@@ -35,16 +35,16 @@ let iter = 0;
3535
3636const errorHandler = common.mustCall((err) => {
3737 let expectedErrorCode = 'ERR_SSL_WRONG_VERSION_NUMBER';
38- let expectedErrorReason = ' wrong version number' ;
38+ let expectedErrorReason = / wrong[\s_] version[\s_] number/i ;
3939 if (hasOpenSSL(3, 2)) {
4040 expectedErrorCode = 'ERR_SSL_PACKET_LENGTH_TOO_LONG';
41- expectedErrorReason = ' packet length too long' ;
41+ expectedErrorReason = / packet[\s_] length[\s_] too[\s_] long/i ;
4242 };
4343
4444 assert.strictEqual(err.code, expectedErrorCode);
4545 assert.strictEqual(err.library, 'SSL routines');
4646 if (!hasOpenSSL3) assert.strictEqual(err.function, 'ssl3_get_record');
47- assert.strictEqual (err.reason, expectedErrorReason);
47+ assert.match (err.reason, expectedErrorReason);
4848 errorReceived = true;
4949 if (canCloseServer())
5050 server.close();
@@ -98,15 +98,15 @@ function sendBADTLSRecord() {
9898 }));
9999 client.on('error', common.mustCall((err) => {
100100 let expectedErrorCode = 'ERR_SSL_TLSV1_ALERT_PROTOCOL_VERSION';
101- let expectedErrorReason = ' tlsv1 alert protocol version' ;
101+ let expectedErrorReason = / tlsv1[\s_] alert[\s_] protocol[\s_] version/i ;
102102 if (hasOpenSSL(3, 2)) {
103103 expectedErrorCode = 'ERR_SSL_TLSV1_ALERT_RECORD_OVERFLOW';
104- expectedErrorReason = ' tlsv1 alert record overflow' ;
104+ expectedErrorReason = / tlsv1[\s_] alert[\s_] record[\s_] overflow/i ;
105105 }
106106 assert.strictEqual(err.code, expectedErrorCode);
107107 assert.strictEqual(err.library, 'SSL routines');
108108 if (!hasOpenSSL3)
109109 assert.strictEqual(err.function, 'ssl3_read_bytes');
110- assert.strictEqual (err.reason, expectedErrorReason);
110+ assert.match (err.reason, expectedErrorReason);
111111 }));
112112}
0 commit comments