2019-05-11 23:07:06 +02:00
|
|
|
'use strict';
|
|
|
|
|
|
|
|
const common = require('../common');
|
|
|
|
if (!common.hasCrypto)
|
|
|
|
common.skip('missing crypto');
|
|
|
|
|
|
|
|
const assert = require('assert');
|
|
|
|
const tls = require('tls');
|
|
|
|
const fixtures = require('../common/fixtures');
|
|
|
|
|
|
|
|
const server = tls.createServer({
|
2019-05-29 17:03:05 -07:00
|
|
|
key: fixtures.readKey('agent2-key.pem'),
|
|
|
|
cert: fixtures.readKey('agent2-cert.pem'),
|
2019-05-11 23:07:06 +02:00
|
|
|
// Amount of keylog events depends on negotiated protocol
|
|
|
|
// version, so force a specific one:
|
|
|
|
minVersion: 'TLSv1.3',
|
|
|
|
maxVersion: 'TLSv1.3',
|
|
|
|
}).listen(() => {
|
|
|
|
const client = tls.connect({
|
|
|
|
port: server.address().port,
|
|
|
|
rejectUnauthorized: false,
|
|
|
|
});
|
|
|
|
|
2019-10-21 14:27:50 -07:00
|
|
|
server.on('keylog', common.mustCall((line, tlsSocket) => {
|
|
|
|
assert(Buffer.isBuffer(line));
|
|
|
|
assert.strictEqual(tlsSocket.encrypted, true);
|
|
|
|
}, 5));
|
|
|
|
client.on('keylog', common.mustCall((line) => {
|
|
|
|
assert(Buffer.isBuffer(line));
|
|
|
|
}, 5));
|
2019-05-11 23:07:06 +02:00
|
|
|
|
|
|
|
client.once('secureConnect', () => {
|
|
|
|
server.close();
|
|
|
|
client.end();
|
|
|
|
});
|
|
|
|
});
|