47 lines
1.1 KiB
JavaScript
47 lines
1.1 KiB
JavaScript
|
'use strict';
|
||
|
const common = require('../common');
|
||
|
if (!common.hasCrypto)
|
||
|
common.skip('missing crypto');
|
||
|
const fixtures = require('../common/fixtures');
|
||
|
const assert = require('assert');
|
||
|
const tls = require('tls');
|
||
|
|
||
|
const options = {
|
||
|
key: fixtures.readKey('agent1-key.pem'),
|
||
|
|
||
|
// NOTE: Certificate Common Name is 'agent1'
|
||
|
cert: fixtures.readKey('agent1-cert.pem'),
|
||
|
|
||
|
// NOTE: TLS 1.3 creates new session ticket **after** handshake so
|
||
|
// `getSession()` output will be different even if the session was reused
|
||
|
// during the handshake.
|
||
|
secureProtocol: 'TLSv1_2_method'
|
||
|
};
|
||
|
|
||
|
const server = tls.createServer(options, common.mustCall((socket) => {
|
||
|
socket.end();
|
||
|
})).listen(0, common.mustCall(() => {
|
||
|
let connected = false;
|
||
|
let session = null;
|
||
|
|
||
|
const client = tls.connect({
|
||
|
rejectUnauthorized: false,
|
||
|
port: server.address().port,
|
||
|
}, common.mustCall(() => {
|
||
|
assert(!connected);
|
||
|
assert(!session);
|
||
|
|
||
|
connected = true;
|
||
|
}));
|
||
|
|
||
|
client.on('session', common.mustCall((newSession) => {
|
||
|
assert(connected);
|
||
|
assert(!session);
|
||
|
|
||
|
session = newSession;
|
||
|
|
||
|
client.end();
|
||
|
server.close();
|
||
|
}));
|
||
|
}));
|