1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066 |
- From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
- From: Jeremy Rose <[email protected]>
- Date: Tue, 9 Feb 2021 12:34:46 -0800
- Subject: fix crypto tests to run with bssl
- This fixes some crypto tests so that they pass when compiled with
- BoringSSL.
- This should be upstreamed in some form, though it may need to be tweaked
- before it's acceptable to upstream, as this patch comments out a couple
- of tests that upstream probably cares about.
- diff --git a/test/parallel/test-crypto-async-sign-verify.js b/test/parallel/test-crypto-async-sign-verify.js
- index 4e3c32fdcd23fbe3e74bd5e624b739d224689f33..19d65aae7fa8ec9f9b907733ead17a208ed47909 100644
- --- a/test/parallel/test-crypto-async-sign-verify.js
- +++ b/test/parallel/test-crypto-async-sign-verify.js
- @@ -88,6 +88,7 @@ test('rsa_public.pem', 'rsa_private.pem', 'sha256', false,
- // ED25519
- test('ed25519_public.pem', 'ed25519_private.pem', undefined, true);
- // ED448
- +/*
- test('ed448_public.pem', 'ed448_private.pem', undefined, true);
-
- // ECDSA w/ der signature encoding
- @@ -109,6 +110,7 @@ test('dsa_public.pem', 'dsa_private.pem', 'sha256',
- // DSA w/ ieee-p1363 signature encoding
- test('dsa_public.pem', 'dsa_private.pem', 'sha256', false,
- { dsaEncoding: 'ieee-p1363' });
- +*/
-
- // Test Parallel Execution w/ KeyObject is threadsafe in openssl3
- {
- diff --git a/test/parallel/test-crypto-authenticated.js b/test/parallel/test-crypto-authenticated.js
- index 59dd3b69c4bdf6dbd7b5e4f03df74caac551d459..1e0f9ce4c979683530afdf83ac3dc095acad2eb8 100644
- --- a/test/parallel/test-crypto-authenticated.js
- +++ b/test/parallel/test-crypto-authenticated.js
- @@ -48,7 +48,9 @@ const errMessages = {
- const ciphers = crypto.getCiphers();
-
- const expectedWarnings = common.hasFipsCrypto ?
- - [] : [
- + [] : !ciphers.includes('aes-192-ccm') ? [
- + ['Use Cipheriv for counter mode of aes-192-gcm'],
- + ] : [
- ['Use Cipheriv for counter mode of aes-192-gcm'],
- ['Use Cipheriv for counter mode of aes-192-ccm'],
- ['Use Cipheriv for counter mode of aes-192-ccm'],
- @@ -315,7 +317,9 @@ for (const test of TEST_CASES) {
-
- // Test that create(De|C)ipher(iv)? throws if the mode is CCM and an invalid
- // authentication tag length has been specified.
- -{
- +if (!ciphers.includes('aes-256-ccm')) {
- + common.printSkipMessage(`unsupported aes-256-ccm test`);
- +} else {
- for (const authTagLength of [-1, true, false, NaN, 5.5]) {
- assert.throws(() => {
- crypto.createCipheriv('aes-256-ccm',
- @@ -403,6 +407,10 @@ for (const test of TEST_CASES) {
- // authentication tag has been specified.
- {
- for (const mode of ['ccm', 'ocb']) {
- + if (!ciphers.includes(`aes-256-${mode}`)) {
- + common.printSkipMessage(`unsupported aes-256-${mode} test`);
- + continue;
- + }
- assert.throws(() => {
- crypto.createCipheriv(`aes-256-${mode}`,
- 'FxLKsqdmv0E9xrQhp0b1ZgI0K7JFZJM8',
- @@ -437,7 +445,9 @@ for (const test of TEST_CASES) {
- }
-
- // Test that setAAD throws if an invalid plaintext length has been specified.
- -{
- +if (!ciphers.includes('aes-256-ccm')) {
- + common.printSkipMessage(`unsupported aes-256-ccm test`);
- +} else {
- const cipher = crypto.createCipheriv('aes-256-ccm',
- 'FxLKsqdmv0E9xrQhp0b1ZgI0K7JFZJM8',
- 'qkuZpJWCewa6S',
- @@ -458,7 +468,9 @@ for (const test of TEST_CASES) {
- }
-
- // Test that setAAD and update throw if the plaintext is too long.
- -{
- +if (!ciphers.includes('aes-256-ccm')) {
- + common.printSkipMessage(`unsupported aes-256-ccm test`);
- +} else {
- for (const ivLength of [13, 12]) {
- const maxMessageSize = (1 << (8 * (15 - ivLength))) - 1;
- const key = 'FxLKsqdmv0E9xrQhp0b1ZgI0K7JFZJM8';
- @@ -489,7 +501,9 @@ for (const test of TEST_CASES) {
-
- // Test that setAAD throws if the mode is CCM and the plaintext length has not
- // been specified.
- -{
- +if (!ciphers.includes('aes-256-ccm')) {
- + common.printSkipMessage(`unsupported aes-256-ccm test`);
- +} else {
- assert.throws(() => {
- const cipher = crypto.createCipheriv('aes-256-ccm',
- 'FxLKsqdmv0E9xrQhp0b1ZgI0K7JFZJM8',
- @@ -514,7 +528,9 @@ for (const test of TEST_CASES) {
- }
-
- // Test that final() throws in CCM mode when no authentication tag is provided.
- -{
- +if (!ciphers.includes('aes-128-ccm')) {
- + common.printSkipMessage(`unsupported aes-256-ccm test`);
- +} else {
- if (!common.hasFipsCrypto) {
- const key = Buffer.from('1ed2233fa2223ef5d7df08546049406c', 'hex');
- const iv = Buffer.from('7305220bca40d4c90e1791e9', 'hex');
- @@ -546,7 +562,9 @@ for (const test of TEST_CASES) {
- }
-
- // Test that an IV length of 11 does not overflow max_message_size_.
- -{
- +if (!ciphers.includes('aes-128-ccm')) {
- + common.printSkipMessage(`unsupported aes-128-ccm test`);
- +} else {
- const key = 'x'.repeat(16);
- const iv = Buffer.from('112233445566778899aabb', 'hex');
- const options = { authTagLength: 8 };
- @@ -563,6 +581,10 @@ for (const test of TEST_CASES) {
- const iv = Buffer.from('0123456789ab', 'utf8');
-
- for (const mode of ['gcm', 'ocb']) {
- + if (!ciphers.includes(`aes-128-${mode}`)) {
- + common.printSkipMessage(`unsupported aes-128-${mode} test`);
- + continue;
- + }
- for (const authTagLength of mode === 'gcm' ? [undefined, 8] : [8]) {
- const cipher = crypto.createCipheriv(`aes-128-${mode}`, key, iv, {
- authTagLength
- @@ -597,6 +619,10 @@ for (const test of TEST_CASES) {
- const opts = { authTagLength: 8 };
-
- for (const mode of ['gcm', 'ccm', 'ocb']) {
- + if (!ciphers.includes(`aes-128-${mode}`)) {
- + common.printSkipMessage(`unsupported aes-128-${mode} test`);
- + continue;
- + }
- const cipher = crypto.createCipheriv(`aes-128-${mode}`, key, iv, opts);
- const ciphertext = Buffer.concat([cipher.update(plain), cipher.final()]);
- const tag = cipher.getAuthTag();
- @@ -619,7 +645,9 @@ for (const test of TEST_CASES) {
- // Test chacha20-poly1305 rejects invalid IV lengths of 13, 14, 15, and 16 (a
- // length of 17 or greater was already rejected).
