|
@@ -549,7 +549,7 @@ index 1785f5eef3d202976666081d09850ed744d83446..e88227a215ba4f7fa196f7642ae694a5
|
|
|
});
|
|
|
|
|
|
diff --git a/test/parallel/test-crypto-rsa-dsa.js b/test/parallel/test-crypto-rsa-dsa.js
|
|
|
-index 9afcb38616dafd6da1ab7b5843d68f4f796ca9a6..00d3381056a5a40c549f06d74c130149ba4abc8c 100644
|
|
|
+index 438037acc867c2bd6e34ffdcd1e706f8d0ff6a57..65611c79d0e93bf7f91948b2a0105cdc3192b2f2 100644
|
|
|
--- a/test/parallel/test-crypto-rsa-dsa.js
|
|
|
+++ b/test/parallel/test-crypto-rsa-dsa.js
|
|
|
@@ -28,12 +28,11 @@ const dsaPkcs8KeyPem = fixtures.readKey('dsa_private_pkcs8.pem');
|
|
@@ -570,7 +570,18 @@ index 9afcb38616dafd6da1ab7b5843d68f4f796ca9a6..00d3381056a5a40c549f06d74c130149
|
|
|
};
|
|
|
|
|
|
const decryptError = common.hasOpenSSL3 ?
|
|
|
-@@ -397,7 +396,7 @@ assert.throws(() => {
|
|
|
+@@ -221,8 +220,8 @@ function test_rsa(padding, encryptOaepHash, decryptOaepHash) {
|
|
|
+ oaepHash: encryptOaepHash
|
|
|
+ }, bufferToEncrypt);
|
|
|
+
|
|
|
+-
|
|
|
+- if (padding === constants.RSA_PKCS1_PADDING) {
|
|
|
++ // BoringSSL does not support RSA_PKCS1_PADDING.
|
|
|
++ if (false) {
|
|
|
+ assert.throws(() => {
|
|
|
+ crypto.privateDecrypt({
|
|
|
+ key: rsaKeyPem,
|
|
|
+@@ -415,7 +414,7 @@ assert.throws(() => {
|
|
|
assert.strictEqual(verify2.verify(publicKey, signature, 'hex'), true);
|
|
|
}
|
|
|
|
|
@@ -579,7 +590,7 @@ index 9afcb38616dafd6da1ab7b5843d68f4f796ca9a6..00d3381056a5a40c549f06d74c130149
|
|
|
//
|
|
|
// Test DSA signing and verification
|
|
|
//
|
|
|
-@@ -472,3 +471,4 @@ const input = 'I AM THE WALRUS';
|
|
|
+@@ -490,3 +489,4 @@ const input = 'I AM THE WALRUS';
|
|
|
|
|
|
assert.strictEqual(verify.verify(dsaPubPem, signature, 'hex'), true);
|
|
|
}
|