Sha256: 2c6e89f9b55ce4a4f0fda1c4985126d66b491681eb92e6545c122382cf64bc25
Contents?: true
Size: 1.56 KB
Versions: 2
Compression:
Stored size: 1.56 KB
Contents
'use strict'; const common = require('../common'); const assert = require('assert'); if (!common.hasCrypto) { common.skip('missing crypto'); return; } const tls = require('tls'); const fs = require('fs'); const path = require('path'); const options = { key: fs.readFileSync(path.join(common.fixturesDir, 'test_key.pem')), cert: fs.readFileSync(path.join(common.fixturesDir, 'test_cert.pem')) }; const server = tls.createServer(options, common.mustCall(function(socket) { socket.on('data', function(data) { console.error(data.toString()); assert.strictEqual(data.toString(), 'ok'); }); }, 3)).listen(0, function() { unauthorized(); }); function unauthorized() { const socket = tls.connect({ port: server.address().port, servername: 'localhost', rejectUnauthorized: false }, common.mustCall(function() { assert(!socket.authorized); socket.end(); rejectUnauthorized(); })); socket.on('error', common.fail); socket.write('ok'); } function rejectUnauthorized() { const socket = tls.connect(server.address().port, { servername: 'localhost' }, common.fail); socket.on('error', common.mustCall(function(err) { console.error(err); authorized(); })); socket.write('ng'); } function authorized() { const socket = tls.connect(server.address().port, { ca: [fs.readFileSync(path.join(common.fixturesDir, 'test_cert.pem'))], servername: 'localhost' }, common.mustCall(function() { assert(socket.authorized); socket.end(); server.close(); })); socket.on('error', common.fail); socket.write('ok'); }
Version data entries
2 entries across 2 versions & 1 rubygems
Version | Path |
---|---|
node-compiler-0.9.1 | vendor/node/test/parallel/test-tls-client-reject.js |
node-compiler-0.9.0 | vendor/node-v7.2.1/test/parallel/test-tls-client-reject.js |