Lines Matching defs:peer

6486  * write data is pending in peer.
6571 * peer read data is pending after peer accepted keyupdate(the msg header
6584 SSL *local = NULL, *peer = NULL;
6598 peer = tst == 0 ? serverssl : clientssl;
6604 SSL_set_bio(peer, pbio, pbio);
6618 * first read keyupdate msg in peer in peer
6621 if (!TEST_int_eq(SSL_read(peer, prbuf, sizeof(prbuf)), -1)
6622 || !TEST_int_eq(SSL_get_error(peer, -1), SSL_ERROR_WANT_READ))
6625 /* Now write some data in peer - we will write the key update */
6626 if (!TEST_int_eq(SSL_write(peer, mess, strlen(mess)), strlen(mess)))
6631 * read data in peer previously that we will complete
6634 || !TEST_int_eq(SSL_read(peer, prbuf, sizeof(prbuf)), sizeof(prbuf)))
6639 || !TEST_int_eq(SSL_read(peer, prbuf, sizeof(prbuf)), strlen(mess)))
6668 SSL *local = NULL, *peer = NULL;
6683 peer = tst == 0 ? serverssl : clientssl;
6720 * read data in peer - we will read the keyupdate msg
6723 || !TEST_int_eq(SSL_read(peer, buf, sizeof(buf)), strlen(mess)))
6726 /* Write more peer more data to ensure we send the keyupdate message back */
6727 if (!TEST_int_eq(SSL_write(peer, mess, strlen(mess)), strlen(mess))
6758 SSL *local = NULL, *peer = NULL;
6772 peer = tst == 0 ? serverssl : clientssl;
6778 SSL_set_bio(peer, pbio, pbio);
6780 /* write app data in peer will fail with SSL_ERROR_WANT_WRITE */
6781 if (!TEST_int_eq(SSL_write(peer, pwbuf, sizeof(pwbuf)), -1)
6782 || !TEST_int_eq(SSL_get_error(peer, -1), SSL_ERROR_WANT_WRITE))
6796 * write data in peer previously that we will complete
6799 if (!TEST_int_eq(SSL_write(peer, pwbuf, sizeof(pwbuf)), sizeof(pwbuf))
6805 * read data in peer - we will read the key update
6808 || !TEST_int_eq(SSL_read(peer, prbuf, sizeof(prbuf)), strlen(mess)))
6811 /* Write more peer data to ensure we send the keyupdate message back */
6812 if (!TEST_int_eq(SSL_write(peer, mess, strlen(mess)), strlen(mess))
7709 * libctx, we want one peer to always use the full set of ciphersuites
9251 * or accepted for the peer that uses this libctx. Note that libssl