crypto: use correct webcrypto RSASSA-PKCS1-v1_5 algorithm name · nodejs/node@ac69b95

@@ -71,7 +71,7 @@ async function generateKey(

7171

validateBoolean(extractable, 'extractable');

7272

validateArray(keyUsages, 'keyUsages');

7373

switch (algorithm.name) {

74-

case 'RSASSA-PKCS1-V1_5':

74+

case 'RSASSA-PKCS1-v1_5':

7575

// Fall through

7676

case 'RSA-PSS':

7777

// Fall through

@@ -199,7 +199,7 @@ async function deriveKey(

199199200200

async function exportKeySpki(key) {

201201

switch (key.algorithm.name) {

202-

case 'RSASSA-PKCS1-V1_5':

202+

case 'RSASSA-PKCS1-v1_5':

203203

// Fall through

204204

case 'RSA-PSS':

205205

// Fall through

@@ -242,7 +242,7 @@ async function exportKeySpki(key) {

242242243243

async function exportKeyPkcs8(key) {

244244

switch (key.algorithm.name) {

245-

case 'RSASSA-PKCS1-V1_5':

245+

case 'RSASSA-PKCS1-v1_5':

246246

// Fall through

247247

case 'RSA-PSS':

248248

// Fall through

@@ -321,7 +321,7 @@ async function exportKeyJWK(key) {

321321

ext: key.extractable,

322322

});

323323

switch (key.algorithm.name) {

324-

case 'RSASSA-PKCS1-V1_5':

324+

case 'RSASSA-PKCS1-v1_5':

325325

jwk.alg = normalizeHashName(

326326

key.algorithm.hash.name,

327327

normalizeHashName.kContextJwkRsa);

@@ -461,7 +461,7 @@ async function importKey(

461461

validateBoolean(extractable, 'extractable');

462462

validateArray(keyUsages, 'keyUsages');

463463

switch (algorithm.name) {

464-

case 'RSASSA-PKCS1-V1_5':

464+

case 'RSASSA-PKCS1-v1_5':

465465

// Fall through

466466

case 'RSA-PSS':

467467

// Fall through

@@ -588,7 +588,7 @@ function signVerify(algorithm, key, data, signature) {

588588

switch (algorithm.name) {

589589

case 'RSA-PSS':

590590

// Fall through

591-

case 'RSASSA-PKCS1-V1_5':

591+

case 'RSASSA-PKCS1-v1_5':

592592

return lazyRequire('internal/crypto/rsa')

593593

.rsaSignVerify(key, data, algorithm, signature);

594594

case 'NODE-ED25519':