Lines Matching defs:server

71 		errx(1, "server context");
77 fprintf(stderr, "FAIL: Failed to load server certificate");
82 fprintf(stderr, "FAIL: Failed to load server private key");
87 errx(1, "server ssl");
200 do_client_server_loop(SSL *client, ssl_func client_func, SSL *server,
215 fprintf(stderr, "DEBUG: server loop\n");
216 if (!server_func(server, "server", &server_done))
241 .desc = "Default client and server",
244 .desc = "Default client and TLSv1.2 server",
248 .desc = "Default client and default server with ECDHE KEX",
252 .desc = "Default client and TLSv1.2 server with ECDHE KEX",
257 .desc = "Default client and default server with DHE KEX",
261 .desc = "Default client and TLSv1.2 server with DHE KEX",
266 .desc = "Default client and default server with RSA KEX",
270 .desc = "Default client and TLSv1.2 server with RSA KEX",
275 .desc = "TLSv1.2 client and default server",
279 .desc = "TLSv1.2 client and default server with ECDHE KEX",
284 .desc = "TLSv1.2 client and default server with DHE KEX",
289 .desc = "TLSv1.2 client and default server with RSA KEX",
301 SSL *client = NULL, *server = NULL;
331 if ((server = tls_server(client_wbio, server_wbio)) == NULL)
334 if (!SSL_set_min_proto_version(server, tt->server_min_version))
338 if (!SSL_set_max_proto_version(server, tt->server_max_version))
342 if (!SSL_set_cipher_list(server, tt->server_ciphers))
346 if (!do_client_server_loop(client, do_connect, server, do_accept)) {
347 fprintf(stderr, "FAIL: client and server handshake failed\n");
351 if (!do_client_server_loop(client, do_write, server, do_read)) {
352 fprintf(stderr, "FAIL: client write and server read I/O failed\n");
356 if (!do_client_server_loop(client, do_read, server, do_write)) {
357 fprintf(stderr, "FAIL: client read and server write I/O failed\n");
361 if (!do_client_server_loop(client, do_shutdown, server, do_shutdown)) {
362 fprintf(stderr, "FAIL: client and server shutdown failed\n");
375 SSL_free(server);