fix_parallel_test-crypto-ecdh-convert-key_to_use_compatible_group.patch 1.0 KB

1234567891011121314151617181920212223
  1. From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
  2. From: Jeremy Rose <[email protected]>
  3. Date: Tue, 9 Feb 2021 11:59:08 -0800
  4. Subject: fix parallel/test-crypto-ecdh-convert-key to use compatible group
  5. This fixes a node crypto test to use an algorithm that's boringssl also
  6. supports.
  7. This should be upstreamed.
  8. diff --git a/test/parallel/test-crypto-ecdh-convert-key.js b/test/parallel/test-crypto-ecdh-convert-key.js
  9. index 69ee339aa7a653a8f2b4523bf8b28f1b2254c705..93074a42f770fb4d26c609520fa4c72f520c0d1b 100644
  10. --- a/test/parallel/test-crypto-ecdh-convert-key.js
  11. +++ b/test/parallel/test-crypto-ecdh-convert-key.js
  12. @@ -117,7 +117,7 @@ if (getCurves().includes('secp256k1')) {
  13. // rather than Node's generic error message.
  14. const badKey = 'f'.repeat(128);
  15. assert.throws(
  16. - () => ECDH.convertKey(badKey, 'secp256k1', 'hex', 'hex', 'compressed'),
  17. + () => ECDH.convertKey(badKey, 'secp521r1', 'hex', 'hex', 'compressed'),
  18. /Failed to convert Buffer to EC_POINT/);
  19. // Next statement should not throw an exception.