|
@@ -489,12 +489,12 @@ index af2146982c7a3bf7bd7527f44e4b17a3b605026e..f6b91f675cfea367c608892dee078b56
|
|
|
// Non-XOF hash functions should accept valid outputLength options as well.
|
|
|
assert.strictEqual(crypto.createHash('sha224', { outputLength: 28 })
|
|
|
diff --git a/test/parallel/test-crypto-key-objects.js b/test/parallel/test-crypto-key-objects.js
|
|
|
-index 3159b0da3f2901aab17e0b360eda84decaed9eb3..995b7f6b45bd0aa83eef143b15dede5658ac1bc0 100644
|
|
|
+index aa03a0379a291a4632b68d428d4e1875d60166a3..a6862ace1fa73473b406fe4513b9e7a99296d365 100644
|
|
|
--- a/test/parallel/test-crypto-key-objects.js
|
|
|
+++ b/test/parallel/test-crypto-key-objects.js
|
|
|
-@@ -310,11 +310,11 @@ const privateDsa = fixtures.readKey('dsa_private_encrypted_1025.pem',
|
|
|
+@@ -307,11 +307,11 @@ const privateDsa = fixtures.readKey('dsa_private_encrypted_1025.pem',
|
|
|
}, common.hasOpenSSL3 ? {
|
|
|
- message: 'Failed to read private key',
|
|
|
+ message: 'error:1E08010C:DECODER routines::unsupported',
|
|
|
} : {
|
|
|
- message: 'error:0909006C:PEM routines:get_name:no start line',
|
|
|
- code: 'ERR_OSSL_PEM_NO_START_LINE',
|
|
@@ -509,7 +509,7 @@ index 3159b0da3f2901aab17e0b360eda84decaed9eb3..995b7f6b45bd0aa83eef143b15dede56
|
|
|
});
|
|
|
|
|
|
// This should not abort either: https://github.com/nodejs/node/issues/29904
|
|
|
-@@ -337,8 +337,8 @@ const privateDsa = fixtures.readKey('dsa_private_encrypted_1025.pem',
|
|
|
+@@ -334,8 +334,8 @@ const privateDsa = fixtures.readKey('dsa_private_encrypted_1025.pem',
|
|
|
message: /error:1E08010C:DECODER routines::unsupported/,
|
|
|
library: 'DECODER routines'
|
|
|
} : {
|
|
@@ -520,7 +520,7 @@ index 3159b0da3f2901aab17e0b360eda84decaed9eb3..995b7f6b45bd0aa83eef143b15dede56
|
|
|
});
|
|
|
}
|
|
|
|
|
|
-@@ -352,6 +352,7 @@ const privateDsa = fixtures.readKey('dsa_private_encrypted_1025.pem',
|
|
|
+@@ -349,6 +349,7 @@ const privateDsa = fixtures.readKey('dsa_private_encrypted_1025.pem',
|
|
|
d: 'wVK6M3SMhQh3NK-7GRrSV-BVWQx1FO5pW8hhQeu_NdA',
|
|
|
kty: 'OKP'
|
|
|
} },
|
|
@@ -528,7 +528,7 @@ index 3159b0da3f2901aab17e0b360eda84decaed9eb3..995b7f6b45bd0aa83eef143b15dede56
|
|
|
{ private: fixtures.readKey('ed448_private.pem', 'ascii'),
|
|
|
public: fixtures.readKey('ed448_public.pem', 'ascii'),
|
|
|
keyType: 'ed448',
|
|
|
-@@ -383,6 +384,7 @@ const privateDsa = fixtures.readKey('dsa_private_encrypted_1025.pem',
|
|
|
+@@ -380,6 +381,7 @@ const privateDsa = fixtures.readKey('dsa_private_encrypted_1025.pem',
|
|
|
'S0jlSYJk',
|
|
|
kty: 'OKP'
|
|
|
} },
|
|
@@ -536,7 +536,7 @@ index 3159b0da3f2901aab17e0b360eda84decaed9eb3..995b7f6b45bd0aa83eef143b15dede56
|
|
|
].forEach((info) => {
|
|
|
const keyType = info.keyType;
|
|
|
|
|
|
-@@ -424,7 +426,7 @@ const privateDsa = fixtures.readKey('dsa_private_encrypted_1025.pem',
|
|
|
+@@ -421,7 +423,7 @@ const privateDsa = fixtures.readKey('dsa_private_encrypted_1025.pem',
|
|
|
}
|
|
|
}
|
|
|
});
|
|
@@ -545,7 +545,7 @@ index 3159b0da3f2901aab17e0b360eda84decaed9eb3..995b7f6b45bd0aa83eef143b15dede56
|
|
|
[
|
|
|
{ private: fixtures.readKey('ec_p256_private.pem', 'ascii'),
|
|
|
public: fixtures.readKey('ec_p256_public.pem', 'ascii'),
|
|
|
-@@ -517,7 +519,7 @@ const privateDsa = fixtures.readKey('dsa_private_encrypted_1025.pem',
|
|
|
+@@ -514,7 +516,7 @@ const privateDsa = fixtures.readKey('dsa_private_encrypted_1025.pem',
|
|
|
}
|
|
|
}
|
|
|
});
|
|
@@ -554,16 +554,16 @@ index 3159b0da3f2901aab17e0b360eda84decaed9eb3..995b7f6b45bd0aa83eef143b15dede56
|
|
|
{
|
|
|
// Reading an encrypted key without a passphrase should fail.
