Lines Matching defs:server
402 * data we expect. For both client and server, we expect to see one master
479 * TLSv1.3, but we do expect both client and server to emit keys.
566 /* server key, cert, chain, and root */
595 /* attempt SSL_connect() with incomplete server chain */
600 /* application provides intermediate certs needed to verify server cert */
613 /* continue SSL_connect(), must now succeed with completed server chain */
840 * Very focused test to exercise a single case in the server-side state
876 /* Resume, preferring a different cipher. Our server will force the
1916 /* Try again but this time force the server side callback to fail */
1946 * specific one. We'll use the server cert.
2182 /* Now do some tests for server side caching */
2193 /* Internal caching is the default on the server side */
2412 /* Start handshake on the server and client */
2707 * incremented by both client and server.
3419 * there is no SNI cb set up by the server), so it should not impact
3527 /* Write more data from server and read it from client */
3579 /* Push the ClientFinished and the normal data back into the server rbio */
3590 /* Client and server should not be able to write/read early data now */
3601 /* Client should be able to read the data sent by the server */
3652 /* Client and server should not be able to write/read early data now */
3663 /* Client and server should be able to write/read normal data */
3750 * The server is configured to accept early data. Create a connection to
3847 * Helper function to test that a server attempting to read early data can
3967 * cause the server to fail
4029 * Test that a server attempting to read early data can handle a connection
4040 * Test that a server attempting to read early data can handle a connection
4051 * Test that a server attempting to read early data can handle a connection
4063 * Test that a server attempting to read early data will abort if it tries to
4074 * Test that a server attempting to read early data can handle a connection
4091 /* Write some data - should block due to handshake with server */
4227 * Set inconsistent SNI (server side). In this case the connection
4228 * will succeed and accept early_data. In TLSv1.3 on the server side SNI
4230 * should not matter that we used a different server name last time.
4249 * Set inconsistent ALPN (server detected). In this case the connection
4392 * and assigns to both client and server with incremented reference
4416 /* Send some normal data from client to server */
4443 * Test that a server that doesn't try to read early data can handle a
4478 /* Send some normal data from client to server */
4504 * Test that a server attempting to read early data can handle a connection
4520 /* Write some data - should block due to handshake with server */
4538 * for the CCS/Finished from server
4791 * Test 0 = Test all ECDHE Key exchange with TLSv1.3 client and server
4792 * Test 1 = Test NID_X9_62_prime256v1 with TLSv1.3 client and server
4793 * Test 2 = Test NID_secp384r1 with TLSv1.3 client and server
4794 * Test 3 = Test NID_secp521r1 with TLSv1.3 client and server
4795 * Test 4 = Test NID_X25519 with TLSv1.3 client and server
4796 * Test 5 = Test NID_X448 with TLSv1.3 client and server
4797 * Test 6 = Test all FFDHE Key exchange with TLSv1.3 client and server
4798 * Test 7 = Test NID_ffdhe2048 with TLSv1.3 client and server
4799 * Test 8 = Test NID_ffdhe3072 with TLSv1.3 client and server
4800 * Test 9 = Test NID_ffdhe4096 with TLSv1.3 client and server
4801 * Test 10 = Test NID_ffdhe6144 with TLSv1.3 client and server
4802 * Test 11 = Test NID_ffdhe8192 with TLSv1.3 client and server
4803 * Test 12 = Test all ECDHE with TLSv1.2 client and server
4804 * Test 13 = Test all FFDHE with TLSv1.2 client and server
5027 * E tests of ECDHE with TLS 1.3, server only has one group
5028 * F tests of FFDHE with TLS 1.3, server only has one group
5029 * E tests of ECDHE with TLS 1.2, server only has one group
5030 * F tests of FFDHE with TLS 1.2, server only has one group
