mirror of https://gitee.com/openkylin/nodejs.git
189 lines
5.5 KiB
JavaScript
189 lines
5.5 KiB
JavaScript
// Copyright Joyent, Inc. and other Node contributors.
|
|
//
|
|
// Permission is hereby granted, free of charge, to any person obtaining a
|
|
// copy of this software and associated documentation files (the
|
|
// "Software"), to deal in the Software without restriction, including
|
|
// without limitation the rights to use, copy, modify, merge, publish,
|
|
// distribute, sublicense, and/or sell copies of the Software, and to permit
|
|
// persons to whom the Software is furnished to do so, subject to the
|
|
// following conditions:
|
|
//
|
|
// The above copyright notice and this permission notice shall be included
|
|
// in all copies or substantial portions of the Software.
|
|
//
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
|
// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN
|
|
// NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
|
|
// DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
|
|
// OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
|
// USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
'use strict';
|
|
const common = require('../common');
|
|
|
|
// Test multi-identity ('key')/multi-algorithm scenarios.
|
|
|
|
if (!common.hasCrypto)
|
|
common.skip('missing crypto');
|
|
|
|
const fixtures = require('../common/fixtures');
|
|
const assert = require('assert');
|
|
const tls = require('tls');
|
|
|
|
// Key is ordered as ec, rsa, cert is ordered as rsa, ec.
|
|
test({
|
|
key: [
|
|
fixtures.readKey('ec10-key.pem'),
|
|
fixtures.readKey('agent1-key.pem'),
|
|
],
|
|
cert: [
|
|
fixtures.readKey('agent1-cert.pem'),
|
|
fixtures.readKey('ec10-cert.pem'),
|
|
],
|
|
eccCN: 'agent10.example.com',
|
|
client: { ca: [
|
|
fixtures.readKey('ca5-cert.pem'),
|
|
fixtures.readKey('ca1-cert.pem'),
|
|
] },
|
|
});
|
|
|
|
// Key and cert are ordered as ec, rsa.
|
|
test({
|
|
key: [
|
|
fixtures.readKey('ec10-key.pem'),
|
|
fixtures.readKey('agent1-key.pem'),
|
|
],
|
|
cert: [
|
|
fixtures.readKey('agent1-cert.pem'),
|
|
fixtures.readKey('ec10-cert.pem'),
|
|
],
|
|
eccCN: 'agent10.example.com',
|
|
client: { ca: [
|
|
fixtures.readKey('ca5-cert.pem'),
|
|
fixtures.readKey('ca1-cert.pem'),
|
|
] },
|
|
});
|
|
|
|
// Key, cert, and pfx options can be used simultaneously.
|
|
test({
|
|
key: [
|
|
fixtures.readKey('ec-key.pem'),
|
|
],
|
|
cert: [
|
|
fixtures.readKey('ec-cert.pem'),
|
|
],
|
|
pfx: fixtures.readKey('agent1.pfx'),
|
|
passphrase: 'sample',
|
|
client: { ca: [
|
|
fixtures.readKey('ec-cert.pem'),
|
|
fixtures.readKey('ca1-cert.pem'),
|
|
] },
|
|
});
|
|
|
|
// Key and cert with mixed algorithms, and cert chains with intermediate CAs
|
|
test({
|
|
key: [
|
|
fixtures.readKey('ec10-key.pem'),
|
|
fixtures.readKey('agent10-key.pem'),
|
|
],
|
|
cert: [
|
|
fixtures.readKey('agent10-cert.pem'),
|
|
fixtures.readKey('ec10-cert.pem'),
|
|
],
|
|
rsaCN: 'agent10.example.com',
|
|
eccCN: 'agent10.example.com',
|
|
client: { ca: [
|
|
fixtures.readKey('ca2-cert.pem'),
|
|
fixtures.readKey('ca5-cert.pem'),
|
|
] },
|
|
});
|
|
|
|
// Key and cert with mixed algorithms, and cert chains with intermediate CAs,
|
|
// using PFX for EC.
