From 0e19476595729c850f07befea93e864822cd8459 Mon Sep 17 00:00:00 2001 From: Fedor Indutny Date: Wed, 17 Dec 2014 20:30:04 +0700 Subject: test: split test in parallel/sequential Reviewed-By: Ben Noordhuis PR-URL: https://github.com/iojs/io.js/pull/172 Fix: iojs/io.js#139 --- test/parallel/test-crypto-verify-failure.js | 83 +++++++++++++++++++++++++++++ 1 file changed, 83 insertions(+) create mode 100644 test/parallel/test-crypto-verify-failure.js (limited to 'test/parallel/test-crypto-verify-failure.js') diff --git a/test/parallel/test-crypto-verify-failure.js b/test/parallel/test-crypto-verify-failure.js new file mode 100644 index 0000000000..09c43ddc05 --- /dev/null +++ b/test/parallel/test-crypto-verify-failure.js @@ -0,0 +1,83 @@ +// Copyright Joyent, Inc. and other Node contributors. +// +// Permission is hereby granted, free of charge, to any person obtaining a +// copy of this software and associated documentation files (the +// "Software"), to deal in the Software without restriction, including +// without limitation the rights to use, copy, modify, merge, publish, +// distribute, sublicense, and/or sell copies of the Software, and to permit +// persons to whom the Software is furnished to do so, subject to the +// following conditions: +// +// The above copyright notice and this permission notice shall be included +// in all copies or substantial portions of the Software. +// +// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS +// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF +// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN +// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, +// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR +// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE +// USE OR OTHER DEALINGS IN THE SOFTWARE. + + + + +var common = require('../common'); +var assert = require('assert'); + +try { + var crypto = require('crypto'); + var tls = require('tls'); +} catch (e) { + console.log('Not compiled with OPENSSL support.'); + process.exit(); +} + +crypto.DEFAULT_ENCODING = 'buffer'; + +var fs = require('fs'); + +var certPem = fs.readFileSync(common.fixturesDir + '/test_cert.pem', 'ascii'); + +var options = { + key: fs.readFileSync(common.fixturesDir + '/keys/agent1-key.pem'), + cert: fs.readFileSync(common.fixturesDir + '/keys/agent1-cert.pem') +}; + +var canSend = true; + +var server = tls.Server(options, function(socket) { + setImmediate(function() { + console.log('sending'); + verify(); + setImmediate(function() { + socket.destroy(); + }); + }); +}); + +var client; + +function verify() { + console.log('verify'); + var verified = crypto.createVerify('RSA-SHA1') + .update('Test') + .verify(certPem, 'asdfasdfas', 'base64'); +} + +server.listen(common.PORT, function() { + client = tls.connect({ + port: common.PORT, + rejectUnauthorized: false + }, function() { + verify(); + }).on('data', function(data) { + console.log(data); + }).on('error', function(err) { + throw err; + }).on('close', function() { + server.close(); + }).resume(); +}); + +server.unref(); -- cgit v1.2.3