- // - https://www.openssl.org/news/secadv/20190306.txt
- -{
- +if (!ciphers.includes('chacha20-poly1305')) {
- + common.printSkipMessage(`unsupported chacha20-poly1305 test`);
- +} else {
- // Valid extracted from TEST_CASES, check that it detects IV tampering.
- const valid = {
- algo: 'chacha20-poly1305',
- @@ -664,6 +692,9 @@ for (const test of TEST_CASES) {
-
- {
- // CCM cipher without data should not crash, see https://github.com/nodejs/node/issues/38035.
- + common.printSkipMessage(`unsupported aes-128-ccm test`);
- + return;
- +
- const algo = 'aes-128-ccm';
- const key = Buffer.alloc(16);
- const iv = Buffer.alloc(12);
- diff --git a/test/parallel/test-crypto-certificate.js b/test/parallel/test-crypto-certificate.js
- index 4a5f1f149fe6c739f7f1d2ee17df6e61a942d621..b3287f428ce6b3fde11d449c601a57ff5e3843f9 100644
- --- a/test/parallel/test-crypto-certificate.js
- +++ b/test/parallel/test-crypto-certificate.js
- @@ -40,8 +40,10 @@ function copyArrayBuffer(buf) {
- }
-
- function checkMethods(certificate) {
- -
- + /* spkacValid has a md5 based signature which is not allowed in boringssl
- + https://boringssl.googlesource.com/boringssl/+/33d7e32ce40c04e8f1b99c05964956fda187819f
- assert.strictEqual(certificate.verifySpkac(spkacValid), true);
- + */
- assert.strictEqual(certificate.verifySpkac(spkacFail), false);
-
- assert.strictEqual(
- @@ -56,10 +58,12 @@ function checkMethods(certificate) {
- );
- assert.strictEqual(certificate.exportChallenge(spkacFail), '');
-
- + /* spkacValid has a md5 based signature which is not allowed in boringssl
- const ab = copyArrayBuffer(spkacValid);
- assert.strictEqual(certificate.verifySpkac(ab), true);
- assert.strictEqual(certificate.verifySpkac(new Uint8Array(ab)), true);
- assert.strictEqual(certificate.verifySpkac(new DataView(ab)), true);
- + */
- }
-
- {
- diff --git a/test/parallel/test-crypto-cipher-decipher.js b/test/parallel/test-crypto-cipher-decipher.js
- index 35514afbea92562a81c163b1e4d918b4ab609f71..13098e1acf12c309f2ed6f6143a2c2eeb8a2763d 100644
- --- a/test/parallel/test-crypto-cipher-decipher.js
- +++ b/test/parallel/test-crypto-cipher-decipher.js
- @@ -22,7 +22,7 @@ common.expectWarning({
- function testCipher1(key) {
- // Test encryption and decryption
- const plaintext = 'Keep this a secret? No! Tell everyone about node.js!';
- - const cipher = crypto.createCipher('aes192', key);
- + const cipher = crypto.createCipher('aes-192-cbc', key);
-
- // Encrypt plaintext which is in utf8 format
- // to a ciphertext which will be in hex
- @@ -30,7 +30,7 @@ function testCipher1(key) {
- // Only use binary or hex, not base64.
- ciph += cipher.final('hex');
-
- - const decipher = crypto.createDecipher('aes192', key);
- + const decipher = crypto.createDecipher('aes-192-cbc', key);
- let txt = decipher.update(ciph, 'hex', 'utf8');
- txt += decipher.final('utf8');
-
- @@ -40,11 +40,11 @@ function testCipher1(key) {
- // NB: In real life, it's not guaranteed that you can get all of it
- // in a single read() like this. But in this case, we know it's
- // quite small, so there's no harm.
- - const cStream = crypto.createCipher('aes192', key);
- + const cStream = crypto.createCipher('aes-192-cbc', key);
- cStream.end(plaintext);
- ciph = cStream.read();
-
- - const dStream = crypto.createDecipher('aes192', key);
- + const dStream = crypto.createDecipher('aes-192-cbc', key);
- dStream.end(ciph);
- txt = dStream.read().toString('utf8');
-
- @@ -59,14 +59,14 @@ function testCipher2(key) {
- '32|RmVZZkFUVmpRRkp0TmJaUm56ZU9qcnJkaXNNWVNpTTU*|iXmckfRWZBGWWELw' +
- 'eCBsThSsfUHLeRe0KCsK8ooHgxie0zOINpXxfZi/oNG7uq9JWFVCk70gfzQH8ZUJ' +
- 'jAfaFg**';
- - const cipher = crypto.createCipher('aes256', key);
- + const cipher = crypto.createCipher('aes-256-cbc', key);
-
- // Encrypt plaintext which is in utf8 format to a ciphertext which will be in
- // Base64.
- let ciph = cipher.update(plaintext, 'utf8', 'base64');
- ciph += cipher.final('base64');
-
- - const decipher = crypto.createDecipher('aes256', key);
- + const decipher = crypto.createDecipher('aes-256-cbc', key);
- let txt = decipher.update(ciph, 'base64', 'utf8');
- txt += decipher.final('utf8');
-
- @@ -170,7 +170,7 @@ testCipher2(Buffer.from('0123456789abcdef'));
- // Regression test for https://github.com/nodejs/node-v0.x-archive/issues/5482:
- // string to Cipher#update() should not assert.
- {
- - const c = crypto.createCipher('aes192', '0123456789abcdef');
- + const c = crypto.createCipher('aes-192-cbc', '0123456789abcdef');
- c.update('update');
- c.final();
- }
- @@ -178,15 +178,15 @@ testCipher2(Buffer.from('0123456789abcdef'));
- // https://github.com/nodejs/node-v0.x-archive/issues/5655 regression tests,
- // 'utf-8' and 'utf8' are identical.
- {
- - let c = crypto.createCipher('aes192', '0123456789abcdef');
- + let c = crypto.createCipher('aes-192-cbc', '0123456789abcdef');
- c.update('update', ''); // Defaults to "utf8".
- c.final('utf-8'); // Should not throw.
-
- - c = crypto.createCipher('aes192', '0123456789abcdef');
- + c = crypto.createCipher('aes-192-cbc', '0123456789abcdef');
- c.update('update', 'utf8');
- c.final('utf-8'); // Should not throw.
-
- - c = crypto.createCipher('aes192', '0123456789abcdef');
- + c = crypto.createCipher('aes-192-cbc', '0123456789abcdef');
- c.update('update', 'utf-8');
- c.final('utf8'); // Should not throw.
