fork-openpgpjs/test/crypto/index.js
Ilya Chesnokov 6e7f399eb3 Use Web Crypto & Node crypto for RSA signing and verifying (#999)
Also, when generating RSA keys in JS, generate them with p < q, as per
the spec.

Also, when generating RSA keys using Web Crypto or Node crypto, swap the
generated p and q around, so that will satisfy p < q in most browsers
(but not old Microsoft Edge, 50% of the time) and so that we can use the
generated u coefficient (p^-1 mod q in OpenPGP, q^-1 mod p in RFC3447).

Then, when signing and verifying, swap p and q again, so that the key
hopefully satisfies Safari's requirement that p > q, and so that we can
keep using u again.
2019-11-18 14:59:01 +01:00

13 lines
281 B
JavaScript

describe('Crypto', function () {
require('./cipher');
require('./hash');
require('./random.js');
require('./crypto.js');
require('./elliptic.js');
require('./pkcs5.js');
require('./aes_kw.js');
require('./eax.js');
require('./ocb.js');
require('./rsa.js');
});