|
|
|
assert.throws(() => createPrivateKey(privateDsa), common.hasOpenSSL3 ? {
|
|
|
-@@ -550,7 +552,7 @@ const privateDsa = fixtures.readKey('dsa_private_encrypted_1025.pem',
|
|
|
+@@ -546,7 +548,7 @@ const privateDsa = fixtures.readKey('dsa_private_encrypted_1025.pem',
|
|
|
}), {
|
|
|
message: common.hasOpenSSL3 ?
|
|
|
- 'error:07880109:common libcrypto routines::interrupted or cancelled' :
|
|
|
+ 'error:1E08010C:DECODER routines::unsupported' :
|
|
|
- /bad decrypt/
|
|
|
-+ /bad decrypt|BAD_DECRYPT/
|
|
|
++ /bad decrypt|error:1e000065:Cipher functions:OPENSSL_internal:BAD_DECRYPT/
|
|
|
});
|
|
|
|
|
|
const publicKey = createPublicKey(publicDsa);
|
|
|
-@@ -573,7 +575,7 @@ const privateDsa = fixtures.readKey('dsa_private_encrypted_1025.pem',
|
|
|
+@@ -569,7 +571,7 @@ const privateDsa = fixtures.readKey('dsa_private_encrypted_1025.pem',
|
|
|
() => privateKey.export({ format: 'jwk' }),
|
|
|
{ code: 'ERR_CRYPTO_JWK_UNSUPPORTED_KEY_TYPE' });
|
|
|
}
|
|
@@ -572,7 +572,7 @@ index 3159b0da3f2901aab17e0b360eda84decaed9eb3..995b7f6b45bd0aa83eef143b15dede56
|
|
|
{
|
|
|
// Test RSA-PSS.
|
|
|
{
|
|
|
-@@ -719,7 +721,7 @@ const privateDsa = fixtures.readKey('dsa_private_encrypted_1025.pem',
|
|
|
+@@ -715,7 +717,7 @@ const privateDsa = fixtures.readKey('dsa_private_encrypted_1025.pem',
|
|
|
}
|
|
|
}
|
|
|
}
|
|
@@ -582,28 +582,28 @@ index 3159b0da3f2901aab17e0b360eda84decaed9eb3..995b7f6b45bd0aa83eef143b15dede56
|
|
|
// Exporting an encrypted private key requires a cipher
|
|
|
const privateKey = createPrivateKey(privatePem);
|
|
|
diff --git a/test/parallel/test-crypto-keygen.js b/test/parallel/test-crypto-keygen.js
|
|
|
-index 4612fc4a1ac40a27ccc2c70ac11e32f0fdcaa2c3..a4d604cf0318cfb0771e3573245b1ed989991473 100644
|
|
|
+index ed5986e6bfd4211a1cc22fa94aaf68fc1013133f..08986a6793a39b275277c8bf188316f669a53c63 100644
|
|
|
--- a/test/parallel/test-crypto-keygen.js
|
|
|
+++ b/test/parallel/test-crypto-keygen.js
|
|
|
-@@ -300,6 +300,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
+@@ -297,6 +297,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
}));
|
|
|
}
|
|
|
|
|
|
-+ /*
|
|
|
++/*
|
|
|
{
|
|
|
// Test RSA-PSS.
