Lines Matching defs:server

1855      * consisting of only 0x00 for the client and only 0xFF for the server.
2011 mbedtls_test_ssl_endpoint client, server;
2029 mbedtls_platform_zeroize(&server, sizeof(server));
2066 TEST_ASSERT(mbedtls_test_ssl_endpoint_init(&server,
2072 mbedtls_ssl_set_timer_cb(&server.ssl, &timer_server,
2077 TEST_ASSERT(mbedtls_test_ssl_endpoint_init(&server,
2083 mbedtls_ssl_conf_authmode(&server.conf, options->srv_auth_mode);
2086 TEST_ASSERT(mbedtls_ssl_conf_max_frag_len(&(server.conf),
2105 &server.conf, options->psk_str->x,
2110 mbedtls_ssl_conf_psk_cb(&server.conf, psk_dummy_callback, NULL);
2116 mbedtls_ssl_conf_renegotiation(&(server.conf),
2121 mbedtls_ssl_conf_legacy_renegotiation(&(server.conf),
2129 &(server.socket),
2137 TEST_ASSERT(server.ssl.out_buf_len == MBEDTLS_SSL_OUT_BUFFER_LEN);
2138 TEST_ASSERT(server.ssl.in_buf_len == MBEDTLS_SSL_IN_BUFFER_LEN);
2147 &(server.ssl),
2158 /* Make sure server state is moved to HANDSHAKE_OVER also. */
2159 TEST_EQUAL(mbedtls_test_move_handshake_to_state(&(server.ssl),
2164 TEST_ASSERT(mbedtls_ssl_is_handshake_over(&server.ssl) == 1);
2174 &server.ssl)) {
2179 TEST_EQUAL(server.ssl.session->ciphersuite,
2185 /* A server, when using DTLS, might delay a buffer resize to happen
2187 TEST_ASSERT(exchange_data(&(client.ssl), &(server.ssl)) == 0);
2193 TEST_ASSERT(server.ssl.out_buf_len ==
2194 mbedtls_ssl_get_output_buflen(&server.ssl));
2195 TEST_ASSERT(server.ssl.in_buf_len ==
2196 mbedtls_ssl_get_input_buflen(&server.ssl));
2205 &(server.ssl), options->srv_msg_len,
2213 TEST_ASSERT(mbedtls_ssl_context_save(&(server.ssl), NULL,
2220 TEST_ASSERT(mbedtls_ssl_context_save(&(server.ssl), context_buf,
2225 mbedtls_ssl_free(&(server.ssl));
2226 mbedtls_ssl_init(&(server.ssl));
2228 TEST_ASSERT(mbedtls_ssl_setup(&(server.ssl), &(server.conf)) == 0);
2230 mbedtls_ssl_set_bio(&(server.ssl), &server_context,
2235 mbedtls_ssl_set_user_data_p(&server.ssl, &server);
2238 mbedtls_ssl_set_timer_cb(&server.ssl, &timer_server,
2245 TEST_ASSERT(server.ssl.out_buf_len == MBEDTLS_SSL_OUT_BUFFER_LEN);
2246 TEST_ASSERT(server.ssl.in_buf_len == MBEDTLS_SSL_IN_BUFFER_LEN);
2249 TEST_ASSERT(mbedtls_ssl_context_load(&(server.ssl), context_buf,
2255 TEST_ASSERT(server.ssl.out_buf_len ==
2256 mbedtls_ssl_get_output_buflen(&server.ssl));
2257 TEST_ASSERT(server.ssl.in_buf_len ==
2258 mbedtls_ssl_get_input_buflen(&server.ssl));
2266 &(server.ssl), options->srv_msg_len,
2276 TEST_ASSERT(server.ssl.renego_status ==
2281 /* After calling this function for the server, it only sends a handshake
2283 TEST_ASSERT(mbedtls_ssl_renegotiate(&(server.ssl)) == 0);
2284 TEST_ASSERT(server.ssl.renego_status ==
2289 TEST_ASSERT(exchange_data(&(client.ssl), &(server.ssl)) == 0);
2290 TEST_ASSERT(server.ssl.renego_status ==
2298 * between client and server so this function will return waiting error
2312 TEST_ASSERT(server.ssl.renego_status ==
2317 TEST_ASSERT(exchange_data(&(client.ssl), &(server.ssl)) == 0);
2318 TEST_ASSERT(server.ssl.renego_status ==
2329 TEST_ASSERT(server.ssl.out_buf_len ==
2330 mbedtls_ssl_get_output_buflen(&server.ssl));
2331 TEST_ASSERT(server.ssl.in_buf_len ==
2332 mbedtls_ssl_get_input_buflen(&server.ssl));
2340 TEST_ASSERT(mbedtls_ssl_conf_get_user_data_p(&server.conf) == &server);
2341 TEST_ASSERT(mbedtls_ssl_get_user_data_p(&server.ssl) == &server);
2346 mbedtls_test_ssl_endpoint_free(&server,