From 3c5077579f0e5c421c137d423512e3c49f7b502d Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Tobias=20Nie=C3=9Fen?= Date: Sat, 20 Aug 2022 12:35:10 +0200 Subject: [PATCH] test: add coverage for invalid RSA-PSS digests PR-URL: https://github.com/nodejs/node/pull/44271 Reviewed-By: Richard Lau Reviewed-By: Filip Skokan Reviewed-By: Darshan Sen Reviewed-By: Luigi Pinca Reviewed-By: Anna Henningsen --- test/parallel/test-crypto-keygen.js | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) diff --git a/test/parallel/test-crypto-keygen.js b/test/parallel/test-crypto-keygen.js index f42bd2accd7582..b9274b2b22e6a0 100644 --- a/test/parallel/test-crypto-keygen.js +++ b/test/parallel/test-crypto-keygen.js @@ -1542,6 +1542,24 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher); } ); } + + assert.throws(() => generateKeyPair('rsa-pss', { + modulusLength: 512, + hashAlgorithm: 'sha2', + }, common.mustNotCall()), { + name: 'TypeError', + code: 'ERR_CRYPTO_INVALID_DIGEST', + message: 'md specifies an invalid digest' + }); + + assert.throws(() => generateKeyPair('rsa-pss', { + modulusLength: 512, + mgf1HashAlgorithm: 'sha2', + }, common.mustNotCall()), { + name: 'TypeError', + code: 'ERR_CRYPTO_INVALID_DIGEST', + message: 'mgf1_md specifies an invalid digest' + }); } // Passing an empty passphrase string should not cause OpenSSL's default