@@ -581,6 +581,49 @@ index 6f88e81e9ff29defe73800fc038b0d96d1ebd846..c0b92e2bdf86d3d2638c973f8be3110d
581
581
};
582
582
583
583
// Create TLS1.2 server
584
+ diff --git a/test/parallel/test-tls-alert-handling.js b/test/parallel/test-tls-alert-handling.js
585
+ index cba5bebaa29b6f8ac4fd0fcedaadb2f7bb3eb321..019d95df499892b14ab088f99013ee32c432779c 100644
586
+ --- a/test/parallel/test-tls-alert-handling.js
587
+ +++ b/test/parallel/test-tls-alert-handling.js
588
+ @@ -35,7 +35,7 @@ let iter = 0;
589
+
590
+ const errorHandler = common.mustCall((err) => {
591
+ let expectedErrorCode = 'ERR_SSL_WRONG_VERSION_NUMBER';
592
+ - let expectedErrorReason = 'wrong version number';
593
+ + let expectedErrorReason = /wrong[\s_]version[\s_]number/i;
594
+ if (hasOpenSSL(3, 2)) {
595
+ expectedErrorCode = 'ERR_SSL_PACKET_LENGTH_TOO_LONG';
596
+ expectedErrorReason = 'packet length too long';
597
+ @@ -43,8 +43,8 @@ const errorHandler = common.mustCall((err) => {
598
+
599
+ assert.strictEqual(err.code, expectedErrorCode);
600
+ assert.strictEqual(err.library, 'SSL routines');
601
+ - if (!hasOpenSSL3) assert.strictEqual(err.function, 'ssl3_get_record');
602
+ - assert.strictEqual(err.reason, expectedErrorReason);
603
+ + if (!hasOpenSSL3 && !common.openSSLIsBoringSSL) assert.strictEqual(err.function, 'ssl3_get_record');
604
+ + assert.match(err.reason, expectedErrorReason);
605
+ errorReceived = true;
606
+ if (canCloseServer())
607
+ server.close();
608
+ @@ -98,15 +98,15 @@ function sendBADTLSRecord() {
609
+ }));
610
+ client.on('error', common.mustCall((err) => {
611
+ let expectedErrorCode = 'ERR_SSL_TLSV1_ALERT_PROTOCOL_VERSION';
612
+ - let expectedErrorReason = 'tlsv1 alert protocol version';
613
+ + let expectedErrorReason = /tlsv1[\s_]alert[\s_]protocol[\s_]version/i;
614
+ if (hasOpenSSL(3, 2)) {
615
+ expectedErrorCode = 'ERR_SSL_TLSV1_ALERT_RECORD_OVERFLOW';
616
+ expectedErrorReason = 'tlsv1 alert record overflow';
617
+ }
618
+ assert.strictEqual(err.code, expectedErrorCode);
619
+ assert.strictEqual(err.library, 'SSL routines');
620
+ - if (!hasOpenSSL3)
621
+ + if (!hasOpenSSL3 && !common.openSSLIsBoringSSL)
622
+ assert.strictEqual(err.function, 'ssl3_read_bytes');
623
+ - assert.strictEqual(err.reason, expectedErrorReason);
624
+ + assert.match(err.reason, expectedErrorReason);
625
+ }));
626
+ }
584
627
diff --git a/test/parallel/test-tls-getprotocol.js b/test/parallel/test-tls-getprotocol.js
585
628
index b1eab88fd6517e3698934dea17752ef2bb8d8d54..3ad6db20316baa8490e3787dd55903b58a54ad06 100644
586
629
--- a/test/parallel/test-tls-getprotocol.js
0 commit comments