSEXT_ERR_OK
771 int ret = SSL_do_handshake(peer->ssl);
773 if (ret == 1) {
775 } else if (ret == 0) {
778 int error = SSL_get_error(peer->ssl, ret);
799 int ret = 1, write_bytes;
807 while (ret > 0 && peer->bytes_to_read) {
808 ret = SSL_read(peer->ssl, peer->read_buf, peer->read_buf_len);
809 if (ret > 0) {
810 if (!TEST_int_le(ret, peer->bytes_to_read)) {
814 peer->bytes_to_read -= ret;
815 } else if (ret == 0) {
819 int error = SSL_get_error(peer->ssl, ret);
831 ret = SSL_write(peer->ssl, peer->write_buf, write_bytes);
832 if (ret > 0) {
834 if (!TEST_int_eq(ret, write_bytes)) {
838 peer->bytes_to_write -= ret;
862 int ret;
910 ret = SSL_renegotiate(peer->ssl);
927 ret = SSL_renegotiate(peer->ssl);
929 ret = SSL_renegotiate_abbreviated(peer->ssl);
931 if (!ret) {
962 ret = SSL_key_update(peer->ssl, test_ctx->key_update_type);
963 if (!ret) {
980 ret = SSL_verify_client_post_handshake(peer->ssl);
981 if (!ret) {
1001 ret = SSL_read(peer->ssl, &buf, sizeof(buf));
1002 if (ret >= 0) {
1010 int error = SSL_get_error(peer->ssl, ret);
1041 int ret;
1047 ret = SSL_shutdown(peer->ssl);
1049 if (ret == 1) {
1051 } else if (ret < 0) { /* On 0, we retry. */
1052 int error = SSL_get_error(peer->ssl, ret);
1226 char *ret = NULL;
1233 TEST_ptr(ret = OPENSSL_strndup((const char*)(in), len));
1234 return ret;
1303 int ret = 0;
1366 ret = 1;
1376 return ret;
1403 HANDSHAKE_RESULT *ret = HANDSHAKE_RESULT_new();
1420 if (ret == NULL)
1435 HANDSHAKE_RESULT_free(ret);
1471 ret->result = SSL_TEST_INTERNAL_ERROR;
1550 ret->result = SSL_TEST_SUCCESS;
1564 ret->result = SSL_TEST_CLIENT_FAIL;
1567 ret->result = SSL_TEST_SERVER_FAIL;
1570 ret->result = SSL_TEST_INTERNAL_ERROR;
1578 ret->result = SSL_TEST_INTERNAL_ERROR;
1596 ret->result = SSL_TEST_INTERNAL_ERROR;
1605 ret->result = SSL_TEST_INTERNAL_ERROR;
1617 ret->server_alert_sent = server_ex_data.alert_sent;
1618 ret->server_num_fatal_alerts_sent = server_ex_data.num_fatal_alerts_sent;
1619 ret->server_alert_received = client_ex_data.alert_received;
1620 ret->client_alert_sent = client_ex_data.alert_sent;
1621 ret->client_num_fatal_alerts_sent = client_ex_data.num_fatal_alerts_sent;
1622 ret->client_alert_received = server_ex_data.alert_received;
1623 ret->server_protocol = SSL_version(server.ssl);
1624 ret->client_protocol = SSL_version(client.ssl);
1625 ret->servername = server_ex_data.servername;
1631 ret->session_ticket = SSL_TEST_SESSION_TICKET_NO;
1633 ret->session_ticket = SSL_TEST_SESSION_TICKET_YES;
1634 ret->compression = (SSL_get_current_compression(client.ssl) == NULL)
1638 ret->session_id = SSL_TEST_SESSION_ID_NO;
1640 ret->session_id = SSL_TEST_SESSION_ID_YES;
1641 ret->session_ticket_do_not_call = server_ex_data.session_ticket_do_not_call;
1645 ret->result = SSL_TEST_SERVER_FAIL;
1649 ret->client_npn_negotiated = dup_str(proto, proto_len);
1652 ret->server_npn_negotiated = dup_str(proto, proto_len);
1656 ret->client_alpn_negotiated = dup_str(proto, proto_len);
1659 ret->server_alpn_negotiated = dup_str(proto, proto_len);
1663 ret->result_session_ticket_app_data = OPENSSL_strndup((const char*)tick, tick_len);
1666 ret->client_resumed = SSL_session_reused(client.ssl);
1667 ret->server_resumed = SSL_session_reused(server.ssl);
1670 ret->cipher = dup_str((const unsigned char*)cipher, strlen(cipher));
1686 ret->tmp_key_type = pkey_type(tmp_key);
1690 SSL_get_peer_signature_nid(client.ssl, &ret->server_sign_hash);
1691 SSL_get_peer_signature_nid(server.ssl, &ret->client_sign_hash);
1693 SSL_get_peer_signature_type_nid(client.ssl, &ret->server_sign_type);
1694 SSL_get_peer_signature_type_nid(server.ssl, &ret->client_sign_type);
1698 ret->client_ca_names = NULL;
1700 ret->client_ca_names = SSL_dup_CA_list(names);
1704 ret->server_ca_names = NULL;
1706 ret->server_ca_names = SSL_dup_CA_list(names);
1708 ret->server_cert_type = peer_pkey_type(client.ssl);
1709 ret->client_cert_type = peer_pkey_type(server.ssl);
1717 return ret;