-
-
Notifications
You must be signed in to change notification settings - Fork 35.4k
Expand file tree
/
Copy pathtest-tls-ecdh-multiple.js
More file actions
78 lines (63 loc) · 1.95 KB
/
test-tls-ecdh-multiple.js
File metadata and controls
78 lines (63 loc) · 1.95 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
'use strict';
const common = require('../common');
// This test ensures that ecdhCurve option of TLS server supports colon
// separated ECDH curve names as value.
if (!common.hasCrypto) {
common.skip('missing crypto');
}
const { opensslCli, hasOpenSSL } = require('../common/crypto');
const crypto = require('crypto');
if (!opensslCli) {
common.skip('missing openssl-cli');
}
const assert = require('assert');
const tls = require('tls');
const { execFile } = require('child_process');
const fixtures = require('../common/fixtures');
function loadPEM(n) {
return fixtures.readKey(`${n}.pem`);
}
// OpenSSL 4.0 disables support for deprecated elliptic curves from RFC 8422
// (including secp256k1) by default.
const ecdhCurve = hasOpenSSL(4, 0) ?
'prime256v1:secp521r1' :
'secp256k1:prime256v1:secp521r1';
const options = {
key: loadPEM('agent2-key'),
cert: loadPEM('agent2-cert'),
ciphers: '-ALL:ECDHE-RSA-AES128-SHA256',
ecdhCurve,
maxVersion: 'TLSv1.2',
};
const reply = 'I AM THE WALRUS'; // Something recognizable
const server = tls.createServer(options, (conn) => {
conn.end(reply);
}).listen(0, common.mustCall(() => {
const args = ['s_client',
'-cipher', `${options.ciphers}`,
'-connect', `127.0.0.1:${server.address().port}`];
execFile(opensslCli, args, common.mustSucceed((stdout) => {
assert(stdout.includes(reply));
server.close();
}));
}));
{
// Some unsupported curves.
const unsupportedCurves = [
'wap-wsg-idm-ecid-wtls1',
'c2pnb163v1',
'prime192v3',
];
// Brainpool is not supported in FIPS mode.
if (crypto.getFips()) {
unsupportedCurves.push('brainpoolP256r1');
}
// Deprecated RFC 8422 curves are disabled by default in OpenSSL 4.0.
if (hasOpenSSL(4, 0)) {
unsupportedCurves.push('secp256k1');
}
unsupportedCurves.forEach((ecdhCurve) => {
assert.throws(() => tls.createServer({ ecdhCurve }),
/Error: Failed to set ECDH curve/);
});
}