mirror of
https://github.com/nodejs/node.git
synced 2025-05-01 17:03:34 +00:00

agent6 was the only cert that had a chain (an intermediate certificate), and there were no non-RSA certs other than a single self-signed one. This makes it impossible to test cert-chain scenarios with multiple identities which require chains to prove chain completion, and multi-algorithm because OpenSSL doesn't support multiple identities unless they are multi-algorithm. PFX files were also missing for most identities, making it difficult to test multi-PFX and PFX interactions with cert-chain+key and CA options. New server cert chains: - ECC: ca5 signs ca6 signs ec10, CN=agent10.example.com - RSA: ca2 signs ca4 signs agent10, CN=agent10.example.com PFX added for: - agent6 - agent10 - ec10 All pem and pfx regenerated from scratch to test that the Makefile is actually working as intended. PR-URL: https://github.com/nodejs/node/pull/24374 Reviewed-By: Daniel Bevenius <daniel.bevenius@gmail.com> Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl> Reviewed-By: Franziska Hinkelmann <franziska.hinkelmann@gmail.com>
89 lines
3.1 KiB
JavaScript
89 lines
3.1 KiB
JavaScript
// Copyright Joyent, Inc. and other Node contributors.
|
|
//
|
|
// Permission is hereby granted, free of charge, to any person obtaining a
|
|
// copy of this software and associated documentation files (the
|
|
// "Software"), to deal in the Software without restriction, including
|
|
// without limitation the rights to use, copy, modify, merge, publish,
|
|
// distribute, sublicense, and/or sell copies of the Software, and to permit
|
|
// persons to whom the Software is furnished to do so, subject to the
|
|
// following conditions:
|
|
//
|
|
// The above copyright notice and this permission notice shall be included
|
|
// in all copies or substantial portions of the Software.
|
|
//
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
|
// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN
|
|
// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
|
|
// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
|
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
'use strict';
|
|
const common = require('../common');
|
|
const fixtures = require('../common/fixtures');
|
|
if (!common.hasCrypto) {
|
|
common.skip('missing crypto');
|
|
}
|
|
const crypto = require('crypto');
|
|
|
|
// Verify that detailed getPeerCertificate() return value has all certs.
|
|
|
|
const {
|
|
assert, connect, debug, keys
|
|
} = require(fixtures.path('tls-connect'));
|
|
|
|
function sha256(s) {
|
|
return crypto.createHash('sha256').update(s);
|
|
}
|
|
|
|
connect({
|
|
client: { rejectUnauthorized: false },
|
|
server: keys.agent1,
|
|
}, function(err, pair, cleanup) {
|
|
assert.ifError(err);
|
|
const socket = pair.client.conn;
|
|
const localCert = socket.getCertificate();
|
|
assert.deepStrictEqual(localCert, {});
|
|
let peerCert = socket.getPeerCertificate();
|
|
assert.ok(!peerCert.issuerCertificate);
|
|
|
|
peerCert = socket.getPeerCertificate(true);
|
|
debug('peerCert:\n', peerCert);
|
|
|
|
assert.ok(peerCert.issuerCertificate);
|
|
assert.strictEqual(peerCert.subject.emailAddress, 'ry@tinyclouds.org');
|
|
assert.strictEqual(peerCert.serialNumber, 'ECC9B856270DA9A8');
|
|
assert.strictEqual(peerCert.exponent, '0x10001');
|
|
assert.strictEqual(
|
|
peerCert.fingerprint,
|
|
'D7:FD:F6:42:92:A8:83:51:8E:80:48:62:66:DA:85:C2:EE:A6:A1:CD'
|
|
);
|
|
assert.strictEqual(
|
|
peerCert.fingerprint256,
|
|
'B0:BE:46:49:B8:29:63:E0:6F:63:C8:8A:57:9C:3F:9B:72:C6:F5:89:E3:0D:84:AC:' +
|
|
'5B:08:9A:20:89:B6:8F:D6'
|
|
);
|
|
|
|
// SHA256 fingerprint of the public key
|
|
assert.strictEqual(
|
|
sha256(peerCert.pubkey).digest('hex'),
|
|
'221fcc8593146e9eee65b2f7f9c1504993ece8de014657a4a1cde55c5e35d06e'
|
|
);
|
|
|
|
// HPKP / RFC7469 "pin-sha256" of the public key
|
|
assert.strictEqual(
|
|
sha256(peerCert.pubkey).digest('base64'),
|
|
'Ih/MhZMUbp7uZbL3+cFQSZPs6N4BRlekoc3lXF410G4='
|
|
);
|
|
|
|
assert.deepStrictEqual(peerCert.infoAccess['OCSP - URI'],
|
|
[ 'http://ocsp.nodejs.org/' ]);
|
|
|
|
const issuer = peerCert.issuerCertificate;
|
|
assert.strictEqual(issuer.issuerCertificate, issuer);
|
|
assert.strictEqual(issuer.serialNumber, 'CB153AE212609FC6');
|
|
|
|
return cleanup();
|
|
});
|