@@ -26,15 +26,6 @@ function sharedOpenSSL() {
2626  return  process . config . variables . node_shared_openssl ; 
2727} 
2828
29- function  addToEnv ( newVar ,  value )  { 
30-   const  envCopy  =  { } ; 
31-   for  ( const  e  in  process . env )  { 
32-     envCopy [ e ]  =  process . env [ e ] ; 
33-   } 
34-   envCopy [ newVar ]  =  value ; 
35-   return  envCopy ; 
36- } 
37- 
3829function  testHelper ( stream ,  args ,  expectedOutput ,  cmd ,  env )  { 
3930  const  fullArgs  =  args . concat ( [ '-e' ,  `console.log(${ cmd }  ] ) ; 
4031  const  child  =  spawnSync ( process . execPath ,  fullArgs ,  { 
@@ -72,7 +63,7 @@ testHelper(
7263  [ ] , 
7364  FIPS_DISABLED , 
7465  'require("crypto").fips' , 
75-   addToEnv ( 'OPENSSL_CONF' ,  '' ) ) ; 
66+   Object . assign ( { } ,   process . env ,   {   'OPENSSL_CONF' :  ''   } ) ) ; 
7667
7768// --enable-fips should turn FIPS mode on 
7869testHelper ( 
@@ -117,23 +108,23 @@ if (!sharedOpenSSL()) {
117108    [ ] , 
118109    compiledWithFips ( )  ? FIPS_ENABLED  : FIPS_DISABLED , 
119110    'require("crypto").fips' , 
120-     addToEnv ( 'OPENSSL_CONF' ,  CNF_FIPS_ON ) ) ; 
111+     Object . assign ( { } ,   process . env ,   {   'OPENSSL_CONF' :  CNF_FIPS_ON   } ) ) ; 
121112
122113  // --openssl-config option should override OPENSSL_CONF 
123114  testHelper ( 
124115    'stdout' , 
125116    [ `--openssl-config=${ CNF_FIPS_ON }  ] , 
126117    compiledWithFips ( )  ? FIPS_ENABLED  : FIPS_DISABLED , 
127118    'require("crypto").fips' , 
128-     addToEnv ( 'OPENSSL_CONF' ,  CNF_FIPS_OFF ) ) ; 
119+     Object . assign ( { } ,   process . env ,   {   'OPENSSL_CONF' :  CNF_FIPS_OFF   } ) ) ; 
129120} 
130121
131122testHelper ( 
132123  'stdout' , 
133124  [ `--openssl-config=${ CNF_FIPS_OFF }  ] , 
134125  FIPS_DISABLED , 
135126  'require("crypto").fips' , 
136-   addToEnv ( 'OPENSSL_CONF' ,  CNF_FIPS_ON ) ) ; 
127+   Object . assign ( { } ,   process . env ,   {   'OPENSSL_CONF' :  CNF_FIPS_ON   } ) ) ; 
137128
138129// --enable-fips should take precedence over OpenSSL config file 
139130testHelper ( 
@@ -149,7 +140,7 @@ testHelper(
149140  [ '--enable-fips' ] , 
150141  compiledWithFips ( )  ? FIPS_ENABLED  : OPTION_ERROR_STRING , 
151142  'require("crypto").fips' , 
152-   addToEnv ( 'OPENSSL_CONF' ,  CNF_FIPS_OFF ) ) ; 
143+   Object . assign ( { } ,   process . env ,   {   'OPENSSL_CONF' :  CNF_FIPS_OFF   } ) ) ; 
153144
154145// --force-fips should take precedence over OpenSSL config file 
155146testHelper ( 
@@ -165,7 +156,7 @@ testHelper(
165156  [ '--force-fips' ] , 
166157  compiledWithFips ( )  ? FIPS_ENABLED  : OPTION_ERROR_STRING , 
167158  'require("crypto").fips' , 
168-   addToEnv ( 'OPENSSL_CONF' ,  CNF_FIPS_OFF ) ) ; 
159+   Object . assign ( { } ,   process . env ,   {   'OPENSSL_CONF' :  CNF_FIPS_OFF   } ) ) ; 
169160
170161// setFipsCrypto should be able to turn FIPS mode on 
171162testHelper ( 
0 commit comments