| 'use strict'; |
| |
| const common = require('../common'); |
| if (!common.hasCrypto) |
| common.skip('missing crypto'); |
| |
| const assert = require('assert'); |
| const tls = require('tls'); |
| |
| assert.throws( |
| () => tls.createSecureContext({ ciphers: 1 }), |
| { |
| code: 'ERR_INVALID_ARG_TYPE', |
| name: 'TypeError', |
| message: 'The "options.ciphers" property must be of type string.' + |
| ' Received type number (1)' |
| }); |
| |
| assert.throws( |
| () => tls.createServer({ ciphers: 1 }), |
| { |
| code: 'ERR_INVALID_ARG_TYPE', |
| name: 'TypeError', |
| message: 'The "options.ciphers" property must be of type string.' + |
| ' Received type number (1)' |
| }); |
| |
| assert.throws( |
| () => tls.createSecureContext({ key: 'dummykey', passphrase: 1 }), |
| { |
| code: 'ERR_INVALID_ARG_TYPE', |
| name: 'TypeError', |
| message: /The "options\.passphrase" property must be of type string/ |
| }); |
| |
| assert.throws( |
| () => tls.createServer({ key: 'dummykey', passphrase: 1 }), |
| { |
| code: 'ERR_INVALID_ARG_TYPE', |
| name: 'TypeError', |
| message: /The "options\.passphrase" property must be of type string/ |
| }); |
| |
| assert.throws( |
| () => tls.createServer({ ecdhCurve: 1 }), |
| { |
| code: 'ERR_INVALID_ARG_TYPE', |
| name: 'TypeError', |
| message: /The "options\.ecdhCurve" property must be of type string/ |
| }); |
| |
| assert.throws( |
| () => tls.createServer({ handshakeTimeout: 'abcd' }), |
| { |
| code: 'ERR_INVALID_ARG_TYPE', |
| name: 'TypeError', |
| message: 'The "options.handshakeTimeout" property must be of type number.' + |
| " Received type string ('abcd')" |
| } |
| ); |
| |
| assert.throws( |
| () => tls.createServer({ sessionTimeout: 'abcd' }), |
| { |
| code: 'ERR_INVALID_ARG_TYPE', |
| name: 'TypeError', |
| message: /The "options\.sessionTimeout" property must be of type number/ |
| }); |
| |
| assert.throws( |
| () => tls.createServer({ ticketKeys: 'abcd' }), |
| { |
| code: 'ERR_INVALID_ARG_TYPE', |
| name: 'TypeError', |
| message: /The "options\.ticketKeys" property must be an instance of/ |
| }); |
| |
| assert.throws(() => tls.createServer({ ticketKeys: Buffer.alloc(0) }), { |
| code: 'ERR_INVALID_ARG_VALUE', |
| message: /The property 'options\.ticketKeys' must be exactly 48 bytes/ |
| }); |
| |
| assert.throws( |
| () => tls.createSecurePair({}), |
| { |
| message: 'context must be a SecureContext', |
| code: 'ERR_TLS_INVALID_CONTEXT', |
| name: 'TypeError', |
| } |
| ); |
| |
| { |
| const buffer = Buffer.from('abcd'); |
| const out = {}; |
| tls.convertALPNProtocols(buffer, out); |
| out.ALPNProtocols.write('efgh'); |
| assert(buffer.equals(Buffer.from('abcd'))); |
| assert(out.ALPNProtocols.equals(Buffer.from('efgh'))); |
| } |
| |
| { |
| const arrayBufferViewStr = 'abcd'; |
| const inputBuffer = Buffer.from(arrayBufferViewStr.repeat(8), 'utf8'); |
| for (const expectView of common.getArrayBufferViews(inputBuffer)) { |
| const out = {}; |
| const expected = Buffer.from(expectView.buffer.slice(), |
| expectView.byteOffset, |
| expectView.byteLength); |
| tls.convertALPNProtocols(expectView, out); |
| assert(out.ALPNProtocols.equals(expected)); |
| } |
| } |
| |
| { |
| const protocols = [(new String('a')).repeat(500)]; |
| const out = {}; |
| assert.throws( |
| () => tls.convertALPNProtocols(protocols, out), |
| { |
| code: 'ERR_OUT_OF_RANGE', |
| message: 'The byte length of the protocol at index 0 exceeds the ' + |
| 'maximum length. It must be <= 255. Received 500' |
| } |
| ); |
| } |
| |
| assert.throws(() => { tls.createSecureContext({ minVersion: 'fhqwhgads' }); }, |
| { |
| code: 'ERR_TLS_INVALID_PROTOCOL_VERSION', |
| name: 'TypeError' |
| }); |
| |
| assert.throws(() => { tls.createSecureContext({ maxVersion: 'fhqwhgads' }); }, |
| { |
| code: 'ERR_TLS_INVALID_PROTOCOL_VERSION', |
| name: 'TypeError' |
| }); |