-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
crypto: support multiple ECDH curves and auto
Using SSL_CTX_set1_curves_list() (OpenSSL 1.0.2+), this allows to set colon separated ECDH curve names in SecureContext's ecdhCurve option. The option can also be set to "auto" to select the curve automatically from list built in OpenSSL by enabling SSL_CTX_set_ecdh_auto() (OpenSSL 1.0.2+). PR-URL: nodejs/node#15206 Ref: nodejs/node#15054 Reviewed-By: James M Snell <[email protected]> Reviewed-By: Ben Noordhuis <[email protected]> Reviewed-By: Ruben Bridgewater <[email protected]> Reviewed-By: Tobias Nießen <[email protected]>
- Loading branch information
Showing
4 changed files
with
159 additions
and
19 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,64 @@ | ||
'use strict'; | ||
const common = require('../common'); | ||
|
||
// This test ensures that the value "auto" on ecdhCurve option is | ||
// supported to enable automatic curve selection in TLS server. | ||
|
||
if (!common.hasCrypto) | ||
common.skip('missing crypto'); | ||
|
||
if (!common.opensslCli) | ||
common.skip('missing openssl-cli'); | ||
|
||
const assert = require('assert'); | ||
const tls = require('tls'); | ||
const spawn = require('child_process').spawn; | ||
const fixtures = require('../common/fixtures'); | ||
|
||
function loadPEM(n) { | ||
return fixtures.readKey(`${n}.pem`); | ||
} | ||
|
||
const options = { | ||
key: loadPEM('agent2-key'), | ||
cert: loadPEM('agent2-cert'), | ||
ciphers: '-ALL:ECDHE-RSA-AES128-SHA256', | ||
ecdhCurve: 'auto' | ||
}; | ||
|
||
const reply = 'I AM THE WALRUS'; // something recognizable | ||
|
||
const server = tls.createServer(options, function(conn) { | ||
conn.end(reply); | ||
}); | ||
|
||
let gotReply = false; | ||
|
||
server.listen(0, function() { | ||
const args = ['s_client', | ||
'-cipher', `${options.ciphers}`, | ||
'-connect', `127.0.0.1:${this.address().port}`]; | ||
|
||
// for the performance and stability issue in s_client on Windows | ||
if (common.isWindows) | ||
args.push('-no_rand_screen'); | ||
|
||
const client = spawn(common.opensslCli, args); | ||
|
||
client.stdout.on('data', function(data) { | ||
const message = data.toString(); | ||
if (message.includes(reply)) | ||
gotReply = true; | ||
}); | ||
|
||
client.on('exit', function(code) { | ||
assert.strictEqual(0, code); | ||
server.close(); | ||
}); | ||
|
||
client.on('error', assert.ifError); | ||
}); | ||
|
||
process.on('exit', function() { | ||
assert.ok(gotReply); | ||
}); |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,80 @@ | ||
'use strict'; | ||
const common = require('../common'); | ||
|
||
// This test ensures that ecdhCurve option of TLS server supports colon | ||
// separated ECDH curve names as value. | ||
|
||
if (!common.hasCrypto) | ||
common.skip('missing crypto'); | ||
|
||
if (!common.opensslCli) | ||
common.skip('missing openssl-cli'); | ||
|
||
const assert = require('assert'); | ||
const tls = require('tls'); | ||
const spawn = require('child_process').spawn; | ||
const fixtures = require('../common/fixtures'); | ||
|
||
function loadPEM(n) { | ||
return fixtures.readKey(`${n}.pem`); | ||
} | ||
|
||
const options = { | ||
key: loadPEM('agent2-key'), | ||
cert: loadPEM('agent2-cert'), | ||
ciphers: '-ALL:ECDHE-RSA-AES128-SHA256', | ||
ecdhCurve: 'secp256k1:prime256v1:secp521r1' | ||
}; | ||
|
||
const reply = 'I AM THE WALRUS'; // something recognizable | ||
|
||
const server = tls.createServer(options, function(conn) { | ||
conn.end(reply); | ||
}); | ||
|
||
let gotReply = false; | ||
|
||
server.listen(0, function() { | ||
const args = ['s_client', | ||
'-cipher', `${options.ciphers}`, | ||
'-connect', `127.0.0.1:${this.address().port}`]; | ||
|
||
// for the performance and stability issue in s_client on Windows | ||
if (common.isWindows) | ||
args.push('-no_rand_screen'); | ||
|
||
const client = spawn(common.opensslCli, args); | ||
|
||
client.stdout.on('data', function(data) { | ||
const message = data.toString(); | ||
if (message.includes(reply)) | ||
gotReply = true; | ||
}); | ||
|
||
client.on('exit', function(code) { | ||
assert.strictEqual(0, code); | ||
server.close(); | ||
}); | ||
|
||
client.on('error', assert.ifError); | ||
}); | ||
|
||
process.on('exit', function() { | ||
assert.ok(gotReply); | ||
|
||
// Some of unsupported curves | ||
const unsupportedCurves = [ | ||
'wap-wsg-idm-ecid-wtls1', | ||
'c2pnb163v1', | ||
'prime192v3' | ||
]; | ||
|
||
// Brainpool is not supported in FIPS mode | ||
if (common.hasFipsCrypto) | ||
unsupportedCurves.push('brainpoolP256r1'); | ||
|
||
unsupportedCurves.forEach((ecdhCurve) => { | ||
assert.throws(() => tls.createServer({ ecdhCurve: ecdhCurve }), | ||
/Error: Failed to set ECDH curve/); | ||
}); | ||
}); |