@@ -405,13 +405,11 @@ function getKeyTypes(allowKeyObject, bufferOnly = false) {
405
405
406
406
function getKeyObjectHandleFromJwk ( key , ctx ) {
407
407
validateObject ( key , 'key' ) ;
408
+ key = { ...key } ;
408
409
validateOneOf (
409
410
key . kty , 'key.kty' , [ 'RSA' , 'EC' , 'OKP' ] ) ;
410
-
411
411
const isPublic = ctx === kConsumePublic || ctx === kCreatePublic ;
412
412
413
- key = { ...key } ;
414
-
415
413
if ( key . kty === 'OKP' ) {
416
414
validateString ( key . crv , 'key.crv' ) ;
417
415
validateOneOf (
@@ -431,17 +429,17 @@ function getKeyObjectHandleFromJwk(key, ctx) {
431
429
case 'Ed25519' :
432
430
case 'X25519' :
433
431
if ( keyData . byteLength !== 32 ) {
434
- throw new ERR_CRYPTO_INVALID_JWK ( 'Invalid JWK data' ) ;
432
+ throw new ERR_CRYPTO_INVALID_JWK ( ) ;
435
433
}
436
434
break ;
437
435
case 'Ed448' :
438
436
if ( keyData . byteLength !== 57 ) {
439
- throw new ERR_CRYPTO_INVALID_JWK ( 'Invalid JWK data' ) ;
437
+ throw new ERR_CRYPTO_INVALID_JWK ( ) ;
440
438
}
441
439
break ;
442
440
case 'X448' :
443
441
if ( keyData . byteLength !== 56 ) {
444
- throw new ERR_CRYPTO_INVALID_JWK ( 'Invalid JWK data' ) ;
442
+ throw new ERR_CRYPTO_INVALID_JWK ( ) ;
445
443
}
446
444
break ;
447
445
}
@@ -478,7 +476,7 @@ function getKeyObjectHandleFromJwk(key, ctx) {
478
476
const handle = new KeyObjectHandle ( ) ;
479
477
const type = handle . initJwk ( key , key . crv ) ;
480
478
if ( type === undefined )
481
- throw new ERR_CRYPTO_INVALID_JWK ( 'Invalid JWK data' ) ;
479
+ throw new ERR_CRYPTO_INVALID_JWK ( ) ;
482
480
483
481
return handle ;
484
482
}
@@ -505,7 +503,7 @@ function getKeyObjectHandleFromJwk(key, ctx) {
505
503
const handle = new KeyObjectHandle ( ) ;
506
504
const type = handle . initJwk ( key ) ;
507
505
if ( type === undefined )
508
- throw new ERR_CRYPTO_INVALID_JWK ( 'Invalid JWK data' ) ;
506
+ throw new ERR_CRYPTO_INVALID_JWK ( ) ;
509
507
510
508
return handle ;
511
509
}
0 commit comments