@@ -97,8 +97,6 @@ const der = Buffer.from(
97
97
assert . strictEqual ( x509 . infoAccess , infoAccessCheck ) ;
98
98
assert . strictEqual ( x509 . validFrom , 'Sep 3 21:40:37 2022 GMT' ) ;
99
99
assert . strictEqual ( x509 . validTo , 'Jun 17 21:40:37 2296 GMT' ) ;
100
- assert . deepStrictEqual ( x509 . validFromDate , new Date ( '2022-09-03T21:40:37Z' ) ) ;
101
- assert . deepStrictEqual ( x509 . validToDate , new Date ( '2296-06-17T21:40:37Z' ) ) ;
102
100
assert . strictEqual (
103
101
x509 . fingerprint ,
104
102
'8B:89:16:C4:99:87:D2:13:1A:64:94:36:38:A5:32:01:F0:95:3B:53' ) ;
@@ -118,6 +116,11 @@ const der = Buffer.from(
118
116
119
117
assert . deepStrictEqual ( x509 . raw , der ) ;
120
118
119
+ if ( ! process . features . openssl_is_boringssl ) {
120
+ assert . deepStrictEqual ( x509 . validFromDate , new Date ( '2022-09-03T21:40:37Z' ) ) ;
121
+ assert . deepStrictEqual ( x509 . validToDate , new Date ( '2296-06-17T21:40:37Z' ) ) ;
122
+ }
123
+
121
124
assert ( x509 . publicKey ) ;
122
125
assert . strictEqual ( x509 . publicKey . type , 'public' ) ;
123
126
@@ -356,13 +359,15 @@ tAt3hIKFD1bJt6c6WtMH2Su3syosWxmdmGk5ihslB00lvLpfj/wed8i3bkcB1doq
356
359
UcXd/5qu2GhokrKU2cPttU+XAN2Om6a0
357
360
-----END CERTIFICATE-----` ;
358
361
359
- const cert = new X509Certificate ( certPem ) ;
360
- assert . throws ( ( ) => cert . publicKey , {
361
- message : hasOpenSSL3 ? / d e c o d e e r r o r / : / w r o n g t a g / ,
362
- name : 'Error'
363
- } ) ;
362
+ if ( ! process . features . openssl_is_boringssl ) {
363
+ const cert = new X509Certificate ( certPem ) ;
364
+ assert . throws ( ( ) => cert . publicKey , {
365
+ message : hasOpenSSL3 ? / d e c o d e e r r o r / : / w r o n g t a g / ,
366
+ name : 'Error'
367
+ } ) ;
364
368
365
- assert . strictEqual ( cert . checkIssued ( cert ) , false ) ;
369
+ assert . strictEqual ( cert . checkIssued ( cert ) , false ) ;
370
+ }
366
371
}
367
372
368
373
{
@@ -401,8 +406,10 @@ UidvpWWipVLZgK+oDks+bKTobcoXGW9oXobiIYqslXPy
401
406
-----END CERTIFICATE-----` . trim ( ) ;
402
407
const c1 = new X509Certificate ( certPemUTCTime ) ;
403
408
404
- assert . deepStrictEqual ( c1 . validFromDate , new Date ( '1949-12-25T23:59:58Z' ) ) ;
405
- assert . deepStrictEqual ( c1 . validToDate , new Date ( '1950-01-01T23:59:58Z' ) ) ;
409
+ if ( ! process . features . openssl_is_boringssl ) {
410
+ assert . deepStrictEqual ( c1 . validFromDate , new Date ( '1949-12-25T23:59:58Z' ) ) ;
411
+ assert . deepStrictEqual ( c1 . validToDate , new Date ( '1950-01-01T23:59:58Z' ) ) ;
412
+ }
406
413
407
414
// The GeneralizedTime format is used for dates in 2050 or later.
408
415
const certPemGeneralizedTime = `-----BEGIN CERTIFICATE-----
@@ -436,6 +443,8 @@ CWwQO8JZjJqFtqtuzy2n+gLCvqePgG/gmSqHOPm2ZbLW
436
443
-----END CERTIFICATE-----` . trim ( ) ;
437
444
const c2 = new X509Certificate ( certPemGeneralizedTime ) ;
438
445
439
- assert . deepStrictEqual ( c2 . validFromDate , new Date ( '2049-12-26T00:00:01Z' ) ) ;
440
- assert . deepStrictEqual ( c2 . validToDate , new Date ( '2050-01-02T00:00:01Z' ) ) ;
446
+ if ( ! process . features . openssl_is_boringssl ) {
447
+ assert . deepStrictEqual ( c2 . validFromDate , new Date ( '2049-12-26T00:00:01Z' ) ) ;
448
+ assert . deepStrictEqual ( c2 . validToDate , new Date ( '2050-01-02T00:00:01Z' ) ) ;
449
+ }
441
450
}
0 commit comments