- }
- @@ -195,23 +195,23 @@ testCipher2(Buffer.from('0123456789abcdef'));
- {
- const key = '0123456789abcdef';
- const plaintext = 'Top secret!!!';
- - const c = crypto.createCipher('aes192', key);
- + const c = crypto.createCipher('aes-192-cbc', key);
- let ciph = c.update(plaintext, 'utf16le', 'base64');
- ciph += c.final('base64');
-
- - let decipher = crypto.createDecipher('aes192', key);
- + let decipher = crypto.createDecipher('aes-192-cbc', key);
-
- let txt;
- txt = decipher.update(ciph, 'base64', 'ucs2');
- txt += decipher.final('ucs2');
- assert.strictEqual(txt, plaintext);
-
- - decipher = crypto.createDecipher('aes192', key);
- + decipher = crypto.createDecipher('aes-192-cbc', key);
- txt = decipher.update(ciph, 'base64', 'ucs-2');
- txt += decipher.final('ucs-2');
- assert.strictEqual(txt, plaintext);
-
- - decipher = crypto.createDecipher('aes192', key);
- + decipher = crypto.createDecipher('aes-192-cbc', key);
- txt = decipher.update(ciph, 'base64', 'utf-16le');
- txt += decipher.final('utf-16le');
- assert.strictEqual(txt, plaintext);
- diff --git a/test/parallel/test-crypto-cipheriv-decipheriv.js b/test/parallel/test-crypto-cipheriv-decipheriv.js
- index 3e3632203af72c54f2795d8de0cf345862a043bb..a066bbb803d41d9d1f26a02e41115b71233988d6 100644
- --- a/test/parallel/test-crypto-cipheriv-decipheriv.js
- +++ b/test/parallel/test-crypto-cipheriv-decipheriv.js
- @@ -60,6 +60,10 @@ function testCipher2(key, iv) {
-
-
- function testCipher3(key, iv) {
- + if (!crypto.getCiphers().includes('id-aes128-wrap')) {
- + common.printSkipMessage(`unsupported id-aes128-wrap test`);
- + return;
- + }
- // Test encryption and decryption with explicit key and iv.
- // AES Key Wrap test vector comes from RFC3394
- const plaintext = Buffer.from('00112233445566778899AABBCCDDEEFF', 'hex');
- diff --git a/test/parallel/test-crypto-classes.js b/test/parallel/test-crypto-classes.js
- index dd073274aef765e8f1e403aa2c8baf9694b521cb..fc6339e040debe61ecc61a3eb5b26823b102f1ff 100644
- --- a/test/parallel/test-crypto-classes.js
- +++ b/test/parallel/test-crypto-classes.js
- @@ -22,8 +22,8 @@ const TEST_CASES = {
- };
-
- if (!common.hasFipsCrypto) {
- - TEST_CASES.Cipher = ['aes192', 'secret'];
- - TEST_CASES.Decipher = ['aes192', 'secret'];
- + TEST_CASES.Cipher = ['aes-192-cbc', 'secret'];
- + TEST_CASES.Decipher = ['aes-192-cbc', 'secret'];
- TEST_CASES.DiffieHellman = [common.hasOpenSSL3 ? 1024 : 256];
- }
-
- diff --git a/test/parallel/test-crypto-dh-curves.js b/test/parallel/test-crypto-dh-curves.js
- index 81a469c226c261564dee1e0b06b6571b18a41f1f..58b66045dba4201b7ebedd78b129420ffc316051 100644
- --- a/test/parallel/test-crypto-dh-curves.js
- +++ b/test/parallel/test-crypto-dh-curves.js
- @@ -16,7 +16,7 @@ const p = 'FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74' +
- crypto.createDiffieHellman(p, 'hex');
-
- // Confirm DH_check() results are exposed for optional examination.
- -const bad_dh = crypto.createDiffieHellman('02', 'hex');
- +const bad_dh = crypto.createDiffieHellman('abcd', 'hex', 0);
- assert.notStrictEqual(bad_dh.verifyError, 0);
-
- const availableCurves = new Set(crypto.getCurves());
- diff --git a/test/parallel/test-crypto-dh-errors.js b/test/parallel/test-crypto-dh-errors.js
- index fcf1922bcdba733af6c22f142db4f7b099947757..9f72ae4e41a113e752f40795103c2af514538780 100644
- --- a/test/parallel/test-crypto-dh-errors.js
- +++ b/test/parallel/test-crypto-dh-errors.js
- @@ -32,9 +32,9 @@ for (const bits of [-1, 0, 1]) {
- });
- } else {
- assert.throws(() => crypto.createDiffieHellman(bits), {
- - code: 'ERR_OSSL_BN_BITS_TOO_SMALL',
- + code: /ERR_OSSL_BN_BITS_TOO_SMALL|ERR_OSSL_DH_MODULUS_TOO_LARGE/,
- name: 'Error',
- - message: /bits too small/,
- + message: /bits too small|BITS_TOO_SMALL|MODULUS_TOO_LARGE/,
- });
- }
- }
- @@ -43,7 +43,7 @@ for (const g of [-1, 1]) {
- const ex = {
- code: 'ERR_OSSL_DH_BAD_GENERATOR',
- name: 'Error',
- - message: /bad generator/,
- + message: /bad generator|BAD_GENERATOR/,
- };
- assert.throws(() => crypto.createDiffieHellman('abcdef', g), ex);
- assert.throws(() => crypto.createDiffieHellman('abcdef', 'hex', g), ex);
- @@ -55,7 +55,7 @@ for (const g of [Buffer.from([]),
- const ex = {
- code: 'ERR_OSSL_DH_BAD_GENERATOR',
- name: 'Error',
- - message: /bad generator/,
- + message: /bad generator|BAD_GENERATOR/,
- };
- assert.throws(() => crypto.createDiffieHellman('abcdef', g), ex);
- assert.throws(() => crypto.createDiffieHellman('abcdef', 'hex', g), ex);
- diff --git a/test/parallel/test-crypto-dh.js b/test/parallel/test-crypto-dh.js
- index fb580e1b315445182538c56fc114742ce896bf4c..36014fe7cb411016d72a7f4ab118923d12e97898 100644
- --- a/test/parallel/test-crypto-dh.js
- +++ b/test/parallel/test-crypto-dh.js
- @@ -55,18 +55,17 @@ const crypto = require('crypto');
- let wrongBlockLength;
- if (common.hasOpenSSL3) {
- wrongBlockLength = {
- - message: 'error:1C80006B:Provider routines::wrong final block length',
- - code: 'ERR_OSSL_WRONG_FINAL_BLOCK_LENGTH',
- - library: 'Provider routines',
- - reason: 'wrong final block length'
- + message: /error:1C80006B:Provider routines::wrong final block length|error:1e00007b:Cipher functions:OPENSSL_internal:WRONG_FINAL_BLOCK_LENGTH/,
- + code: /ERR_OSSL_(EVP_)?WRONG_FINAL_BLOCK_LENGTH/,
- + library: /digital envelope routines|Cipher functions/,
- + reason: /wrong final block length|WRONG_FINAL_BLOCK_LENGTH/
- };
- } else {
- wrongBlockLength = {
- - message: 'error:0606506D:digital envelope' +
- - ' routines:EVP_DecryptFinal_ex:wrong final block length',
- - code: 'ERR_OSSL_EVP_WRONG_FINAL_BLOCK_LENGTH',
- - library: 'digital envelope routines',
- - reason: 'wrong final block length'
- + message: /error:0606506D:digital envelope routines:EVP_DecryptFinal_ex:wrong final block length|error:1e00007b:Cipher functions:OPENSSL_internal:WRONG_FINAL_BLOCK_LENGTH/,
- + code: /ERR_OSSL_(EVP_)?WRONG_FINAL_BLOCK_LENGTH/,
- + library: /digital envelope routines|Cipher functions/,
- + reason: /wrong final block length|WRONG_FINAL_BLOCK_LENGTH/
- };
- }
-
- @@ -99,10 +98,16 @@ const crypto = require('crypto');
- // Through a fluke of history, g=0 defaults to DH_GENERATOR (2).
