���� JFIF �� � ( %"1"%)+...383,7(-.-
![]() Server : Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.4.20 System : Linux st2.domain.com 3.10.0-1127.10.1.el7.x86_64 #1 SMP Wed Jun 3 14:28:03 UTC 2020 x86_64 User : apache ( 48) PHP Version : 7.4.20 Disable Function : NONE Directory : /home/real/node-v13.0.1/test/parallel/ |
'use strict'; const common = require('../common'); if (!common.hasCrypto) common.skip('missing crypto'); const { TestTLSSocket, ccs } = require('../common/tls'); const fixtures = require('../common/fixtures'); const https = require('https'); // Regression test for an use-after-free bug in the TLS implementation that // would occur when `SSL_write()` failed. // Refs: https://github.com/nodejs-private/security/issues/189 const server_key = fixtures.readKey('agent1-key.pem'); const server_cert = fixtures.readKey('agent1-cert.pem'); const opts = { key: server_key, cert: server_cert }; const server = https.createServer(opts, (req, res) => { res.write('hello'); }).listen(0, common.mustCall(() => { const client = new TestTLSSocket(server_cert); client.connect({ host: 'localhost', port: server.address().port }, common.mustCall(() => { const ch = client.createClientHello(); client.write(ch); })); client.once('data', common.mustCall((buf) => { let remaining = buf; do { remaining = client.parseTLSFrame(remaining); } while (remaining.length > 0); const cke = client.createClientKeyExchange(); const finished = client.createFinished(); const ill = client.createIllegalHandshake(); const frames = Buffer.concat([ cke, ccs, client.encrypt(finished), client.encrypt(ill) ]); client.write(frames, common.mustCall(() => { client.end(); server.close(); })); })); }));