Lines Matching refs:Handshake
369 // algorithm that the peer should have used in the handshake.
371 // expectedCurveID, if not zero, is the curve that the handshake should
406 // handshake.
416 // connection immediately after the handshake rather than echoing
423 // HelloRequest when the handshake completes.
623 if err := tlsConn.Handshake(); err != nil {
1471 if flag == "-implicit-handshake" {
2008 // Small enough that every handshake message is
2020 // Large enough that no handshake message is
2073 "-handshake-never-done",
2094 "-implicit-handshake",
2096 "-handshake-never-done",
2108 expectedLocalError: "remote error: handshake failure",
2292 "-handshake-never-done",
3825 certificateRequired = "remote error: handshake failure"
4113 // handshake does, then a server should
4202 // Adds tests that try to cover the range of the handshake state machine, under
4234 // Basic handshake, with resumption. Client and server,
4297 // TLS 1.3 basic handshake shapes.
4905 // NPN on client and server; results in post-handshake message.
5156 // handshake tests because the shim never reads or writes.
5303 test.flags = append(test.flags, "-implicit-handshake")
7417 // invalid for the server to echo, so the handshake fails at
7913 // handshake.
7932 // handshake.
7952 expectedLocalError: "handshake failure",
7966 expectedLocalError: "handshake failure",
7980 expectedLocalError: "handshake failure",
7994 expectedLocalError: "handshake failure",
8008 expectedLocalError: "handshake failure",
8222 // We reject stray HelloRequests during the handshake in TLS 1.2.
8281 // Stray HelloRequests during the handshake are forbidden in TLS 1.3.
8340 // We do not negotiate ALPN after the initial handshake. This is
9483 // each peer handshake flight N. The timeout opcode both simulates a
9485 // runner bracket each handshake flight.
9489 // handshake flight N+1. At this point, it will process the timeout
9504 // four patterns of handshake.
9619 // post-handshake penultimate Finished from the runner. The above tests
9723 // server handshake, so we test it with ProtocolBugs.
9752 // after the handshake is confirmed. This arrives after
9753 // the server handshake, so the normal hooks work.
9773 // Handshake twice on the client to force
9774 // handshake confirmation.
9775 "-handshake-twice",
10072 // If the parse callback fails, the handshake should also fail.
10102 // If the add callback fails, the handshake should also fail.
10166 // If the client sends both early data and custom extension, the handshake
11158 // Test synchronization between the handshake and ChangeCipherSpec.
11159 // Partial post-CCS handshake messages before ChangeCipherSpec should be
11160 // rejected. Test both with and without handshake packing to handle both
11247 // messages in the handshake queue. Do this by testing the server
11265 // Test synchronization between encryption changes and the handshake in
11410 // message in the TLS handshake. These may be used with bugs like
13299 // Test that client and server both notice handshake errors after data
13483 // Test SSL_peek can drive the initial handshake.
13488 "-implicit-handshake",
13822 "-no-op-extra-handshake",
13834 "-no-op-extra-handshake",
13846 "-no-op-extra-handshake",
13858 "-no-op-extra-handshake",
13881 "-no-op-extra-handshake",
13885 // An extra SSL_do_handshake drives the handshake to completion in False
13902 "-handshake-twice",