summaryrefslogtreecommitdiff
path: root/test/parallel/test-crypto-verify-failure.js
diff options
context:
space:
mode:
authorFedor Indutny <fedor@indutny.com>2014-12-17 20:30:04 +0700
committerFedor Indutny <fedor@indutny.com>2014-12-17 20:45:02 +0700
commit0e19476595729c850f07befea93e864822cd8459 (patch)
treea868c3dd1becd87b7b5ea9fd2b645dd61e68ae8c /test/parallel/test-crypto-verify-failure.js
parent165b70f146e163b82a09bb869463708516c08cf6 (diff)
downloadandroid-node-v8-0e19476595729c850f07befea93e864822cd8459.tar.gz
android-node-v8-0e19476595729c850f07befea93e864822cd8459.tar.bz2
android-node-v8-0e19476595729c850f07befea93e864822cd8459.zip
test: split test in parallel/sequential
Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl> PR-URL: https://github.com/iojs/io.js/pull/172 Fix: iojs/io.js#139
Diffstat (limited to 'test/parallel/test-crypto-verify-failure.js')
-rw-r--r--test/parallel/test-crypto-verify-failure.js83
1 files changed, 83 insertions, 0 deletions
diff --git a/test/parallel/test-crypto-verify-failure.js b/test/parallel/test-crypto-verify-failure.js
new file mode 100644
index 0000000000..09c43ddc05
--- /dev/null
+++ b/test/parallel/test-crypto-verify-failure.js
@@ -0,0 +1,83 @@
+// Copyright Joyent, Inc. and other Node contributors.
+//
+// Permission is hereby granted, free of charge, to any person obtaining a
+// copy of this software and associated documentation files (the
+// "Software"), to deal in the Software without restriction, including
+// without limitation the rights to use, copy, modify, merge, publish,
+// distribute, sublicense, and/or sell copies of the Software, and to permit
+// persons to whom the Software is furnished to do so, subject to the
+// following conditions:
+//
+// The above copyright notice and this permission notice shall be included
+// in all copies or substantial portions of the Software.
+//
+// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
+// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
+// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN
+// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
+// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
+// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
+// USE OR OTHER DEALINGS IN THE SOFTWARE.
+
+
+
+
+var common = require('../common');
+var assert = require('assert');
+
+try {
+ var crypto = require('crypto');
+ var tls = require('tls');
+} catch (e) {
+ console.log('Not compiled with OPENSSL support.');
+ process.exit();
+}
+
+crypto.DEFAULT_ENCODING = 'buffer';
+
+var fs = require('fs');
+
+var certPem = fs.readFileSync(common.fixturesDir + '/test_cert.pem', 'ascii');
+
+var options = {
+ key: fs.readFileSync(common.fixturesDir + '/keys/agent1-key.pem'),
+ cert: fs.readFileSync(common.fixturesDir + '/keys/agent1-cert.pem')
+};
+
+var canSend = true;
+
+var server = tls.Server(options, function(socket) {
+ setImmediate(function() {
+ console.log('sending');
+ verify();
+ setImmediate(function() {
+ socket.destroy();
+ });
+ });
+});
+
+var client;
+
+function verify() {
+ console.log('verify');
+ var verified = crypto.createVerify('RSA-SHA1')
+ .update('Test')
+ .verify(certPem, 'asdfasdfas', 'base64');
+}
+
+server.listen(common.PORT, function() {
+ client = tls.connect({
+ port: common.PORT,
+ rejectUnauthorized: false
+ }, function() {
+ verify();
+ }).on('data', function(data) {
+ console.log(data);
+ }).on('error', function(err) {
+ throw err;
+ }).on('close', function() {
+ server.close();
+ }).resume();
+});
+
+server.unref();