aboutsummaryrefslogtreecommitdiff
path: root/test
diff options
context:
space:
mode:
authorFedor Indutny <fedor@indutny.com>2014-09-01 18:44:57 +0400
committerFedor Indutny <fedor@indutny.com>2014-09-03 17:36:54 +0400
commit73631bbcc83888ec61a0aebf4eff3904e9384a2e (patch)
tree7077275225c1e0c1d0d8977faf6e46a5954cad1e /test
parent7343c77cdba04e3b7ea6041285fe9b1e9f4fdaeb (diff)
downloadandroid-node-v8-73631bbcc83888ec61a0aebf4eff3904e9384a2e.tar.gz
android-node-v8-73631bbcc83888ec61a0aebf4eff3904e9384a2e.tar.bz2
android-node-v8-73631bbcc83888ec61a0aebf4eff3904e9384a2e.zip
tls: support multiple keys/certs
Required to serve website with both ECDSA/RSA certificates.
Diffstat (limited to 'test')
-rw-r--r--test/simple/test-tls-multi-key.js74
1 files changed, 74 insertions, 0 deletions
diff --git a/test/simple/test-tls-multi-key.js b/test/simple/test-tls-multi-key.js
new file mode 100644
index 0000000000..e00c404093
--- /dev/null
+++ b/test/simple/test-tls-multi-key.js
@@ -0,0 +1,74 @@
+// Copyright Joyent, Inc. and other Node contributors.
+//
+// Permission is hereby granted, free of charge, to any person obtaining a
+// copy of this software and associated documentation files (the
+// "Software"), to deal in the Software without restriction, including
+// without limitation the rights to use, copy, modify, merge, publish,
+// distribute, sublicense, and/or sell copies of the Software, and to permit
+// persons to whom the Software is furnished to do so, subject to the
+// following conditions:
+//
+// The above copyright notice and this permission notice shall be included
+// in all copies or substantial portions of the Software.
+//
+// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
+// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
+// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN
+// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
+// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
+// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
+// USE OR OTHER DEALINGS IN THE SOFTWARE.
+
+if (!process.versions.openssl) {
+ console.error('Skipping because node compiled without OpenSSL.');
+ process.exit(0);
+}
+
+var common = require('../common');
+var assert = require('assert');
+var tls = require('tls');
+var fs = require('fs');
+
+var options = {
+ key: [
+ fs.readFileSync(common.fixturesDir + '/keys/agent1-key.pem'),
+ fs.readFileSync(common.fixturesDir + '/keys/ec-key.pem')
+ ],
+ cert: [
+ fs.readFileSync(common.fixturesDir + '/keys/agent1-cert.pem'),
+ fs.readFileSync(common.fixturesDir + '/keys/ec-cert.pem')
+ ]
+};
+
+var ciphers = [];
+
+var server = tls.createServer(options, function(conn) {
+ conn.end('ok');
+}).listen(common.PORT, function() {
+ var ecdsa = tls.connect(common.PORT, {
+ ciphers: 'ECDHE-ECDSA-AES256-GCM-SHA384',
+ rejectUnauthorized: false
+ }, function() {
+ var rsa = tls.connect(common.PORT, {
+ ciphers: 'ECDHE-RSA-AES256-GCM-SHA384',
+ rejectUnauthorized: false
+ }, function() {
+ ecdsa.destroy();
+ rsa.destroy();
+
+ ciphers.push(ecdsa.getCipher());
+ ciphers.push(rsa.getCipher());
+ server.close();
+ });
+ });
+});
+
+process.on('exit', function() {
+ assert.deepEqual(ciphers, [{
+ name: 'ECDHE-ECDSA-AES256-GCM-SHA384',
+ version: 'TLSv1/SSLv3'
+ }, {
+ name: 'ECDHE-RSA-AES256-GCM-SHA384',
+ version: 'TLSv1/SSLv3'
+ }]);
+});