/third_party/openssl/doc/man3/ |
D | SSL_CTX_set_tlsext_servername_callback.pod | 24 The functionality provided by the servername callback is mostly superseded by 26 However, even where the ClientHello callback is used, the servername callback is 27 still necessary in order to acknowledge the servername requested by the client. 31 the servername extension received in the incoming connection. When B<cb> 34 The servername callback should return one of the following values: 40 This is used to indicate that the servername requested by the client has been 42 up a different configuration for the selected servername in this case. 46 In this case the servername requested by the client is not accepted and the 53 If this value is returned then the servername is not accepted by the server. 62 This return value indicates that the servername is not accepted by the server. [all …]
|
/third_party/node/test/parallel/ |
D | test-x509-escaping.js | 33 servername: 'nodejs.org', property 131 servername: 'example.com', property 238 servername: 'example.com', property 352 servername: 'example.com', property 440 const servername = 'good.example.com'; constant 442 assert.strictEqual(certX509.subject, `CN=${servername}`); 446 assert.strictEqual(certX509.checkHost(servername), undefined); 447 assert.strictEqual(certX509.checkHost(servername, { subject: 'default' }), 449 assert.strictEqual(certX509.checkHost(servername, { subject: 'always' }), 450 servername); [all …]
|
D | test-tls-sni-option.js | 40 SNICallback: function(servername, callback) { argument 41 const context = SNIContexts[servername]; 77 servername: 'a.example.com', property 90 servername: 'a.example.com', property 103 servername: 'b.example.com', property 116 servername: 'c.wrong.com', property 129 servername: 'c.another.com', property 142 { sni: c.servername, authorized: c.authorized }
|
D | test-tls-sni-servername.js | 15 SNICallback: function(servername, callback) { argument 16 if (servername === 'c.another.com') { 30 assert.strictEqual(socket.servername, options.servername); 48 servername: 'c.another.com', property 54 servername: 'c.wrong.com', property
|
D | test-https-agent-sni.js | 21 const servername = req.socket.servername; 23 if (servername !== false) { 24 res.setHeader('x-sni', servername); 49 servername: `sni.${j}`, property 59 servername: '', property
|
D | test-tls-sni-server-client.js | 60 servername: 'a.example.com' property 69 servername: 'b.test.com', property 78 servername: 'a.b.test.com', property 87 servername: 'c.wrong.com', property 96 servername: 'chain.example.com', property 104 assert.strictEqual(c.servername, serverResult);
|
D | test-http2-create-client-secure-session.js | 30 assert(headers[':authority'].startsWith(socket.servername)); 33 servername: socket.servername, property 73 assert.strictEqual(jsonData.servername, 74 opts.servername || 'localhost'); 93 { servername: 'agent1' }); property 99 { servername: '' }); property
|
D | test-https-agent-session-reuse.js | 39 servername: 'agent1', property 48 servername: 'agent1', property 57 servername: 'agent1', property 70 servername: 'agent1', property 81 servername: 'agent1', property 90 servername: 'agent1', property
|
D | test-tls-add-context.js | 29 if (c.servername === 'unknowncontext') { 55 servername: 'context1', property 63 servername: 'context2', property 71 servername: 'unknowncontext', property
|
D | test-tls-secure-context-usage-order.js | 42 if ('a.example.com' === c.servername) { 47 if ('b.example.com' === c.servername) { 62 servername: 'a.example.com', property 76 options.servername = 'b.example.com';
|
D | test-tls-client-reject.js | 48 servername: 'localhost', property 70 servername: 'localhost' property 82 servername: 'localhost', property 96 servername: 'localhost' property
|
D | test-tls-socket-snicallback-without-server.js | 18 SNICallback: common.mustCall((servername, cb) => { 19 assert.strictEqual(servername, 'www.google.com');
|
D | test-tls-securepair-fiftharg.js | 17 SNICallback: common.mustCall((servername, cb) => { 18 assert.strictEqual(servername, 'www.google.com');
|
