summaryrefslogtreecommitdiff
path: root/test/disabled/test-net-tls.js
blob: c40adfd3d0ad663df8565c7354efec6e127a115c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
var common = require('../common');
var assert = require('assert');
var fs = require('fs');
var net = require('net');

var have_openssl;
try {
  var crypto = require('crypto');
  have_openssl=true;
} catch (e) {
  have_openssl=false;
  console.log("Not compiled with OPENSSL support.");
  process.exit();
}

var caPem = fs.readFileSync(common.fixturesDir+"/test_ca.pem", 'ascii');
var certPem = fs.readFileSync(common.fixturesDir+"/test_cert.pem", 'ascii');
var keyPem = fs.readFileSync(common.fixturesDir+"/test_key.pem", 'ascii');

try{
  var credentials = crypto.createCredentials({key:keyPem, cert:certPem, ca:caPem});
} catch (e) {
  console.log("Not compiled with OPENSSL support.");
  process.exit();
}

var testData = "TEST123";
var serverData = '';
var clientData = '';
var gotSecureServer = false;
var gotSecureClient = false;

var secureServer = net.createServer(function (connection) {
  var self = this;
  connection.setSecure(credentials);
  connection.setEncoding("UTF8");

  connection.addListener("secure", function () {
    gotSecureServer = true;
    var verified = connection.verifyPeer();
    var peerDN = JSON.stringify(connection.getPeerCertificate());
    assert.equal(verified, true);
    assert.equal(peerDN, '{"subject":"/C=UK/ST=Acknack Ltd/L=Rhys Jones'
         + '/O=node.js/OU=Test TLS Certificate/CN=localhost",'
         + '"issuer":"/C=UK/ST=Acknack Ltd/L=Rhys Jones/O=node.js'
         + '/OU=Test TLS Certificate/CN=localhost","valid_from":'
         + '"Nov 11 09:52:22 2009 GMT","valid_to":'
         + '"Nov  6 09:52:22 2029 GMT",'
         + '"fingerprint":"2A:7A:C2:DD:E5:F9:CC:53:72:35:99:7A:02:5A:71:38:52:EC:8A:DF"}');

  });

  connection.addListener("data", function (chunk) {
    serverData += chunk;
    connection.write(chunk);
  });

  connection.addListener("end", function () {
    assert.equal(serverData, testData);
    connection.end();
    self.close();
  });
});
secureServer.listen(common.PORT);

secureServer.addListener("listening", function() {
  var secureClient = net.createConnection(common.PORT);

  secureClient.setEncoding("UTF8");
  secureClient.addListener("connect", function () {
    secureClient.setSecure(credentials);
  });

  secureClient.addListener("secure", function () {
    gotSecureClient = true;
    var verified = secureClient.verifyPeer();
    var peerDN = JSON.stringify(secureClient.getPeerCertificate());
    assert.equal(verified, true);
    assert.equal(peerDN, '{"subject":"/C=UK/ST=Acknack Ltd/L=Rhys Jones'
      + '/O=node.js/OU=Test TLS Certificate/CN=localhost",'
      + '"issuer":"/C=UK/ST=Acknack Ltd/L=Rhys Jones/O=node.js'
      + '/OU=Test TLS Certificate/CN=localhost","valid_from":'
      + '"Nov 11 09:52:22 2009 GMT","valid_to":'
      + '"Nov  6 09:52:22 2029 GMT",'
      + '"fingerprint":"2A:7A:C2:DD:E5:F9:CC:53:72:35:99:7A:02:5A:71:38:52:EC:8A:DF"}');

    secureClient.write(testData);
    secureClient.end();
  });

  secureClient.addListener("data", function (chunk) {
    clientData += chunk;
  });

  secureClient.addListener("end", function () {
    assert.equal(clientData, testData);
  });
});

process.addListener("exit", function () {
  assert.ok(gotSecureServer, "Did not get secure event for server");
  assert.ok(gotSecureClient, "Did not get secure event for clientr");
});