2018-03-14 03:13:29 +05:30
|
|
|
'use strict';
|
|
|
|
const common = require('../common');
|
|
|
|
if (!common.hasCrypto)
|
|
|
|
common.skip('node compiled without crypto.');
|
|
|
|
const fixtures = require('../common/fixtures');
|
|
|
|
|
|
|
|
// This test ensures that TLS does not fail to read a self-signed certificate
|
|
|
|
// and thus throw an `authorizationError`.
|
|
|
|
// https://github.com/nodejs/node/issues/5100
|
|
|
|
|
|
|
|
const assert = require('assert');
|
|
|
|
const tls = require('tls');
|
|
|
|
|
2016-12-22 11:04:59 -08:00
|
|
|
const pfx = fixtures.readKey('agent1.pfx');
|
2018-03-14 03:13:29 +05:30
|
|
|
|
|
|
|
const server = tls
|
|
|
|
.createServer(
|
|
|
|
{
|
|
|
|
pfx: pfx,
|
|
|
|
passphrase: 'sample',
|
|
|
|
requestCert: true,
|
|
|
|
rejectUnauthorized: false
|
|
|
|
},
|
|
|
|
common.mustCall(function(c) {
|
2018-11-08 13:40:46 -08:00
|
|
|
assert.strictEqual(c.getPeerCertificate().serialNumber,
|
2022-09-03 14:46:47 +00:00
|
|
|
'147D36C1C2F74206DE9FAB5F2226D78ADB00A426');
|
2018-03-14 03:13:29 +05:30
|
|
|
assert.strictEqual(c.authorizationError, null);
|
|
|
|
c.end();
|
|
|
|
})
|
|
|
|
)
|
|
|
|
.listen(0, function() {
|
|
|
|
const client = tls.connect(
|
|
|
|
{
|
|
|
|
port: this.address().port,
|
|
|
|
pfx: pfx,
|
|
|
|
passphrase: 'sample',
|
|
|
|
rejectUnauthorized: false
|
|
|
|
},
|
|
|
|
function() {
|
2019-01-14 12:08:55 +01:00
|
|
|
for (let i = 0; i < 10; ++i) {
|
|
|
|
// Calling this repeatedly is a regression test that verifies
|
|
|
|
// that .getCertificate() does not accidentally decrease the
|
|
|
|
// reference count of the X509* certificate on the native side.
|
|
|
|
assert.strictEqual(client.getCertificate().serialNumber,
|
2022-09-03 14:46:47 +00:00
|
|
|
'147D36C1C2F74206DE9FAB5F2226D78ADB00A426');
|
2019-01-14 12:08:55 +01:00
|
|
|
}
|
2018-03-14 03:13:29 +05:30
|
|
|
client.end();
|
|
|
|
server.close();
|
|
|
|
}
|
|
|
|
);
|
|
|
|
});
|