- {
- const g = 0;
- - crypto.createDiffieHellman('abcdef', g);
- + assert.throws(() => crypto.createDiffieHellman('abcdef', g), {
- + code: /INVALID_PARAMETERS/,
- + name: 'Error'
- + });
- crypto.createDiffieHellman('abcdef', 'hex', g);
- }
-
- {
- - crypto.createDiffieHellman('abcdef', Buffer.from([2])); // OK
- + assert.throws(() => crypto.createDiffieHellman('abcdef', Buffer.from([2])), {
- + code: /INVALID_PARAMETERS/,
- + name: 'Error'
- + });
- }
- diff --git a/test/parallel/test-crypto-getcipherinfo.js b/test/parallel/test-crypto-getcipherinfo.js
- index 64b79fc36ccf4d38f763fcd8c1930473c82cefd7..892490fc7dd8da09f8aa10a20bec69385c0fee28 100644
- --- a/test/parallel/test-crypto-getcipherinfo.js
- +++ b/test/parallel/test-crypto-getcipherinfo.js
- @@ -62,9 +62,13 @@ assert(getCipherInfo('aes-128-cbc', { ivLength: 16 }));
-
- assert(!getCipherInfo('aes-128-ccm', { ivLength: 1 }));
- assert(!getCipherInfo('aes-128-ccm', { ivLength: 14 }));
- +/*
- for (let n = 7; n <= 13; n++)
- assert(getCipherInfo('aes-128-ccm', { ivLength: n }));
- +*/
-
- assert(!getCipherInfo('aes-128-ocb', { ivLength: 16 }));
- +/*
- for (let n = 1; n < 16; n++)
- assert(getCipherInfo('aes-128-ocb', { ivLength: n }));
- +*/
- \ No newline at end of file
- diff --git a/test/parallel/test-crypto-hash-stream-pipe.js b/test/parallel/test-crypto-hash-stream-pipe.js
- index d22281abbd5c3cab3aaa3ac494301fa6b4a8a968..5f0c6a4aed2e868a1a1049212edf218791cd6868 100644
- --- a/test/parallel/test-crypto-hash-stream-pipe.js
- +++ b/test/parallel/test-crypto-hash-stream-pipe.js
- @@ -30,11 +30,11 @@ const crypto = require('crypto');
-
- const stream = require('stream');
- const s = new stream.PassThrough();
- -const h = crypto.createHash('sha3-512');
- -const expect = '36a38a2a35e698974d4e5791a3f05b05' +
- - '198235381e864f91a0e8cd6a26b677ec' +
- - 'dcde8e2b069bd7355fabd68abd6fc801' +
- - '19659f25e92f8efc961ee3a7c815c758';
- +const h = crypto.createHash('sha512');
- +const expect = 'fba055c6fd0c5b6645407749ed7a8b41' +
- + 'b8f629f2163c3ca3701d864adabda1f8' +
- + '93c37bf82b22fdd151ba8e357f611da4' +
- + '88a74b6a5525dd9b69554c6ce5138ad7';
-
- s.pipe(h).on('data', common.mustCall(function(c) {
- assert.strictEqual(c, expect);
- diff --git a/test/parallel/test-crypto-hash.js b/test/parallel/test-crypto-hash.js
- index af2146982c7a3bf7bd7527f44e4b17a3b605026e..f6b91f675cfea367c608892dee078b565814f2dd 100644
- --- a/test/parallel/test-crypto-hash.js
- +++ b/test/parallel/test-crypto-hash.js
- @@ -182,6 +182,7 @@ assert.throws(
-
- // Test XOF hash functions and the outputLength option.
- {
- + /*
- // Default outputLengths.
- assert.strictEqual(crypto.createHash('shake128').digest('hex'),
- '7f9c2ba4e88f827d616045507605853e');
- @@ -236,6 +237,7 @@ assert.throws(
- assert.strictEqual(superLongHash.length, 2 * 1024 * 1024);
- assert.ok(superLongHash.endsWith('193414035ddba77bf7bba97981e656ec'));
- assert.ok(superLongHash.startsWith('a2a28dbc49cfd6e5d6ceea3d03e77748'));
- + */
-
- // Non-XOF hash functions should accept valid outputLength options as well.
- assert.strictEqual(crypto.createHash('sha224', { outputLength: 28 })
- diff --git a/test/parallel/test-crypto-hkdf.js b/test/parallel/test-crypto-hkdf.js
- index ff3abdf291efcd076b36e755de4147b0aad0b345..d29854cf0c0ce89f84c912def672e7c4e11427a3 100644
- --- a/test/parallel/test-crypto-hkdf.js
- +++ b/test/parallel/test-crypto-hkdf.js
- @@ -124,8 +124,6 @@ const algorithms = [
- ['sha256', '', 'salt', '', 10],
- ['sha512', 'secret', 'salt', '', 15],
- ];
- -if (!common.hasOpenSSL3)
- - algorithms.push(['whirlpool', 'secret', '', 'info', 20]);
-
- algorithms.forEach(([ hash, secret, salt, info, length ]) => {
- {
- diff --git a/test/parallel/test-crypto-padding.js b/test/parallel/test-crypto-padding.js
- index f1f14b472997e76bb4100edb1c6cf4fc24d1074d..5057e3f9bc5bb78aceffa5e79530f8ceed84e6f7 100644
- --- a/test/parallel/test-crypto-padding.js
- +++ b/test/parallel/test-crypto-padding.js
- @@ -87,10 +87,9 @@ assert.throws(function() {
- code: 'ERR_OSSL_WRONG_FINAL_BLOCK_LENGTH',
- reason: 'wrong final block length',
- } : {
- - message: 'error:0607F08A:digital envelope routines:EVP_EncryptFinal_ex:' +
- - 'data not multiple of block length',
- - code: 'ERR_OSSL_EVP_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH',
- - reason: 'data not multiple of block length',
- + message: /error:0607F08A:digital envelope routines:EVP_EncryptFinal_ex:data not multiple of block length|error:1e00006a:Cipher functions:OPENSSL_internal:DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH/,
- + code: /ERR_OSSL(_EVP)?_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH/,
- + reason: /data not multiple of block length|DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH/,
- }
- );
-
- @@ -114,10 +113,9 @@ assert.throws(function() {
- reason: 'bad decrypt',
- code: 'ERR_OSSL_BAD_DECRYPT',
- } : {
- - message: 'error:06065064:digital envelope routines:EVP_DecryptFinal_ex:' +
- - 'bad decrypt',
- - reason: 'bad decrypt',
- - code: 'ERR_OSSL_EVP_BAD_DECRYPT',
- + message: /error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt|error:1e000065:Cipher functions:OPENSSL_internal:BAD_DECRYPT/,
- + reason: /bad decrypt|BAD_DECRYPT/,
- + code: /ERR_OSSL(_EVP)?_BAD_DECRYPT/,
- });
-
- // No-pad encrypted string should return the same:
- diff --git a/test/parallel/test-crypto-private-decrypt-gh32240.js b/test/parallel/test-crypto-private-decrypt-gh32240.js
- index 1785f5eef3d202976666081d09850ed744d83446..e88227a215ba4f7fa196f7642ae694a57d55b3ca 100644
