Lines Matching refs:ret

366 	unsigned char *ret = p;
373 ret+=2;
375 if (ret>=limit) return NULL; /* this really never occurs, but ... */
391 if ((lenmax = limit - ret - 9) < 0
396 s2n(TLSEXT_TYPE_server_name,ret);
397 s2n(size_str+5,ret);
400 s2n(size_str+3,ret);
403 *(ret++) = (unsigned char) TLSEXT_NAMETYPE_host_name;
404 s2n(size_str,ret);
405 memcpy(ret, s->tlsext_hostname, size_str);
406 ret+=size_str;
422 s2n(TLSEXT_TYPE_renegotiate,ret);
423 s2n(el,ret);
425 if(!ssl_add_clienthello_renegotiate_ext(s, ret, &el, el))
431 ret += el;
451 if ((limit - ret - 5 - login_len) < 0) return NULL;
454 s2n(TLSEXT_TYPE_srp,ret);
455 s2n(login_len+1,ret);
456 (*ret++) = (unsigned char) login_len;
457 memcpy(ret, s->srp_ctx.login, login_len);
458 ret+=login_len;
469 if ((lenmax = limit - ret - 5) < 0) return NULL;
477 s2n(TLSEXT_TYPE_ec_point_formats,ret);
478 s2n(s->tlsext_ecpointformatlist_length + 1,ret);
479 *(ret++) = (unsigned char) s->tlsext_ecpointformatlist_length;
480 memcpy(ret, s->tlsext_ecpointformatlist, s->tlsext_ecpointformatlist_length);
481 ret+=s->tlsext_ecpointformatlist_length;
489 if ((lenmax = limit - ret - 6) < 0) return NULL;
497 s2n(TLSEXT_TYPE_elliptic_curves,ret);
498 s2n(s->tlsext_ellipticcurvelist_length + 2, ret);
505 s2n(s->tlsext_ellipticcurvelist_length, ret);
506 memcpy(ret, s->tlsext_ellipticcurvelist, s->tlsext_ellipticcurvelist_length);
507 ret+=s->tlsext_ellipticcurvelist_length;
536 if ((long)(limit - ret - 4 - ticklen) < 0) return NULL;
537 s2n(TLSEXT_TYPE_session_ticket,ret);
538 s2n(ticklen,ret);
541 memcpy(ret, s->session->tlsext_tick, ticklen);
542 ret += ticklen;
549 if ((size_t)(limit - ret) < sizeof(tls12_sigalgs) + 6)
551 s2n(TLSEXT_TYPE_signature_algorithms,ret);
552 s2n(sizeof(tls12_sigalgs) + 2, ret);
553 s2n(sizeof(tls12_sigalgs), ret);
554 memcpy(ret, tls12_sigalgs, sizeof(tls12_sigalgs));
555 ret += sizeof(tls12_sigalgs);
564 if ((long)(limit - ret - 6 - col < 0))
569 s2n(TLSEXT_TYPE_opaque_prf_input, ret);
570 s2n(col + 2, ret);
571 s2n(col, ret);
572 memcpy(ret, s->s3->client_opaque_prf_input, col);
573 ret += col;
603 if ((long)(limit - ret - 7 - extlen - idlen) < 0) return NULL;
604 s2n(TLSEXT_TYPE_status_request, ret);
607 s2n(extlen + idlen + 5, ret);
608 *(ret++) = TLSEXT_STATUSTYPE_ocsp;
609 s2n(idlen, ret);
613 unsigned char *q = ret;
616 ret += 2;
617 itmp = i2d_OCSP_RESPID(id, &ret);
621 s2n(extlen, ret);
623 i2d_X509_EXTENSIONS(s->tlsext_ocsp_exts, &ret);
628 s2n(TLSEXT_TYPE_heartbeat,ret);
629 s2n(1,ret);
635 *(ret++) = SSL_TLSEXT_HB_DONT_SEND_REQUESTS;
637 *(ret++) = SSL_TLSEXT_HB_ENABLED;
645 if (limit - ret - 4 < 0)
647 s2n(TLSEXT_TYPE_next_proto_neg,ret);
648 s2n(0,ret);
656 if (limit - ret - 4 < 0)
658 s2n(TLSEXT_TYPE_channel_id,ret);
659 s2n(0,ret);
671 s2n(TLSEXT_TYPE_use_srtp,ret);
672 s2n(el,ret);
674 if(ssl_add_clienthello_use_srtp_ext(s, ret, &el, el))
679 ret += el;
683 if ((extdatalen = ret-p-2)== 0)
687 return ret;
693 unsigned char *ret = p;
702 ret+=2;
