|
|
|
// Create an ssl server. First connection, validate that not resume.
|
|
|
|
// Cache session and close connection. Use session on second connection.
|
|
|
|
// ASSERT resumption.
|
|
|
|
|
|
|
|
var common = require('../common');
|
|
|
|
var assert = require('assert');
|
|
|
|
|
|
|
|
if (!common.hasCrypto) {
|
|
|
|
console.log('1..0 # Skipped: missing crypto');
|
|
|
|
process.exit();
|
|
|
|
}
|
|
|
|
var tls = require('tls');
|
|
|
|
|
|
|
|
var fs = require('fs');
|
|
|
|
|
|
|
|
var options = {
|
|
|
|
key: fs.readFileSync(common.fixturesDir + '/keys/agent2-key.pem'),
|
|
|
|
cert: fs.readFileSync(common.fixturesDir + '/keys/agent2-cert.pem')
|
|
|
|
};
|
|
|
|
|
|
|
|
var connections = 0;
|
|
|
|
|
|
|
|
// create server
|
|
|
|
var server = tls.Server(options, function(socket) {
|
|
|
|
socket.end('Goodbye');
|
|
|
|
connections++;
|
|
|
|
});
|
|
|
|
|
|
|
|
// start listening
|
|
|
|
server.listen(common.PORT, function() {
|
|
|
|
|
|
|
|
var session1 = null;
|
|
|
|
var client1 = tls.connect({
|
|
|
|
port: common.PORT,
|
|
|
|
rejectUnauthorized: false
|
|
|
|
}, function() {
|
|
|
|
console.log('connect1');
|
|
|
|
assert.ok(!client1.isSessionReused(), 'Session *should not* be reused.');
|
|
|
|
session1 = client1.getSession();
|
|
|
|
});
|
|
|
|
|
|
|
|
client1.on('close', function() {
|
|
|
|
console.log('close1');
|
|
|
|
|
|
|
|
var opts = {
|
|
|
|
port: common.PORT,
|
|
|
|
rejectUnauthorized: false,
|
|
|
|
session: session1
|
|
|
|
};
|
|
|
|
|
|
|
|
var client2 = tls.connect(opts, function() {
|
|
|
|
console.log('connect2');
|
|
|
|
assert.ok(client2.isSessionReused(), 'Session *should* be reused.');
|
|
|
|
});
|
|
|
|
|
|
|
|
client2.on('close', function() {
|
|
|
|
console.log('close2');
|
|
|
|
server.close();
|
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
process.on('exit', function() {
|
|
|
|
assert.equal(2, connections);
|
|
|
|
});
|