mirror of https://github.com/lukechilds/node.git
Browse Source
According to documentation all certificates specified in `pfx` option should be treated as a CA certificates too. While it doesn't seem to be logically correct to me, we can't afford to break API stability at this point. Fix: #5100 PR-URL: https://github.com/nodejs/node/pull/5109 Reviewed-By: James M Snell <jasnell@gmail.com> Reviewed-By: Shigeki Ohtsu <ohtsu@iij.ad.jp>v5.x
Fedor Indutny
9 years ago
committed by
Rod Vagg
2 changed files with 47 additions and 0 deletions
@ -0,0 +1,36 @@ |
|||
'use strict'; |
|||
|
|||
const common = require('../common'); |
|||
|
|||
if (!common.hasCrypto) { |
|||
console.log('1..0 # Skipped: node compiled without crypto.'); |
|||
return; |
|||
} |
|||
|
|||
const assert = require('assert'); |
|||
const tls = require('tls'); |
|||
const fs = require('fs'); |
|||
const path = require('path'); |
|||
|
|||
const pfx = fs.readFileSync( |
|||
path.join(common.fixturesDir, 'keys', 'agent1-pfx.pem')); |
|||
|
|||
const server = tls.createServer({ |
|||
pfx: pfx, |
|||
passphrase: 'sample', |
|||
requestCert: true, |
|||
rejectUnauthorized: false |
|||
}, common.mustCall(function(c) { |
|||
assert(c.authorizationError === null, 'authorizationError must be null'); |
|||
c.end(); |
|||
})).listen(common.PORT, function() { |
|||
var client = tls.connect({ |
|||
port: common.PORT, |
|||
pfx: pfx, |
|||
passphrase: 'sample', |
|||
rejectUnauthorized: false |
|||
}, function() { |
|||
client.end(); |
|||
server.close(); |
|||
}); |
|||
}); |
Loading…
Reference in new issue