Lines Matching refs:handshake
2544 * handshake, force the TLS 1.2 version on endpoint under test.
2772 srv_pattern.pattern = cli_pattern.pattern = "found fragmented DTLS handshake";
2790 /* Test if the server received a fragmented handshake */
2794 /* Test if the client received a fragmented handshake */
3044 TEST_ASSERT(ssl.handshake != NULL && ssl.handshake->group_list != NULL);
3047 TEST_EQUAL(ssl.handshake->
3052 TEST_EQUAL(iana_tls_group_list[i], ssl.handshake->group_list[i]);
3350 (client.ssl).handshake->xxdh_psa_peerkey[0] ^= 0x02;
3647 * Run first handshake to get a ticket from the server.
3657 * Prepare for handshake with the ticket.
3683 * Run the handshake up to MBEDTLS_SSL_HANDSHAKE_WRAPUP and not
3684 * MBEDTLS_SSL_HANDSHAKE_OVER to preserve handshake data for the checks
3691 TEST_EQUAL(server_ep.ssl.handshake->resume, 1);
3692 TEST_EQUAL(server_ep.ssl.handshake->new_session_tickets_count, 1);
3693 TEST_EQUAL(server_ep.ssl.handshake->key_exchange_mode,
3738 * Run first handshake to get a ticket from the server.
3766 * Prepare for handshake with the ticket.
3871 TEST_EQUAL(server_ep.ssl.handshake->early_data_accepted, 1);
3879 TEST_EQUAL(server_ep.ssl.handshake->early_data_accepted, 0);
3890 TEST_EQUAL(server_ep.ssl.handshake->early_data_accepted, 0);
3937 * Run first handshake to get a ticket from the server.
3953 * Prepare for handshake with the ticket.
3996 * Go through the handshake sequence, state by state, checking the early
4002 /* Progress the handshake from at least one state */
4033 if (!client_ep.ssl.handshake->hello_retry_request_flag) {
4061 if (!client_ep.ssl.handshake->hello_retry_request_flag) {
4065 client_ep.ssl.handshake->randbytes,
4072 client_ep.ssl.handshake->randbytes,
4273 TEST_EQUAL(client_ep.ssl.handshake->ccs_sent, 1);
4310 * Run first handshake to get a ticket from the server.
4326 * Prepare for handshake with the ticket.
4373 * Run handshakes going one state further in the handshake sequence at each
4375 * state. For each reached handshake state, check the result of the call
4377 * handshake successfully and then reset the connection to restart the
4378 * handshake from scratch.
4410 if (!client_ep.ssl.handshake->hello_retry_request_flag) {
4435 if (!client_ep.ssl.handshake->hello_retry_request_flag) {
4594 * this first part of the handshake with HRR.
4609 /* Progress the handshake from at least one state */
4659 * Run first handshake to get a ticket from the server.
4673 * Prepare for handshake with the ticket.
4693 * initiate the handshake on server side before doing all the calls to
4828 * Run first handshake to get a ticket from the server.
4844 * Prepare for handshake with the ticket.
4902 * Start an handshake based on the ticket up to the point where early data