|
1 | 1 | 'use strict';
|
2 |
| -var common = require('../common'); |
3 |
| -var assert = require('assert'); |
| 2 | +const common = require('../common'); |
| 3 | +const assert = require('assert'); |
4 | 4 |
|
5 | 5 | if (!common.hasCrypto) {
|
6 | 6 | common.skip('missing crypto');
|
7 | 7 | return;
|
8 | 8 | }
|
9 |
| -var tls = require('tls'); |
| 9 | +const tls = require('tls'); |
10 | 10 |
|
11 |
| -var fs = require('fs'); |
12 |
| -var util = require('util'); |
13 |
| -var join = require('path').join; |
| 11 | +const fs = require('fs'); |
| 12 | +const util = require('util'); |
| 13 | +const join = require('path').join; |
14 | 14 |
|
15 |
| -var options = { |
| 15 | +const options = { |
16 | 16 | key: fs.readFileSync(join(common.fixturesDir, 'keys', 'agent1-key.pem')),
|
17 | 17 | cert: fs.readFileSync(join(common.fixturesDir, 'keys', 'agent1-cert.pem')),
|
18 | 18 | ca: [ fs.readFileSync(join(common.fixturesDir, 'keys', 'ca1-cert.pem')) ]
|
19 | 19 | };
|
20 | 20 |
|
21 |
| -var server = tls.createServer(options, function(cleartext) { |
| 21 | +const server = tls.createServer(options, function(cleartext) { |
22 | 22 | cleartext.end('World');
|
23 | 23 | });
|
24 | 24 | server.listen(0, common.mustCall(function() {
|
25 |
| - var socket = tls.connect({ |
| 25 | + const socket = tls.connect({ |
26 | 26 | port: this.address().port,
|
27 | 27 | rejectUnauthorized: false
|
28 | 28 | }, common.mustCall(function() {
|
29 |
| - var peerCert = socket.getPeerCertificate(); |
| 29 | + let peerCert = socket.getPeerCertificate(); |
30 | 30 | assert.ok(!peerCert.issuerCertificate);
|
31 | 31 |
|
32 | 32 | // Verify that detailed return value has all certs
|
33 | 33 | peerCert = socket.getPeerCertificate(true);
|
34 | 34 | assert.ok(peerCert.issuerCertificate);
|
35 | 35 |
|
36 | 36 | console.error(util.inspect(peerCert));
|
37 |
| - assert.equal(peerCert.subject.emailAddress, '[email protected]'); |
38 |
| - assert.equal(peerCert.serialNumber, '9A84ABCFB8A72AC0'); |
39 |
| - assert.equal(peerCert.exponent, '0x10001'); |
40 |
| - assert.equal(peerCert.fingerprint, |
41 |
| - '8D:06:3A:B3:E5:8B:85:29:72:4F:7D:1B:54:CD:95:19:3C:EF:6F:AA'); |
| 37 | + assert.strictEqual(peerCert.subject.emailAddress, '[email protected]'); |
| 38 | + assert.strictEqual(peerCert.serialNumber, '9A84ABCFB8A72AC0'); |
| 39 | + assert.strictEqual(peerCert.exponent, '0x10001'); |
| 40 | + assert.strictEqual( |
| 41 | + peerCert.fingerprint, |
| 42 | + '8D:06:3A:B3:E5:8B:85:29:72:4F:7D:1B:54:CD:95:19:3C:EF:6F:AA' |
| 43 | + ); |
42 | 44 | assert.deepStrictEqual(peerCert.infoAccess['OCSP - URI'],
|
43 | 45 | [ 'http://ocsp.nodejs.org/' ]);
|
44 | 46 |
|
45 |
| - var issuer = peerCert.issuerCertificate; |
46 |
| - assert.ok(issuer.issuerCertificate === issuer); |
47 |
| - assert.equal(issuer.serialNumber, '8DF21C01468AF393'); |
| 47 | + const issuer = peerCert.issuerCertificate; |
| 48 | + assert.strictEqual(issuer.issuerCertificate, issuer); |
| 49 | + assert.strictEqual(issuer.serialNumber, '8DF21C01468AF393'); |
48 | 50 | server.close();
|
49 | 51 | }));
|
50 | 52 | socket.end('Hello');
|
|
0 commit comments