From e61fccf3f5a79ea00538d8f9d2140b8109adbcc2 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Tobias=20Nie=C3=9Fen?= Date: Sat, 20 Aug 2022 12:35:10 +0200 Subject: [PATCH] test: add coverage for invalid RSA-PSS digests PR-URL: https://github.com/nodejs/node/pull/44271 Reviewed-By: Richard Lau Reviewed-By: Filip Skokan Reviewed-By: Darshan Sen Reviewed-By: Luigi Pinca Reviewed-By: Anna Henningsen --- test/parallel/test-crypto-keygen.js | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) diff --git a/test/parallel/test-crypto-keygen.js b/test/parallel/test-crypto-keygen.js index 4e657e190e78b4..893ca085918051 100644 --- a/test/parallel/test-crypto-keygen.js +++ b/test/parallel/test-crypto-keygen.js @@ -1654,6 +1654,24 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher); } ); } + + assert.throws(() => generateKeyPair('rsa-pss', { + modulusLength: 512, + hashAlgorithm: 'sha2', + }, common.mustNotCall()), { + name: 'TypeError', + code: 'ERR_CRYPTO_INVALID_DIGEST', + message: 'md specifies an invalid digest' + }); + + assert.throws(() => generateKeyPair('rsa-pss', { + modulusLength: 512, + mgf1HashAlgorithm: 'sha2', + }, common.mustNotCall()), { + name: 'TypeError', + code: 'ERR_CRYPTO_INVALID_DIGEST', + message: 'mgf1_md specifies an invalid digest' + }); } // Passing an empty passphrase string should not cause OpenSSL's default