test: make crypto tests work with BoringSSL · nodejs/node@89fdfde

@@ -35,16 +35,16 @@ let iter = 0;

35353636

const errorHandler = common.mustCall((err) => {

3737

let expectedErrorCode = 'ERR_SSL_WRONG_VERSION_NUMBER';

38-

let expectedErrorReason = 'wrong version number';

38+

let expectedErrorReason = /wrong[\s_]version[\s_]number/i;

3939

if (hasOpenSSL(3, 2)) {

4040

expectedErrorCode = 'ERR_SSL_PACKET_LENGTH_TOO_LONG';

41-

expectedErrorReason = 'packet length too long';

41+

expectedErrorReason = /packet[\s_]length[\s_]too[\s_]long/i;

4242

};

43434444

assert.strictEqual(err.code, expectedErrorCode);

4545

assert.strictEqual(err.library, 'SSL routines');

4646

if (!hasOpenSSL3) assert.strictEqual(err.function, 'ssl3_get_record');

47-

assert.strictEqual(err.reason, expectedErrorReason);

47+

assert.match(err.reason, expectedErrorReason);

4848

errorReceived = true;

4949

if (canCloseServer())

5050

server.close();

@@ -98,15 +98,15 @@ function sendBADTLSRecord() {

9898

}));

9999

client.on('error', common.mustCall((err) => {

100100

let expectedErrorCode = 'ERR_SSL_TLSV1_ALERT_PROTOCOL_VERSION';

101-

let expectedErrorReason = 'tlsv1 alert protocol version';

101+

let expectedErrorReason = /tlsv1[\s_]alert[\s_]protocol[\s_]version/i;

102102

if (hasOpenSSL(3, 2)) {

103103

expectedErrorCode = 'ERR_SSL_TLSV1_ALERT_RECORD_OVERFLOW';

104-

expectedErrorReason = 'tlsv1 alert record overflow';

104+

expectedErrorReason = /tlsv1[\s_]alert[\s_]record[\s_]overflow/i;

105105

}

106106

assert.strictEqual(err.code, expectedErrorCode);

107107

assert.strictEqual(err.library, 'SSL routines');

108108

if (!hasOpenSSL3)

109109

assert.strictEqual(err.function, 'ssl3_read_bytes');

110-

assert.strictEqual(err.reason, expectedErrorReason);

110+

assert.match(err.reason, expectedErrorReason);

111111

}));

112112

}