Lines Matching +full:use +full:- +full:handshake

23 #include "crypto-tls-x509-helpers.h"
24 #include "crypto-tls-psk-helpers.h"
34 #define WORKDIR "tests/test-crypto-tlssession-work/"
36 #define KEYFILE WORKDIR "key-ctx.pem"
50 return -1; in testWrite()
68 return -1; in testRead()
106 /* We'll use this for our fake client-server connection */ in test_crypto_tls_session_psk()
111 * We have an evil loop to do the handshake in a single in test_crypto_tls_session_psk()
112 * thread, so we need these non-blocking to avoid deadlock in test_crypto_tls_session_psk()
139 /* For handshake to work, we need to set the I/O callbacks in test_crypto_tls_session_psk()
150 * Finally we loop around & around doing handshake on each in test_crypto_tls_session_psk()
151 * session until we get an error, or the handshake completes. in test_crypto_tls_session_psk()
153 * deadlocking ourselves upon handshake in test_crypto_tls_session_psk()
220 "verify-peer", "yes", in test_tls_creds_x509_create()
225 * and the test-crypto-tlscreds test already in test_tls_creds_x509_create()
228 "sanity-check", "no", in test_tls_creds_x509_create()
239 * active TLS session after handshake completes. To
260 /* We'll use this for our fake client-server connection */ in test_crypto_tls_session_x509()
265 * We have an evil loop to do the handshake in a single in test_crypto_tls_session_x509()
266 * thread, so we need these non-blocking to avoid deadlock in test_crypto_tls_session_x509()
272 #define CLIENT_CERT_DIR "tests/test-crypto-tlssession-client/" in test_crypto_tls_session_x509()
273 #define SERVER_CERT_DIR "tests/test-crypto-tlssession-server/" in test_crypto_tls_session_x509()
285 g_assert(link(data->servercacrt, in test_crypto_tls_session_x509()
287 g_assert(link(data->servercrt, in test_crypto_tls_session_x509()
292 g_assert(link(data->clientcacrt, in test_crypto_tls_session_x509()
294 g_assert(link(data->clientcrt, in test_crypto_tls_session_x509()
312 wildcards = data->wildcards; in test_crypto_tls_session_x509()
323 clientCreds, data->hostname, NULL, in test_crypto_tls_session_x509()
329 data->wildcards ? "tlssessionacl" : NULL, in test_crypto_tls_session_x509()
333 /* For handshake to work, we need to set the I/O callbacks in test_crypto_tls_session_x509()
344 * Finally we loop around & around doing handshake on each in test_crypto_tls_session_x509()
345 * session until we get an error, or the handshake completes. in test_crypto_tls_session_x509()
347 * deadlocking ourselves upon handshake in test_crypto_tls_session_x509()
376 serverSess, data->expectServerFail ? NULL : &error_abort) < 0) { in test_crypto_tls_session_x509()
377 g_assert(data->expectServerFail); in test_crypto_tls_session_x509()
379 g_assert(!data->expectServerFail); in test_crypto_tls_session_x509()
386 clientSess, data->expectClientFail ? NULL : &error_abort) < 0) { in test_crypto_tls_session_x509()
387 g_assert(data->expectClientFail); in test_crypto_tls_session_x509()
389 g_assert(!data->expectClientFail); in test_crypto_tls_session_x509()
428 /* Simple initial test using Pre-Shared Keys. */ in main()
644 test_tls_write_cert_chain(WORKDIR "cacertchain-sess.pem", in main()
648 TEST_SESS_REG(cachain, WORKDIR "cacertchain-sess.pem", in main()
670 unlink(WORKDIR "cacertchain-sess.pem"); in main()