|
|
|
generateKeyPair('rsa-pss', {
|
|
|
-@@ -342,7 +343,9 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
+@@ -339,7 +340,9 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
testSignVerify(publicKey, privateKey);
|
|
|
}));
|
|
|
}
|
|
|
+*/
|
|
|
|
|
|
-+ /*
|
|
|
++/*
|
|
|
{
|
|
|
const privateKeyEncoding = {
|
|
|
type: 'pkcs8',
|
|
|
-@@ -412,6 +415,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
+@@ -409,6 +412,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
});
|
|
|
}));
|
|
|
}
|
|
@@ -611,7 +611,7 @@ index 4612fc4a1ac40a27ccc2c70ac11e32f0fdcaa2c3..a4d604cf0318cfb0771e3573245b1ed9
|
|
|
|
|
|
{
|
|
|
// Test async elliptic curve key generation, e.g. for ECDSA, with a SEC1
|
|
|
-@@ -436,6 +440,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
+@@ -433,6 +437,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
testSignVerify(publicKey, privateKey);
|
|
|
}));
|
|
|
|
|
@@ -619,7 +619,7 @@ index 4612fc4a1ac40a27ccc2c70ac11e32f0fdcaa2c3..a4d604cf0318cfb0771e3573245b1ed9
|
|
|
// Test async elliptic curve key generation, e.g. for ECDSA, with a SEC1
|
|
|
// private key with paramEncoding explicit.
|
|
|
generateKeyPair('ec', {
|
|
|
-@@ -457,6 +462,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
+@@ -454,6 +459,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
|
|
|
testSignVerify(publicKey, privateKey);
|
|
|
}));
|
|
@@ -627,7 +627,7 @@ index 4612fc4a1ac40a27ccc2c70ac11e32f0fdcaa2c3..a4d604cf0318cfb0771e3573245b1ed9
|
|
|
|
|
|
// Do the same with an encrypted private key.
|
|
|
generateKeyPair('ec', {
|
|
|
-@@ -492,6 +498,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
+@@ -489,6 +495,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
testSignVerify(publicKey, { key: privateKey, passphrase: 'secret' });
|
|
|
}));
|
|
|
|
|
@@ -635,7 +635,7 @@ index 4612fc4a1ac40a27ccc2c70ac11e32f0fdcaa2c3..a4d604cf0318cfb0771e3573245b1ed9
|
|
|
// Do the same with an encrypted private key with paramEncoding explicit.
|
|
|
generateKeyPair('ec', {
|
|
|
namedCurve: 'prime256v1',
|
|
|
-@@ -525,6 +532,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
+@@ -522,6 +529,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
|
|
|
testSignVerify(publicKey, { key: privateKey, passphrase: 'secret' });
|
|
|
}));
|
|
@@ -643,7 +643,7 @@ index 4612fc4a1ac40a27ccc2c70ac11e32f0fdcaa2c3..a4d604cf0318cfb0771e3573245b1ed9
|
|
|
}
|
|
|
|
|
|
{
|
|
|
-@@ -566,6 +574,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
+@@ -562,6 +570,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
});
|
|
|
}));
|
|
|
|
|
@@ -651,15 +651,31 @@ index 4612fc4a1ac40a27ccc2c70ac11e32f0fdcaa2c3..a4d604cf0318cfb0771e3573245b1ed9
|
|
|
// Test async elliptic curve key generation, e.g. for ECDSA, with an encrypted
|
|
|
// private key with paramEncoding explicit.
|
|
|
generateKeyPair('ec', {
|
|
|
-@@ -603,6 +612,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
- passphrase: 'top secret'
|
|
|
- });
|
|
|
- }));
|
|
|
+@@ -686,6 +695,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
+ }
|
|
|
+ }
|
|
|
+ });
|
|
|
+ */
|
|
|
}
|
|
|
|
|
|
// Test invalid parameter encoding.
|
|
|
-@@ -951,6 +961,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
+@@ -709,6 +719,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
+ message: "The property 'options.paramEncoding' is invalid. " +
|
|
|
+ "Received 'otherEncoding'"
|
|
|
+ });
|
|
|
++ /*
|
|
|
+ assert.throws(() => generateKeyPairSync('dsa', {
|
|
|
+ modulusLength: 4096,
|
|
|
+ publicKeyEncoding: {
|
|
|
+@@ -722,6 +733,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
+ code: 'ERR_CRYPTO_JWK_UNSUPPORTED_KEY_TYPE',
|
|
|
+ message: 'Unsupported JWK Key Type.'
