nodejs/test/parallel/test-tls-write-error.js
Shelley Vohr 2b425345fe
crypto: expose crypto.constants.OPENSSL_IS_BORINGSSL
PR-URL: https://github.com/nodejs/node/pull/58387
Reviewed-By: Anna Henningsen <anna@addaleax.net>
Reviewed-By: James M Snell <jasnell@gmail.com>
Reviewed-By: Chengzhong Wu <legendecas@gmail.com>
2025-05-22 11:04:16 +00:00

60 lines
1.5 KiB
JavaScript

'use strict';
const common = require('../common');
if (!common.hasCrypto)
common.skip('missing crypto');
const { TestTLSSocket, ccs } = require('../common/tls');
const fixtures = require('../common/fixtures');
const https = require('https');
// Regression test for an use-after-free bug in the TLS implementation that
// would occur when `SSL_write()` failed.
// Refs: https://github.com/nodejs-private/security/issues/189
const server_key = fixtures.readKey('agent1-key.pem');
const server_cert = fixtures.readKey('agent1-cert.pem');
const opts = {
key: server_key,
cert: server_cert,
};
if (!process.features.openssl_is_boringssl) {
opts.ciphers = 'ALL@SECLEVEL=0';
}
const server = https.createServer(opts, (req, res) => {
res.write('hello');
}).listen(0, common.mustCall(() => {
const client = new TestTLSSocket(server_cert);
client.connect({
host: 'localhost',
port: server.address().port
}, common.mustCall(() => {
const ch = client.createClientHello();
client.write(ch);
}));
client.once('data', common.mustCall((buf) => {
let remaining = buf;
do {
remaining = client.parseTLSFrame(remaining);
} while (remaining.length > 0);
const cke = client.createClientKeyExchange();
const finished = client.createFinished();
const ill = client.createIllegalHandshake();
const frames = Buffer.concat([
cke,
ccs,
client.encrypt(finished),
client.encrypt(ill),
]);
client.write(frames, common.mustCall(() => {
client.end();
server.close();
}));
}));
}));