Skip to content

Commit c14b4ea

Browse files
authored
test: move crypto related common utilities in common/crypto
nodejs/node#56714
1 parent 761980c commit c14b4ea

File tree

1 file changed

+43
-0
lines changed

1 file changed

+43
-0
lines changed

patches/node/fix_crypto_tests_to_run_with_bssl.patch

Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -581,6 +581,49 @@ index 6f88e81e9ff29defe73800fc038b0d96d1ebd846..c0b92e2bdf86d3d2638c973f8be3110d
581581
};
582582

583583
// Create TLS1.2 server
584+
diff --git a/test/parallel/test-tls-alert-handling.js b/test/parallel/test-tls-alert-handling.js
585+
index cba5bebaa29b6f8ac4fd0fcedaadb2f7bb3eb321..019d95df499892b14ab088f99013ee32c432779c 100644
586+
--- a/test/parallel/test-tls-alert-handling.js
587+
+++ b/test/parallel/test-tls-alert-handling.js
588+
@@ -35,7 +35,7 @@ let iter = 0;
589+
590+
const errorHandler = common.mustCall((err) => {
591+
let expectedErrorCode = 'ERR_SSL_WRONG_VERSION_NUMBER';
592+
- let expectedErrorReason = 'wrong version number';
593+
+ let expectedErrorReason = /wrong[\s_]version[\s_]number/i;
594+
if (hasOpenSSL(3, 2)) {
595+
expectedErrorCode = 'ERR_SSL_PACKET_LENGTH_TOO_LONG';
596+
expectedErrorReason = 'packet length too long';
597+
@@ -43,8 +43,8 @@ const errorHandler = common.mustCall((err) => {
598+
599+
assert.strictEqual(err.code, expectedErrorCode);
600+
assert.strictEqual(err.library, 'SSL routines');
601+
- if (!hasOpenSSL3) assert.strictEqual(err.function, 'ssl3_get_record');
602+
- assert.strictEqual(err.reason, expectedErrorReason);
603+
+ if (!hasOpenSSL3 && !common.openSSLIsBoringSSL) assert.strictEqual(err.function, 'ssl3_get_record');
604+
+ assert.match(err.reason, expectedErrorReason);
605+
errorReceived = true;
606+
if (canCloseServer())
607+
server.close();
608+
@@ -98,15 +98,15 @@ function sendBADTLSRecord() {
609+
}));
610+
client.on('error', common.mustCall((err) => {
611+
let expectedErrorCode = 'ERR_SSL_TLSV1_ALERT_PROTOCOL_VERSION';
612+
- let expectedErrorReason = 'tlsv1 alert protocol version';
613+
+ let expectedErrorReason = /tlsv1[\s_]alert[\s_]protocol[\s_]version/i;
614+
if (hasOpenSSL(3, 2)) {
615+
expectedErrorCode = 'ERR_SSL_TLSV1_ALERT_RECORD_OVERFLOW';
616+
expectedErrorReason = 'tlsv1 alert record overflow';
617+
}
618+
assert.strictEqual(err.code, expectedErrorCode);
619+
assert.strictEqual(err.library, 'SSL routines');
620+
- if (!hasOpenSSL3)
621+
+ if (!hasOpenSSL3 && !common.openSSLIsBoringSSL)
622+
assert.strictEqual(err.function, 'ssl3_read_bytes');
623+
- assert.strictEqual(err.reason, expectedErrorReason);
624+
+ assert.match(err.reason, expectedErrorReason);
625+
}));
626+
}
584627
diff --git a/test/parallel/test-tls-getprotocol.js b/test/parallel/test-tls-getprotocol.js
585628
index b1eab88fd6517e3698934dea17752ef2bb8d8d54..3ad6db20316baa8490e3787dd55903b58a54ad06 100644
586629
--- a/test/parallel/test-tls-getprotocol.js

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy