Lines Matching full:example
42 'DNS:"good.example.com\\u002c DNS:evil.example.com"',
44 'URI:http://example.com/',
45 'URI:http://example.com/?a=b&c=d',
47 'URI:"http://example.com/a\\u002cb"',
49 'URI:http://example.com/a%2Cb',
51 'URI:"http://example.com/a\\u002c DNS:good.example.com"',
55 'DNS:"\\"evil.example.com\\""',
65 'email:foo@example.com',
67 'email:"foo@example.com\\u002c DNS:good.example.com"',
71 'DirName:"/C=DE/L=Berlin\\u002c DNS:good.example.com"',
72 'DirName:"/C=DE/L=Berlin\\u002c DNS:good.example.com\\\\x00' +
73 'evil.example.com"',
74 'DirName:"/C=DE/L=Berlin\\u002c DNS:good.example.com\\\\\\\\x00' +
75 'evil.example.com"',
81 'DirName:"/C=DE/L=Berlin\\\\/CN=good.example.com"' :
82 'DirName:/C=DE/L=Berlin/CN=good.example.com',
93 'othername:" XmppAddr::abc123\\u002c DNS:good.example.com"' :
96 'othername:" XmppAddr::good.example.com\\u0000abc123"' :
134 servername: 'example.com',
136 assert.strictEqual(hostname, 'example.com');
148 text: 'OCSP - URI:"http://good.example.com/\\u000a' +
149 'OCSP - URI:http://evil.example.com/"',
152 'http://good.example.com/\nOCSP - URI:http://evil.example.com/',
157 text: 'CA Issuers - URI:"http://ca.example.com/\\u000a' +
158 'OCSP - URI:http://evil.example.com"\n' +
159 'OCSP - DNS:"good.example.com\\u000a' +
163 'http://ca.example.com/\nOCSP - URI:http://evil.example.com',
166 'good.example.com\nOCSP - URI:http://ca.nodejs.org/ca.cert',
171 text: '1.3.9999.12.34 - URI:http://ca.example.com/',
174 'http://ca.example.com/',
179 text: 'OCSP - othername: XmppAddr::good.example.com\n' +
184 ' XmppAddr::good.example.com',
202 text: 'OCSP - othername:" XmppAddr::good.example.com\\u0000abc123"',
205 ' XmppAddr::good.example.com\0abc123',
244 servername: 'example.com',
246 assert.strictEqual(hostname, 'example.com');
260 text: 'L=Somewhere\nCN=evil.example.com',
263 CN: 'evil.example.com',
267 text: 'L=Somewhere\\00evil.example.com',
269 L: 'Somewhere\0evil.example.com',
273 text: 'L=Somewhere\\0ACN=evil.example.com',
275 L: 'Somewhere\nCN=evil.example.com'
279 text: 'L=Somewhere\\, CN = evil.example.com',
281 L: 'Somewhere, CN = evil.example.com'
285 text: 'L=Somewhere/CN=evil.example.com',
287 L: 'Somewhere/CN=evil.example.com'
291 text: 'L=München\\\\\\0ACN=evil.example.com',
293 L: 'München\\\nCN=evil.example.com'
297 text: 'L=Somewhere + CN=evil.example.com',
300 CN: 'evil.example.com',
304 text: 'L=Somewhere \\+ CN=evil.example.com',
306 L: 'Somewhere + CN=evil.example.com'
353 servername: 'example.com',
355 assert.strictEqual(hostname, 'example.com');
394 tls.checkServerIdentity('example.com', {
408 // cause checkServerIdentity to see 'DNS:b.example.com' and thus to accept
409 // the certificate for b.example.com.
410 const san = 'DNS:"a.example.com, DNS:b.example.com, DNS:c.example.com"';
413 const hostname = 'b.example.com';
421 'altnames: Host: b.example.com. is not in ' +
422 'the cert\'s altnames: DNS:"a.example.com, ' +
423 'DNS:b.example.com, DNS:c.example.com"');
432 const servername = 'good.example.com';
440 // assert.strictEqual(certX509.subjectAltName, 'DNS:evil.example.com');
454 "good.example.com. is not in the cert's" +
455 ' altnames: DNS:evil.example.com');
467 const servername = 'good.example.com';