|
1 | 1 | 'use strict'; |
2 | | -var common = require('../common'); |
3 | | -var assert = require('assert'); |
| 2 | +const common = require('../common'); |
| 3 | +const assert = require('assert'); |
4 | 4 |
|
5 | 5 | if (!common.hasCrypto) { |
6 | 6 | common.skip('missing crypto'); |
7 | 7 | return; |
8 | 8 | } |
9 | | -var tls = require('tls'); |
| 9 | +const tls = require('tls'); |
10 | 10 |
|
11 | | -var fs = require('fs'); |
12 | | -var util = require('util'); |
13 | | -var join = require('path').join; |
| 11 | +const fs = require('fs'); |
| 12 | +const util = require('util'); |
| 13 | +const join = require('path').join; |
14 | 14 |
|
15 | | -var options = { |
| 15 | +const options = { |
16 | 16 | key: fs.readFileSync(join(common.fixturesDir, 'keys', 'agent1-key.pem')), |
17 | 17 | cert: fs.readFileSync(join(common.fixturesDir, 'keys', 'agent1-cert.pem')), |
18 | 18 | ca: [ fs.readFileSync(join(common.fixturesDir, 'keys', 'ca1-cert.pem')) ] |
19 | 19 | }; |
20 | 20 |
|
21 | | -var server = tls.createServer(options, function(cleartext) { |
| 21 | +const server = tls.createServer(options, function(cleartext) { |
22 | 22 | cleartext.end('World'); |
23 | 23 | }); |
24 | 24 | server.listen(0, common.mustCall(function() { |
25 | | - var socket = tls.connect({ |
| 25 | + const socket = tls.connect({ |
26 | 26 | port: this.address().port, |
27 | 27 | rejectUnauthorized: false |
28 | 28 | }, common.mustCall(function() { |
29 | | - var peerCert = socket.getPeerCertificate(); |
| 29 | + let peerCert = socket.getPeerCertificate(); |
30 | 30 | assert.ok(!peerCert.issuerCertificate); |
31 | 31 |
|
32 | 32 | // Verify that detailed return value has all certs |
33 | 33 | peerCert = socket.getPeerCertificate(true); |
34 | 34 | assert.ok(peerCert.issuerCertificate); |
35 | 35 |
|
36 | 36 | console.error(util.inspect(peerCert)); |
37 | | - assert.equal(peerCert.subject.emailAddress, '[email protected]'); |
38 | | - assert.equal(peerCert.serialNumber, '9A84ABCFB8A72AC0'); |
39 | | - assert.equal(peerCert.exponent, '0x10001'); |
40 | | - assert.equal(peerCert.fingerprint, |
41 | | - '8D:06:3A:B3:E5:8B:85:29:72:4F:7D:1B:54:CD:95:19:3C:EF:6F:AA'); |
| 37 | + assert.strictEqual(peerCert.subject.emailAddress, '[email protected]'); |
| 38 | + assert.strictEqual(peerCert.serialNumber, '9A84ABCFB8A72AC0'); |
| 39 | + assert.strictEqual(peerCert.exponent, '0x10001'); |
| 40 | + assert.strictEqual( |
| 41 | + peerCert.fingerprint, |
| 42 | + '8D:06:3A:B3:E5:8B:85:29:72:4F:7D:1B:54:CD:95:19:3C:EF:6F:AA' |
| 43 | + ); |
42 | 44 | assert.deepStrictEqual(peerCert.infoAccess['OCSP - URI'], |
43 | 45 | [ 'http://ocsp.nodejs.org/' ]); |
44 | 46 |
|
45 | | - var issuer = peerCert.issuerCertificate; |
46 | | - assert.ok(issuer.issuerCertificate === issuer); |
47 | | - assert.equal(issuer.serialNumber, '8DF21C01468AF393'); |
| 47 | + const issuer = peerCert.issuerCertificate; |
| 48 | + assert.strictEqual(issuer.issuerCertificate, issuer); |
| 49 | + assert.strictEqual(issuer.serialNumber, '8DF21C01468AF393'); |
48 | 50 | server.close(); |
49 | 51 | })); |
50 | 52 | socket.end('Hello'); |
|
0 commit comments