| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156 | 
							- var { assert } = require('chai');
 
- var forge      = require('node-forge');
 
- var fs         = require('fs');
 
- var exec       = require('child_process').exec;
 
- describe('generate', function () {
 
-   var generate = require('../index').generate;
 
-   it('should work without attrs/options', function (done) {
 
-     var pems = generate();
 
-     assert.ok(!!pems.private, 'has a private key');
 
-     assert.ok(!!pems.fingerprint, 'has fingerprint');
 
-     assert.ok(!!pems.public, 'has a public key');
 
-     assert.ok(!!pems.cert, 'has a certificate');
 
-     assert.ok(!pems.pkcs7, 'should not include a pkcs7 by default');
 
-     assert.ok(!pems.clientcert, 'should not include a client cert by default');
 
-     assert.ok(!pems.clientprivate, 'should not include a client private key by default');
 
-     assert.ok(!pems.clientpublic, 'should not include a client public key by default');
 
-     var caStore = forge.pki.createCaStore();
 
-     caStore.addCertificate(pems.cert);
 
-     done();
 
-   });
 
-   it('should generate client cert', function (done) {
 
-     var pems = generate(null, {clientCertificate: true});
 
-     assert.ok(!!pems.clientcert, 'should include a client cert when requested');
 
-     assert.ok(!!pems.clientprivate, 'should include a client private key when requested');
 
-     assert.ok(!!pems.clientpublic, 'should include a client public key when requested');
 
-     done();
 
-   });
 
-   it('should include pkcs7', function (done) {
 
-     var pems = generate([{ name: 'commonName', value: 'contoso.com' }], {pkcs7: true});
 
-     assert.ok(!!pems.pkcs7, 'has a pkcs7');
 
-     try {
 
-       fs.unlinkSync('/tmp/tmp.pkcs7');
 
-     } catch (er) {}
 
-     fs.writeFileSync('/tmp/tmp.pkcs7', pems.pkcs7);
 
-     exec('openssl pkcs7 -print_certs -in /tmp/tmp.pkcs7', function (err, stdout, stderr) {
 
-       if (err) {
 
-         return done(err);
 
-       }
 
-       const errorMessage = stderr.toString();
 
-       if (errorMessage.length) {
 
-         return done(new Error(errorMessage));
 
-       }
 
-       const expected = stdout.toString();
 
-       let [ subjectLine,issuerLine, ...cert ] = expected.split(/\r?\n/).filter(c => c);
 
-       cert = cert.filter(c => c);
 
-       assert.match(subjectLine, /subject=\/?CN\s?=\s?contoso.com/i);
 
-       assert.match(issuerLine, /issuer=\/?CN\s?=\s?contoso.com/i);
 
-       assert.strictEqual(
 
-         pems.cert,
 
-         cert.join('\r\n') + '\r\n'
 
-       );
 
-       done();
 
-     });
 
-   });
 
-   it('should support sha1 algorithm', function (done) {
 
-     var pems_sha1 = generate(null, { algorithm: 'sha1' });
 
-     assert.ok(forge.pki.certificateFromPem(pems_sha1.cert).siginfo.algorithmOid === forge.pki.oids['sha1WithRSAEncryption'], 'can generate sha1 certs');
 
-     done();
 
-   });
 
-   it('should support sha256 algorithm', function (done) {
 
-     var pems_sha256 = generate(null, { algorithm: 'sha256' });
 
-     assert.ok(forge.pki.certificateFromPem(pems_sha256.cert).siginfo.algorithmOid === forge.pki.oids['sha256WithRSAEncryption'], 'can generate sha256 certs');
 
-     done();
 
-   });
 
-   describe('with callback', function () {
 
-     it('should work without attrs/options', function (done) {
 
-       generate(function (err, pems) {
 
-         if (err) done(err);
 
-         assert.ok(!!pems.private, 'has a private key');
 
-         assert.ok(!!pems.public, 'has a public key');
 
-         assert.ok(!!pems.cert, 'has a certificate');
 
-         assert.ok(!pems.pkcs7, 'should not include a pkcs7 by default');
 
-         assert.ok(!pems.clientcert, 'should not include a client cert by default');
 
-         assert.ok(!pems.clientprivate, 'should not include a client private key by default');
 
-         assert.ok(!pems.clientpublic, 'should not include a client public key by default');
 
-         done();
 
-       });
 
-     });
 
-     it('should generate client cert', function (done) {
 
-       generate(null, {clientCertificate: true}, function (err, pems) {
 
-         if (err) done(err);
 
-         assert.ok(!!pems.clientcert, 'should include a client cert when requested');
 
-         assert.ok(!!pems.clientprivate, 'should include a client private key when requested');
 
-         assert.ok(!!pems.clientpublic, 'should include a client public key when requested');
 
-         done();
 
-       });
 
-     });
 
-     it('should include pkcs7', function (done) {
 
-       generate([{ name: 'commonName', value: 'contoso.com' }], {pkcs7: true}, function (err, pems) {
 
-         if (err) done(err);
 
-         assert.ok(!!pems.pkcs7, 'has a pkcs7');
 
-         try {
 
-           fs.unlinkSync('/tmp/tmp.pkcs7');
 
-         } catch (er) {}
 
-         fs.writeFileSync('/tmp/tmp.pkcs7', pems.pkcs7);
 
-         exec('openssl pkcs7 -print_certs -in /tmp/tmp.pkcs7', function (err, stdout, stderr) {
 
-           if (err) {
 
-             return done(err);
 
-           }
 
-           const errorMessage = stderr.toString();
 
-           if (errorMessage.length) {
 
-             return done(new Error(errorMessage));
 
-           }
 
-           const expected = stdout.toString();
 
-           let [ subjectLine,issuerLine, ...cert ] = expected.split(/\r?\n/).filter(c => c);
 
-           assert.match(subjectLine, /subject=\/?CN\s?=\s?contoso.com/i);
 
-           assert.match(issuerLine, /issuer=\/?CN\s?=\s?contoso.com/i);
 
-           assert.strictEqual(
 
-             pems.cert,
 
-             cert.join('\r\n') + '\r\n'
 
-           );
 
-           done();
 
-         });
 
-       });
 
-     });
 
-     it('should support sha1 algorithm', function (done) {
 
-       generate(null, { algorithm: 'sha1' }, function (err, pems_sha1) {
 
-         if (err) done(err);
 
-         assert.ok(forge.pki.certificateFromPem(pems_sha1.cert).siginfo.algorithmOid === forge.pki.oids['sha1WithRSAEncryption'], 'can generate sha1 certs');
 
-         done();
 
-       });
 
-     });
 
-     it('should support sha256 algorithm', function (done) {
 
-       generate(null, { algorithm: 'sha256' }, function (err, pems_sha256) {
 
-         if (err) done(err);
 
-         assert.ok(forge.pki.certificateFromPem(pems_sha256.cert).siginfo.algorithmOid === forge.pki.oids['sha256WithRSAEncryption'], 'can generate sha256 certs');
 
-         done();
 
-       });
 
-     });
 
-   });
 
- });
 
 
  |