- --- a/test/parallel/test-crypto-private-decrypt-gh32240.js
- +++ b/test/parallel/test-crypto-private-decrypt-gh32240.js
- @@ -24,7 +24,7 @@ const pkeyEncrypted =
- pair.privateKey.export({
- type: 'pkcs1',
- format: 'pem',
- - cipher: 'aes128',
- + cipher: 'aes-128-cbc',
- passphrase: 'secret',
- });
-
- diff --git a/test/parallel/test-crypto-rsa-dsa.js b/test/parallel/test-crypto-rsa-dsa.js
- index 5f4fafdfffbf726b7cb39c472baa3df25c9794cf..73bb53b0405b20f51b13326cc70e52755c674366 100644
- --- a/test/parallel/test-crypto-rsa-dsa.js
- +++ b/test/parallel/test-crypto-rsa-dsa.js
- @@ -28,12 +28,11 @@ const dsaPkcs8KeyPem = fixtures.readKey('dsa_private_pkcs8.pem');
- const ec = new TextEncoder();
-
- const openssl1DecryptError = {
- - message: 'error:06065064:digital envelope routines:EVP_DecryptFinal_ex:' +
- - 'bad decrypt',
- - code: 'ERR_OSSL_EVP_BAD_DECRYPT',
- - reason: 'bad decrypt',
- - function: 'EVP_DecryptFinal_ex',
- - library: 'digital envelope routines',
- + message: /error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt|error:1e000065:Cipher functions:OPENSSL_internal:BAD_DECRYPT/,
- + code: /ERR_OSSL(_EVP)?_BAD_DECRYPT/,
- + reason: /bad decrypt|BAD_DECRYPT/,
- + function: /EVP_DecryptFinal_ex|OPENSSL_internal/,
- + library: /digital envelope routines|Cipher functions/,
- };
-
- const decryptError = common.hasOpenSSL3 ?
- @@ -222,7 +221,8 @@ function test_rsa(padding, encryptOaepHash, decryptOaepHash) {
- }, bufferToEncrypt);
-
-
- - if (padding === constants.RSA_PKCS1_PADDING) {
- + // BoringSSL does not support RSA_PKCS1_PADDING.
- + if (false) {
- if (!process.config.variables.node_shared_openssl) {
- assert.throws(() => {
- crypto.privateDecrypt({
- @@ -466,7 +466,7 @@ assert.throws(() => {
- assert.strictEqual(verify2.verify(publicKey, signature, 'hex'), true);
- }
-
- -
- +/*
- //
- // Test DSA signing and verification
- //
- @@ -541,3 +541,4 @@ const input = 'I AM THE WALRUS';
-
- assert.strictEqual(verify.verify(dsaPubPem, signature, 'hex'), true);
- }
- +*/
- diff --git a/test/parallel/test-crypto-scrypt.js b/test/parallel/test-crypto-scrypt.js
- index 61bd65fc92678c24baa3c0eb9ffb1ead64ace70b..cb690351696a811210b9d990ee4cde3cfb2a3446 100644
- --- a/test/parallel/test-crypto-scrypt.js
- +++ b/test/parallel/test-crypto-scrypt.js
- @@ -178,7 +178,7 @@ for (const options of bad) {
-
- for (const options of toobig) {
- const expected = {
- - message: /Invalid scrypt params:.*memory limit exceeded/,
- + message: /Invalid scrypt params/,
- code: 'ERR_CRYPTO_INVALID_SCRYPT_PARAMS',
- };
- assert.throws(() => crypto.scrypt('pass', 'salt', 1, options, () => {}),
- diff --git a/test/parallel/test-crypto-sign-verify.js b/test/parallel/test-crypto-sign-verify.js
- index 56e5c16c2867f019caccf42f228193cae6167150..dc585c44db9894ae57a5e11d453af03e1ea4f211 100644
- --- a/test/parallel/test-crypto-sign-verify.js
- +++ b/test/parallel/test-crypto-sign-verify.js
- @@ -28,6 +28,7 @@ const keySize = 2048;
- 'instance when called without `new`');
- }
-
- +/*
- // Test handling of exceptional conditions
- {
- const library = {
- @@ -68,6 +69,7 @@ const keySize = 2048;
-
- delete Object.prototype.opensslErrorStack;
- }
- +*/
-
- assert.throws(
- () => crypto.createVerify('SHA256').verify({
- @@ -341,15 +343,17 @@ assert.throws(
- padding: crypto.constants.RSA_PKCS1_OAEP_PADDING
- });
- }, common.hasOpenSSL3 ? {
- - code: 'ERR_OSSL_ILLEGAL_OR_UNSUPPORTED_PADDING_MODE',
- - message: /illegal or unsupported padding mode/,
- + code: /^ERR_OSSL_(RSA|EVP)_ILLEGAL_OR_UNSUPPORTED_PADDING_MODE$/,
- + message: /illegal or unsupported padding mode|ILLEGAL_OR_UNSUPPORTED_PADDING_MODE/,
- } : {
- - code: 'ERR_OSSL_RSA_ILLEGAL_OR_UNSUPPORTED_PADDING_MODE',
- - message: /illegal or unsupported padding mode/,
- + code: /^ERR_OSSL_(RSA|EVP)_ILLEGAL_OR_UNSUPPORTED_PADDING_MODE$/,
- + message: /illegal or unsupported padding mode|ILLEGAL_OR_UNSUPPORTED_PADDING_MODE/,
- + /*
- opensslErrorStack: [
- 'error:06089093:digital envelope routines:EVP_PKEY_CTX_ctrl:' +
- 'command not supported',
- ],
- + */
- });
- }
-
- @@ -419,10 +423,12 @@ assert.throws(
- public: fixtures.readKey('ed25519_public.pem', 'ascii'),
- algo: null,
- sigLen: 64 },
- + /*
- { private: fixtures.readKey('ed448_private.pem', 'ascii'),
- public: fixtures.readKey('ed448_public.pem', 'ascii'),
- algo: null,
- sigLen: 114 },
- + */
- { private: fixtures.readKey('rsa_private_2048.pem', 'ascii'),
- public: fixtures.readKey('rsa_public_2048.pem', 'ascii'),
- algo: 'sha1',
- @@ -493,7 +499,7 @@ assert.throws(
-
- {
- const data = Buffer.from('Hello world');
- - const keys = [['ec-key.pem', 64], ['dsa_private_1025.pem', 40]];
- + const keys = [['ec-key.pem', 64]/*, ['dsa_private_1025.pem', 40]*/];
-
- for (const [file, length] of keys) {
- const privKey = fixtures.readKey(file);
- diff --git a/test/parallel/test-crypto-stream.js b/test/parallel/test-crypto-stream.js
- index 008ab129f0e019c659eecf5a76b7eb412c947fe3..6688f5d916f50e1e4fcfff1619c8634a3233f820 100644
- --- a/test/parallel/test-crypto-stream.js
- +++ b/test/parallel/test-crypto-stream.js
- @@ -76,10 +76,10 @@ cipher.pipe(decipher)
- library: 'Provider routines',
- reason: 'bad decrypt',
- } : {
- - message: /bad decrypt/,
- - function: 'EVP_DecryptFinal_ex',
- - library: 'digital envelope routines',
- - reason: 'bad decrypt',
- + message: /bad decrypt|BAD_DECRYPT/,
- + function: /EVP_DecryptFinal_ex|OPENSSL_internal/,
- + library: /digital envelope routines|Cipher functions/,
- + reason: /bad decrypt|BAD_DECRYPT/,
- }));
-
- cipher.end('Papaya!'); // Should not cause an unhandled exception.
