From bfa40d1d3f69a4c5895dba9365ad2e94e92793ec Mon Sep 17 00:00:00 2001 From: Jarred Sumner <709451+Jarred-Sumner@users.noreply.github.com> Date: Wed, 2 Nov 2022 20:00:44 -0700 Subject: Fix 4/4 failing tests --- .../bindings/webcrypto/CryptoAlgorithmRSA_PSSOpenSSL.cpp | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) (limited to 'src/bun.js/bindings/webcrypto/CryptoAlgorithmRSA_PSSOpenSSL.cpp') diff --git a/src/bun.js/bindings/webcrypto/CryptoAlgorithmRSA_PSSOpenSSL.cpp b/src/bun.js/bindings/webcrypto/CryptoAlgorithmRSA_PSSOpenSSL.cpp index 62267c581..149560a39 100644 --- a/src/bun.js/bindings/webcrypto/CryptoAlgorithmRSA_PSSOpenSSL.cpp +++ b/src/bun.js/bindings/webcrypto/CryptoAlgorithmRSA_PSSOpenSSL.cpp @@ -26,7 +26,7 @@ #include "config.h" #include "CryptoAlgorithmRSA_PSS.h" -#if ENABLE(WEB_CRYPTO) && HAVE(RSA_PSS) +#if ENABLE(WEB_CRYPTO) #include "CryptoAlgorithmRsaPssParams.h" #include "CryptoKeyRSA.h" @@ -36,7 +36,7 @@ namespace WebCore { ExceptionOr> CryptoAlgorithmRSA_PSS::platformSign(const CryptoAlgorithmRsaPssParams& parameters, const CryptoKeyRSA& key, const Vector& data) { -#if defined(EVP_PKEY_CTX_set_rsa_pss_saltlen) && defined(EVP_PKEY_CTX_set_rsa_mgf1_md) +#if 1 // defined(EVP_PKEY_CTX_set_rsa_pss_saltlen) && defined(EVP_PKEY_CTX_set_rsa_mgf1_md) const EVP_MD* md = digestAlgorithm(key.hashAlgorithmIdentifier()); if (!md) return Exception { NotSupportedError }; @@ -52,7 +52,7 @@ ExceptionOr> CryptoAlgorithmRSA_PSS::platformSign(const CryptoAl if (EVP_PKEY_sign_init(ctx.get()) <= 0) return Exception { OperationError }; - if (EVP_PKEY_CTX_set_rsa_padding(ctx.get(), RSA_PKCS1_PSS_PADDING ) <= 0) + if (EVP_PKEY_CTX_set_rsa_padding(ctx.get(), RSA_PKCS1_PSS_PADDING) <= 0) return Exception { OperationError }; if (EVP_PKEY_CTX_set_rsa_pss_saltlen(ctx.get(), parameters.saltLength) <= 0) @@ -81,7 +81,7 @@ ExceptionOr> CryptoAlgorithmRSA_PSS::platformSign(const CryptoAl ExceptionOr CryptoAlgorithmRSA_PSS::platformVerify(const CryptoAlgorithmRsaPssParams& parameters, const CryptoKeyRSA& key, const Vector& signature, const Vector& data) { -#if defined(EVP_PKEY_CTX_set_rsa_pss_saltlen) && defined(EVP_PKEY_CTX_set_rsa_mgf1_md) +#if 1 // defined(EVP_PKEY_CTX_set_rsa_pss_saltlen) && defined(EVP_PKEY_CTX_set_rsa_mgf1_md) const EVP_MD* md = digestAlgorithm(key.hashAlgorithmIdentifier()); if (!md) return Exception { NotSupportedError }; @@ -97,7 +97,7 @@ ExceptionOr CryptoAlgorithmRSA_PSS::platformVerify(const CryptoAlgorithmRs if (EVP_PKEY_verify_init(ctx.get()) <= 0) return Exception { OperationError }; - if (EVP_PKEY_CTX_set_rsa_padding(ctx.get(), RSA_PKCS1_PSS_PADDING ) <= 0) + if (EVP_PKEY_CTX_set_rsa_padding(ctx.get(), RSA_PKCS1_PSS_PADDING) <= 0) return Exception { OperationError }; if (EVP_PKEY_CTX_set_rsa_pss_saltlen(ctx.get(), parameters.saltLength) <= 0) -- cgit v1.2.3