Lines Matching defs:test

400      * Now we want to test that our output data was vaguely sensible. We
477 * Now we want to test that our output data was vaguely sensible. For this
478 * test, we expect no CLIENT_RANDOM entry because it doesn't make sense for
840 * Very focused test to exercise a single case in the server-side state
1006 * test we need to have a message larger than that.
1164 /* Skip this test if the platform does not support ktls */
1303 /* Skip this test if the platform does not support ktls */
1455 static int test_ktls(int test)
1460 OPENSSL_assert(test / 4 < (int)NUM_KTLS_TEST_CIPHERS);
1461 cipher = &ktls_test_ciphers[test / 4];
1463 cis_ktls = (test & 1) != 0;
1464 sis_ktls = (test & 2) != 0;
1513 * test each protocol version individually, each with and without EtM enabled.
1514 * TLSv1.3 doesn't use EtM so technically it is redundant to test both but it is
1515 * simpler this way. We also test all combinations with and without the
1815 /* In this test we are expecting exactly 1 OCSP_RESPID */
1945 * We'll just use any old cert for this test - it doesn't have to be an OCSP
2511 /* idx is the test number, but also the number of tickets we want */
3000 * This test is checking that the ref counting for SSL_set_bio is correct.
3333 #define MSG6 "test"
3382 * Helper method to setup objects for early data test. Caller frees objects on
3847 * Helper function to test that a server attempting to read early data can
3990 TEST_error("Invalid test type");
4189 * Note: There is no test for inconsistent SNI with late client detection.
4217 * early_data too, but we test it here because it is similar to the
4295 TEST_error("Bad test index");
4892 /* We're skipping this test */
5016 * test, for both TLS 1.2 and TLS 1.3, negotiating each group in turn,
5620 /* The arrival of CCS messages can confuse the test */
6103 * according to the test iteration.
6104 * Default values do not make much sense: test would fail with them.
6184 * no test vectors so all we do is test that both sides of the communication
6194 const char label[LONG_LABEL_LEN + 1] = "test label";
6352 * results. There are no test vectors so all we do is test that both
6358 static const char label[] = "test label";
6437 static char *mess = "A test message";
6496 static char *mess = "A test message";
6582 static char *mess = "A test message";
6665 static char *mess = "A test message";
6756 static char *mess = "A test message";
6936 /* Maximum-Fragment-Length TLS extension mode to test */
7200 char *userid = "test", *password = "password", *tstsrpfile;
7370 /* We do not ever expect a connection to fail in this test */
7378 * test
7428 /* We need either ECDHE or DHE for the TLSv1.2 test to work */
7544 char msg[] = "A test message";
7667 * This test combines TLSv1.3 and TLSv1.2 ciphersuites so they must both be
8163 char msg[] = "A test message";
8275 * In this test the client has sent close_notify and it has been
8727 /* Reduce the fragment size - so the multiblock test buffer can be small */
8817 static int test_session_timeout(int test)
8821 * Can't explicitly test performance of the new code,
8822 * but can test to see if the ordering of the sessions
9366 /* This test can run in TLSv1.3 even if ec and dh are disabled */
9391 /* removing a single algorithm from the list makes the test pass */
9766 * removed, so we cannot test it.
10231 * deprecated APIs for this test.
10342 * have been used - except in test 3 where only |numpipes - 1| pipelines
10344 * test 3) having been sent to peerb. Since peerb is not using read_ahead we
10346 * SSL_read_ex calls. In the case of test 4, there is then one additional
10379 * separate chunks (depending on which test we are running). If the
10612 TEST_error("Error parsing test options\n");
10640 * We add, but don't load the test "tls-provider". We'll load it when we