703 if (ret>=limit) return NULL; /* this really never occurs, but ... */
707 if ((long)(limit - ret - 4) < 0) return NULL;
709 s2n(TLSEXT_TYPE_server_name,ret);
710 s2n(0,ret);
725 s2n(TLSEXT_TYPE_renegotiate,ret);
726 s2n(el,ret);
728 if(!ssl_add_serverhello_renegotiate_ext(s, ret, &el, el))
734 ret += el;
744 if ((lenmax = limit - ret - 5) < 0) return NULL;
752 s2n(TLSEXT_TYPE_ec_point_formats,ret);
753 s2n(s->tlsext_ecpointformatlist_length + 1,ret);
754 *(ret++) = (unsigned char) s->tlsext_ecpointformatlist_length;
755 memcpy(ret, s->tlsext_ecpointformatlist, s->tlsext_ecpointformatlist_length);
756 ret+=s->tlsext_ecpointformatlist_length;
765 if ((long)(limit - ret - 4) < 0) return NULL;
766 s2n(TLSEXT_TYPE_session_ticket,ret);
767 s2n(0,ret);
772 if ((long)(limit - ret - 4) < 0) return NULL;
773 s2n(TLSEXT_TYPE_status_request,ret);
774 s2n(0,ret);
783 if ((long)(limit - ret - 6 - sol) < 0)
788 s2n(TLSEXT_TYPE_opaque_prf_input, ret);
789 s2n(sol + 2, ret);
790 s2n(sol, ret);
791 memcpy(ret, s->s3->server_opaque_prf_input, sol);
792 ret += sol;
805 s2n(TLSEXT_TYPE_use_srtp,ret);
806 s2n(el,ret);
808 if(ssl_add_serverhello_use_srtp_ext(s, ret, &el, el))
813 ret+=el;
826 if (limit-ret<36) return NULL;
827 memcpy(ret,cryptopro_ext,36);
828 ret+=36;
836 s2n(TLSEXT_TYPE_heartbeat,ret);
837 s2n(1,ret);
843 *(ret++) = SSL_TLSEXT_HB_DONT_SEND_REQUESTS;
845 *(ret++) = SSL_TLSEXT_HB_ENABLED;
862 if ((long)(limit - ret - 4 - npalen) < 0) return NULL;
863 s2n(TLSEXT_TYPE_next_proto_neg,ret);
864 s2n(npalen,ret);
865 memcpy(ret, npa, npalen);
866 ret += npalen;
876 if (limit - ret - 4 < 0)
878 s2n(TLSEXT_TYPE_channel_id,ret);
879 s2n(0,ret);
882 if ((extdatalen = ret-p-2)== 0)
886 return ret;
1804 int ret=SSL_TLSEXT_ERR_NOACK;
1817 ret = s->ctx->tlsext_servername_callback(s, &al, s->ctx->tlsext_servername_arg);
1819 ret = s->initial_ctx->tlsext_servername_callback(s, &al, s->initial_ctx->tlsext_servername_arg);
1835 ret = SSL_TLSEXT_ERR_ALERT_FATAL;
1859 ret = SSL_TLSEXT_ERR_ALERT_FATAL;
1873 ret = SSL_TLSEXT_ERR_ALERT_FATAL;
1880 switch (ret)
1899 int ret = SSL_TLSEXT_ERR_OK;
1938 ret = SSL_TLSEXT_ERR_ALERT_FATAL;
1947 switch (ret)
1964 int ret=SSL_TLSEXT_ERR_NOACK;
1997 ret = SSL_TLSEXT_ERR_OK;
2001 ret = s->ctx->tlsext_servername_callback(s, &al, s->ctx->tlsext_servername_arg);
2003 ret = s->initial_ctx->tlsext_servername_callback(s, &al, s->initial_ctx->tlsext_servername_arg);
2013 ret = SSL_TLSEXT_ERR_ALERT_FATAL;
2022 ret = SSL_TLSEXT_ERR_ALERT_FATAL;
2048 ret = SSL_TLSEXT_ERR_ALERT_FATAL;
2053 ret = SSL_TLSEXT_ERR_ALERT_FATAL;
2057 switch (ret)
2083 * ret: (output) on return, if a ticket was decrypted, then this is set to
2097 * 3: a ticket was successfully decrypted and *ret was set.
2108 const unsigned char *limit, SSL_SESSION **ret)
2114 *ret = NULL;
2174 r = tls_decrypt_ticket(s, p, size, session_id, len, ret);
2580 int ret;
2634 ret = ssl3_write_bytes(s, TLS1_RT_HEARTBEAT, buf, 3 + payload + padding);
2635 if (ret >= 0)
2647 return ret;