blob: 3b4eec1eef1f4a62efcf184da651babd300a0917 [file] [log] [blame]
// Copyright Joyent, Inc. and other Node contributors.
//
// Permission is hereby granted, free of charge, to any person obtaining a
// copy of this software and associated documentation files (the
// "Software"), to deal in the Software without restriction, including
// without limitation the rights to use, copy, modify, merge, publish,
// distribute, sublicense, and/or sell copies of the Software, and to permit
// persons to whom the Software is furnished to do so, subject to the
// following conditions:
//
// The above copyright notice and this permission notice shall be included
// in all copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN
// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
// USE OR OTHER DEALINGS IN THE SOFTWARE.
if (!process.versions.openssl) {
console.error('Skipping because node compiled without OpenSSL.');
process.exit(0);
}
var common = require('../common');
var assert = require('assert');
var join = require('path').join;
var net = require('net');
var fs = require('fs');
var crypto = require('crypto');
var tls = require('tls');
var spawn = require('child_process').spawn;
var connections = 0;
var key = fs.readFileSync(join(common.fixturesDir, 'agent.key')).toString();
var cert = fs.readFileSync(join(common.fixturesDir, 'agent.crt')).toString();
function log(a) {
console.error('***server*** ' + a);
}
var server = net.createServer(function(socket) {
connections++;
log('connection fd=' + socket.fd);
var sslcontext = crypto.createCredentials({key: key, cert: cert});
sslcontext.context.setCiphers('RC4-SHA:AES128-SHA:AES256-SHA');
var pair = tls.createSecurePair(sslcontext, true);
assert.ok(pair.encrypted.writable);
assert.ok(pair.cleartext.writable);
pair.encrypted.pipe(socket);
socket.pipe(pair.encrypted);
log('i set it secure');
pair.on('secure', function() {
log('connected+secure!');
pair.cleartext.write('hello\r\n');
log(pair.cleartext.getPeerCertificate());
log(pair.cleartext.getCipher());
});
pair.cleartext.on('data', function(data) {
log('read bytes ' + data.length);
pair.cleartext.write(data);
});
socket.on('end', function() {
log('socket end');
});
pair.cleartext.on('error', function(err) {
log('got error: ');
log(err);
log(err.stack);
socket.destroy();
});
pair.encrypted.on('error', function(err) {
log('encrypted error: ');
log(err);
log(err.stack);
socket.destroy();
});
socket.on('error', function(err) {
log('socket error: ');
log(err);
log(err.stack);
socket.destroy();
});
socket.on('close', function(err) {
log('socket closed');
});
pair.on('error', function(err) {
log('secure error: ');
log(err);
log(err.stack);
socket.destroy();
});
});
var gotHello = false;
var sentWorld = false;
var gotWorld = false;
var opensslExitCode = -1;
server.listen(common.PORT, function() {
// To test use: openssl s_client -connect localhost:8000
var client = spawn('openssl', ['s_client', '-connect', '127.0.0.1:' +
common.PORT]);
var out = '';
client.stdout.setEncoding('utf8');
client.stdout.on('data', function(d) {
out += d;
if (!gotHello && /hello/.test(out)) {
gotHello = true;
client.stdin.write('world\r\n');
sentWorld = true;
}
if (!gotWorld && /world/.test(out)) {
gotWorld = true;
client.stdin.end();
}
});
client.stdout.pipe(process.stdout, { end: false });
client.on('exit', function(code) {
opensslExitCode = code;
server.close();
});
});
process.on('exit', function() {
assert.equal(1, connections);
assert.ok(gotHello);
assert.ok(sentWorld);
assert.ok(gotWorld);
assert.equal(0, opensslExitCode);
});