test: make crypto tests work with BoringSSL · nodejs/node@89fdfde
@@ -35,16 +35,16 @@ let iter = 0;
35353636const errorHandler = common.mustCall((err) => {
3737let expectedErrorCode = 'ERR_SSL_WRONG_VERSION_NUMBER';
38-let expectedErrorReason = 'wrong version number';
38+let expectedErrorReason = /wrong[\s_]version[\s_]number/i;
3939if (hasOpenSSL(3, 2)) {
4040expectedErrorCode = 'ERR_SSL_PACKET_LENGTH_TOO_LONG';
41-expectedErrorReason = 'packet length too long';
41+expectedErrorReason = /packet[\s_]length[\s_]too[\s_]long/i;
4242};
43434444assert.strictEqual(err.code, expectedErrorCode);
4545assert.strictEqual(err.library, 'SSL routines');
4646if (!hasOpenSSL3) assert.strictEqual(err.function, 'ssl3_get_record');
47-assert.strictEqual(err.reason, expectedErrorReason);
47+assert.match(err.reason, expectedErrorReason);
4848errorReceived = true;
4949if (canCloseServer())
5050server.close();
@@ -98,15 +98,15 @@ function sendBADTLSRecord() {
9898}));
9999client.on('error', common.mustCall((err) => {
100100let expectedErrorCode = 'ERR_SSL_TLSV1_ALERT_PROTOCOL_VERSION';
101-let expectedErrorReason = 'tlsv1 alert protocol version';
101+let expectedErrorReason = /tlsv1[\s_]alert[\s_]protocol[\s_]version/i;
102102if (hasOpenSSL(3, 2)) {
103103expectedErrorCode = 'ERR_SSL_TLSV1_ALERT_RECORD_OVERFLOW';
104-expectedErrorReason = 'tlsv1 alert record overflow';
104+expectedErrorReason = /tlsv1[\s_]alert[\s_]record[\s_]overflow/i;
105105}
106106assert.strictEqual(err.code, expectedErrorCode);
107107assert.strictEqual(err.library, 'SSL routines');
108108if (!hasOpenSSL3)
109109assert.strictEqual(err.function, 'ssl3_read_bytes');
110-assert.strictEqual(err.reason, expectedErrorReason);
110+assert.match(err.reason, expectedErrorReason);
111111}));
112112}