|
|
|
+ });
|
|
|
++ */
|
|
|
+ assert.throws(() => generateKeyPairSync('ec', {
|
|
|
+ namedCurve: 'secp224r1',
|
|
|
+ publicKeyEncoding: {
|
|
|
+@@ -1060,6 +1072,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
}
|
|
|
}
|
|
|
|
|
@@ -667,7 +683,7 @@ index 4612fc4a1ac40a27ccc2c70ac11e32f0fdcaa2c3..a4d604cf0318cfb0771e3573245b1ed9
|
|
|
// Test DSA parameters.
|
|
|
{
|
|
|
// Test invalid modulus lengths.
|
|
|
-@@ -978,6 +989,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
+@@ -1087,6 +1100,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
});
|
|
|
}
|
|
|
}
|
|
@@ -675,7 +691,7 @@ index 4612fc4a1ac40a27ccc2c70ac11e32f0fdcaa2c3..a4d604cf0318cfb0771e3573245b1ed9
|
|
|
|
|
|
// Test EC parameters.
|
|
|
{
|
|
|
-@@ -1022,13 +1034,13 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
+@@ -1131,13 +1145,13 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
}));
|
|
|
|
|
|
generateKeyPair('ec', {
|
|
@@ -692,7 +708,7 @@ index 4612fc4a1ac40a27ccc2c70ac11e32f0fdcaa2c3..a4d604cf0318cfb0771e3573245b1ed9
|
|
|
});
|
|
|
}));
|
|
|
}
|
|
|
-@@ -1036,7 +1048,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
+@@ -1145,7 +1159,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
// Test EdDSA key generation.
|
|
|
{
|
|
|
if (!/^1\.1\.0/.test(process.versions.openssl)) {
|
|
@@ -701,7 +717,7 @@ index 4612fc4a1ac40a27ccc2c70ac11e32f0fdcaa2c3..a4d604cf0318cfb0771e3573245b1ed9
|
|
|
generateKeyPair(keyType, common.mustSucceed((publicKey, privateKey) => {
|
|
|
assert.strictEqual(publicKey.type, 'public');
|
|
|
assert.strictEqual(publicKey.asymmetricKeyType, keyType);
|
|
|
-@@ -1050,6 +1062,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
+@@ -1159,6 +1173,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
}
|
|
|
}
|
|
|
|
|
@@ -709,7 +725,7 @@ index 4612fc4a1ac40a27ccc2c70ac11e32f0fdcaa2c3..a4d604cf0318cfb0771e3573245b1ed9
|
|
|
// Test classic Diffie-Hellman key generation.
|
|
|
{
|
|
|
generateKeyPair('dh', {
|
|
|
-@@ -1162,6 +1175,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
+@@ -1271,6 +1286,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher);
|
|
|
});
|
|
|
}
|
|
|
}
|
|
@@ -717,7 +733,7 @@ index 4612fc4a1ac40a27ccc2c70ac11e32f0fdcaa2c3..a4d604cf0318cfb0771e3573245b1ed9
|
|
|
|
|
|
// Test invalid key encoding types.
