| 'use strict'; |
| |
| const common = require('../common'); |
| if (!common.hasCrypto) |
| common.skip('missing crypto'); |
| |
| const assert = require('assert'); |
| const { |
| generateKeyPair, |
| } = require('crypto'); |
| |
| // This test makes sure deprecated and new options may be used |
| // simultaneously so long as they're identical values. |
| { |
| generateKeyPair('rsa-pss', { |
| modulusLength: 512, |
| saltLength: 16, |
| hash: 'sha256', |
| hashAlgorithm: 'sha256', |
| mgf1Hash: 'sha256', |
| mgf1HashAlgorithm: 'sha256' |
| }, common.mustSucceed((publicKey, privateKey) => { |
| assert.strictEqual(publicKey.type, 'public'); |
| assert.strictEqual(publicKey.asymmetricKeyType, 'rsa-pss'); |
| assert.deepStrictEqual(publicKey.asymmetricKeyDetails, { |
| modulusLength: 512, |
| publicExponent: 65537n, |
| hashAlgorithm: 'sha256', |
| mgf1HashAlgorithm: 'sha256', |
| saltLength: 16 |
| }); |
| |
| assert.strictEqual(privateKey.type, 'private'); |
| assert.strictEqual(privateKey.asymmetricKeyType, 'rsa-pss'); |
| assert.deepStrictEqual(privateKey.asymmetricKeyDetails, { |
| modulusLength: 512, |
| publicExponent: 65537n, |
| hashAlgorithm: 'sha256', |
| mgf1HashAlgorithm: 'sha256', |
| saltLength: 16 |
| }); |
| })); |
| } |