mirror of
https://github.com/nodejs/node.git
synced 2024-11-24 20:29:23 +01:00
8671e4a116
Ubuntu 22.04 Jammy rejects 1024 bit RSA Keys PR-URL: https://github.com/nodejs/node/pull/44498 Refs: https://github.com/nodejs/node/issues/44497 Reviewed-By: Luigi Pinca <luigipinca@gmail.com> Reviewed-By: Michael Dawson <midawson@redhat.com>
52 lines
1.5 KiB
JavaScript
52 lines
1.5 KiB
JavaScript
'use strict';
|
|
const common = require('../common');
|
|
if (!common.hasCrypto)
|
|
common.skip('node compiled without crypto.');
|
|
const fixtures = require('../common/fixtures');
|
|
|
|
// This test ensures that TLS does not fail to read a self-signed certificate
|
|
// and thus throw an `authorizationError`.
|
|
// https://github.com/nodejs/node/issues/5100
|
|
|
|
const assert = require('assert');
|
|
const tls = require('tls');
|
|
|
|
const pfx = fixtures.readKey('agent1.pfx');
|
|
|
|
const server = tls
|
|
.createServer(
|
|
{
|
|
pfx: pfx,
|
|
passphrase: 'sample',
|
|
requestCert: true,
|
|
rejectUnauthorized: false
|
|
},
|
|
common.mustCall(function(c) {
|
|
assert.strictEqual(c.getPeerCertificate().serialNumber,
|
|
'147D36C1C2F74206DE9FAB5F2226D78ADB00A426');
|
|
assert.strictEqual(c.authorizationError, null);
|
|
c.end();
|
|
})
|
|
)
|
|
.listen(0, function() {
|
|
const client = tls.connect(
|
|
{
|
|
port: this.address().port,
|
|
pfx: pfx,
|
|
passphrase: 'sample',
|
|
rejectUnauthorized: false
|
|
},
|
|
function() {
|
|
for (let i = 0; i < 10; ++i) {
|
|
// Calling this repeatedly is a regression test that verifies
|
|
// that .getCertificate() does not accidentally decrease the
|
|
// reference count of the X509* certificate on the native side.
|
|
assert.strictEqual(client.getCertificate().serialNumber,
|
|
'147D36C1C2F74206DE9FAB5F2226D78ADB00A426');
|
|
}
|
|
client.end();
|
|
server.close();
|
|
}
|
|
);
|
|
});
|