• Home
  • Raw
  • Download

Lines Matching full:example

43     'DNS:"good.example.com\\u002c DNS:evil.example.com"',
45 'URI:http://example.com/',
46 'URI:http://example.com/?a=b&c=d',
48 'URI:"http://example.com/a\\u002cb"',
50 'URI:http://example.com/a%2Cb',
52 'URI:"http://example.com/a\\u002c DNS:good.example.com"',
56 'DNS:"\\"evil.example.com\\""',
66 'email:foo@example.com',
68 'email:"foo@example.com\\u002c DNS:good.example.com"',
75 'DirName:"L=Berlin\\\\\\u002c DNS:good.example.com\\u002cC=DE"',
78 'DirName:"L=Berlin\\\\\\u002c DNS:good.example.com\\u0000' +
79 'evil.example.com\\u002cC=DE"',
80 'DirName:"L=Berlin\\\\\\u002c DNS:good.example.com\\\\\\\\\\u0000' +
81 'evil.example.com\\u002cC=DE"',
83 'DirName:"L=Berlin/CN=good.example.com\\u002cC=DE"',
94 'othername:"XmppAddr:abc123\\u002c DNS:good.example.com"' :
97 'othername:"XmppAddr:good.example.com\\u0000abc123"' :
131 servername: 'example.com',
133 assert.strictEqual(hostname, 'example.com');
145 text: 'OCSP - URI:"http://good.example.com/\\u000a' +
146 'OCSP - URI:http://evil.example.com/"',
149 'http://good.example.com/\nOCSP - URI:http://evil.example.com/',
154 text: 'CA Issuers - URI:"http://ca.example.com/\\u000a' +
155 'OCSP - URI:http://evil.example.com"\n' +
156 'OCSP - DNS:"good.example.com\\u000a' +
160 'http://ca.example.com/\nOCSP - URI:http://evil.example.com',
163 'good.example.com\nOCSP - URI:http://ca.nodejs.org/ca.cert',
168 text: '1.3.9999.12.34 - URI:http://ca.example.com/',
171 'http://ca.example.com/',
176 text: 'OCSP - othername:XmppAddr:good.example.com\n' +
181 'XmppAddr:good.example.com',
199 text: 'OCSP - othername:"XmppAddr:good.example.com\\u0000abc123"',
202 'XmppAddr:good.example.com\0abc123',
238 servername: 'example.com',
240 assert.strictEqual(hostname, 'example.com');
263 text: 'L=Somewhere\nCN=evil.example.com',
266 CN: 'evil.example.com',
270 text: 'L=Somewhere\\00evil.example.com',
272 L: 'Somewhere\0evil.example.com',
276 text: 'L=Somewhere\\0ACN=evil.example.com',
278 L: 'Somewhere\nCN=evil.example.com'
282 text: 'L=Somewhere\\, CN = evil.example.com',
284 L: 'Somewhere, CN = evil.example.com'
288 text: 'L=Somewhere/CN=evil.example.com',
290 L: 'Somewhere/CN=evil.example.com'
294 text: 'L=München\\\\\\0ACN=evil.example.com',
296 L: 'München\\\nCN=evil.example.com'
300 text: 'L=Somewhere + CN=evil.example.com',
303 CN: 'evil.example.com',
307 text: 'L=Somewhere \\+ CN=evil.example.com',
309 L: 'Somewhere + CN=evil.example.com'
352 servername: 'example.com',
354 assert.strictEqual(hostname, 'example.com');
402 tls.checkServerIdentity('example.com', {
416 // cause checkServerIdentity to see 'DNS:b.example.com' and thus to accept
417 // the certificate for b.example.com.
418 const san = 'DNS:"a.example.com, DNS:b.example.com, DNS:c.example.com"';
421 const hostname = 'b.example.com';
429 'altnames: Host: b.example.com. is not in ' +
430 'the cert\'s altnames: DNS:"a.example.com, ' +
431 'DNS:b.example.com, DNS:c.example.com"');
440 const servername = 'good.example.com';
443 assert.strictEqual(certX509.subjectAltName, 'DNS:evil.example.com');
466 "good.example.com. is not in the cert's" +
467 ' altnames: DNS:evil.example.com');
479 const servername = 'good.example.com';