@@ -71,7 +71,7 @@ async function generateKey(
71
71
validateBoolean ( extractable , 'extractable' ) ;
72
72
validateArray ( keyUsages , 'keyUsages' ) ;
73
73
switch ( algorithm . name ) {
74
- case 'RSASSA-PKCS1-V1_5 ' :
74
+ case 'RSASSA-PKCS1-v1_5 ' :
75
75
// Fall through
76
76
case 'RSA-PSS' :
77
77
// Fall through
@@ -199,7 +199,7 @@ async function deriveKey(
199
199
200
200
async function exportKeySpki ( key ) {
201
201
switch ( key . algorithm . name ) {
202
- case 'RSASSA-PKCS1-V1_5 ' :
202
+ case 'RSASSA-PKCS1-v1_5 ' :
203
203
// Fall through
204
204
case 'RSA-PSS' :
205
205
// Fall through
@@ -242,7 +242,7 @@ async function exportKeySpki(key) {
242
242
243
243
async function exportKeyPkcs8 ( key ) {
244
244
switch ( key . algorithm . name ) {
245
- case 'RSASSA-PKCS1-V1_5 ' :
245
+ case 'RSASSA-PKCS1-v1_5 ' :
246
246
// Fall through
247
247
case 'RSA-PSS' :
248
248
// Fall through
@@ -321,7 +321,7 @@ async function exportKeyJWK(key) {
321
321
ext : key . extractable ,
322
322
} ) ;
323
323
switch ( key . algorithm . name ) {
324
- case 'RSASSA-PKCS1-V1_5 ' :
324
+ case 'RSASSA-PKCS1-v1_5 ' :
325
325
jwk . alg = normalizeHashName (
326
326
key . algorithm . hash . name ,
327
327
normalizeHashName . kContextJwkRsa ) ;
@@ -461,7 +461,7 @@ async function importKey(
461
461
validateBoolean ( extractable , 'extractable' ) ;
462
462
validateArray ( keyUsages , 'keyUsages' ) ;
463
463
switch ( algorithm . name ) {
464
- case 'RSASSA-PKCS1-V1_5 ' :
464
+ case 'RSASSA-PKCS1-v1_5 ' :
465
465
// Fall through
466
466
case 'RSA-PSS' :
467
467
// Fall through
@@ -588,7 +588,7 @@ function signVerify(algorithm, key, data, signature) {
588
588
switch ( algorithm . name ) {
589
589
case 'RSA-PSS' :
590
590
// Fall through
591
- case 'RSASSA-PKCS1-V1_5 ' :
591
+ case 'RSASSA-PKCS1-v1_5 ' :
592
592
return lazyRequire ( 'internal/crypto/rsa' )
593
593
. rsaSignVerify ( key , data , algorithm , signature ) ;
594
594
case 'NODE-ED25519' :
0 commit comments