/third_party/node/test/parallel/ |
H A D | test-https-strict.js | 83 const server2 = server(options2); 89 server2.listen(0, listening()); 144 port === server2.address().port ? server2 : 156 server2.close(); 166 const port2 = server2.address().port; 180 // server2: self-signed, host = 'agent2' 202 assert.strictEqual(server2.requests.length, server2.expectCount);
|
H A D | test-http-agent-maxtotalsockets.js | 44 const server2 = http.createServer(common.mustCall((req, res) => { 49 server2.keepAliveTimeout = 0; 55 server2.close(); 96 server2.listen(0, common.mustCall(() => handler(server2)));
|
H A D | test-cluster-child-index-net.js | 20 const server2 = net.createServer(); 21 server2.listen(kPort, common.mustCall(() => { 22 server2.close(countdown.dec());
|
H A D | test-net-server-listen-path.js | 79 const server2 = net.createServer() 85 server2.on('error', common.mustCall((err) => {
|
/third_party/libuv/test/ |
H A D | test-tcp-bind6-error.c | 39 uv_tcp_t server1, server2; in TEST_IMPL() local 52 r = uv_tcp_init(uv_default_loop(), &server2); in TEST_IMPL() 54 r = uv_tcp_bind(&server2, (const struct sockaddr*) &addr, 0); in TEST_IMPL() 59 r = uv_listen((uv_stream_t*)&server2, 128, NULL); in TEST_IMPL() 63 uv_close((uv_handle_t*)&server2, close_cb); in TEST_IMPL()
|
H A D | test-pipe-bind-error.c | 46 uv_pipe_t server1, server2; in TEST_IMPL() local 54 r = uv_pipe_init(uv_default_loop(), &server2, 0); in TEST_IMPL() 56 r = uv_pipe_bind(&server2, TEST_PIPENAME); in TEST_IMPL() 61 r = uv_listen((uv_stream_t*)&server2, SOMAXCONN, NULL); in TEST_IMPL() 65 uv_close((uv_handle_t*)&server2, close_cb); in TEST_IMPL()
|
H A D | test-tcp-bind-error.c | 82 uv_tcp_t server1, server2; in TEST_IMPL() local 91 r = uv_tcp_init(uv_default_loop(), &server2); in TEST_IMPL() 93 r = uv_tcp_bind(&server2, (const struct sockaddr*) &addr, 0); in TEST_IMPL() 98 r = uv_listen((uv_stream_t*)&server2, 128, NULL); in TEST_IMPL() 102 uv_close((uv_handle_t*)&server2, close_cb); in TEST_IMPL()
|
/third_party/mbedtls/tests/data_files/ |
H A D | Makefile | 658 $(OPENSSL) req -x509 -nodes -days 7300 -key server2.key -outform DER -out $@ -config authorityKeyId_subjectKeyId.conf -extensions 'v3_req' -set_serial 593828494303792449134898749208168108403991951034 661 $(OPENSSL) req -x509 -nodes -days 7300 -key server2.key -outform DER -out $@ -config authorityKeyId_subjectKeyId.conf -extensions 'v3_req_authorityKeyId_no_keyid' -set_serial 593828494303792449134898749208168108403991951034 664 $(OPENSSL) req -x509 -nodes -days 7300 -key server2.key -outform DER -out $@ -config authorityKeyId_subjectKeyId.conf -extensions 'v3_req_authorityKeyId_no_issuer' 667 $(OPENSSL) req -x509 -nodes -days 7300 -key server2.key -outform DER -out $@ -config authorityKeyId_subjectKeyId.conf -extensions 'v3_req_no_authorityKeyId' 1483 # server2* 1487 server2.req.sha256: server2.key 1489 all_intermediate += server2.req.sha256 1491 parse_input/server2.crt.der: parse_input/server2 [all...] |
/third_party/openssl/test/helpers/ |