5362 * necessary if we have no cert/priv key. In that case the server should
5370 * As noted above the server should prefer SHA256 automatically. However
5523 * Check that if the server rejects the PSK we can still connect, but with
5644 * Create a new connection from the client (we can reuse the server SSL
5661 * Now create a connection from a new client but with the same server SSL
5710 int *server = (int *)add_arg;
5718 if (*server != SSL_is_server(s)
5737 int *server = (int *)parse_arg;
5744 if (*server != SSL_is_server(s)
5756 int *server = (int *)add_arg;
5764 if (*server != SSL_is_server(s)
5784 int *server = (int *)parse_arg;
5791 if (*server != SSL_is_server(s)
5829 static int server = 1;
5914 /* Create a server side custom extension */
5918 &server, old_parse_cb,
5919 &server)))
5924 &server, new_parse_cb, &server)))
5929 new_free_cb, &server,
5930 new_parse_cb, &server)))
5937 &server, old_parse_cb,
5938 &server))
5941 new_free_cb, &server,
5942 new_parse_cb, &server)))
6009 * old style callbacks we ignore it on the server side because they set
6975 /* This shouldn't succeed because we don't have a server! */
7029 /* Start handshake on the server */
7280 /* TLSv1.2 server followed by resumption */
7309 /* TLSv1.3 server followed by resumption */
7341 /* TLSv1.3 server, early_data */
7412 * Test 0: TLSv1.2, server
7414 * Test 2: TLSv1.3, server
7416 * Test 4: TLSv1.3, server, early_data
7496 * For even numbered tests we check the server callbacks. For odd numbers we
7712 * having the full set of ciphersuites and once with the server side.
8093 * server does not set SSL_OP_IGNORE_UNEXPECTED_EOF,
8094 * server should get SSL_ERROR_SSL
8096 * server sets SSL_OP_IGNORE_UNEXPECTED_EOF,
8097 * server should get SSL_ERROR_ZERO_RETURN
8148 * Test 1: TLSv1.2, server continues to read/write after client shutdown
8151 * Test 4: TLSv1.3, server continues to read/write after client shutdown, server
8153 * Test 5: TLSv1.3, server continues to read/write after client shutdown, server
8155 * Test 6: TLSv1.3, server continues to read/write after client shutdown, client
8210 * Reading on the server after the client has sent close_notify should
8239 /* Should still be able to read data from server */
8259 * been received by the server. The server has not sent close_notify
8264 * Writing on the server after sending close_notify shouldn't
8276 * received by the server which has responded with a close_notify. The
8277 * client needs to read the close_notify sent by the server.
8343 ecdsacert = test_mk_file_path(certsdir, "server-ecdsa-cert.pem");
8344 ecdsakey = test_mk_file_path(certsdir, "server-ecdsa-key.pem");
8586 * Test setting certificate authorities on both client and server.
8657 * We only expect certificate authorities to have been sent to the server
9061 * Test 0: Client sets servername and server acknowledges it (TLSv1.2)
9062 * Test 1: Client sets servername and server does not acknowledge it (TLSv1.2)
9066 * Test 5: Client sets servername and server acknowledges it (TLSv1.3)
9067 * Test 6: Client sets servername and server does not acknowledge it (TLSv1.3)
9173 * we expect the hostname on the server to be empty. On the client we
9177 * session but is now, the server hostname will be empty, but the client
9221 * Test 2: The server only has SHA2-256: only SHA2-256 algorithms shared
9224 * Test 5: The server only has an ECDSA sig alg: only ECDSA algorithms shared
9764 * Send the server's first flight. At this point the server has created the
10233 * Test 0: Client has pipelining enabled, server does not
10235 * Test 2: Client has pipelining enabled, server does not: not enough data to
10237 * Test 3: Client has pipelining enabled, server does not: not enough data to
10239 * Test 4: Client has pipelining enabled, server does not: more data than all
10241 * Test 5: Client has pipelining enabled, server does not: Maximum size pipeline
10672 cert2 = test_mk_file_path(certsdir, "server-ecdsa-cert.pem");
10676 privkey2 = test_mk_file_path(certsdir, "server-ecdsa-key.pem");