// Copyright Joyent, Inc. and other Node contributors. // // Permission is hereby granted, free of charge, to any person obtaining a // copy of this software and associated documentation files (the // "Software"), to deal in the Software without restriction, including // without limitation the rights to use, copy, modify, merge, publish, // distribute, sublicense, and/or sell copies of the Software, and to permit // persons to whom the Software is furnished to do so, subject to the // following conditions: // // The above copyright notice and this permission notice shall be included // in all copies or substantial portions of the Software. // // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS // OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN // NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, // DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR // OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE // USE OR OTHER DEALINGS IN THE SOFTWARE. 'use strict'; const common = require('../common'); const assert = require('assert'); if (!common.hasCrypto) { common.skip('missing crypto'); return; } const tls = require('tls'); const fs = require('fs'); const path = require('path'); const passKey = fs.readFileSync(path.join(common.fixturesDir, 'pass-key.pem')); const rawKey = fs.readFileSync(path.join(common.fixturesDir, 'raw-key.pem')); const cert = fs.readFileSync(path.join(common.fixturesDir, 'pass-cert.pem')); assert(Buffer.isBuffer(passKey)); assert(Buffer.isBuffer(cert)); assert.strictEqual(typeof passKey.toString(), 'string'); assert.strictEqual(typeof cert.toString(), 'string'); const server = tls.Server({ key: passKey, passphrase: 'passphrase', cert: cert, ca: [cert], requestCert: true, rejectUnauthorized: true }, function(s) { s.end(); }); server.listen(0, common.mustCall(function() { // Buffer tls.connect({ port: this.address().port, key: passKey, passphrase: 'passphrase', cert: cert, rejectUnauthorized: false }, common.mustCall(function() {})); tls.connect({ port: this.address().port, key: rawKey, cert: cert, rejectUnauthorized: false }, common.mustCall(function() {})); tls.connect({ port: this.address().port, key: rawKey, passphrase: 'ignored', cert: cert, rejectUnauthorized: false }, common.mustCall(function() {})); // Buffer[] tls.connect({ port: this.address().port, key: [passKey], passphrase: 'passphrase', cert: [cert], rejectUnauthorized: false }, common.mustCall(function() {})); tls.connect({ port: this.address().port, key: [rawKey], cert: [cert], rejectUnauthorized: false }, common.mustCall(function() {})); tls.connect({ port: this.address().port, key: [rawKey], passphrase: 'ignored', cert: [cert], rejectUnauthorized: false }, common.mustCall(function() {})); // string tls.connect({ port: this.address().port, key: passKey.toString(), passphrase: 'passphrase', cert: cert.toString(), rejectUnauthorized: false }, common.mustCall(function() {})); tls.connect({ port: this.address().port, key: rawKey.toString(), cert: cert.toString(), rejectUnauthorized: false }, common.mustCall(function() {})); tls.connect({ port: this.address().port, key: rawKey.toString(), passphrase: 'ignored', cert: cert.toString(), rejectUnauthorized: false }, common.mustCall(function() {})); // String[] tls.connect({ port: this.address().port, key: [passKey.toString()], passphrase: 'passphrase', cert: [cert.toString()], rejectUnauthorized: false }, common.mustCall(function() {})); tls.connect({ port: this.address().port, key: [rawKey.toString()], cert: [cert.toString()], rejectUnauthorized: false }, common.mustCall(function() {})); tls.connect({ port: this.address().port, key: [rawKey.toString()], passphrase: 'ignored', cert: [cert.toString()], rejectUnauthorized: false }, common.mustCall(function() {})); // Object[] tls.connect({ port: this.address().port, key: [{pem: passKey, passphrase: 'passphrase'}], cert: cert, rejectUnauthorized: false }, common.mustCall(function() {})); tls.connect({ port: this.address().port, key: [{pem: passKey, passphrase: 'passphrase'}], passphrase: 'ignored', cert: cert, rejectUnauthorized: false }, common.mustCall(function() {})); tls.connect({ port: this.address().port, key: [{pem: passKey}], passphrase: 'passphrase', cert: cert, rejectUnauthorized: false }, common.mustCall(function() {})); tls.connect({ port: this.address().port, key: [{pem: passKey.toString(), passphrase: 'passphrase'}], cert: cert, rejectUnauthorized: false }, common.mustCall(function() {})); tls.connect({ port: this.address().port, key: [{pem: rawKey, passphrase: 'ignored'}], cert: cert, rejectUnauthorized: false }, common.mustCall(function() {})); tls.connect({ port: this.address().port, key: [{pem: rawKey.toString(), passphrase: 'ignored'}], cert: cert, rejectUnauthorized: false }, common.mustCall(function() {})); tls.connect({ port: this.address().port, key: [{pem: rawKey}], passphrase: 'ignored', cert: cert, rejectUnauthorized: false }, common.mustCall(function() {})); tls.connect({ port: this.address().port, key: [{pem: rawKey.toString()}], passphrase: 'ignored', cert: cert, rejectUnauthorized: false }, common.mustCall(function() {})); tls.connect({ port: this.address().port, key: [{pem: rawKey}], cert: cert, rejectUnauthorized: false }, common.mustCall(function() {})); tls.connect({ port: this.address().port, key: [{pem: rawKey.toString()}], cert: cert, rejectUnauthorized: false }, common.mustCall(function() {})); })).unref(); // Missing passphrase assert.throws(function() { tls.connect({ port: server.address().port, key: passKey, cert: cert, rejectUnauthorized: false }); }, /bad password read/); assert.throws(function() { tls.connect({ port: server.address().port, key: [passKey], cert: cert, rejectUnauthorized: false }); }, /bad password read/); assert.throws(function() { tls.connect({ port: server.address().port, key: [{pem: passKey}], cert: cert, rejectUnauthorized: false }); }, /bad password read/); // Invalid passphrase assert.throws(function() { tls.connect({ port: server.address().port, key: passKey, passphrase: 'invalid', cert: cert, rejectUnauthorized: false }); }, /bad decrypt/); assert.throws(function() { tls.connect({ port: server.address().port, key: [passKey], passphrase: 'invalid', cert: cert, rejectUnauthorized: false }); }, /bad decrypt/); assert.throws(function() { tls.connect({ port: server.address().port, key: [{pem: passKey}], passphrase: 'invalid', cert: cert, rejectUnauthorized: false }); }, /bad decrypt/); assert.throws(function() { tls.connect({ port: server.address().port, key: [{pem: passKey, passphrase: 'invalid'}], passphrase: 'passphrase', // Valid but unused cert: cert, rejectUnauthorized: false }); }, /bad decrypt/);