@@ -97,8 +97,6 @@ const der = Buffer.from(
9797 assert . strictEqual ( x509 . infoAccess , infoAccessCheck ) ;
9898 assert . strictEqual ( x509 . validFrom , 'Sep 3 21:40:37 2022 GMT' ) ;
9999 assert . strictEqual ( x509 . validTo , 'Jun 17 21:40:37 2296 GMT' ) ;
100- assert . deepStrictEqual ( x509 . validFromDate , new Date ( '2022-09-03T21:40:37Z' ) ) ;
101- assert . deepStrictEqual ( x509 . validToDate , new Date ( '2296-06-17T21:40:37Z' ) ) ;
102100 assert . strictEqual (
103101 x509 . fingerprint ,
104102 '8B:89:16:C4:99:87:D2:13:1A:64:94:36:38:A5:32:01:F0:95:3B:53' ) ;
@@ -118,6 +116,11 @@ const der = Buffer.from(
118116
119117 assert . deepStrictEqual ( x509 . raw , der ) ;
120118
119+ if ( ! process . features . openssl_is_boringssl ) {
120+ assert . deepStrictEqual ( x509 . validFromDate , new Date ( '2022-09-03T21:40:37Z' ) ) ;
121+ assert . deepStrictEqual ( x509 . validToDate , new Date ( '2296-06-17T21:40:37Z' ) ) ;
122+ }
123+
121124 assert ( x509 . publicKey ) ;
122125 assert . strictEqual ( x509 . publicKey . type , 'public' ) ;
123126
@@ -356,13 +359,15 @@ tAt3hIKFD1bJt6c6WtMH2Su3syosWxmdmGk5ihslB00lvLpfj/wed8i3bkcB1doq
356359UcXd/5qu2GhokrKU2cPttU+XAN2Om6a0
357360-----END CERTIFICATE-----` ;
358361
359- const cert = new X509Certificate ( certPem ) ;
360- assert . throws ( ( ) => cert . publicKey , {
361- message : hasOpenSSL3 ? / d e c o d e e r r o r / : / w r o n g t a g / ,
362- name : 'Error'
363- } ) ;
362+ if ( ! process . features . openssl_is_boringssl ) {
363+ const cert = new X509Certificate ( certPem ) ;
364+ assert . throws ( ( ) => cert . publicKey , {
365+ message : hasOpenSSL3 ? / d e c o d e e r r o r / : / w r o n g t a g / ,
366+ name : 'Error'
367+ } ) ;
364368
365- assert . strictEqual ( cert . checkIssued ( cert ) , false ) ;
369+ assert . strictEqual ( cert . checkIssued ( cert ) , false ) ;
370+ }
366371}
367372
368373{
@@ -401,8 +406,10 @@ UidvpWWipVLZgK+oDks+bKTobcoXGW9oXobiIYqslXPy
401406-----END CERTIFICATE-----` . trim ( ) ;
402407 const c1 = new X509Certificate ( certPemUTCTime ) ;
403408
404- assert . deepStrictEqual ( c1 . validFromDate , new Date ( '1949-12-25T23:59:58Z' ) ) ;
405- assert . deepStrictEqual ( c1 . validToDate , new Date ( '1950-01-01T23:59:58Z' ) ) ;
409+ if ( ! process . features . openssl_is_boringssl ) {
410+ assert . deepStrictEqual ( c1 . validFromDate , new Date ( '1949-12-25T23:59:58Z' ) ) ;
411+ assert . deepStrictEqual ( c1 . validToDate , new Date ( '1950-01-01T23:59:58Z' ) ) ;
412+ }
406413
407414 // The GeneralizedTime format is used for dates in 2050 or later.
408415 const certPemGeneralizedTime = `-----BEGIN CERTIFICATE-----
@@ -436,6 +443,8 @@ CWwQO8JZjJqFtqtuzy2n+gLCvqePgG/gmSqHOPm2ZbLW
436443-----END CERTIFICATE-----` . trim ( ) ;
437444 const c2 = new X509Certificate ( certPemGeneralizedTime ) ;
438445
439- assert . deepStrictEqual ( c2 . validFromDate , new Date ( '2049-12-26T00:00:01Z' ) ) ;
440- assert . deepStrictEqual ( c2 . validToDate , new Date ( '2050-01-02T00:00:01Z' ) ) ;
446+ if ( ! process . features . openssl_is_boringssl ) {
447+ assert . deepStrictEqual ( c2 . validFromDate , new Date ( '2049-12-26T00:00:01Z' ) ) ;
448+ assert . deepStrictEqual ( c2 . validToDate , new Date ( '2050-01-02T00:00:01Z' ) ) ;
449+ }
441450}
0 commit comments