Home
last modified time | relevance | path

Searched refs:cleartext (Results 1 – 25 of 44) sorted by relevance

12

/third_party/node/test/parallel/
Dtest-tls-securepair-server.js51 assert.ok(pair.cleartext.writable);
60 pair.cleartext.write('hello\r\n');
61 log(pair.cleartext.getPeerCertificate());
62 log(pair.cleartext.getCipher());
65 pair.cleartext.on('data', function(data) {
67 pair.cleartext.write(data);
74 pair.cleartext.on('error', function(err) {
Dtest-tls-timeout-server-2.js36 const server = tls.createServer(options, common.mustCall(function(cleartext) { argument
37 const s = cleartext.setTimeout(50, function() {
38 cleartext.destroy();
Dtest-https-timeout-server-2.js40 server.on('secureConnection', function(cleartext) { argument
41 const s = cleartext.setTimeout(50, function() {
42 cleartext.destroy();
Dtest-tls-ocsp-callback.js61 const server = tls.createServer(options, common.mustCall((cleartext) => {
62 cleartext.on('error', function(er) {
69 cleartext.end();
Dtest-tls-session-cache.js60 const server = tls.createServer(options, function(cleartext) { argument
61 cleartext.on('error', function(er) {
69 cleartext.end('');
Dtest-tls-peer-certificate-encoding.js38 const server = tls.createServer(options, (cleartext) => {
39 cleartext.end('World');
Dtest-tls-peer-certificate-multi-keys.js36 const server = tls.createServer(options, function(cleartext) { argument
37 cleartext.end('World');
Dtest-tls-getcertificate-x509.js16 const server = tls.createServer(options, function(cleartext) { argument
17 cleartext.end('World');
/third_party/node/test/sequential/
Dtest-tls-securepair-client.js54 assert.strictEqual(pair.cleartext.getPeerCertificate().ext_key_usage.length,
56 assert.strictEqual(pair.cleartext.getPeerCertificate().ext_key_usage[0],
134 assert.ok(pair.cleartext.writable);
144 pair.cleartext.write('hello\r\n', function() {
153 pair.cleartext.getPeerCertificate());
155 pair.cleartext.getCipher());
159 pair.cleartext.on('data', function(d) {
Dtest-tls-session-timeout.js112 const server = tls.createServer(options, (cleartext) => {
113 cleartext.on('error', (er) => {
117 cleartext.end();
/third_party/openssl/test/recipes/
D15-test_mp_rsa.t45 my $cleartext = data_file("plain_text");
70 '-encrypt', '-in', $cleartext,
85 '-encrypt', '-in', $cleartext,
94 '-encrypt', '-in', $cleartext,
112 open(my $fh, "<", $cleartext) or return 0;
/third_party/node/lib/internal/tls/
Dsecure-pair.js69 this.cleartext = new _tls_wrap.TLSSocket(socket2, {
76 this.cleartext.once('secure', () => this.emit('secure'));
80 this.cleartext.destroy();
/third_party/openssl/test/
Dmodes_internal_test.c194 unsigned char cleartext[64], ciphertext[64], vector[64]; in execute_cts128() local
212 size = fixture->decrypt_block(ciphertext, cleartext, len, in execute_cts128()
216 || !TEST_mem_eq(cleartext, len, test_input, len) in execute_cts128()
232 if (!TEST_size_t_eq(fixture->decrypt_stream(ciphertext, cleartext, len, in execute_cts128()
236 || !TEST_mem_eq(cleartext, len, test_input, len) in execute_cts128()
/third_party/nghttp2/doc/sources/
Dh2load-howto.rst35 cleartext connection, the default protocol is HTTP/2. To change the
36 protocol in cleartext connection, use :option:`--no-tls-proto` option.
38 cleartext and SSL/TLS connections.
/third_party/openssl/doc/man3/
DSMIME_write_PKCS7.pod26 If B<PKCS7_DETACHED> is set then cleartext signing will be used,
38 If cleartext signing is being used and B<PKCS7_STREAM> not set then
DSMIME_write_CMS.pod26 If B<CMS_DETACHED> is set then cleartext signing will be used, this option only
37 If cleartext signing is being used and B<CMS_STREAM> not set then the data must
DSMIME_write_ASN1.pod43 If B<CMS_DETACHED> is set then cleartext signing will be used, this option only
54 If cleartext signing is being used and B<CMS_STREAM> not set then the data must
DSMIME_read_PKCS7.pod20 If cleartext signing is used then the content is saved in
DSMIME_read_CMS.pod21 If cleartext signing is used then the content is saved in a memory bio which is
DSMIME_read_ASN1.pod34 If cleartext signing is used then the content is saved in a memory bio which is
DDES_random_key.pod146 (cleartext) is encrypted in to the I<output> (ciphertext) using the
149 ciphertext) is decrypted into the I<output> (now cleartext). Input
165 routine cipher-block-chain encrypts the cleartext data pointed to by
/third_party/openssl/doc/man1/
Dopenssl-passwd.pod.in85 In the output list, prepend the cleartext password and a TAB character
90 When the B<-table> option is used, reverse the order of cleartext and hash.
/third_party/node/benchmark/tls/
Dsecure-pair.js94 serverPair.cleartext.pipe(client);
/third_party/python/Doc/library/
Dcrypt.rst162 cleartext = getpass.getpass()
163 return compare_hash(crypt.crypt(cleartext, cryptedpasswd), cryptedpasswd)
/third_party/mbedtls/docs/proposed/
Dpsa-driver-developer-guide.md20 * **Transparent** drivers implement cryptographic operations on keys that are provided in cleartext

12