summaryrefslogtreecommitdiff
path: root/test/parallel/test-tls-multi-key.js
diff options
context:
space:
mode:
authorSam Roberts <vieuxtech@gmail.com>2019-06-03 11:48:25 -0700
committerAnna Henningsen <anna@addaleax.net>2019-12-03 23:28:38 +0100
commita025c5a8745637aa5f6e06acab0c15461a920d8e (patch)
tree7efb124ee33c61471cd7012e674f0266c89eff5c /test/parallel/test-tls-multi-key.js
parentc0905b71adb55cbf98816dd993fec2d7c17ebbfe (diff)
downloadandroid-node-v8-a025c5a8745637aa5f6e06acab0c15461a920d8e.tar.gz
android-node-v8-a025c5a8745637aa5f6e06acab0c15461a920d8e.tar.bz2
android-node-v8-a025c5a8745637aa5f6e06acab0c15461a920d8e.zip
tls: expose IETF name for current cipher suite
OpenSSL has its own legacy names, but knowing the IETF name is useful when trouble-shooting, or looking for more information on the cipher. PR-URL: https://github.com/nodejs/node/pull/30637 Reviewed-By: Colin Ihrig <cjihrig@gmail.com> Reviewed-By: Tobias Nießen <tniessen@tnie.de> Reviewed-By: David Carlier <devnexen@gmail.com> Reviewed-By: Yorkie Liu <yorkiefixer@gmail.com> Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl> Reviewed-By: Anna Henningsen <anna@addaleax.net> Reviewed-By: James M Snell <jasnell@gmail.com> Reviewed-By: Luigi Pinca <luigipinca@gmail.com>
Diffstat (limited to 'test/parallel/test-tls-multi-key.js')
-rw-r--r--test/parallel/test-tls-multi-key.js2
1 files changed, 2 insertions, 0 deletions
diff --git a/test/parallel/test-tls-multi-key.js b/test/parallel/test-tls-multi-key.js
index c5e66f3980..b9eaa05d59 100644
--- a/test/parallel/test-tls-multi-key.js
+++ b/test/parallel/test-tls-multi-key.js
@@ -157,6 +157,7 @@ function test(options) {
}, common.mustCall(function() {
assert.deepStrictEqual(ecdsa.getCipher(), {
name: 'ECDHE-ECDSA-AES256-GCM-SHA384',
+ standardName: 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384',
version: 'TLSv1.2'
});
assert.strictEqual(ecdsa.getPeerCertificate().subject.CN, eccCN);
@@ -175,6 +176,7 @@ function test(options) {
}, common.mustCall(function() {
assert.deepStrictEqual(rsa.getCipher(), {
name: 'ECDHE-RSA-AES256-GCM-SHA384',
+ standardName: 'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384',
version: 'TLSv1.2'
});
assert.strictEqual(rsa.getPeerCertificate().subject.CN, rsaCN);