Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)
Tests completed in 65 milliseconds.
168 assertions of 168 passed, 0 failed.
- parseExt github.com (0, 13, 13)Rerun3 ms
- 9 aExtInfo.length
- [0].oid = AKID
- [0].critical = false
- [0].vidx
- [0].tlv
- [3].oid = keyUsage
- [3].critical = true
- [3].vidx
- [3].tlv = 0302...
- [8].oid = basicConstraints
- [8].critical = true
- [8].vidx
- [8].tlv = 3000
- getExtInfo github.com (0, 10, 10)Rerun1 ms
- i3(2.5.29.19) by oid not undefined
- oid
- critical
- vidx
- i3n(keyUsage) by name not undefined
- oid
- critical
- vidx
- ixn(unknownExt1) by name is undefined
- iyn(0.1.2.3) by oid is undefined
- getExtBasicConstraints (0, 3, 3)Rerun3 ms
- for GitHub.com site
- cA=true for DigiCert EV root
- cA:true,pathLen:3 for z1p3
- getExtKeyUsageBin() (0, 5, 5)Rerun2 ms
- 101 for GitHub.com site
- 1000011 for DigiCert EV root
- 0000011 for GlobalSign R6 root
- decipherOnly
- dsig,cert,crl
- getExtKeyUsageString() (0, 4, 4)Rerun2 ms
- digitalSignature,keyEncipherment for GitHub.com site
- digitalSignature,keyCertSign,cRLSign for DigiCert EV root
- keyCertSign,cRLSign for GlobalSign R6 root
- decipherOnly
- getExtKeyUsage test (0, 4, 4)Rerun2 ms
- digitalSignature,keyEncipherment for GitHub.com site
- digitalSignature,keyCertSign,cRLSign for DigiCert EV root
- keyCertSign,cRLSign for GlobalSign R6 root
- decipherOnly critical=true
- getExtSubjectKeyIdentifier() (0, 2, 2)Rerun2 ms
- for GitHub.com site
- for DigiCert EV root
- getExtAuthorityKeyIdentifier() (0, 3, 3)Rerun3 ms
- for GitHub.com site
- for DigiCert EV root
- hoge
- getExtExtKeyUsage test (0, 2, 2)Rerun1 ms
- for GitHub.com site
- three EKU
- getExtExtKeyUsageName test (DEPRECATED) (0, 1, 1)Rerun1 ms
- for GitHub.com site
- getExtSubjectAltName github.com (0, 3, 3)Rerun2 ms
- for GitHub.com site
- mail
- cloudflare 1.1.1.1 cert
- getExtSubjectAltName2 ip1.1.1.1 (DEPRECATED) (0, 1, 1)Rerun1 ms
- ip1.1.1.1 site
- getExtSubjectAltName with DNSx2 IPx2 (0, 1, 1)Rerun1 ms
- SAN with IPx2, DNSx2
- getExtCRLDistributionPoints test (0, 2, 2)Rerun1 ms
- two dp {http,ldap}://aaa.com
- for github.com site
- getExtCRLDistributionPointsURI github (0, 1, 1)Rerun1 ms
- for GitHub.com site
- getExtCRLDistributionPoints danmarks (0, 1, 1)Rerun1 ms
- for Danmarks Apotekerforening User cert
- getExtCRLDistributionPointsURI danmarks (0, 1, 1)Rerun1 ms
- for Danmarks Apotekerforening User cert
- getExtAuthorityInfoAccess (0, 3, 3)Rerun1 ms
- lets encrypt by method argument
- lets encrypt by method argument
- github digicert
- getExtAIAInfo test (DEPRECATED) (0, 1, 1)Rerun1 ms
- for GitHub.com site
- getExtCertificatePolicies (0, 3, 3)Rerun3 ms
- for GitHub.com site
- for pulse.cio.gov site Let's Encrypt cert
- moj CP
- _asn1ToUnotice (0, 3, 3)Rerun0 ms
- noticeref, exptext
- exptext
- noticeref
- _asn1ToNoticeRef (0, 3, 3)Rerun1 ms
- org, num
- org
- num
- _asn1ToNoticeNum (0, 1, 1)Rerun0 ms
- [1, 22]
- getUserNotice (0, 1, 1)Rerun0 ms
- sample UserNotice
- getExtPolicyMappings (0, 2, 2)Rerun1 ms
- {"extname":"policyMappings","critical":true,"array":[["anyPolicy","0.1.2"]]}
- {"extname":"policyMappings","critical":true,"array":[["1.2.3","0.1.2"],["1.2.5","0.1.5"]]}
- getExtPolicyConstraints (0, 2, 2)Rerun0 ms
- {"extname":"policyConstraints","critical":true,"inhibit":3}
- {"extname":"policyConstraints","critical":true,"reqexp":2}
