45 lines
1.1 KiB
JavaScript
45 lines
1.1 KiB
JavaScript
'use strict';
|
|
|
|
const common = require('../common');
|
|
if (!common.hasCrypto)
|
|
common.skip('missing crypto');
|
|
|
|
const assert = require('assert');
|
|
const https = require('https');
|
|
const fixtures = require('../common/fixtures');
|
|
|
|
const server = https.createServer({
|
|
key: fixtures.readKey('agent2-key.pem'),
|
|
cert: fixtures.readKey('agent2-cert.pem'),
|
|
// Amount of keylog events depends on negotiated protocol
|
|
// version, so force a specific one:
|
|
minVersion: 'TLSv1.3',
|
|
maxVersion: 'TLSv1.3',
|
|
}, (req, res) => {
|
|
res.end('bye');
|
|
}).listen(() => {
|
|
https.get({
|
|
port: server.address().port,
|
|
rejectUnauthorized: false,
|
|
}, (res) => {
|
|
res.resume();
|
|
res.on('end', () => {
|
|
// Trigger TLS connection reuse
|
|
https.get({
|
|
port: server.address().port,
|
|
rejectUnauthorized: false,
|
|
}, (res) => {
|
|
server.close();
|
|
res.resume();
|
|
});
|
|
});
|
|
});
|
|
});
|
|
|
|
const verifyKeylog = (line, tlsSocket) => {
|
|
assert(Buffer.isBuffer(line));
|
|
assert.strictEqual(tlsSocket.encrypted, true);
|
|
};
|
|
server.on('keylog', common.mustCall(verifyKeylog, 10));
|
|
https.globalAgent.on('keylog', common.mustCall(verifyKeylog, 10));
|