Lines Matching refs:server

96 /* Select the appropriate server CTX.
202 * If the server understood the ClientHello extension but
203 * does not recognize the server name, the server SHOULD take one of two
388 * The client SHOULD select the first protocol advertised by the server that it
389 * also supports. In the event that the client doesn't support any of server's
390 * protocols, or the server doesn't advertise any, it SHOULD select the first
419 * The server SHOULD select the most highly preferred protocol that it supports
420 * and that is also advertised by the client. In the event that the server
421 * supports no protocols that the client advertises, then the server SHALL
483 * in the server/client CONF.
540 switch (extra->server.servername_callback) {
561 if (extra->server.cert_status != SSL_TEST_CERT_STATUS_NONE) {
567 ((extra->server.cert_status == SSL_TEST_CERT_STATUS_GOOD_RESPONSE)
580 if (extra->server.broken_session_ticket) {
585 if (extra->server.npn_protocols != NULL) {
586 if (!TEST_true(parse_protos(extra->server.npn_protocols,
611 if (extra->server.alpn_protocols != NULL) {
612 if (!TEST_true(parse_protos(extra->server.alpn_protocols,
641 if (extra->server.session_ticket_app_data != NULL) {
643 OPENSSL_strdup(extra->server.session_ticket_app_data);
700 static void configure_handshake_ssl(SSL *server, SSL *client,
867 * We are a client that succeeded this step previously, but the server
906 * session. The server may or may not resume dependent on the
942 * If status is PEER_SUCCESS then we are the server and we have
977 /* Make the server believe it's received the extension */
978 if (test_ctx->extra.server.force_pha)
1381 * Note that |extra| points to the correct client/server configuration
1383 * are taken from |test_ctx|, and client/server-specific settings should be
1399 PEER server, client;
1426 memset(&server, 0, sizeof(server));
1447 if (!create_peer(&server, server_ctx)) {
1448 TEST_note("creating server context");
1456 server.bytes_to_write = client.bytes_to_read = test_ctx->app_data_size;
1457 client.bytes_to_write = server.bytes_to_read = test_ctx->app_data_size;
1459 configure_handshake_ssl(server.ssl, client.ssl, extra);
1496 SSL_set_accept_state(server.ssl);
1501 SSL_set_bio(server.ssl, server_to_client, server_to_client);
1507 SSL_set_bio(server.ssl, client_to_server, server_to_client);
1512 || !TEST_int_eq(SSL_set_ex_data(server.ssl, ex_data_idx, &server_ex_data), 1)
1516 SSL_set_info_callback(server.ssl, &info_cb);
1520 server.status = PEER_WAITING;
1526 * Client and server speak to each other synchronously in the same process.
1535 status = handshake_status(client.status, server.status,
1537 if (server.status == PEER_WAITING)
1538 server.status = PEER_RETRY;
1540 do_connect_step(test_ctx, &server, phase);
1541 status = handshake_status(server.status, client.status,
1542 0 /* server went last */);
1553 client.status = server.status = PEER_RETRY;
1558 * server-initiated shutdown.
1586 if ((client_turn && server.status == PEER_RETRY)
1599 if (client_turn && server.status == PEER_SUCCESS) {
1601 * The server may finish before the client because the
1623 ret->server_protocol = SSL_version(server.ssl);
1651 SSL_get0_next_proto_negotiated(server.ssl, &proto, &proto_len);
1658 SSL_get0_alpn_selected(server.ssl, &proto, &proto_len);
1661 if ((sess = SSL_get0_session(server.ssl)) != NULL) {
1667 ret->server_resumed = SSL_session_reused(server.ssl);
1675 SSL_SESSION *tmp = SSL_get_session(server.ssl);
1678 * We create a fresh copy that is not in the server session ctx linked
1691 SSL_get_peer_signature_nid(server.ssl, &ret->client_sign_hash);
1694 SSL_get_peer_signature_type_nid(server.ssl, &ret->client_sign_type);
1702 names = SSL_get0_peer_CA_list(server.ssl);
1709 ret->client_cert_type = peer_pkey_type(server.ssl);
1715 peer_free_data(&server);