On older browsers not supporting window.crypto/msCrypto, RSA_OAEP_encrypt, RSA_PSS_sign gather random values from calling seed with a subarray (with an offset) on the underlying buffer, but this typo is causing the Random_seed to use the original buffer at index 0.
On older browsers not supporting window.crypto/msCrypto, RSA_OAEP_encrypt, RSA_PSS_sign gather random values from calling seed with a subarray (with an offset) on the underlying buffer, but this typo is causing the Random_seed to use the original buffer at index 0.