diff --git a/src/crypto/crypto_rsa.cc b/src/crypto/crypto_rsa.cc index bd732a70a8ffe6..97007527efd564 100644 --- a/src/crypto/crypto_rsa.cc +++ b/src/crypto/crypto_rsa.cc @@ -153,7 +153,7 @@ Maybe RsaKeyGenTraits::AdditionalConfig( Utf8Value digest(env->isolate(), args[*offset]); params->params.md = EVP_get_digestbyname(*digest); if (params->params.md == nullptr) { - THROW_ERR_CRYPTO_INVALID_DIGEST(env, "md specifies an invalid digest"); + THROW_ERR_CRYPTO_INVALID_DIGEST(env, "Invalid digest: %s", *digest); return Nothing(); } } @@ -163,8 +163,8 @@ Maybe RsaKeyGenTraits::AdditionalConfig( Utf8Value digest(env->isolate(), args[*offset + 1]); params->params.mgf1_md = EVP_get_digestbyname(*digest); if (params->params.mgf1_md == nullptr) { - THROW_ERR_CRYPTO_INVALID_DIGEST(env, - "mgf1_md specifies an invalid digest"); + THROW_ERR_CRYPTO_INVALID_DIGEST( + env, "Invalid MGF1 digest: %s", *digest); return Nothing(); } } diff --git a/test/parallel/test-crypto-keygen.js b/test/parallel/test-crypto-keygen.js index b9274b2b22e6a0..235bc583b969f2 100644 --- a/test/parallel/test-crypto-keygen.js +++ b/test/parallel/test-crypto-keygen.js @@ -1549,7 +1549,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher); }, common.mustNotCall()), { name: 'TypeError', code: 'ERR_CRYPTO_INVALID_DIGEST', - message: 'md specifies an invalid digest' + message: 'Invalid digest: sha2' }); assert.throws(() => generateKeyPair('rsa-pss', { @@ -1558,7 +1558,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher); }, common.mustNotCall()), { name: 'TypeError', code: 'ERR_CRYPTO_INVALID_DIGEST', - message: 'mgf1_md specifies an invalid digest' + message: 'Invalid MGF1 digest: sha2' }); }