mirror of
https://github.com/nodejs/node.git
synced 2024-11-25 08:19:38 +01:00
3e1b1dd4a9
The copyright and license notice is already in the LICENSE file. There is no justifiable reason to also require that it be included in every file, since the individual files are not individually distributed except as part of the entire package.
133 lines
2.9 KiB
JavaScript
133 lines
2.9 KiB
JavaScript
var common = require('../common');
|
|
|
|
if (!common.opensslCli) {
|
|
console.error('Skipping because node compiled without OpenSSL CLI.');
|
|
process.exit(0);
|
|
}
|
|
|
|
var assert = require('assert');
|
|
|
|
var join = require('path').join;
|
|
var net = require('net');
|
|
var fs = require('fs');
|
|
var tls = require('tls');
|
|
var spawn = require('child_process').spawn;
|
|
|
|
var connections = 0;
|
|
var key = fs.readFileSync(join(common.fixturesDir, 'agent.key')).toString();
|
|
var cert = fs.readFileSync(join(common.fixturesDir, 'agent.crt')).toString();
|
|
|
|
function log(a) {
|
|
console.error('***server*** ' + a);
|
|
}
|
|
|
|
var server = net.createServer(function(socket) {
|
|
connections++;
|
|
log('connection fd=' + socket.fd);
|
|
var sslcontext = tls.createSecureContext({key: key, cert: cert});
|
|
sslcontext.context.setCiphers('RC4-SHA:AES128-SHA:AES256-SHA');
|
|
|
|
var pair = tls.createSecurePair(sslcontext, true);
|
|
|
|
assert.ok(pair.encrypted.writable);
|
|
assert.ok(pair.cleartext.writable);
|
|
|
|
pair.encrypted.pipe(socket);
|
|
socket.pipe(pair.encrypted);
|
|
|
|
log('i set it secure');
|
|
|
|
pair.on('secure', function() {
|
|
log('connected+secure!');
|
|
pair.cleartext.write('hello\r\n');
|
|
log(pair.cleartext.getPeerCertificate());
|
|
log(pair.cleartext.getCipher());
|
|
});
|
|
|
|
pair.cleartext.on('data', function(data) {
|
|
log('read bytes ' + data.length);
|
|
pair.cleartext.write(data);
|
|
});
|
|
|
|
socket.on('end', function() {
|
|
log('socket end');
|
|
});
|
|
|
|
pair.cleartext.on('error', function(err) {
|
|
log('got error: ');
|
|
log(err);
|
|
log(err.stack);
|
|
socket.destroy();
|
|
});
|
|
|
|
pair.encrypted.on('error', function(err) {
|
|
log('encrypted error: ');
|
|
log(err);
|
|
log(err.stack);
|
|
socket.destroy();
|
|
});
|
|
|
|
socket.on('error', function(err) {
|
|
log('socket error: ');
|
|
log(err);
|
|
log(err.stack);
|
|
socket.destroy();
|
|
});
|
|
|
|
socket.on('close', function(err) {
|
|
log('socket closed');
|
|
});
|
|
|
|
pair.on('error', function(err) {
|
|
log('secure error: ');
|
|
log(err);
|
|
log(err.stack);
|
|
socket.destroy();
|
|
});
|
|
});
|
|
|
|
var gotHello = false;
|
|
var sentWorld = false;
|
|
var gotWorld = false;
|
|
var opensslExitCode = -1;
|
|
|
|
server.listen(common.PORT, function() {
|
|
// To test use: openssl s_client -connect localhost:8000
|
|
var client = spawn(common.opensslCli, ['s_client', '-connect', '127.0.0.1:' +
|
|
common.PORT]);
|
|
|
|
|
|
var out = '';
|
|
|
|
client.stdout.setEncoding('utf8');
|
|
client.stdout.on('data', function(d) {
|
|
out += d;
|
|
|
|
if (!gotHello && /hello/.test(out)) {
|
|
gotHello = true;
|
|
client.stdin.write('world\r\n');
|
|
sentWorld = true;
|
|
}
|
|
|
|
if (!gotWorld && /world/.test(out)) {
|
|
gotWorld = true;
|
|
client.stdin.end();
|
|
}
|
|
});
|
|
|
|
client.stdout.pipe(process.stdout, { end: false });
|
|
|
|
client.on('exit', function(code) {
|
|
opensslExitCode = code;
|
|
server.close();
|
|
});
|
|
});
|
|
|
|
process.on('exit', function() {
|
|
assert.equal(1, connections);
|
|
assert.ok(gotHello);
|
|
assert.ok(sentWorld);
|
|
assert.ok(gotWorld);
|
|
assert.equal(0, opensslExitCode);
|
|
});
|