- diff --git a/test/parallel/test-crypto-x509.js b/test/parallel/test-crypto-x509.js
- index 89a7521544f7051edc1779138551bbad1972b3fb..91df6acc65d4003999f29f0fa5f639056b21ee3b 100644
- --- a/test/parallel/test-crypto-x509.js
- +++ b/test/parallel/test-crypto-x509.js
- @@ -111,7 +111,7 @@ const der = Buffer.from(
- '5A:42:63:E0:21:2F:D6:70:63:07:96:6F:27:A7:78:12:08:02:7A:8B'
- );
- assert.strictEqual(x509.keyUsage, undefined);
- - assert.strictEqual(x509.serialNumber, '147D36C1C2F74206DE9FAB5F2226D78ADB00A426');
- + assert.match(x509.serialNumber, /147D36C1C2F74206DE9FAB5F2226D78ADB00A426/i);
-
- assert.deepStrictEqual(x509.raw, der);
-
- @@ -253,6 +253,16 @@ oans248kpal88CGqsN2so/wZKxVnpiXlPHMdiNL7hRSUqlHkUi07FrP2Htg8kjI=
- });
- mc.port2.postMessage(x509);
-
- + const modulusOSSL = 'D456320AFB20D3827093DC2C4284ED04DFBABD56E1DDAE529E28B790CD42' +
- + '56DB273349F3735FFD337C7A6363ECCA5A27B7F73DC7089A96C6D886DB0C' +
- + '62388F1CDD6A963AFCD599D5800E587A11F908960F84ED50BA25A28303EC' +
- + 'DA6E684FBE7BAEDC9CE8801327B1697AF25097CEE3F175E400984C0DB6A8' +
- + 'EB87BE03B4CF94774BA56FFFC8C63C68D6ADEB60ABBE69A7B14AB6A6B9E7' +
- + 'BAA89B5ADAB8EB07897C07F6D4FA3D660DFF574107D28E8F63467A788624' +
- + 'C574197693E959CEA1362FFAE1BBA10C8C0D88840ABFEF103631B2E8F5C3' +
- + '9B5548A7EA57E8A39F89291813F45A76C448033A2B7ED8403F4BAA147CF3' +
- + '5E2D2554AA65CE49695797095BF4DC6B';
- +
- // Verify that legacy encoding works
- const legacyObjectCheck = {
- subject: Object.assign({ __proto__: null }, {
- @@ -277,15 +287,7 @@ oans248kpal88CGqsN2so/wZKxVnpiXlPHMdiNL7hRSUqlHkUi07FrP2Htg8kjI=
- 'OCSP - URI': ['http://ocsp.nodejs.org/'],
- 'CA Issuers - URI': ['http://ca.nodejs.org/ca.cert']
- }),
- - modulus: 'D456320AFB20D3827093DC2C4284ED04DFBABD56E1DDAE529E28B790CD42' +
- - '56DB273349F3735FFD337C7A6363ECCA5A27B7F73DC7089A96C6D886DB0C' +
- - '62388F1CDD6A963AFCD599D5800E587A11F908960F84ED50BA25A28303EC' +
- - 'DA6E684FBE7BAEDC9CE8801327B1697AF25097CEE3F175E400984C0DB6A8' +
- - 'EB87BE03B4CF94774BA56FFFC8C63C68D6ADEB60ABBE69A7B14AB6A6B9E7' +
- - 'BAA89B5ADAB8EB07897C07F6D4FA3D660DFF574107D28E8F63467A788624' +
- - 'C574197693E959CEA1362FFAE1BBA10C8C0D88840ABFEF103631B2E8F5C3' +
- - '9B5548A7EA57E8A39F89291813F45A76C448033A2B7ED8403F4BAA147CF3' +
- - '5E2D2554AA65CE49695797095BF4DC6B',
- + modulusPattern: new RegExp(modulusOSSL, 'i'),
- bits: 2048,
- exponent: '0x10001',
- valid_from: 'Sep 3 21:40:37 2022 GMT',
- @@ -298,7 +300,7 @@ oans248kpal88CGqsN2so/wZKxVnpiXlPHMdiNL7hRSUqlHkUi07FrP2Htg8kjI=
- '51:62:18:39:E2:E2:77:F5:86:11:E8:C0:CA:54:43:7C:76:83:19:05:D0:03:' +
- '24:21:B8:EB:14:61:FB:24:16:EB:BD:51:1A:17:91:04:30:03:EB:68:5F:DC:' +
- '86:E1:D1:7C:FB:AF:78:ED:63:5F:29:9C:32:AF:A1:8E:22:96:D1:02',
- - serialNumber: '147D36C1C2F74206DE9FAB5F2226D78ADB00A426'
- + serialNumberPattern: /147D36C1C2F74206DE9FAB5F2226D78ADB00A426/i
- };
-
- const legacyObject = x509.toLegacyObject();
- @@ -307,7 +309,7 @@ oans248kpal88CGqsN2so/wZKxVnpiXlPHMdiNL7hRSUqlHkUi07FrP2Htg8kjI=
- assert.deepStrictEqual(legacyObject.subject, legacyObjectCheck.subject);
- assert.deepStrictEqual(legacyObject.issuer, legacyObjectCheck.issuer);
- assert.deepStrictEqual(legacyObject.infoAccess, legacyObjectCheck.infoAccess);
- - assert.strictEqual(legacyObject.modulus, legacyObjectCheck.modulus);
- + assert.match(legacyObject.modulus, legacyObjectCheck.modulusPattern);
- assert.strictEqual(legacyObject.bits, legacyObjectCheck.bits);
- assert.strictEqual(legacyObject.exponent, legacyObjectCheck.exponent);
- assert.strictEqual(legacyObject.valid_from, legacyObjectCheck.valid_from);
- @@ -316,11 +318,12 @@ oans248kpal88CGqsN2so/wZKxVnpiXlPHMdiNL7hRSUqlHkUi07FrP2Htg8kjI=
- assert.strictEqual(
- legacyObject.fingerprint256,
- legacyObjectCheck.fingerprint256);
- - assert.strictEqual(
- + assert.match(
- legacyObject.serialNumber,
- - legacyObjectCheck.serialNumber);
- + legacyObjectCheck.serialNumberPattern);
- }
-
- +/*
- {
- // This X.509 Certificate can be parsed by OpenSSL because it contains a
- // structurally sound TBSCertificate structure. However, the SPKI field of the
- @@ -359,3 +362,4 @@ UcXd/5qu2GhokrKU2cPttU+XAN2Om6a0
-
- assert.strictEqual(cert.checkIssued(cert), false);
- }
- +*/
- diff --git a/test/parallel/test-crypto.js b/test/parallel/test-crypto.js
- index a8ceb169de2b3de73f062083c42292babc673e73..8fb950d0814e5014faf5c1ef576b65795857da1b 100644
- --- a/test/parallel/test-crypto.js
- +++ b/test/parallel/test-crypto.js
- @@ -67,7 +67,7 @@ assert.throws(() => {
- // Throws general Error, so there is no opensslErrorStack property.
