mirror of
https://github.com/nodejs/node.git
synced 2025-05-01 17:03:34 +00:00

In preparation for a lint rule that will enforce assert.deepStrictEqual() over assert.deepEqual(), change tests and benchmarks accordingly. For tests and benchmarks that are testing or benchmarking assert.deepEqual() itself, apply a comment to ignore the upcoming rule. PR-URL: https://github.com/nodejs/node/pull/6213 Reviewed-By: James M Snell <jasnell@gmail.com> Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
54 lines
1.3 KiB
JavaScript
54 lines
1.3 KiB
JavaScript
'use strict';
|
|
var common = require('../common');
|
|
var assert = require('assert');
|
|
|
|
if (!common.hasCrypto) {
|
|
console.log('1..0 # Skipped: missing crypto');
|
|
return;
|
|
}
|
|
var tls = require('tls');
|
|
var fs = require('fs');
|
|
|
|
var options = {
|
|
key: [
|
|
fs.readFileSync(common.fixturesDir + '/keys/agent1-key.pem'),
|
|
fs.readFileSync(common.fixturesDir + '/keys/ec-key.pem')
|
|
],
|
|
cert: [
|
|
fs.readFileSync(common.fixturesDir + '/keys/agent1-cert.pem'),
|
|
fs.readFileSync(common.fixturesDir + '/keys/ec-cert.pem')
|
|
]
|
|
};
|
|
|
|
var ciphers = [];
|
|
|
|
var server = tls.createServer(options, function(conn) {
|
|
conn.end('ok');
|
|
}).listen(common.PORT, function() {
|
|
var ecdsa = tls.connect(common.PORT, {
|
|
ciphers: 'ECDHE-ECDSA-AES256-GCM-SHA384',
|
|
rejectUnauthorized: false
|
|
}, function() {
|
|
ciphers.push(ecdsa.getCipher());
|
|
var rsa = tls.connect(common.PORT, {
|
|
ciphers: 'ECDHE-RSA-AES256-GCM-SHA384',
|
|
rejectUnauthorized: false
|
|
}, function() {
|
|
ciphers.push(rsa.getCipher());
|
|
ecdsa.end();
|
|
rsa.end();
|
|
server.close();
|
|
});
|
|
});
|
|
});
|
|
|
|
process.on('exit', function() {
|
|
assert.deepStrictEqual(ciphers, [{
|
|
name: 'ECDHE-ECDSA-AES256-GCM-SHA384',
|
|
version: 'TLSv1/SSLv3'
|
|
}, {
|
|
name: 'ECDHE-RSA-AES256-GCM-SHA384',
|
|
version: 'TLSv1/SSLv3'
|
|
}]);
|
|
});
|