- getExtInhibitAnyPolicy (0, 1, 1)Rerun0 ms
- {"extname":"inhibitAnyPolicy","critical":true,"skip":3}
- readCertPEM, parseExt aExtInfo github.com (0, 24, 24)Rerun0 ms
- num ext=9
- AKID TLV index
- AKID oid
- AKID critical
- AKID value index
- SKID oid
- SKID critical
- SAN oid
- SAN critical
- KeyUsage oid
- KeyUsage critical
- KeyUsage posV
- KeyUsage value 030205a0
- ExtKeyUsage oid
- ExtKeyUsage critical
- CDP oid
- CDP critical
- CertPolicy oid
- CertPolicy critical
- AIA oid
- AIA critical
- basicConstraints oid
- basicConstraints critical
- basicConst value 3000
- getExtInfo vidx github.com (0, 4, 4)Rerun1 ms
- by keyUsage
- by 2.5.29.15(=keyUsage)
- by policyConstraints -> undefined, no such extension
- by 0.0.0.0 -> undefined, no such extension
- getExtInfo getV github.com (0, 3, 3)Rerun0 ms
- by keyUsage
- by policyConstraints -> undefined, no such extension
- by 0.0.0.0 -> undefined, no such extension
- getExtInfo getTLV github.com (0, 3, 3)Rerun1 ms
- by keyUsage
- by policyConstraints -> undefined, no such extension
- by 0.0.0.0 -> undefined, no such extension
- getExtKeyUsageBin (0, 1, 1)Rerun0 ms
- 101
- getExtKeyUsageString (0, 1, 1)Rerun1 ms
- digitalSignature,keyEncipherment
- getExtBasicConstraints k1 {cA:true} (0, 3, 3)Rerun0 ms
- okay
- okay
- okay
- getExtBasicConstraints z1.der1-p3 {cA:true,pathLen:3} (0, 3, 3)Rerun0 ms
- okay
- okay
- okay
- getExtBasicConstraints z1.der2-emp {} (0, 2, 2)Rerun1 ms
- getExtInfo basicConstraints
- der2-emp
- getExtBasicConstraints z1.der3-no (no basic constraints) (0, 1, 1)Rerun0 ms
- no basicConstraints returns undefined
- getExtSubjectDirectoryAttributes (0, 1, 1)Rerun0 ms
- hoge
- parseExt(CSR) test (csrcertbot1) (0, 2, 2)Rerun1 ms
- aExtInfo=[{"critical":false,"oid":"2.5.29.17","vidx":670}]
- info=[["DNS","nodejs.rz-bsd.my.corp"]]
- getDistributionPoint test (0, 1, 1)Rerun0 ms
- {dpname: {full: [{uri: http://aaa.com/}]}}
- getDistributionPointName test (0, 1, 1)Rerun0 ms
- {full: [{uri: http://aaa.com/}]}
- getGeneralNames test (0, 2, 2)Rerun0 ms
- [{uri}]
- [{dn}]
- getGeneralName test (0, 3, 3)Rerun0 ms
- uri
- ip 192.168.1.1/24
- dn
- getGeneralName OtherName test (0, 2, 2)Rerun1 ms
- other brazil
- other jpki cn
- getX500NameRule test (0, 11, 11)Rerun0 ms
- mixed-1
- mixed-2
- mixed-3
- mixed-4
- utf8-1
- utf8-1a
- utf8-2
- utf8-3
- utf8-4
- prn-5
- 6-mixed
- getX500Name test (0, 4, 4)Rerun2 ms
- /C=JP/O=b/CN=a@a.jp
- /CN=Cànary (UTF-8 non ascii)
- BMP(ICS2) non ascii)
- CABF SMIME BR sample
- getRDN test (0, 1, 1)Rerun0 ms
- [CN a@a.jp ia5]
- getAttrTypeAndValue test (0, 5, 5)Rerun0 ms
- CN=1234©ú tel
- CN=123456 num
- CN=a@a.jp ia5
- O=b utf8
- C=JP prn
- X509.dnarraytostr (0, 2, 2)Rerun0 ms
- /C=JP/O=T1
- /C=JP/O=T1+CN=Bob
- X509.getExtNameConstraints (0, 5, 5)Rerun0 ms
- permit [{dns: testcertificates.gov}]
- exclude [{dns: testcertificates.gov}]
- permit [{uri: .testcertificates.gov}]
- permit [{ip: 192.168.1.1/24}]
- permit [{dn: /C=US/O=Test Certificates 2011/OU=permittedSubtree1}]
- X509.getGeneralSubtree (0, 3, 3)Rerun0 ms
- {dns: testcertificates.gov}
- {ip: 192.168.1.1/24}
- {dn: /C=US/O=...}
- getExtParam - unknown private extension (0, 1, 1)Rerun0 ms
- unknown extension 1.2.392.100300.1.1.5={prn 東京}
- X509.registExtParser (0, 2, 2)Rerun0 ms
- success case (=utf8)
- fail case (=prnstr)