Server IP : 108.163.255.210 / Your IP : 3.12.73.221 Web Server : Apache System : Linux blossom.urlnameserver.com 3.10.0-1160.80.1.el7.x86_64 #1 SMP Tue Nov 8 15:48:59 UTC 2022 x86_64 User : ( 1172) PHP Version : 7.2.34 Disable Function : eval,escapeshellarg,proc_close,proc_get_status,proc_nice,proc_open,symlink,system,pcntl_exec,getrusage,chown,chgp,closelog,openlog,syslog,define_syslog_variables,php_ini_loaded_file,getservbyname,getservbyport,posix_getgid,posix_getgrgid,proc_terminate,pfsockopen,apache_child_terminate,posix_mkfifo,posix_setpgid,posix_setuid,hypot,pg_host,pos,posix_access,posix_getcwd,posix_getservbyname,myshellexec,getpid,posix_getsid,posix_isatty,posix_kill,posix_mknod,posix_setgid,posix_setsid,posix_setuid,posix_times,posix_uname,ps_fill,posix_getpwuid,global,ini_restore,zip_open,zip_read,rar_open,bzopen,bzread,bzwrite,apache_get_modules,apache_get_version,phpversionphpinfo,php_ini_scanned_files,get_current_user,disk_total_space,diskfreespace,leak,imap_list,hypo,filedump,safe_mode,getmygid,apache_getenv,apache_setenv,bzread,bzwrite,bzopen,phpini,higlight_file,dos_conv,get_cwd,er_log,cmd,e_name,vdir,get_dir,only_read,ftok,ftpexec,posix_getpwnam,mysql_list_dbs,disk_free_space,session_save_path,confirm_phpdoc_compiled,zip_entry_rea,php_u,psockopen,crack_opendict,crack_getlastmessage,crack_closedict,crack_check,fpassthru,posix_get_last_error,posix_getlogin,posix_getgroups,posix_strerror,posix_getrlimit,posix_getpgrp,posix_getgrnam,pos,dl MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /home/unilinki/public_html/indijourneys.com/node_modules/selfsigned/test/ |
Upload File : |
var assert = require('assert'); var forge = require('node-forge'); var fs = require('fs'); var exec = require('child_process').exec; describe('generate', function () { var generate = require('../index').generate; it('should work without attrs/options', function (done) { var pems = generate(); assert.ok(!!pems.private, 'has a private key'); assert.ok(!!pems.fingerprint, 'has fingerprint'); assert.ok(!!pems.public, 'has a public key'); assert.ok(!!pems.cert, 'has a certificate'); assert.ok(!pems.pkcs7, 'should not include a pkcs7 by default'); assert.ok(!pems.clientcert, 'should not include a client cert by default'); assert.ok(!pems.clientprivate, 'should not include a client private key by default'); assert.ok(!pems.clientpublic, 'should not include a client public key by default'); var caStore = forge.pki.createCaStore(); caStore.addCertificate(pems.cert); done(); }); it('should generate client cert', function (done) { var pems = generate(null, {clientCertificate: true}); assert.ok(!!pems.clientcert, 'should include a client cert when requested'); assert.ok(!!pems.clientprivate, 'should include a client private key when requested'); assert.ok(!!pems.clientpublic, 'should include a client public key when requested'); done(); }); it('should include pkcs7', function (done) { var pems = generate([{ name: 'commonName', value: 'contoso.com' }], {pkcs7: true}); assert.ok(!!pems.pkcs7, 'has a pkcs7'); try { fs.unlinkSync('/tmp/tmp.pkcs7'); } catch (er) {} fs.writeFileSync('/tmp/tmp.pkcs7', pems.pkcs7); exec('openssl pkcs7 -print_certs -in /tmp/tmp.pkcs7', function (err, stdout, stderr) { if (err) { return done(err); } const errorMessage = stderr.toString(); if (errorMessage.length) { return done(new Error(errorMessage)); } const expected = stdout.toString().replace(/\n/g, '\r\n'); //node-forge uses \r\n assert.equal( `subject=/CN=contoso.com\r\nissuer=/CN=contoso.com\r\n` + pems.cert + '\r\n', expected ); done(); }); }); it('should support sha1 algorithm', function (done) { var pems_sha1 = generate(null, { algorithm: 'sha1' }); assert.ok(forge.pki.certificateFromPem(pems_sha1.cert).siginfo.algorithmOid === forge.pki.oids['sha1WithRSAEncryption'], 'can generate sha1 certs'); done(); }); it('should support sha256 algorithm', function (done) { var pems_sha256 = generate(null, { algorithm: 'sha256' }); assert.ok(forge.pki.certificateFromPem(pems_sha256.cert).siginfo.algorithmOid === forge.pki.oids['sha256WithRSAEncryption'], 'can generate sha256 certs'); done(); }); describe('with callback', function () { it('should work without attrs/options', function (done) { generate(function (err, pems) { if (err) done(err); assert.ok(!!pems.private, 'has a private key'); assert.ok(!!pems.public, 'has a public key'); assert.ok(!!pems.cert, 'has a certificate'); assert.ok(!pems.pkcs7, 'should not include a pkcs7 by default'); assert.ok(!pems.clientcert, 'should not include a client cert by default'); assert.ok(!pems.clientprivate, 'should not include a client private key by default'); assert.ok(!pems.clientpublic, 'should not include a client public key by default'); done(); }); }); it('should generate client cert', function (done) { generate(null, {clientCertificate: true}, function (err, pems) { if (err) done(err); assert.ok(!!pems.clientcert, 'should include a client cert when requested'); assert.ok(!!pems.clientprivate, 'should include a client private key when requested'); assert.ok(!!pems.clientpublic, 'should include a client public key when requested'); done(); }); }); it('should include pkcs7', function (done) { generate([{ name: 'commonName', value: 'contoso.com' }], {pkcs7: true}, function (err, pems) { if (err) done(err); assert.ok(!!pems.pkcs7, 'has a pkcs7'); try { fs.unlinkSync('/tmp/tmp.pkcs7'); } catch (er) {} fs.writeFileSync('/tmp/tmp.pkcs7', pems.pkcs7); exec('openssl pkcs7 -print_certs -in /tmp/tmp.pkcs7', function (err, stdout, stderr) { if (err) { return done(err); } const errorMessage = stderr.toString(); if (errorMessage.length) { return done(new Error(errorMessage)); } const expected = stdout.toString().replace(/\n/g, '\r\n'); //node-forge uses \r\n assert.equal( `subject=/CN=contoso.com\r\nissuer=/CN=contoso.com\r\n` + pems.cert + '\r\n', expected ); done(); }); }); }); it('should support sha1 algorithm', function (done) { generate(null, { algorithm: 'sha1' }, function (err, pems_sha1) { if (err) done(err); assert.ok(forge.pki.certificateFromPem(pems_sha1.cert).siginfo.algorithmOid === forge.pki.oids['sha1WithRSAEncryption'], 'can generate sha1 certs'); done(); }); }); it('should support sha256 algorithm', function (done) { generate(null, { algorithm: 'sha256' }, function (err, pems_sha256) { if (err) done(err); assert.ok(forge.pki.certificateFromPem(pems_sha256.cert).siginfo.algorithmOid === forge.pki.oids['sha256WithRSAEncryption'], 'can generate sha256 certs'); done(); }); }); }); });