1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
|
'use strict';
var common = require('../common');
var assert = require('assert');
if (!common.hasCrypto) {
console.log('1..0 # Skipped: missing crypto');
return;
}
var tls = require('tls');
var fs = require('fs');
var path = require('path');
var options = {
key: fs.readFileSync(path.join(common.fixturesDir, 'test_key.pem')),
cert: fs.readFileSync(path.join(common.fixturesDir, 'test_cert.pem'))
};
var connectCount = 0;
var server = tls.createServer(options, function(socket) {
++connectCount;
socket.on('data', function(data) {
console.error(data.toString());
assert.equal(data, 'ok');
});
}).listen(common.PORT, function() {
unauthorized();
});
function unauthorized() {
var socket = tls.connect({
port: common.PORT,
servername: 'localhost',
rejectUnauthorized: false
}, function() {
assert(!socket.authorized);
socket.end();
rejectUnauthorized();
});
socket.on('error', function(err) {
assert(false);
});
socket.write('ok');
}
function rejectUnauthorized() {
var socket = tls.connect(common.PORT, {
servername: 'localhost'
}, function() {
assert(false);
});
socket.on('error', function(err) {
console.error(err);
authorized();
});
socket.write('ng');
}
function authorized() {
var socket = tls.connect(common.PORT, {
ca: [fs.readFileSync(path.join(common.fixturesDir, 'test_cert.pem'))],
servername: 'localhost'
}, function() {
assert(socket.authorized);
socket.end();
server.close();
});
socket.on('error', function(err) {
assert(false);
});
socket.write('ok');
}
process.on('exit', function() {
assert.equal(connectCount, 3);
});
|