Home | History | Annotate | Download | only in runner

Lines Matching refs:peer

369 	// algorithm that the peer should have used in the handshake.
466 // expectPeerCertificate, if not nil, is the certificate chain the peer
479 // parameters that are expected to be sent by the peer.
564 local, peer := "client", "server"
566 local, peer = peer, local
572 peer: peer,
702 return fmt.Errorf("expected peer to use signature algorithm %04x, but got %04x", expected, connState.PeerSignatureAlgorithm)
706 return fmt.Errorf("expected peer to use curve %04x, but got %04x", expected, connState.CurveID)
711 return fmt.Errorf("expected peer to send %d certificates, but got %d", len(connState.PeerCertificates), len(test.expectPeerCertificate.Certificate))
715 return fmt.Errorf("peer certificate %d did not match", i+1)
722 return errors.New("Peer did not send expected QUIC transport params")
761 return fmt.Errorf("tls-unique mismatch: peer sent %x, but %x was expected", peersValue[:], expected)
2316 expectedLocalError: "tls: peer did not false start: EOF",
2351 expectedLocalError: "tls: peer did not false start: EOF",
2371 expectedLocalError: "tls: peer did not false start: EOF",
2782 // peer's KeyUpdate is discovered while a write is
3816 "-verify-peer",
3853 flags: []string{"-verify-peer"},
3868 "-verify-peer-if-no-obc",
3888 "-verify-peer-if-no-obc",
4045 test.expectedLocalError = "extended master secret required but not supported by peer"
4507 flags: []string{"-verify-peer"},
4525 flags: []string{"-verify-peer"},
4542 flags: []string{"-verify-peer"},
4757 "-verify-peer",
4784 "-verify-peer",
4818 flags := []string{"-verify-peer"}
4852 // By default, the client is in a soft fail mode where the peer
8571 "-expect-peer-signature-algorithm", strconv.Itoa(int(alg.id)),
8575 // Resume the session to assert the peer signature
8627 "-expect-peer-signature-algorithm", strconv.Itoa(int(alg.id)),
8631 // Resume the session to assert the peer signature
8866 // Test that, if the list is missing, the peer falls back to SHA-1 in
9355 // Test Ed25519, when disabled, is not accepted if the peer ignores our
9385 "-expect-peer-signature-algorithm", strconv.Itoa(int(signatureRSAPSSWithSHA384)),
9483 // each peer handshake flight N. The timeout opcode both simulates a
9569 // duplicated if the peer badly fragments everything.
12703 "-on-initial-expect-peer-cert-file", path.Join(*resourceDir, rsaCertificateFile),
12704 "-on-resume-expect-peer-cert-file", path.Join(*resourceDir, rsaCertificateFile),
12705 "-on-retry-expect-peer-cert-file", path.Join(*resourceDir, ecdsaP256CertificateFile),
13613 "-expect-peer-cert-file", path.Join(*resourceDir, rsaChainCertificateFile),
13631 "-expect-peer-cert-file", path.Join(*resourceDir, rsaChainCertificateFile),
13699 "-verify-peer",
13721 "-verify-peer",
13742 "-verify-peer",
13910 expectedLocalError: "tls: peer did not false start: EOF",