- return err instanceof Error &&
- err.name === 'Error' &&
- - /^Error: mac verify failure$/.test(err) &&
- + (/^Error: (mac verify failure|INCORRECT_PASSWORD)$/.test(err)) &&
- !('opensslErrorStack' in err);
- });
-
- @@ -77,7 +77,7 @@ assert.throws(() => {
- // Throws general Error, so there is no opensslErrorStack property.
- return err instanceof Error &&
- err.name === 'Error' &&
- - /^Error: mac verify failure$/.test(err) &&
- + (/^Error: (mac verify failure|INCORRECT_PASSWORD)$/.test(err)) &&
- !('opensslErrorStack' in err);
- });
-
- @@ -87,7 +87,7 @@ assert.throws(() => {
- // Throws general Error, so there is no opensslErrorStack property.
- return err instanceof Error &&
- err.name === 'Error' &&
- - /^Error: not enough data$/.test(err) &&
- + /^Error: (not enough data|BAD_PKCS12_DATA)$/.test(err) &&
- !('opensslErrorStack' in err);
- });
-
- @@ -150,8 +150,6 @@ assert(crypto.getHashes().includes('sha1'));
- assert(crypto.getHashes().includes('sha256'));
- assert(!crypto.getHashes().includes('SHA1'));
- assert(!crypto.getHashes().includes('SHA256'));
- -assert(crypto.getHashes().includes('RSA-SHA1'));
- -assert(!crypto.getHashes().includes('rsa-sha1'));
- validateList(crypto.getHashes());
- // Make sure all of the hashes are supported by OpenSSL
- for (const algo of crypto.getHashes())
- @@ -188,7 +186,7 @@ const encodingError = {
- // hex input that's not a power of two should throw, not assert in C++ land.
- ['createCipher', 'createDecipher'].forEach((funcName) => {
- assert.throws(
- - () => crypto[funcName]('aes192', 'test').update('0', 'hex'),
- + () => crypto[funcName]('aes-192-cbc', 'test').update('0', 'hex'),
- (error) => {
- assert.ok(!('opensslErrorStack' in error));
- if (common.hasFipsCrypto) {
- @@ -219,7 +217,7 @@ assert.throws(
- return true;
- }
- );
- -
- +/*
- assert.throws(() => {
- const priv = [
- '-----BEGIN RSA PRIVATE KEY-----',
- @@ -232,6 +230,7 @@ assert.throws(() => {
- ].join('\n');
- crypto.createSign('SHA256').update('test').sign(priv);
- }, (err) => {
- + console.log(err)
- if (!common.hasOpenSSL3)
- assert.ok(!('opensslErrorStack' in err));
- assert.throws(() => { throw err; }, common.hasOpenSSL3 ? {
- @@ -240,10 +239,10 @@ assert.throws(() => {
- library: 'rsa routines',
- } : {
- name: 'Error',
- - message: /routines:RSA_sign:digest too big for rsa key$/,
- - library: 'rsa routines',
- - function: 'RSA_sign',
- - reason: 'digest too big for rsa key',
- + message: /routines:RSA_sign:digest too big for rsa key$|routines:OPENSSL_internal:DIGEST_TOO_BIG_FOR_RSA_KEY$/,
- + library: /rsa routines|RSA routines/,
- + function: /RSA_sign|OPENSSL_internal/,
- + reason: /digest too big for rsa key|DIGEST_TOO_BIG_FOR_RSA_KEY/,
- code: 'ERR_OSSL_RSA_DIGEST_TOO_BIG_FOR_RSA_KEY'
- });
- return true;
- @@ -276,7 +275,7 @@ if (!common.hasOpenSSL3) {
- return true;
- });
- }
- -
- +*/
- // Make sure memory isn't released before being returned
- console.log(crypto.randomBytes(16));
-
- diff --git a/test/parallel/test-https-agent-additional-options.js b/test/parallel/test-https-agent-additional-options.js
- index 543ee176fb6af38874fee9f14be76f3fdda11060..fef9f1bc2f9fc6c220cf47847e86e03882b51b1d 100644
- --- a/test/parallel/test-https-agent-additional-options.js
- +++ b/test/parallel/test-https-agent-additional-options.js
- @@ -13,7 +13,7 @@ const options = {
- cert: fixtures.readKey('agent1-cert.pem'),
- ca: fixtures.readKey('ca1-cert.pem'),
- minVersion: 'TLSv1.1',
- - ciphers: 'ALL@SECLEVEL=0'
- + // ciphers: 'ALL@SECLEVEL=0'
- };
-
- const server = https.Server(options, (req, res) => {
- @@ -28,7 +28,7 @@ function getBaseOptions(port) {
- ca: options.ca,
- rejectUnauthorized: true,
- servername: 'agent1',
- - ciphers: 'ALL@SECLEVEL=0'
- + // ciphers: 'ALL@SECLEVEL=0'
- };
- }
-
- diff --git a/test/parallel/test-https-agent-session-eviction.js b/test/parallel/test-https-agent-session-eviction.js
- index da5600710560b22049eba1ef18bbb742d447a673..8917b96f666de916616af2fb3ce3a58d00af7438 100644
- --- a/test/parallel/test-https-agent-session-eviction.js
- +++ b/test/parallel/test-https-agent-session-eviction.js
- @@ -14,7 +14,7 @@ const options = {
- key: readKey('agent1-key.pem'),
- cert: readKey('agent1-cert.pem'),
- secureOptions: SSL_OP_NO_TICKET,
- - ciphers: 'RSA@SECLEVEL=0'
- + // ciphers: 'RSA@SECLEVEL=0'
- };
-
- // Create TLS1.2 server
- diff --git a/test/parallel/test-tls-getcertificate-x509.js b/test/parallel/test-tls-getcertificate-x509.js
- index aa685ca9e09cf0d17ff4d5480089e9977dd51f72..ccafa427433922155c1afd5d95ba69d8108825ef 100644
- --- a/test/parallel/test-tls-getcertificate-x509.js
- +++ b/test/parallel/test-tls-getcertificate-x509.js
- @@ -20,9 +20,7 @@ const server = tls.createServer(options, function(cleartext) {
- server.once('secureConnection', common.mustCall(function(socket) {
- const cert = socket.getX509Certificate();
- assert(cert instanceof X509Certificate);
- - assert.strictEqual(
- - cert.serialNumber,
- - '5B75D77EDC7FB5B7FA9F1424DA4C64FB815DCBDE');
- + assert.match(cert.serialNumber, /5B75D77EDC7FB5B7FA9F1424DA4C64FB815DCBDE/i)
- }));
-
- server.listen(0, common.mustCall(function() {
- @@ -33,10 +31,7 @@ server.listen(0, common.mustCall(function() {
- const peerCert = socket.getPeerX509Certificate();
- assert(peerCert.issuerCertificate instanceof X509Certificate);
- assert.strictEqual(peerCert.issuerCertificate.issuerCertificate, undefined);
