���� JFIF �� � ( %"1"%)+...383,7(-.-
![]() Server : Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.4.20 System : Linux st2.domain.com 3.10.0-1127.10.1.el7.x86_64 #1 SMP Wed Jun 3 14:28:03 UTC 2020 x86_64 User : apache ( 48) PHP Version : 7.4.20 Disable Function : NONE Directory : /home/real/node-v13.0.1/test/parallel/ |
'use strict'; const common = require('../common'); if (!common.hasCrypto) common.skip('node compiled without crypto.'); const fixtures = require('../common/fixtures'); // This test ensures that TLS does not fail to read a self-signed certificate // and thus throw an `authorizationError`. // https://github.com/nodejs/node/issues/5100 const assert = require('assert'); const tls = require('tls'); const pfx = fixtures.readKey('agent1.pfx'); const server = tls .createServer( { pfx: pfx, passphrase: 'sample', requestCert: true, rejectUnauthorized: false }, common.mustCall(function(c) { assert.strictEqual(c.getPeerCertificate().serialNumber, 'ECC9B856270DA9A8'); assert.strictEqual(c.authorizationError, null); c.end(); }) ) .listen(0, function() { const client = tls.connect( { port: this.address().port, pfx: pfx, passphrase: 'sample', rejectUnauthorized: false }, function() { for (let i = 0; i < 10; ++i) { // Calling this repeatedly is a regression test that verifies // that .getCertificate() does not accidentally decrease the // reference count of the X509* certificate on the native side. assert.strictEqual(client.getCertificate().serialNumber, 'ECC9B856270DA9A8'); } client.end(); server.close(); } ); });