1234567891011121314151617181920212223 |
- From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
- From: Jeremy Rose <[email protected]>
- Date: Tue, 9 Feb 2021 11:59:08 -0800
- Subject: fix parallel/test-crypto-ecdh-convert-key to use compatible group
- This fixes a node crypto test to use an algorithm that's boringssl also
- supports.
- This should be upstreamed.
- diff --git a/test/parallel/test-crypto-ecdh-convert-key.js b/test/parallel/test-crypto-ecdh-convert-key.js
- index 69ee339aa7a653a8f2b4523bf8b28f1b2254c705..93074a42f770fb4d26c609520fa4c72f520c0d1b 100644
- --- a/test/parallel/test-crypto-ecdh-convert-key.js
- +++ b/test/parallel/test-crypto-ecdh-convert-key.js
- @@ -117,7 +117,7 @@ if (getCurves().includes('secp256k1')) {
- // rather than Node's generic error message.
- const badKey = 'f'.repeat(128);
- assert.throws(
- - () => ECDH.convertKey(badKey, 'secp256k1', 'hex', 'hex', 'compressed'),
- + () => ECDH.convertKey(badKey, 'secp521r1', 'hex', 'hex', 'compressed'),
- /Failed to convert Buffer to EC_POINT/);
-
- // Next statement should not throw an exception.
|