diff options
author | 2022-11-02 20:00:44 -0700 | |
---|---|---|
committer | 2022-11-02 20:00:44 -0700 | |
commit | bfa40d1d3f69a4c5895dba9365ad2e94e92793ec (patch) | |
tree | 667f3e134443db721114c4af3c60fea5c62c3e61 /src/bun.js/bindings/webcrypto/CryptoAlgorithmRSA_PSSOpenSSL.cpp | |
parent | f829bd719067611ae0e39a6ea3703a9587fb6f6b (diff) | |
download | bun-bfa40d1d3f69a4c5895dba9365ad2e94e92793ec.tar.gz bun-bfa40d1d3f69a4c5895dba9365ad2e94e92793ec.tar.zst bun-bfa40d1d3f69a4c5895dba9365ad2e94e92793ec.zip |
Fix 4/4 failing tests
Diffstat (limited to 'src/bun.js/bindings/webcrypto/CryptoAlgorithmRSA_PSSOpenSSL.cpp')
-rw-r--r-- | src/bun.js/bindings/webcrypto/CryptoAlgorithmRSA_PSSOpenSSL.cpp | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/src/bun.js/bindings/webcrypto/CryptoAlgorithmRSA_PSSOpenSSL.cpp b/src/bun.js/bindings/webcrypto/CryptoAlgorithmRSA_PSSOpenSSL.cpp index 62267c581..149560a39 100644 --- a/src/bun.js/bindings/webcrypto/CryptoAlgorithmRSA_PSSOpenSSL.cpp +++ b/src/bun.js/bindings/webcrypto/CryptoAlgorithmRSA_PSSOpenSSL.cpp @@ -26,7 +26,7 @@ #include "config.h" #include "CryptoAlgorithmRSA_PSS.h" -#if ENABLE(WEB_CRYPTO) && HAVE(RSA_PSS) +#if ENABLE(WEB_CRYPTO) #include "CryptoAlgorithmRsaPssParams.h" #include "CryptoKeyRSA.h" @@ -36,7 +36,7 @@ namespace WebCore { ExceptionOr<Vector<uint8_t>> CryptoAlgorithmRSA_PSS::platformSign(const CryptoAlgorithmRsaPssParams& parameters, const CryptoKeyRSA& key, const Vector<uint8_t>& data) { -#if defined(EVP_PKEY_CTX_set_rsa_pss_saltlen) && defined(EVP_PKEY_CTX_set_rsa_mgf1_md) +#if 1 // defined(EVP_PKEY_CTX_set_rsa_pss_saltlen) && defined(EVP_PKEY_CTX_set_rsa_mgf1_md) const EVP_MD* md = digestAlgorithm(key.hashAlgorithmIdentifier()); if (!md) return Exception { NotSupportedError }; @@ -52,7 +52,7 @@ ExceptionOr<Vector<uint8_t>> CryptoAlgorithmRSA_PSS::platformSign(const CryptoAl if (EVP_PKEY_sign_init(ctx.get()) <= 0) return Exception { OperationError }; - if (EVP_PKEY_CTX_set_rsa_padding(ctx.get(), RSA_PKCS1_PSS_PADDING ) <= 0) + if (EVP_PKEY_CTX_set_rsa_padding(ctx.get(), RSA_PKCS1_PSS_PADDING) <= 0) return Exception { OperationError }; if (EVP_PKEY_CTX_set_rsa_pss_saltlen(ctx.get(), parameters.saltLength) <= 0) @@ -81,7 +81,7 @@ ExceptionOr<Vector<uint8_t>> CryptoAlgorithmRSA_PSS::platformSign(const CryptoAl ExceptionOr<bool> CryptoAlgorithmRSA_PSS::platformVerify(const CryptoAlgorithmRsaPssParams& parameters, const CryptoKeyRSA& key, const Vector<uint8_t>& signature, const Vector<uint8_t>& data) { -#if defined(EVP_PKEY_CTX_set_rsa_pss_saltlen) && defined(EVP_PKEY_CTX_set_rsa_mgf1_md) +#if 1 // defined(EVP_PKEY_CTX_set_rsa_pss_saltlen) && defined(EVP_PKEY_CTX_set_rsa_mgf1_md) const EVP_MD* md = digestAlgorithm(key.hashAlgorithmIdentifier()); if (!md) return Exception { NotSupportedError }; @@ -97,7 +97,7 @@ ExceptionOr<bool> CryptoAlgorithmRSA_PSS::platformVerify(const CryptoAlgorithmRs if (EVP_PKEY_verify_init(ctx.get()) <= 0) return Exception { OperationError }; - if (EVP_PKEY_CTX_set_rsa_padding(ctx.get(), RSA_PKCS1_PSS_PADDING ) <= 0) + if (EVP_PKEY_CTX_set_rsa_padding(ctx.get(), RSA_PKCS1_PSS_PADDING) <= 0) return Exception { OperationError }; if (EVP_PKEY_CTX_set_rsa_pss_saltlen(ctx.get(), parameters.saltLength) <= 0) |