2015-05-19 13:00:06 +02:00
|
|
|
'use strict';
|
2011-10-27 02:34:56 +09:00
|
|
|
var common = require('../common');
|
|
|
|
var assert = require('assert');
|
2015-03-04 12:11:21 +11:00
|
|
|
|
|
|
|
if (!common.hasCrypto) {
|
|
|
|
console.log('1..0 # Skipped: missing crypto');
|
2015-07-07 20:55:55 +05:30
|
|
|
return;
|
2015-03-04 12:11:21 +11:00
|
|
|
}
|
2011-10-27 02:34:56 +09:00
|
|
|
var tls = require('tls');
|
2015-03-04 12:11:21 +11:00
|
|
|
|
2011-10-27 02:34:56 +09:00
|
|
|
var fs = require('fs');
|
|
|
|
var path = require('path');
|
|
|
|
|
|
|
|
var key = fs.readFileSync(path.join(common.fixturesDir, 'pass-key.pem'));
|
|
|
|
var cert = fs.readFileSync(path.join(common.fixturesDir, 'pass-cert.pem'));
|
|
|
|
|
|
|
|
var server = tls.Server({
|
|
|
|
key: key,
|
|
|
|
passphrase: 'passphrase',
|
|
|
|
cert: cert,
|
2012-01-17 19:43:34 +01:00
|
|
|
ca: [cert],
|
2011-10-27 02:34:56 +09:00
|
|
|
requestCert: true,
|
|
|
|
rejectUnauthorized: true
|
|
|
|
}, function(s) {
|
|
|
|
s.end();
|
|
|
|
});
|
|
|
|
|
|
|
|
var connectCount = 0;
|
|
|
|
server.listen(common.PORT, function() {
|
2011-11-01 16:28:04 +01:00
|
|
|
var c = tls.connect({
|
|
|
|
port: common.PORT,
|
2011-10-27 02:34:56 +09:00
|
|
|
key: key,
|
|
|
|
passphrase: 'passphrase',
|
2012-08-30 16:43:20 +02:00
|
|
|
cert: cert,
|
|
|
|
rejectUnauthorized: false
|
2011-10-27 02:34:56 +09:00
|
|
|
}, function() {
|
|
|
|
++connectCount;
|
|
|
|
});
|
|
|
|
c.on('end', function() {
|
|
|
|
server.close();
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
assert.throws(function() {
|
2011-11-01 16:28:04 +01:00
|
|
|
tls.connect({
|
|
|
|
port: common.PORT,
|
2011-10-27 02:34:56 +09:00
|
|
|
key: key,
|
|
|
|
passphrase: 'invalid',
|
2012-08-30 16:43:20 +02:00
|
|
|
cert: cert,
|
|
|
|
rejectUnauthorized: false
|
2011-10-27 02:34:56 +09:00
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
process.on('exit', function() {
|
|
|
|
assert.equal(connectCount, 1);
|
|
|
|
});
|