|
|
|
{
|
|
|
-@@ -1362,6 +1376,7 @@ if (!common.hasOpenSSL3) {
|
|
|
+@@ -1471,6 +1487,7 @@ if (!common.hasOpenSSL3) {
|
|
|
}, common.mustSucceed((publicKey, privateKey) => {
|
|
|
assert.strictEqual(publicKey.type, 'public');
|
|
|
|
|
@@ -725,7 +741,7 @@ index 4612fc4a1ac40a27ccc2c70ac11e32f0fdcaa2c3..a4d604cf0318cfb0771e3573245b1ed9
|
|
|
for (const passphrase of ['', Buffer.alloc(0)]) {
|
|
|
const privateKeyObject = createPrivateKey({
|
|
|
passphrase,
|
|
|
-@@ -1369,6 +1384,7 @@ if (!common.hasOpenSSL3) {
|
|
|
+@@ -1478,6 +1495,7 @@ if (!common.hasOpenSSL3) {
|
|
|
});
|
|
|
assert.strictEqual(privateKeyObject.asymmetricKeyType, 'rsa');
|
|
|
}
|
|
@@ -799,10 +815,10 @@ index 1785f5eef3d202976666081d09850ed744d83446..e88227a215ba4f7fa196f7642ae694a5
|
|
|
});
|
|
|
|
|
|
diff --git a/test/parallel/test-crypto-rsa-dsa.js b/test/parallel/test-crypto-rsa-dsa.js
|
|
|
-index 567d8650c5a1772ce8d4e0901f41a07918f3f661..979d372a32723a492c85da91ca127da77f9c08e2 100644
|
|
|
+index 9afcb38616dafd6da1ab7b5843d68f4f796ca9a6..00d3381056a5a40c549f06d74c130149ba4abc8c 100644
|
|
|
--- a/test/parallel/test-crypto-rsa-dsa.js
|
|
|
+++ b/test/parallel/test-crypto-rsa-dsa.js
|
|
|
-@@ -31,12 +31,11 @@ const dsaPkcs8KeyPem = fixtures.readKey('dsa_private_pkcs8.pem');
|
|
|
+@@ -28,12 +28,11 @@ const dsaPkcs8KeyPem = fixtures.readKey('dsa_private_pkcs8.pem');
|
|
|
const ec = new TextEncoder();
|
|
|
|
|
|
const openssl1DecryptError = {
|
|
@@ -820,7 +836,7 @@ index 567d8650c5a1772ce8d4e0901f41a07918f3f661..979d372a32723a492c85da91ca127da7
|
|
|
};
|
|
|
|
|
|
const decryptError = common.hasOpenSSL3 ?
|
|
|
-@@ -400,7 +399,7 @@ assert.throws(() => {
|
|
|
+@@ -397,7 +396,7 @@ assert.throws(() => {
|
|
|
assert.strictEqual(verify2.verify(publicKey, signature, 'hex'), true);
|
|
|
}
|
|
|
|
|
@@ -829,16 +845,16 @@ index 567d8650c5a1772ce8d4e0901f41a07918f3f661..979d372a32723a492c85da91ca127da7
|
|
|
//
|
|
|
// Test DSA signing and verification
|
|
|
//
|
|
|
-@@ -475,3 +474,4 @@ const input = 'I AM THE WALRUS';
|
|
|
+@@ -472,3 +471,4 @@ const input = 'I AM THE WALRUS';
|
|
|
|
|
|
assert.strictEqual(verify.verify(dsaPubPem, signature, 'hex'), true);
|
|
|
}
|
|
|
+*/
|
|
|
diff --git a/test/parallel/test-crypto-sign-verify.js b/test/parallel/test-crypto-sign-verify.js
|
|
|
-index 15fa3db4a69f191d0d4458bb01c1d23508f07754..27f7d15103276e68b5c73061d0abd11d52b66c9c 100644
|
|
|
+index 444135538ccff8a705806941843717be954ed143..fe07bbbf0b18ae4ff344cb972600d5ee3bd8ede3 100644
|
|
|
--- a/test/parallel/test-crypto-sign-verify.js
|
|
|
+++ b/test/parallel/test-crypto-sign-verify.js
|
|
|
-@@ -32,6 +32,7 @@ const keySize = 2048;
|
|
|
+@@ -29,6 +29,7 @@ const keySize = 2048;
|
|
|
'instance when called without `new`');
|
|
|
}
|
|
|
|
|
@@ -846,7 +862,7 @@ index 15fa3db4a69f191d0d4458bb01c1d23508f07754..27f7d15103276e68b5c73061d0abd11d
|
|
|
// Test handling of exceptional conditions
|
|
|
{
|
|
|
const library = {
|
|
|
-@@ -72,6 +73,7 @@ const keySize = 2048;
|
|
|
+@@ -69,6 +70,7 @@ const keySize = 2048;
