mirror of https://github.com/lukechilds/node.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
295 lines
7.1 KiB
295 lines
7.1 KiB
// Copyright Joyent, Inc. and other Node contributors.
|
|
//
|
|
// Permission is hereby granted, free of charge, to any person obtaining a
|
|
// copy of this software and associated documentation files (the
|
|
// "Software"), to deal in the Software without restriction, including
|
|
// without limitation the rights to use, copy, modify, merge, publish,
|
|
// distribute, sublicense, and/or sell copies of the Software, and to permit
|
|
// persons to whom the Software is furnished to do so, subject to the
|
|
// following conditions:
|
|
//
|
|
// The above copyright notice and this permission notice shall be included
|
|
// in all copies or substantial portions of the Software.
|
|
//
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
|
// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN
|
|
// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
|
|
// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
|
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
'use strict';
|
|
const common = require('../common');
|
|
const assert = require('assert');
|
|
|
|
if (!common.hasCrypto) {
|
|
common.skip('missing crypto');
|
|
return;
|
|
}
|
|
const tls = require('tls');
|
|
|
|
const fs = require('fs');
|
|
const path = require('path');
|
|
|
|
const passKey = fs.readFileSync(path.join(common.fixturesDir, 'pass-key.pem'));
|
|
const rawKey = fs.readFileSync(path.join(common.fixturesDir, 'raw-key.pem'));
|
|
const cert = fs.readFileSync(path.join(common.fixturesDir, 'pass-cert.pem'));
|
|
|
|
assert(Buffer.isBuffer(passKey));
|
|
assert(Buffer.isBuffer(cert));
|
|
assert.strictEqual(typeof passKey.toString(), 'string');
|
|
assert.strictEqual(typeof cert.toString(), 'string');
|
|
|
|
const server = tls.Server({
|
|
key: passKey,
|
|
passphrase: 'passphrase',
|
|
cert: cert,
|
|
ca: [cert],
|
|
requestCert: true,
|
|
rejectUnauthorized: true
|
|
}, function(s) {
|
|
s.end();
|
|
});
|
|
|
|
server.listen(0, common.mustCall(function() {
|
|
// Buffer
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: passKey,
|
|
passphrase: 'passphrase',
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: rawKey,
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: rawKey,
|
|
passphrase: 'ignored',
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
// Buffer[]
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: [passKey],
|
|
passphrase: 'passphrase',
|
|
cert: [cert],
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: [rawKey],
|
|
cert: [cert],
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: [rawKey],
|
|
passphrase: 'ignored',
|
|
cert: [cert],
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
// string
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: passKey.toString(),
|
|
passphrase: 'passphrase',
|
|
cert: cert.toString(),
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: rawKey.toString(),
|
|
cert: cert.toString(),
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: rawKey.toString(),
|
|
passphrase: 'ignored',
|
|
cert: cert.toString(),
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
// String[]
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: [passKey.toString()],
|
|
passphrase: 'passphrase',
|
|
cert: [cert.toString()],
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: [rawKey.toString()],
|
|
cert: [cert.toString()],
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: [rawKey.toString()],
|
|
passphrase: 'ignored',
|
|
cert: [cert.toString()],
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
// Object[]
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: [{pem: passKey, passphrase: 'passphrase'}],
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: [{pem: passKey, passphrase: 'passphrase'}],
|
|
passphrase: 'ignored',
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: [{pem: passKey}],
|
|
passphrase: 'passphrase',
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: [{pem: passKey.toString(), passphrase: 'passphrase'}],
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: [{pem: rawKey, passphrase: 'ignored'}],
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: [{pem: rawKey.toString(), passphrase: 'ignored'}],
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: [{pem: rawKey}],
|
|
passphrase: 'ignored',
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: [{pem: rawKey.toString()}],
|
|
passphrase: 'ignored',
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: [{pem: rawKey}],
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
|
|
tls.connect({
|
|
port: this.address().port,
|
|
key: [{pem: rawKey.toString()}],
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
}, common.mustCall());
|
|
})).unref();
|
|
|
|
// Missing passphrase
|
|
assert.throws(function() {
|
|
tls.connect({
|
|
port: server.address().port,
|
|
key: passKey,
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
});
|
|
}, /bad password read/);
|
|
|
|
assert.throws(function() {
|
|
tls.connect({
|
|
port: server.address().port,
|
|
key: [passKey],
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
});
|
|
}, /bad password read/);
|
|
|
|
assert.throws(function() {
|
|
tls.connect({
|
|
port: server.address().port,
|
|
key: [{pem: passKey}],
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
});
|
|
}, /bad password read/);
|
|
|
|
// Invalid passphrase
|
|
assert.throws(function() {
|
|
tls.connect({
|
|
port: server.address().port,
|
|
key: passKey,
|
|
passphrase: 'invalid',
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
});
|
|
}, /bad decrypt/);
|
|
|
|
assert.throws(function() {
|
|
tls.connect({
|
|
port: server.address().port,
|
|
key: [passKey],
|
|
passphrase: 'invalid',
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
});
|
|
}, /bad decrypt/);
|
|
|
|
assert.throws(function() {
|
|
tls.connect({
|
|
port: server.address().port,
|
|
key: [{pem: passKey}],
|
|
passphrase: 'invalid',
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
});
|
|
}, /bad decrypt/);
|
|
|
|
assert.throws(function() {
|
|
tls.connect({
|
|
port: server.address().port,
|
|
key: [{pem: passKey, passphrase: 'invalid'}],
|
|
passphrase: 'passphrase', // Valid but unused
|
|
cert: cert,
|
|
rejectUnauthorized: false
|
|
});
|
|
}, /bad decrypt/);
|
|
|