D | test-tls-connect-secure-context.js | 13 servername: 'agent1', property 29 servername: 'agent1', property
|
D | test-https-agent-session-injection.js | 34 servername: 'nodejs.org', property 47 servername: 'nodejs.org', property
|
D | test-https-autoselectfamily.js | 82 assert.strictEqual(req.socket.servername, 'example.org'); 120 assert.strictEqual(req.socket.servername, 'example.org'); 126 assert.strictEqual(req.socket.servername, 'example.org');
|
/third_party/musl/libc-test/src/functionalext/supplement/manual/network/ |
D | getnameinfo.c | 179 char servername[128] = {0}; in getnameinfo_0900() local 188 servername, sizeof(servername), 0); in getnameinfo_0900() 191 EXPECT_STREQ("getnameinfo_0900 hostname", servername, "http"); in getnameinfo_0900() 199 char servername[128] = {0}; in getnameinfo_1000() local 208 servername, sizeof(servername), 0); in getnameinfo_1000() 211 EXPECT_STREQ("getnameinfo_1000 hostname", servername, "tcpmux"); in getnameinfo_1000() 220 char servername[128] = {0}; in getnameinfo_1100() local 229 servername, sizeof(servername), 0); in getnameinfo_1100() 232 EXPECT_STREQ("getnameinfo_1100 hostname", servername, "fido"); in getnameinfo_1100() 240 char servername[128] = {0}; in getnameinfo_1200() local [all …]
|
/third_party/node/lib/ |
D | _http_agent.js | 255 if (!options.servername && options.servername !== '') 256 options.servername = calculateServerName(options, req); 315 if (!options.servername && options.servername !== '') 316 options.servername = calculateServerName(options, req); 347 let servername = options.host; 360 servername = hostHeader; 362 servername = StringPrototypeSubstr(hostHeader, 1, index - 1); 365 servername = StringPrototypeSplit(hostHeader, ':', 1)[0]; 369 if (net.isIP(servername)) 370 servername = ''; [all …]
|
D | _tls_wrap.js | 212 const servername = info.servername; 213 if (!servername || !owner._SNICallback) 217 owner._SNICallback(servername, (err, context) => { 496 this.servername = null; 871 if (connectOptions.servername) { 872 this.setServername(connectOptions.servername); 1004 if (this.servername === null) { 1005 this.servername = this._handle.getServername(); 1012 'servername', this.servername); 1510 Server.prototype.addContext = function(servername, context) { argument [all …]
|
/third_party/node/deps/undici/src/lib/core/ |
D | connect.js | 83 …return function connect ({ hostname, host, protocol, port, servername, localAddress, httpSocket },… property 89 servername = servername || options.servername || util.getServerName(host) || null 91 const sessionKey = servername || hostname 99 servername, property
|
/third_party/node/deps/undici/src/lib/ |
D | proxy-agent.js | 109 let servername 111 servername = this[kRequestTls].servername 113 servername = opts.servername 115 this[kConnectEndpoint]({ ...opts, servername, httpSocket: socket }, callback)
|
/third_party/openssl/test/helpers/ |
D | handshake.c | 60 ssl_servername_t servername; member 104 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); in select_server_ctx() local 108 if (servername == NULL) { in select_server_ctx() 109 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1; in select_server_ctx() 113 if (strcmp(servername, "server2") == 0) { in select_server_ctx() 124 ex_data->servername = SSL_TEST_SERVERNAME_SERVER2; in select_server_ctx() 126 } else if (strcmp(servername, "server1") == 0) { in select_server_ctx() 127 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1; in select_server_ctx() 130 ex_data->servername = SSL_TEST_SERVERNAME_SERVER1; in select_server_ctx() 140 const char *servername; in client_hello_select_server_ctx() local [all …]
|
/third_party/node/test/internet/ |
D | test-tls-autoselectfamily-servername.js | 21 servername: INET_HOST, property 33 servername: INET_HOST, property
|
/third_party/node/deps/npm/node_modules/minipass-fetch/lib/ |
D | request.js | 90 servername, 115 servername, 226 servername, 266 servername,
|
/third_party/node/deps/npm/node_modules/https-proxy-agent/dist/ |
D | agent.js | 124 const servername = opts.servername || opts.host; 126 servername })); field
|