diff options
author | Fedor Indutny <fedor@indutny.com> | 2014-09-01 18:44:57 +0400 |
---|---|---|
committer | Fedor Indutny <fedor@indutny.com> | 2014-09-03 17:36:54 +0400 |
commit | 73631bbcc83888ec61a0aebf4eff3904e9384a2e (patch) | |
tree | 7077275225c1e0c1d0d8977faf6e46a5954cad1e /test | |
parent | 7343c77cdba04e3b7ea6041285fe9b1e9f4fdaeb (diff) | |
download | android-node-v8-73631bbcc83888ec61a0aebf4eff3904e9384a2e.tar.gz android-node-v8-73631bbcc83888ec61a0aebf4eff3904e9384a2e.tar.bz2 android-node-v8-73631bbcc83888ec61a0aebf4eff3904e9384a2e.zip |
tls: support multiple keys/certs
Required to serve website with both ECDSA/RSA certificates.
Diffstat (limited to 'test')
-rw-r--r-- | test/simple/test-tls-multi-key.js | 74 |
1 files changed, 74 insertions, 0 deletions
diff --git a/test/simple/test-tls-multi-key.js b/test/simple/test-tls-multi-key.js new file mode 100644 index 0000000000..e00c404093 --- /dev/null +++ b/test/simple/test-tls-multi-key.js @@ -0,0 +1,74 @@ +// Copyright Joyent, Inc. and other Node contributors. +// +// Permission is hereby granted, free of charge, to any person obtaining a +// copy of this software and associated documentation files (the +// "Software"), to deal in the Software without restriction, including +// without limitation the rights to use, copy, modify, merge, publish, +// distribute, sublicense, and/or sell copies of the Software, and to permit +// persons to whom the Software is furnished to do so, subject to the +// following conditions: +// +// The above copyright notice and this permission notice shall be included +// in all copies or substantial portions of the Software. +// +// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS +// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF +// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN +// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, +// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR +// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE +// USE OR OTHER DEALINGS IN THE SOFTWARE. + +if (!process.versions.openssl) { + console.error('Skipping because node compiled without OpenSSL.'); + process.exit(0); +} + +var common = require('../common'); +var assert = require('assert'); +var tls = require('tls'); +var fs = require('fs'); + +var options = { + key: [ + fs.readFileSync(common.fixturesDir + '/keys/agent1-key.pem'), + fs.readFileSync(common.fixturesDir + '/keys/ec-key.pem') + ], + cert: [ + fs.readFileSync(common.fixturesDir + '/keys/agent1-cert.pem'), + fs.readFileSync(common.fixturesDir + '/keys/ec-cert.pem') + ] +}; + +var ciphers = []; + +var server = tls.createServer(options, function(conn) { + conn.end('ok'); +}).listen(common.PORT, function() { + var ecdsa = tls.connect(common.PORT, { + ciphers: 'ECDHE-ECDSA-AES256-GCM-SHA384', + rejectUnauthorized: false + }, function() { + var rsa = tls.connect(common.PORT, { + ciphers: 'ECDHE-RSA-AES256-GCM-SHA384', + rejectUnauthorized: false + }, function() { + ecdsa.destroy(); + rsa.destroy(); + + ciphers.push(ecdsa.getCipher()); + ciphers.push(rsa.getCipher()); + server.close(); + }); + }); +}); + +process.on('exit', function() { + assert.deepEqual(ciphers, [{ + name: 'ECDHE-ECDSA-AES256-GCM-SHA384', + version: 'TLSv1/SSLv3' + }, { + name: 'ECDHE-RSA-AES256-GCM-SHA384', + version: 'TLSv1/SSLv3' + }]); +}); |