mirror of
https://github.com/nodejs/node.git
synced 2024-12-01 16:10:02 +01:00
6326ced2de
Lots of changes, but mostly just search/replace of fixtures.readSync(...) to fixtures.readKey([new key]...) Benchmarks modified to use fixtures.readKey(...): benchmark/tls/throughput.js benchmark/tls/tls-connect.js benchmark/tls/secure-pair.js Also be sure to review the change to L16 of test/parallel/test-crypto-sign-verify.js PR-URL: https://github.com/nodejs/node/pull/27962 Reviewed-By: Sam Roberts <vieuxtech@gmail.com> Reviewed-By: Ujjwal Sharma <usharma1998@gmail.com> Reviewed-By: Rich Trott <rtrott@gmail.com>
74 lines
2.0 KiB
JavaScript
74 lines
2.0 KiB
JavaScript
'use strict';
|
|
|
|
const common = require('../common');
|
|
if (!common.hasCrypto)
|
|
common.skip('missing crypto');
|
|
|
|
if (!common.hasIPv6)
|
|
common.skip('IPv6 support required');
|
|
|
|
const initHooks = require('./init-hooks');
|
|
const verifyGraph = require('./verify-graph');
|
|
const tls = require('tls');
|
|
const fixtures = require('../common/fixtures');
|
|
|
|
const hooks = initHooks();
|
|
hooks.enable();
|
|
|
|
//
|
|
// Creating server and listening on port
|
|
//
|
|
const server = tls
|
|
.createServer({
|
|
cert: fixtures.readKey('rsa_cert.crt'),
|
|
key: fixtures.readKey('rsa_private.pem')
|
|
})
|
|
.on('listening', common.mustCall(onlistening))
|
|
.on('secureConnection', common.mustCall(onsecureConnection))
|
|
.listen(0);
|
|
|
|
function onlistening() {
|
|
//
|
|
// Creating client and connecting it to server
|
|
//
|
|
tls
|
|
.connect(server.address().port, { rejectUnauthorized: false })
|
|
.on('secureConnect', common.mustCall(onsecureConnect));
|
|
}
|
|
|
|
function onsecureConnection() {}
|
|
|
|
function onsecureConnect() {
|
|
// end() client socket, which causes slightly different hook events than
|
|
// destroy(), but with TLS1.3 destroy() rips the connection down before the
|
|
// server completes the handshake.
|
|
this.end();
|
|
|
|
// Closing server
|
|
server.close(common.mustCall(onserverClosed));
|
|
}
|
|
|
|
function onserverClosed() {}
|
|
|
|
process.on('exit', onexit);
|
|
|
|
function onexit() {
|
|
hooks.disable();
|
|
|
|
verifyGraph(
|
|
hooks,
|
|
[ { type: 'TCPSERVERWRAP', id: 'tcpserver:1', triggerAsyncId: null },
|
|
{ type: 'TCPWRAP', id: 'tcp:1', triggerAsyncId: 'tcpserver:1' },
|
|
{ type: 'TLSWRAP', id: 'tls:1', triggerAsyncId: 'tcpserver:1' },
|
|
{ type: 'GETADDRINFOREQWRAP',
|
|
id: 'getaddrinforeq:1', triggerAsyncId: 'tls:1' },
|
|
{ type: 'TCPCONNECTWRAP',
|
|
id: 'tcpconnect:1', triggerAsyncId: 'tcp:1' },
|
|
{ type: 'TCPWRAP', id: 'tcp:2', triggerAsyncId: 'tcpserver:1' },
|
|
{ type: 'TLSWRAP', id: 'tls:2', triggerAsyncId: 'tcpserver:1' },
|
|
{ type: 'Immediate', id: 'immediate:1', triggerAsyncId: 'tcp:2' },
|
|
{ type: 'Immediate', id: 'immediate:2', triggerAsyncId: 'tcp:1' },
|
|
]
|
|
);
|
|
}
|