H A D | handshake_srp.c | 61 if (extra->server2.srp_user != NULL) { in configure_handshake_ctx_for_srp() 65 server2_ctx_data->srp_user = OPENSSL_strdup(extra->server2.srp_user); in configure_handshake_ctx_for_srp() 66 server2_ctx_data->srp_password = OPENSSL_strdup(extra->server2.srp_password); in configure_handshake_ctx_for_srp()
|
H A D | ssl_test_ctx.c | 205 {"server2", SSL_TEST_SERVERNAME_SERVER2}, 738 OPENSSL_free(conf->server2.npn_protocols); in ssl_test_extra_conf_free_data() 741 OPENSSL_free(conf->server2.alpn_protocols); in ssl_test_extra_conf_free_data() 745 OPENSSL_free(conf->server2.srp_user); in ssl_test_extra_conf_free_data() 746 OPENSSL_free(conf->server2.srp_password); in ssl_test_extra_conf_free_data() 750 OPENSSL_free(conf->server2.session_ticket_app_data); in ssl_test_extra_conf_free_data() 862 } else if (strcmp(option->name, "server2") == 0) { in SSL_TEST_CTX_create() 863 if (!parse_server_options(&ctx->extra.server2, conf, option->value)) in SSL_TEST_CTX_create() 873 } else if (strcmp(option->name, "resume-server2") == 0) { in SSL_TEST_CTX_create() 874 if (!parse_server_options(&ctx->resume_extra.server2, con in SSL_TEST_CTX_create() [all...] |
H A D | handshake.c | 113 if (strcmp(servername, "server2") == 0) { in select_server_ctx() 177 if (len == strlen("server2") && strncmp(servername, "server2", len) == 0) { in client_hello_select_server_ctx() 593 if (extra->server2.npn_protocols != NULL) { in configure_handshake_ctx() 594 if (!TEST_true(parse_protos(extra->server2.npn_protocols, in configure_handshake_ctx() 618 if (extra->server2.alpn_protocols != NULL) { in configure_handshake_ctx() 620 || !TEST_true(parse_protos(extra->server2.alpn_protocols, in configure_handshake_ctx() 647 if (extra->server2.session_ticket_app_data != NULL) { in configure_handshake_ctx() 651 OPENSSL_strdup(extra->server2.session_ticket_app_data); in configure_handshake_ctx() 658 * one CTX in another CTX. Don't address server2 fo in configure_handshake_ctx() [all...] |
H A D | ssl_test_ctx.h | 139 SSL_TEST_SERVER_CONF server2; member
|
/third_party/openssl/test/ |
H A D | ssl_test_ctx_test.c | 70 || !TEST_true(serverconf_eq(&extra->server2, &extra2->server2))) in extraconf_eq() 192 fixture->expected_ctx->resume_extra.server2.alpn_protocols = in test_good_configuration() 194 if (!TEST_ptr(fixture->expected_ctx->resume_extra.server2.alpn_protocols)) in test_good_configuration()
|
/third_party/node/test/cctest/ |
H A D | test_inspector_socket_server.cc | 494 ServerHolder server2(false, &loop, server1.port()); in TEST_F() 495 ASSERT_FALSE(server2->Start()); in TEST_F()
|
/third_party/mbedtls/tests/ |
H A D | ssl-opt.sh | 480 *server2*|\ 482 # server2 and server7 certificates use RSA encryption 2106 key_file2=data_files/server2.key.enc key_pwd2=PolarSSLTest crt_file2=data_files/server2.crt" \ 2157 "$P_SRV force_version=tls12 auth_mode=required crt_file=data_files/server2-sha256.crt \ 2158 key_file=data_files/server2.key" \ 2159 "$P_CLI key_opaque=1 crt_file=data_files/server2-sha256.crt \ 2160 key_file=data_files/server2.key key_opaque_algs=rsa-sign-pkcs1,none" \ 2174 "$P_SRV force_version=tls12 auth_mode=required crt_file=data_files/server2-sha256.crt \ 2175 key_file=data_files/server2 [all...] |