Lines Matching refs:server
287 * can send a single message from the client to the server.
298 mbedtls_test_mock_socket server;
314 mbedtls_test_mock_socket_init(&server);
324 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
327 /* Send the message to the server */
347 recv_ret = recv(&server, received + read, MSGLEN - read);
363 int blocking_ret = recv(&server, received, 1);
375 mbedtls_test_mock_socket_close(&server);
395 mbedtls_test_mock_socket server;
413 mbedtls_test_mock_socket_init(&server);
425 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
441 socket = (i % 2 == 0) ? (&client) : (&server);
462 /* First receiving is from the server */
463 socket = (i % 2 == 0) ? (&server) : (&client);
504 mbedtls_test_mock_socket_close(&server);
650 mbedtls_test_mock_socket client, server;
666 &server,
704 mbedtls_test_mock_socket client, server;
715 &server,
728 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
731 /* Send the message to the server */
735 /* Read from the server */
766 mbedtls_test_mock_socket client, server;
777 &server,
790 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
793 /* Send three message to the server, last one with an error */
806 /* Read three messages from the server, last one with an error */
833 mbedtls_test_mock_socket client, server;
844 &server,
857 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
860 /* Send two message to the server, second one with an error */
869 /* Read the only message from the server */
888 mbedtls_test_mock_socket client, server;
899 &server,
913 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
916 /* Send two messages to the server, the second one small enough to fit in the
924 /* Read a truncated message from the server */
935 /* Read a full message from the server */
955 mbedtls_test_mock_socket client, server;
966 &server,
979 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
987 server.status = 0;
992 server.status = MBEDTLS_MOCK_SOCKET_CONNECTED;
996 /* Test that even though the server tried to read once disconnected, the
1016 mbedtls_test_mock_socket client, server;
1027 &server,
1040 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
1079 mbedtls_test_mock_socket client, server;
1090 &server,
1103 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
2790 /* Test if the server received a fragmented handshake */
3107 mbedtls_test_ssl_endpoint client, server;
3119 mbedtls_platform_zeroize(&server, sizeof(server));
3129 TEST_ASSERT(mbedtls_test_ssl_endpoint_init(&server, MBEDTLS_SSL_IS_SERVER,
3133 mbedtls_ssl_conf_dbg(&server.conf, options.srv_log_fun,
3137 &(server.socket),
3141 &(client.ssl), &(server.ssl), MBEDTLS_SSL_HANDSHAKE_WRAPUP)
3143 /* Force a bad session_id_len that will be read by the server in
3145 server.ssl.session_negotiate->id_len = 33;
3151 &(server.ssl), options.srv_msg_len,
3160 mbedtls_test_ssl_endpoint_free(&server, NULL);
3304 mbedtls_test_ssl_endpoint client, server;
3315 mbedtls_platform_zeroize(&server, sizeof(server));
3330 TEST_EQUAL(mbedtls_test_ssl_endpoint_init(&server, MBEDTLS_SSL_IS_SERVER,
3335 &(server.socket),
3339 &(client.ssl), &(server.ssl),
3348 /* Force a simulated bitflip in the server key. to make the
3354 &(client.ssl), &(server.ssl), MBEDTLS_SSL_HANDSHAKE_OVER),
3367 mbedtls_test_ssl_endpoint_free(&server, NULL);
3435 * Tweak server Certificate message and parse it.
3647 * Run first handshake to get a ticket from the server.
3738 * Run first handshake to get a ticket from the server.
3937 * Run first handshake to get a ticket from the server.
4310 * Run first handshake to get a ticket from the server.
4342 * Remove server support for the group negotiated in
4659 * Run first handshake to get a ticket from the server.
4691 * server one to be able to contain the maximum number of early data bytes
4693 * initiate the handshake on server side before doing all the calls to
4702 /* If our server is configured with max_early_data_size equal to zero, it
4742 * Now, check data on server side. It is not done in the previous loop as
4743 * in the first call to mbedtls_ssl_handshake(), the server ends up sending
4828 * Run first handshake to get a ticket from the server.
4864 * Remove server support for the group negotiated in
4935 * If the server rejected early data, base the determination of when
4937 * expansion) of early data on server side and the number of early data
4938 * received so far by the server (multiple of the expanded size).