Skip to content

Commit

Permalink
test: fix tests affected by OpenSSL update
Browse files Browse the repository at this point in the history
Last OpenSSL 3 update changes behaviour back to be
closer to that of OpenSSL 1.1.1. Remove some instances
where we expected different errors from OpenSSL 3 versus
OpenSSL 1.1.1.

Signed-off-by: Michael Dawson <midawson@redhat.com>

PR-URL: #42352
Refs: https://mta.openssl.org/pipermail/openssl-announce/2022-March/000218.html
Reviewed-By: Richard Lau <rlau@redhat.com>
Reviewed-By: Danielle Adams <adamzdanielle@gmail.com>
  • Loading branch information
mhdawson authored and richardlau committed Mar 17, 2022
1 parent 3924618 commit c533b43
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 10 deletions.
4 changes: 1 addition & 3 deletions test/parallel/test-crypto-key-objects.js
Original file line number Diff line number Diff line change
Expand Up @@ -545,9 +545,7 @@ const privateDsa = fixtures.readKey('dsa_private_encrypted_1025.pem',
format: 'pem',
passphrase: Buffer.alloc(1024, 'a')
}), {
message: common.hasOpenSSL3 ?
'error:07880109:common libcrypto routines::interrupted or cancelled' :
/bad decrypt/
message: /bad decrypt/
});

const publicKey = createPublicKey(publicDsa);
Expand Down
11 changes: 4 additions & 7 deletions test/parallel/test-tls-passphrase.js
Original file line number Diff line number Diff line change
Expand Up @@ -223,8 +223,7 @@ server.listen(0, common.mustCall(function() {
}, onSecureConnect());
})).unref();

const errMessagePassword = common.hasOpenSSL3 ?
/Error: error:1400006B:UI routines::processing error/ : /bad decrypt/;
const errMessageDecrypt = /bad decrypt/;

// Missing passphrase
assert.throws(function() {
Expand All @@ -234,7 +233,7 @@ assert.throws(function() {
cert: cert,
rejectUnauthorized: false
});
}, errMessagePassword);
}, errMessageDecrypt);

assert.throws(function() {
tls.connect({
Expand All @@ -243,7 +242,7 @@ assert.throws(function() {
cert: cert,
rejectUnauthorized: false
});
}, errMessagePassword);
}, errMessageDecrypt);

assert.throws(function() {
tls.connect({
Expand All @@ -252,9 +251,7 @@ assert.throws(function() {
cert: cert,
rejectUnauthorized: false
});
}, errMessagePassword);

const errMessageDecrypt = /bad decrypt/;
}, errMessageDecrypt);

// Invalid passphrase
assert.throws(function() {
Expand Down

0 comments on commit c533b43

Please sign in to comment.