Lines Matching defs:key
373 /* We also want to ensure that we use RSA-based key exchange. */
403 * secret. The client should also see an RSA key exchange.
501 /* Reset key log */
566 /* server key, cert, chain, and root */
567 char *skey = test_mk_file_path(certsdir, "leaf.key");
648 char *skey = test_mk_file_path(certsdir, "leaf.key");
687 char *skey = test_mk_file_path(certsdir, "leaf-encrypted.key");
3346 const unsigned char key[] = {
3370 || !TEST_true(SSL_SESSION_set1_master_key(sess, key, mdsize))
5344 const unsigned char key[] = {
5362 * necessary if we have no cert/priv key. In that case the server should
5446 || !TEST_true(SSL_SESSION_set1_master_key(clientpsk, key,
5447 sizeof(key)))
6305 * Check that both sides created the same key material with the
6311 * Check that both sides created the same key material with an
6317 * Check that both sides created the same key material without a
6396 * Check that both sides created the same key material with the
6402 * Check that both sides created the same key material with an
6538 /* Now read some data - we will read the key update */
6609 * lwbuf app data msg size + key updata msg size > 512(the size of
6625 /* Now write some data in peer - we will write the key update */
6805 * read data in peer - we will read the key update
7817 /* Don't change what the ticket key callback wanted to do */
7918 * Test 0: TLSv1.2, no ticket key callback, no ticket, no renewal
7919 * Test 1: TLSv1.3, no ticket key callback, no ticket, no renewal
7920 * Test 2: TLSv1.2, no ticket key callback, no ticket, renewal
7921 * Test 3: TLSv1.3, no ticket key callback, no ticket, renewal
7922 * Test 4: TLSv1.2, no ticket key callback, ticket, no renewal
7923 * Test 5: TLSv1.3, no ticket key callback, ticket, no renewal
7924 * Test 6: TLSv1.2, no ticket key callback, ticket, renewal
7925 * Test 7: TLSv1.3, no ticket key callback, ticket, renewal
7926 * Test 8: TLSv1.2, old ticket key callback, ticket, no renewal
7927 * Test 9: TLSv1.3, old ticket key callback, ticket, no renewal
7928 * Test 10: TLSv1.2, old ticket key callback, ticket, renewal
7929 * Test 11: TLSv1.3, old ticket key callback, ticket, renewal
7930 * Test 12: TLSv1.2, old ticket key callback, no ticket
7931 * Test 13: TLSv1.3, old ticket key callback, no ticket
7932 * Test 14: TLSv1.2, ticket key callback, ticket, no renewal
7933 * Test 15: TLSv1.3, ticket key callback, ticket, no renewal
7934 * Test 16: TLSv1.2, ticket key callback, ticket, renewal
7935 * Test 17: TLSv1.3, ticket key callback, ticket, renewal
7936 * Test 18: TLSv1.2, ticket key callback, no ticket
7937 * Test 19: TLSv1.3, ticket key callback, no ticket
7961 /* Which tests the ticket key callback should request renewal for */
8032 * The decrypt ticket key callback in TLSv1.2 should be called even though
8152 * sends key update, client reads it
8326 * Update the SSL_CTX, set the certificate and private key and then
8344 ecdsakey = test_mk_file_path(certsdir, "server-ecdsa-key.pem");
9765 * temporary DH key but hasn't finished using it yet. Once used it is
10676 privkey2 = test_mk_file_path(certsdir, "server-ecdsa-key.pem");
10684 privkey1024 = test_mk_file_path(certsdir, "ee-key-1024.pem");
10692 privkey3072 = test_mk_file_path(certsdir, "ee-key-3072.pem");
10700 privkey4096 = test_mk_file_path(certsdir, "ee-key-4096.pem");
10708 privkey8192 = test_mk_file_path(certsdir, "ee-key-8192.pem");