|
|
|
|
|
|
delete Object.prototype.opensslErrorStack;
|
|
|
}
|
|
@@ -854,7 +870,7 @@ index 15fa3db4a69f191d0d4458bb01c1d23508f07754..27f7d15103276e68b5c73061d0abd11d
|
|
|
|
|
|
assert.throws(
|
|
|
() => crypto.createVerify('SHA256').verify({
|
|
|
-@@ -345,15 +347,17 @@ assert.throws(
|
|
|
+@@ -342,15 +344,17 @@ assert.throws(
|
|
|
padding: crypto.constants.RSA_PKCS1_OAEP_PADDING
|
|
|
});
|
|
|
}, common.hasOpenSSL3 ? {
|
|
@@ -876,7 +892,7 @@ index 15fa3db4a69f191d0d4458bb01c1d23508f07754..27f7d15103276e68b5c73061d0abd11d
|
|
|
});
|
|
|
}
|
|
|
|
|
|
-@@ -423,10 +427,12 @@ assert.throws(
|
|
|
+@@ -420,10 +424,12 @@ assert.throws(
|
|
|
public: fixtures.readKey('ed25519_public.pem', 'ascii'),
|
|
|
algo: null,
|
|
|
sigLen: 64 },
|
|
@@ -889,7 +905,7 @@ index 15fa3db4a69f191d0d4458bb01c1d23508f07754..27f7d15103276e68b5c73061d0abd11d
|
|
|
{ private: fixtures.readKey('rsa_private_2048.pem', 'ascii'),
|
|
|
public: fixtures.readKey('rsa_public_2048.pem', 'ascii'),
|
|
|
algo: 'sha1',
|
|
|
-@@ -497,7 +503,7 @@ assert.throws(
|
|
|
+@@ -494,7 +500,7 @@ assert.throws(
|
|
|
|
|
|
{
|
|
|
const data = Buffer.from('Hello world');
|
|
@@ -1192,10 +1208,10 @@ index ee48a61f4ac8f5e8e4cec96eb03d75cb1c45f56a..5108bbf7499f29bafffda76f3c5270aa
|
|
|
// Test PBKDF2 bit derivation
|
|
|
{
|
|
|
diff --git a/test/parallel/test-webcrypto-encrypt-decrypt-rsa.js b/test/parallel/test-webcrypto-encrypt-decrypt-rsa.js
|
|
|
-index e01152c07f294d834f70d94bc105b77ea008c017..177bfdf4702afbbbede15e0ae37c144cfabeae46 100644
|
|
|
+index 151eebd36c9765df086a020ba42920b2442b1b77..efe97ff2499cba909ac5500d827364fa389a0469 100644
|
|
|
--- a/test/parallel/test-webcrypto-encrypt-decrypt-rsa.js
|
|
|
+++ b/test/parallel/test-webcrypto-encrypt-decrypt-rsa.js
|
|
|
-@@ -130,7 +130,7 @@ async function testEncryptionLongPlaintext({ algorithm,
|
|
|
+@@ -127,7 +127,7 @@ async function testEncryptionLongPlaintext({ algorithm,
|
|
|
|
|
|
return assert.rejects(
|
|
|
subtle.encrypt(algorithm, publicKey, newplaintext), {
|
|
@@ -1205,10 +1221,10 @@ index e01152c07f294d834f70d94bc105b77ea008c017..177bfdf4702afbbbede15e0ae37c144c
|
|
|
}
|
|
|
|
|
|
diff --git a/test/parallel/test-webcrypto-wrap-unwrap.js b/test/parallel/test-webcrypto-wrap-unwrap.js
|
|
|
-index 54a5a782a09586ff7e02ab23d8c8ca984106f036..8624d1fcf77254bb256a6f4bbde2ff20e148a02b 100644
|
|
|
+index 1094845c73e14313860ad476fb7baba2a11b5af4..51972b4b34b191ac59145889dbf2da5c0d407dbe 100644
|
|
|
--- a/test/parallel/test-webcrypto-wrap-unwrap.js
|
|
|
+++ b/test/parallel/test-webcrypto-wrap-unwrap.js
|
|
|
-@@ -21,14 +21,15 @@ const kWrappingData = {
|
|
|
+@@ -18,14 +18,15 @@ const kWrappingData = {
|
|
|
wrap: { label: new Uint8Array(8) },
|
|
|
pair: true
|
|
|
},
|
|
@@ -1228,7 +1244,7 @@ index 54a5a782a09586ff7e02ab23d8c8ca984106f036..8624d1fcf77254bb256a6f4bbde2ff20
|
|
|
pair: false
|
|
|
},
|
|
|
'AES-GCM': {
|
|
|
-@@ -45,6 +46,7 @@ const kWrappingData = {
|
|
|
+@@ -42,6 +43,7 @@ const kWrappingData = {
|
|
|
wrap: { },
|
|
|
pair: false
|
|
|
}
|