|
|
test({
|
|
key: [
|
|
fixtures.readKey('agent10-key.pem'),
|
|
],
|
|
cert: [
|
|
fixtures.readKey('agent10-cert.pem'),
|
|
],
|
|
pfx: fixtures.readKey('ec10.pfx'),
|
|
passphrase: 'sample',
|
|
rsaCN: 'agent10.example.com',
|
|
eccCN: 'agent10.example.com',
|
|
client: { ca: [
|
|
fixtures.readKey('ca2-cert.pem'),
|
|
fixtures.readKey('ca5-cert.pem'),
|
|
] },
|
|
});
|
|
|
|
// Key and cert with mixed algorithms, and cert chains with intermediate CAs,
|
|
// using PFX for RSA.
|
|
test({
|
|
key: [
|
|
fixtures.readKey('ec10-key.pem'),
|
|
],
|
|
cert: [
|
|
fixtures.readKey('ec10-cert.pem'),
|
|
],
|
|
pfx: fixtures.readKey('agent10.pfx'),
|
|
passphrase: 'sample',
|
|
rsaCN: 'agent10.example.com',
|
|
eccCN: 'agent10.example.com',
|
|
client: { ca: [
|
|
fixtures.readKey('ca2-cert.pem'),
|
|
fixtures.readKey('ca5-cert.pem'),
|
|
] },
|
|
});
|
|
|
|
function test(options) {
|
|
const rsaCN = options.rsaCN || 'agent1';
|
|
const eccCN = options.eccCN || 'agent2';
|
|
const clientTrustRoots = options.client.ca;
|
|
delete options.rsaCN;
|
|
delete options.eccCN;
|
|
delete options.client;
|
|
const server = tls.createServer(options, function(conn) {
|
|
conn.end('ok');
|
|
}).listen(0, common.mustCall(connectWithEcdsa));
|
|
|
|
function connectWithEcdsa() {
|
|
const ecdsa = tls.connect(this.address().port, {
|
|
ciphers: 'ECDHE-ECDSA-AES256-GCM-SHA384',
|
|
rejectUnauthorized: true,
|
|
ca: clientTrustRoots,
|
|
checkServerIdentity: (_, c) => assert.strictEqual(c.subject.CN, eccCN),
|
|
}, common.mustCall(function() {
|
|
assert.deepStrictEqual(ecdsa.getCipher(), {
|
|
name: 'ECDHE-ECDSA-AES256-GCM-SHA384',
|
|
standardName: 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384',
|
|
version: 'TLSv1.2'
|
|
});
|
|
assert.strictEqual(ecdsa.getPeerCertificate().subject.CN, eccCN);
|
|
assert.strictEqual(ecdsa.getPeerCertificate().asn1Curve, 'prime256v1');
|
|
ecdsa.end();
|
|
connectWithRsa();
|
|
}));
|
|
}
|
|
|
|
function connectWithRsa() {
|
|
const rsa = tls.connect(server.address().port, {
|
|
ciphers: 'ECDHE-RSA-AES256-GCM-SHA384',
|
|
rejectUnauthorized: true,
|
|
ca: clientTrustRoots,
|
|
checkServerIdentity: (_, c) => assert.strictEqual(c.subject.CN, rsaCN),
|
|
}, common.mustCall(function() {
|
|
assert.deepStrictEqual(rsa.getCipher(), {
|
|
name: 'ECDHE-RSA-AES256-GCM-SHA384',
|
|
standardName: 'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384',
|
|
version: 'TLSv1.2'
|
|
});
|
|
assert.strictEqual(rsa.getPeerCertificate().subject.CN, rsaCN);
|
|
assert(rsa.getPeerCertificate().exponent, 'cert for an RSA key');
|
|
rsa.end();
|
|
server.close();
|
|
}));
|
|
}
|
|
}
|