Lines Matching defs:expected
204 struct sslapitest_log_counts *expected)
324 /* Got what we expected? */
326 expected->rsa_key_exchange_count)
328 expected->master_secret_count)
330 expected->client_early_secret_count)
332 expected->client_handshake_secret_count)
334 expected->server_handshake_secret_count)
336 expected->client_application_secret_count)
338 expected->server_application_secret_count)
340 expected->early_exporter_secret_count)
342 expected->exporter_secret_count))
353 struct sslapitest_log_counts expected;
356 memset(&expected, 0, sizeof(expected));
405 expected.rsa_key_exchange_count = 1;
406 expected.master_secret_count = 1;
408 SSL_get_session(clientssl), &expected)))
411 expected.rsa_key_exchange_count = 0;
413 SSL_get_session(serverssl), &expected)))
435 struct sslapitest_log_counts expected;
440 memset(&expected, 0, sizeof(expected));
481 expected.client_handshake_secret_count = 1;
482 expected.server_handshake_secret_count = 1;
483 expected.client_application_secret_count = 1;
484 expected.server_application_secret_count = 1;
485 expected.exporter_secret_count = 1;
487 SSL_get_session(clientssl), &expected))
490 &expected)))
523 expected.client_early_secret_count = 1;
524 expected.early_exporter_secret_count = 1;
526 SSL_get_session(clientssl), &expected))
529 &expected)))
744 printf("ClientHello callback expected extensions mismatch\n");
2540 * resumption attempt is expected to fail (because we're now using a new
5017 * confirming the expected result; then perform a resumption handshake
5174 /* Check that we get what we expected */
6183 * Test that SSL_export_keying_material() produces expected results. There are
6351 * Test that SSL_export_keying_material_early() produces expected
8823 * are correct, and they they are removed as expected
8874 /* Make sure they are in the expected order */
8941 * Test that a session cache overflow works as expected
9586 int expected = (idx <= 2) ? 0 : 1;
9667 SSL_ERROR_NONE), expected))
10627 /* Check we have the expected provider available */