mirror of
https://github.com/nodejs/node.git
synced 2024-11-25 08:19:38 +01:00
b9686233fc
StreamBase is an improved way to write C++ streams. The class itself is for separting `StreamWrap` (with the methods like `.writeAsciiString`, `.writeBuffer`, `.writev`, etc) from the `HandleWrap` class, making possible to write abstract C++ streams that are not bound to any uv socket. The following methods are important part of the abstraction (which mimics libuv's stream API): * Events: * `OnAlloc(size_t size, uv_buf_t*)` * `OnRead(ssize_t nread, const uv_buf_t*, uv_handle_type pending)` * `OnAfterWrite(WriteWrap*)` * Wrappers: * `DoShutdown(ShutdownWrap*)` * `DoTryWrite(uv_buf_t** bufs, size_t* count)` * `DoWrite(WriteWrap*, uv_buf_t*, size_t count, uv_stream_t* handle)` * `Error()` * `ClearError()` The implementation should provide all of these methods, thus providing the access to the underlying resource (be it uv handle, TLS socket, or anything else). A C++ stream may consume the input of another stream by replacing the event callbacks and proxying the writes. This kind of API is actually used now for the TLSWrap implementation, making it possible to wrap TLS stream into another TLS stream. Thus legacy API calls are no longer required in `_tls_wrap.js`. PR-URL: https://github.com/iojs/io.js/pull/840 Reviewed-By: Trevor Norris <trev.norris@gmail.com> Reviewed-By: Chris Dickinson <christopher.s.dickinson@gmail.com>
53 lines
1.3 KiB
JavaScript
53 lines
1.3 KiB
JavaScript
if (!process.versions.openssl) {
|
|
console.error('Skipping because node compiled without OpenSSL.');
|
|
process.exit(0);
|
|
}
|
|
|
|
var common = require('../common');
|
|
var assert = require('assert');
|
|
var tls = require('tls');
|
|
var fs = require('fs');
|
|
|
|
var options = {
|
|
key: [
|
|
fs.readFileSync(common.fixturesDir + '/keys/agent1-key.pem'),
|
|
fs.readFileSync(common.fixturesDir + '/keys/ec-key.pem')
|
|
],
|
|
cert: [
|
|
fs.readFileSync(common.fixturesDir + '/keys/agent1-cert.pem'),
|
|
fs.readFileSync(common.fixturesDir + '/keys/ec-cert.pem')
|
|
]
|
|
};
|
|
|
|
var ciphers = [];
|
|
|
|
var server = tls.createServer(options, function(conn) {
|
|
conn.end('ok');
|
|
}).listen(common.PORT, function() {
|
|
var ecdsa = tls.connect(common.PORT, {
|
|
ciphers: 'ECDHE-ECDSA-AES256-GCM-SHA384',
|
|
rejectUnauthorized: false
|
|
}, function() {
|
|
ciphers.push(ecdsa.getCipher());
|
|
var rsa = tls.connect(common.PORT, {
|
|
ciphers: 'ECDHE-RSA-AES256-GCM-SHA384',
|
|
rejectUnauthorized: false
|
|
}, function() {
|
|
ciphers.push(rsa.getCipher());
|
|
ecdsa.destroy();
|
|
rsa.destroy();
|
|
server.close();
|
|
});
|
|
});
|
|
});
|
|
|
|
process.on('exit', function() {
|
|
assert.deepEqual(ciphers, [{
|
|
name: 'ECDHE-ECDSA-AES256-GCM-SHA384',
|
|
version: 'TLSv1/SSLv3'
|
|
}, {
|
|
name: 'ECDHE-RSA-AES256-GCM-SHA384',
|
|
version: 'TLSv1/SSLv3'
|
|
}]);
|
|
});
|