[
MAINHACK
]
Mail Test
BC
Config Scan
HOME
Create...
New File
New Folder
Viewing / Editing File: tests.js
var { assert } = require('chai'); var forge = require('node-forge'); var fs = require('fs'); var exec = require('child_process').exec; describe('generate', function () { var generate = require('../index').generate; it('should work without attrs/options', function (done) { var pems = generate(); assert.ok(!!pems.private, 'has a private key'); assert.ok(!!pems.fingerprint, 'has fingerprint'); assert.ok(!!pems.public, 'has a public key'); assert.ok(!!pems.cert, 'has a certificate'); assert.ok(!pems.pkcs7, 'should not include a pkcs7 by default'); assert.ok(!pems.clientcert, 'should not include a client cert by default'); assert.ok(!pems.clientprivate, 'should not include a client private key by default'); assert.ok(!pems.clientpublic, 'should not include a client public key by default'); var caStore = forge.pki.createCaStore(); caStore.addCertificate(pems.cert); done(); }); it('should generate client cert', function (done) { var pems = generate(null, {clientCertificate: true}); assert.ok(!!pems.clientcert, 'should include a client cert when requested'); assert.ok(!!pems.clientprivate, 'should include a client private key when requested'); assert.ok(!!pems.clientpublic, 'should include a client public key when requested'); done(); }); it('should include pkcs7', function (done) { var pems = generate([{ name: 'commonName', value: 'contoso.com' }], {pkcs7: true}); assert.ok(!!pems.pkcs7, 'has a pkcs7'); try { fs.unlinkSync('/tmp/tmp.pkcs7'); } catch (er) {} fs.writeFileSync('/tmp/tmp.pkcs7', pems.pkcs7); exec('openssl pkcs7 -print_certs -in /tmp/tmp.pkcs7', function (err, stdout, stderr) { if (err) { return done(err); } const errorMessage = stderr.toString(); if (errorMessage.length) { return done(new Error(errorMessage)); } const expected = stdout.toString(); let [ subjectLine,issuerLine, ...cert ] = expected.split(/\r?\n/).filter(c => c); cert = cert.filter(c => c); assert.match(subjectLine, /subject=\/?CN\s?=\s?contoso.com/i); assert.match(issuerLine, /issuer=\/?CN\s?=\s?contoso.com/i); assert.strictEqual( pems.cert, cert.join('\r\n') + '\r\n' ); done(); }); }); it('should support sha1 algorithm', function (done) { var pems_sha1 = generate(null, { algorithm: 'sha1' }); assert.ok(forge.pki.certificateFromPem(pems_sha1.cert).siginfo.algorithmOid === forge.pki.oids['sha1WithRSAEncryption'], 'can generate sha1 certs'); done(); }); it('should support sha256 algorithm', function (done) { var pems_sha256 = generate(null, { algorithm: 'sha256' }); assert.ok(forge.pki.certificateFromPem(pems_sha256.cert).siginfo.algorithmOid === forge.pki.oids['sha256WithRSAEncryption'], 'can generate sha256 certs'); done(); }); describe('with callback', function () { it('should work without attrs/options', function (done) { generate(function (err, pems) { if (err) done(err); assert.ok(!!pems.private, 'has a private key'); assert.ok(!!pems.public, 'has a public key'); assert.ok(!!pems.cert, 'has a certificate'); assert.ok(!pems.pkcs7, 'should not include a pkcs7 by default'); assert.ok(!pems.clientcert, 'should not include a client cert by default'); assert.ok(!pems.clientprivate, 'should not include a client private key by default'); assert.ok(!pems.clientpublic, 'should not include a client public key by default'); done(); }); }); it('should generate client cert', function (done) { generate(null, {clientCertificate: true}, function (err, pems) { if (err) done(err); assert.ok(!!pems.clientcert, 'should include a client cert when requested'); assert.ok(!!pems.clientprivate, 'should include a client private key when requested'); assert.ok(!!pems.clientpublic, 'should include a client public key when requested'); done(); }); }); it('should include pkcs7', function (done) { generate([{ name: 'commonName', value: 'contoso.com' }], {pkcs7: true}, function (err, pems) { if (err) done(err); assert.ok(!!pems.pkcs7, 'has a pkcs7'); try { fs.unlinkSync('/tmp/tmp.pkcs7'); } catch (er) {} fs.writeFileSync('/tmp/tmp.pkcs7', pems.pkcs7); exec('openssl pkcs7 -print_certs -in /tmp/tmp.pkcs7', function (err, stdout, stderr) { if (err) { return done(err); } const errorMessage = stderr.toString(); if (errorMessage.length) { return done(new Error(errorMessage)); } const expected = stdout.toString(); let [ subjectLine,issuerLine, ...cert ] = expected.split(/\r?\n/).filter(c => c); assert.match(subjectLine, /subject=\/?CN\s?=\s?contoso.com/i); assert.match(issuerLine, /issuer=\/?CN\s?=\s?contoso.com/i); assert.strictEqual( pems.cert, cert.join('\r\n') + '\r\n' ); done(); }); }); }); it('should support sha1 algorithm', function (done) { generate(null, { algorithm: 'sha1' }, function (err, pems_sha1) { if (err) done(err); assert.ok(forge.pki.certificateFromPem(pems_sha1.cert).siginfo.algorithmOid === forge.pki.oids['sha1WithRSAEncryption'], 'can generate sha1 certs'); done(); }); }); it('should support sha256 algorithm', function (done) { generate(null, { algorithm: 'sha256' }, function (err, pems_sha256) { if (err) done(err); assert.ok(forge.pki.certificateFromPem(pems_sha256.cert).siginfo.algorithmOid === forge.pki.oids['sha256WithRSAEncryption'], 'can generate sha256 certs'); done(); }); }); }); });
Save Changes
Cancel / Back
Close ×
Server Info
Hostname: server1.winmanyltd.com
Server IP: 203.161.60.52
PHP Version: 8.3.27
Server Software: Apache
System: Linux server1.winmanyltd.com 4.18.0-553.22.1.el8_10.x86_64 #1 SMP Tue Sep 24 05:16:59 EDT 2024 x86_64
HDD Total: 117.98 GB
HDD Free: 59.74 GB
Domains on IP: N/A (Requires external lookup)
System Features
Safe Mode:
Off
disable_functions:
None
allow_url_fopen:
On
allow_url_include:
Off
magic_quotes_gpc:
Off
register_globals:
Off
open_basedir:
None
cURL:
Enabled
ZipArchive:
Enabled
MySQLi:
Enabled
PDO:
Enabled
wget:
Yes
curl (cmd):
Yes
perl:
Yes
python:
Yes (py3)
gcc:
Yes
pkexec:
Yes
git:
Yes
User Info
Username: eliosofonline
User ID (UID): 1002
Group ID (GID): 1003
Script Owner UID: 1002
Current Dir Owner: 1002