117 lines
3.5 KiB
JavaScript
117 lines
3.5 KiB
JavaScript
// Copyright Joyent, Inc. and other Node contributors.
|
|
//
|
|
// Permission is hereby granted, free of charge, to any person obtaining a
|
|
// copy of this software and associated documentation files (the
|
|
// "Software"), to deal in the Software without restriction, including
|
|
// without limitation the rights to use, copy, modify, merge, publish,
|
|
// distribute, sublicense, and/or sell copies of the Software, and to permit
|
|
// persons to whom the Software is furnished to do so, subject to the
|
|
// following conditions:
|
|
//
|
|
// The above copyright notice and this permission notice shall be included
|
|
// in all copies or substantial portions of the Software.
|
|
//
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
|
// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN
|
|
// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
|
|
// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
|
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
'use strict';
|
|
|
|
// Check that the ticket from the first connection causes session resumption
|
|
// when used to make a second connection.
|
|
|
|
const common = require('../common');
|
|
if (!common.hasCrypto)
|
|
common.skip('missing crypto');
|
|
|
|
const assert = require('assert');
|
|
const tls = require('tls');
|
|
const fixtures = require('../common/fixtures');
|
|
|
|
const options = {
|
|
key: fixtures.readKey('agent2-key.pem'),
|
|
cert: fixtures.readKey('agent2-cert.pem')
|
|
};
|
|
|
|
// create server
|
|
const server = tls.Server(options, common.mustCall((socket) => {
|
|
socket.end('Goodbye');
|
|
}, 2));
|
|
|
|
// start listening
|
|
server.listen(0, common.mustCall(function() {
|
|
let sessionx = null; // From right after connect, invalid for TLS1.3
|
|
let session1 = null; // Delivered by the session event, always valid.
|
|
let sessions = 0;
|
|
let tls13;
|
|
const client1 = tls.connect({
|
|
port: this.address().port,
|
|
rejectUnauthorized: false
|
|
}, common.mustCall(() => {
|
|
tls13 = client1.getProtocol() === 'TLSv1.3';
|
|
assert.strictEqual(client1.isSessionReused(), false);
|
|
sessionx = client1.getSession();
|
|
assert(sessionx);
|
|
|
|
if (session1)
|
|
reconnect();
|
|
}));
|
|
|
|
client1.on('data', common.mustCall((d) => {
|
|
}));
|
|
|
|
client1.once('session', common.mustCall((session) => {
|
|
console.log('session1');
|
|
session1 = session;
|
|
assert(session1);
|
|
if (sessionx)
|
|
reconnect();
|
|
}));
|
|
|
|
client1.on('session', () => {
|
|
console.log('client1 session#', ++sessions);
|
|
});
|
|
|
|
client1.on('close', () => {
|
|
console.log('client1 close');
|
|
assert.strictEqual(sessions, tls13 ? 2 : 1);
|
|
});
|
|
|
|
function reconnect() {
|
|
assert(sessionx);
|
|
assert(session1);
|
|
if (tls13)
|
|
// For TLS1.3, the session immediately after handshake is a dummy,
|
|
// unresumable session. The one delivered later in session event is
|
|
// resumable.
|
|
assert.notStrictEqual(sessionx.compare(session1), 0);
|
|
else
|
|
// For TLS1.2, they are identical.
|
|
assert.strictEqual(sessionx.compare(session1), 0);
|
|
|
|
const opts = {
|
|
port: server.address().port,
|
|
rejectUnauthorized: false,
|
|
session: session1,
|
|
};
|
|
|
|
const client2 = tls.connect(opts, common.mustCall(() => {
|
|
console.log('connect2');
|
|
assert.strictEqual(client2.isSessionReused(), true);
|
|
}));
|
|
|
|
client2.on('close', common.mustCall(() => {
|
|
console.log('close2');
|
|
server.close();
|
|
}));
|
|
|
|
client2.resume();
|
|
}
|
|
|
|
client1.resume();
|
|
}));
|