Lines Matching defs:client
244 * client random, then the hex-encoded master secret.
282 * client random, and then the hex-encoded secret. In this case,
402 * data we expect. For both client and server, we expect to see one master
403 * secret. The client should also see an RSA key exchange.
479 * TLSv1.3, but we do expect both client and server to emit keys.
1934 * This time we'll get the client to send an OCSP_RESPID that it will
2412 /* Start handshake on the server and client */
2707 * incremented by both client and server.
3285 /* Identity should match that set by the client */
3314 /* Identity should match that set by the client */
3504 * Server should be able to write data, and client should be able to
3514 /* Even after reading normal data, client should be able write early data */
3527 /* Write more data from server and read it from client */
3536 * If client writes normal data it should mean writing early data is no
3546 * At this point the client has written EndOfEarlyData, ClientFinished and
3792 * Server will have sent its flight so client can now send
3848 * handle a connection from a client where the early data should be skipped.
3957 * We force the client to attempt a write. This will fail because
3977 * This client has sent more early_data than we are willing to skip
4030 * from a client where the early data is not acceptable.
4041 * from a client where an HRR occurs.
4052 * from a client where an HRR occurs and correctly fails if early_data is sent
4075 * from a client that doesn't send any.
4189 * Note: There is no test for inconsistent SNI with late client detection.
4192 * client to detect a problem.
4196 /* Set inconsistent SNI (early client detection) */
4204 /* Set inconsistent ALPN (early client detection) */
4274 /* Set inconsistent ALPN (late client detection) */
4392 * and assigns to both client and server with incremented reference
4416 /* Send some normal data from client to server */
4444 * client sending some.
4466 * Server should skip over early data and then block waiting for client to
4478 /* Send some normal data from client to server */
4505 * from a TLSv1.2 client.
4528 * messages from client after ServerDone. Then SSL_read_early_data should
4762 /* Trick the client into thinking this session is for a different digest */
4768 * ciphersuite, but client thinks the session is for SHA-256, so it should
4791 * Test 0 = Test all ECDHE Key exchange with TLSv1.3 client and server
4792 * Test 1 = Test NID_X9_62_prime256v1 with TLSv1.3 client and server
4793 * Test 2 = Test NID_secp384r1 with TLSv1.3 client and server
4794 * Test 3 = Test NID_secp521r1 with TLSv1.3 client and server
4795 * Test 4 = Test NID_X25519 with TLSv1.3 client and server
4796 * Test 5 = Test NID_X448 with TLSv1.3 client and server
4797 * Test 6 = Test all FFDHE Key exchange with TLSv1.3 client and server
4798 * Test 7 = Test NID_ffdhe2048 with TLSv1.3 client and server
4799 * Test 8 = Test NID_ffdhe3072 with TLSv1.3 client and server
4800 * Test 9 = Test NID_ffdhe4096 with TLSv1.3 client and server
4801 * Test 10 = Test NID_ffdhe6144 with TLSv1.3 client and server
4802 * Test 11 = Test NID_ffdhe8192 with TLSv1.3 client and server
4803 * Test 12 = Test all ECDHE with TLSv1.2 client and server
4804 * Test 13 = Test all FFDHE with TLSv1.2 client and server
5031 * E tests of ECDHE with TLS 1.3, client sends only one group
5032 * F tests of FFDHE with TLS 1.3, client sends only one group
5033 * E tests of ECDHE with TLS 1.2, client sends only one group
5034 * F tests of FFDHE with TLS 1.2, client sends only one group
5635 /* Fatal error so abandon the connection from this client */
5644 * Create a new connection from the client (we can reuse the server SSL
5656 /* Abandon the connection from this client */
5661 * Now create a connection from a new client but with the same server SSL
5830 static int client = 0;
5889 /* Create a client side custom extension */
5893 &client, old_parse_cb,
5894 &client)))
5899 &client, new_parse_cb, &client)))
5906 &client, old_parse_cb,
5907 &client))
5910 new_free_cb, &client,
5911 new_parse_cb, &client)))
6903 /* Skip client version and random */
6980 /* no MFL in client hello */
7295 /* TLSv1.2 client followed by resumption */
7324 /* TLSv1.3 client followed by resumption */
7351 /* TLSv1.3 client, early_data */
7413 * Test 1: TLSv1.2, client
7415 * Test 3: TLSv1.3, client
7417 * Test 5: TLSv1.3, client, early_data
7497 * check the client.
7711 * loaded into it. We run the same tests twice - once with the client side
8034 * SSL_TICKET_EMPTY (the client indicates support for tickets but does not
8092 * Test 0: client does not shutdown properly,
8095 * Test 1: client does not shutdown properly,
8148 * Test 1: TLSv1.2, server continues to read/write after client shutdown
8151 * Test 4: TLSv1.3, server continues to read/write after client shutdown, server
8152 * sends key update, client reads it
8153 * Test 5: TLSv1.3, server continues to read/write after client shutdown, server
8154 * sends CertificateRequest, client reads and ignores it
8155 * Test 6: TLSv1.3, server continues to read/write after client shutdown, client
8210 * Reading on the server after the client has sent close_notify should
8252 /* Writing on the client after sending close_notify shouldn't be possible */
8258 * For these tests the client has sent close_notify but it has not yet
8275 * In this test the client has sent close_notify and it has been
8277 * client needs to read the close_notify sent by the server.
8287 * The client has sent close_notify and is expecting a close_notify
8559 * Test that setting a client_cert_cb results in a client certificate being
8586 * Test setting certificate authorities on both client and server.
8676 * client. However, SSL_set_client_CA_list() should override
8769 /* Set up a buffer with some data that will be sent to the client */
9173 * we expect the hostname on the server to be empty. On the client we
9176 * Similarly if the client didn't set a hostname on an original TLSv1.2
9177 * session but is now, the server hostname will be empty, but the client
9220 * Test 1: The client only has SHA2-256: only SHA2-256 algorithms shared
9223 * Test 4: The client only has an ECDSA sig alg: only ECDSA algorithms shared
10234 * Test 1: Server has pipelining enabled, client does not