- - assert.strictEqual(
- - peerCert.issuerCertificate.serialNumber,
- - '147D36C1C2F74206DE9FAB5F2226D78ADB00A425'
- - );
- + assert.match(peerCert.issuerCertificate.serialNumber, /147D36C1C2F74206DE9FAB5F2226D78ADB00A425/i);
- server.close();
- }));
- socket.end('Hello');
- diff --git a/test/parallel/test-tls-getprotocol.js b/test/parallel/test-tls-getprotocol.js
- index 571f400cea574662bda6be8eecd22ceccaf75420..2296362dc625ee663df11927297ccf124233a19b 100644
- --- a/test/parallel/test-tls-getprotocol.js
- +++ b/test/parallel/test-tls-getprotocol.js
- @@ -27,7 +27,7 @@ const clientConfigs = [
-
- const serverConfig = {
- secureProtocol: 'TLS_method',
- - ciphers: 'RSA@SECLEVEL=0',
- + // ciphers: 'RSA@SECLEVEL=0',
- key: fixtures.readKey('agent2-key.pem'),
- cert: fixtures.readKey('agent2-cert.pem')
- };
- diff --git a/test/parallel/test-tls-write-error.js b/test/parallel/test-tls-write-error.js
- index b06f2fa2c53ea72f9a66f0d002dd9281d0259a0f..864fffeebfad75d95416fd47efdea7f222c507a2 100644
- --- a/test/parallel/test-tls-write-error.js
- +++ b/test/parallel/test-tls-write-error.js
- @@ -17,7 +17,7 @@ const server_cert = fixtures.readKey('agent1-cert.pem');
- const opts = {
- key: server_key,
- cert: server_cert,
- - ciphers: 'ALL@SECLEVEL=0'
- + // ciphers: 'ALL@SECLEVEL=0'
- };
-
- const server = https.createServer(opts, (req, res) => {
- diff --git a/test/parallel/test-webcrypto-derivebits.js b/test/parallel/test-webcrypto-derivebits.js
- index eb09bc24f0cb8244b05987e3a7c1d203360d3a38..da891fffa29d5666d91e4445e54c43e3688b870a 100644
- --- a/test/parallel/test-webcrypto-derivebits.js
- +++ b/test/parallel/test-webcrypto-derivebits.js
- @@ -101,6 +101,7 @@ const { subtle } = globalThis.crypto;
- tests.then(common.mustCall());
- }
-
- +/*
- // Test X25519 and X448 bit derivation
- {
- async function test(name) {
- @@ -126,3 +127,4 @@ const { subtle } = globalThis.crypto;
- test('X25519').then(common.mustCall());
- test('X448').then(common.mustCall());
- }
- +*/
- diff --git a/test/parallel/test-webcrypto-derivekey.js b/test/parallel/test-webcrypto-derivekey.js
- index 558d37d90d5796b30101d1b512c9df3e7661d0db..c18f9670b10cb84c6902391f20e0ff75729cc960 100644
- --- a/test/parallel/test-webcrypto-derivekey.js
- +++ b/test/parallel/test-webcrypto-derivekey.js
- @@ -175,6 +175,7 @@ const { KeyObject } = require('crypto');
- })().then(common.mustCall());
- }
-
- +/*
- // Test X25519 and X448 key derivation
- {
- async function test(name) {
- @@ -209,3 +210,4 @@ const { KeyObject } = require('crypto');
- test('X25519').then(common.mustCall());
- test('X448').then(common.mustCall());
- }
- +*/
- diff --git a/test/parallel/test-webcrypto-sign-verify.js b/test/parallel/test-webcrypto-sign-verify.js
- index de736102bdcb71a5560c95f7041537f25026aed4..638fdf0d798f3309528c63f0f8598f3df5528339 100644
- --- a/test/parallel/test-webcrypto-sign-verify.js
- +++ b/test/parallel/test-webcrypto-sign-verify.js
- @@ -105,6 +105,7 @@ const { subtle } = globalThis.crypto;
- test('hello world').then(common.mustCall());
- }
-
- +/*
- // Test Sign/Verify Ed25519
- {
- async function test(data) {
- @@ -144,3 +145,4 @@ const { subtle } = globalThis.crypto;
-
- test('hello world').then(common.mustCall());
- }
- +*/
- diff --git a/test/parallel/test-webcrypto-wrap-unwrap.js b/test/parallel/test-webcrypto-wrap-unwrap.js
- index d1ca571af4be713082d32093bfb8a65f2aef9800..57b8df2ce18df58ff54b2d828af67e3c2e082fe0 100644
- --- a/test/parallel/test-webcrypto-wrap-unwrap.js
- +++ b/test/parallel/test-webcrypto-wrap-unwrap.js
- @@ -18,14 +18,15 @@ const kWrappingData = {
- wrap: { label: new Uint8Array(8) },
- pair: true
- },
- - 'AES-CTR': {
- + 'AES-CBC': {
- generate: { length: 128 },
- - wrap: { counter: new Uint8Array(16), length: 64 },
- + wrap: { iv: new Uint8Array(16) },
- pair: false
- },
- - 'AES-CBC': {
- + /*
- + 'AES-CTR': {
- generate: { length: 128 },
- - wrap: { iv: new Uint8Array(16) },
- + wrap: { counter: new Uint8Array(16), length: 64 },
- pair: false
- },
- 'AES-GCM': {
- @@ -42,6 +43,7 @@ const kWrappingData = {
- wrap: { },
- pair: false
- }
- + */
- };
-
- function generateWrappingKeys() {
- diff --git a/test/parallel/test-x509-escaping.js b/test/parallel/test-x509-escaping.js
- index e6ae4d886908cbc0e56787009db855dad8b12ba7..a17147daa0576ec49e560c05448f1ed0ae8d5640 100644
- --- a/test/parallel/test-x509-escaping.js
- +++ b/test/parallel/test-x509-escaping.js
- @@ -447,7 +447,7 @@ const { hasOpenSSL3 } = common;
- assert.strictEqual(certX509.checkHost(servername, { subject: 'default' }),
- undefined);
- assert.strictEqual(certX509.checkHost(servername, { subject: 'always' }),
- - servername);
- + undefined);
- assert.strictEqual(certX509.checkHost(servername, { subject: 'never' }),
- undefined);
-
- @@ -482,11 +482,11 @@ const { hasOpenSSL3 } = common;
- assert.strictEqual(certX509.subjectAltName, 'IP Address:1.2.3.4');
-
- // The newer X509Certificate API allows customizing this behavior:
- - assert.strictEqual(certX509.checkHost(servername), servername);
- + assert.strictEqual(certX509.checkHost(servername), undefined);
- assert.strictEqual(certX509.checkHost(servername, { subject: 'default' }),
- - servername);
- + undefined);
- assert.strictEqual(certX509.checkHost(servername, { subject: 'always' }),
- - servername);
- + undefined);
- assert.strictEqual(certX509.checkHost(servername, { subject: 'never' }),
- undefined);
-
|