@@ -88,18 +88,21 @@ test('rsa_public.pem', 'rsa_private.pem', 'sha256', false,
8888
8989// ED25519
9090test('ed25519_public.pem', 'ed25519_private.pem', undefined, true);
91- // ED448
92- test('ed448_public.pem', 'ed448_private.pem', undefined, true);
9391
94- // ECDSA w/ der signature encoding
95- test('ec_secp256k1_public.pem', 'ec_secp256k1_private.pem', 'sha384',
96- false);
97- test('ec_secp256k1_public.pem', 'ec_secp256k1_private.pem', 'sha384',
98- false, { dsaEncoding: 'der' });
92+ if (!process.features.openssl_is_boringssl) {
93+ // ED448
94+ test('ed448_public.pem', 'ed448_private.pem', undefined, true);
9995
100- // ECDSA w/ ieee-p1363 signature encoding
101- test('ec_secp256k1_public.pem', 'ec_secp256k1_private.pem', 'sha384', false,
102- { dsaEncoding: 'ieee-p1363' });
96+ // ECDSA w/ der signature encoding
97+ test('ec_secp256k1_public.pem', 'ec_secp256k1_private.pem', 'sha384',
98+ false);
99+ test('ec_secp256k1_public.pem', 'ec_secp256k1_private.pem', 'sha384',
100+ false, { dsaEncoding: 'der' });
101+
102+ // ECDSA w/ ieee-p1363 signature encoding
103+ test('ec_secp256k1_public.pem', 'ec_secp256k1_private.pem', 'sha384', false,
104+ { dsaEncoding: 'ieee-p1363' });
105+ }
103106
104107// DSA w/ der signature encoding
105108test('dsa_public.pem', 'dsa_private.pem', 'sha256',
@@ -150,7 +153,10 @@ MCowBQYDK2VuAyEA6pwGRbadNQAI/tYN8+/p/0/hbsdHfOEGr1ADiLVk/Gc=
150153 const data = crypto.randomBytes(32);
151154 const signature = crypto.randomBytes(16);
152155
153- const expected = hasOpenSSL3 ? /operation not supported for this keytype/ : /no default digest/;
156+ let expected = /no default digest/;
157+ if (hasOpenSSL3 || !process.features.openssl_is_boringssl) {
158+ expected = /operation[\s_]not[\s_]supported[\s_]for[\s_]this[\s_]keytype/i;
159+ }
154160
155161 crypto.verify(undefined, data, untrustedKey, signature, common.mustCall((err) => {
156162 assert.ok(err);
@@ -164,6 +170,6 @@ MCowBQYDK2VuAyEA6pwGRbadNQAI/tYN8+/p/0/hbsdHfOEGr1ADiLVk/Gc=
164170 });
165171 crypto.sign('sha512', 'message', privateKey, common.mustCall((err) => {
166172 assert.ok(err);
167- assert.match(err.message, /digest too big for rsa key/);
173+ assert.match(err.message, /digest[\s_] too[\s_] big[\s_] for[\s_] rsa[\s_] key/i );
168174 }));
169175}
0 commit comments