Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(70)

Side by Side Diff: LayoutTests/crypto/sign-verify-expected.txt

Issue 204013006: [webcrypto] Add length parameter to HmacKeyAlgorithm. (blink) (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: Created 6 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « LayoutTests/crypto/sign-verify.html ('k') | Source/modules/crypto/HmacKeyAlgorithm.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 CONSOLE ERROR: Algorithm: SHA-1: Unsupported operation 1 CONSOLE ERROR: Algorithm: SHA-1: Unsupported operation
2 CONSOLE ERROR: Algorithm: RSAES-PKCS1-v1_5: Unsupported operation 2 CONSOLE ERROR: Algorithm: RSAES-PKCS1-v1_5: Unsupported operation
3 Tests cypto.subtle.sign and crypto.subtle.verify 3 Tests cypto.subtle.sign and crypto.subtle.verify
4 4
5 On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE ". 5 On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE ".
6 6
7 7
8 PASS tmpKey.type is 'secret' 8 PASS tmpKey.type is 'secret'
9 PASS tmpKey.extractable is false 9 PASS tmpKey.extractable is false
10 PASS tmpKey.algorithm.name is 'HMAC' 10 PASS tmpKey.algorithm.name is 'HMAC'
11 PASS tmpKey.algorithm.hash.name is 'SHA-1' 11 PASS tmpKey.algorithm.hash.name is 'SHA-1'
12 PASS tmpKey.algorithm.length is 0
12 PASS tmpKey.usages.join(',') is 'sign,verify' 13 PASS tmpKey.usages.join(',') is 'sign,verify'
13 PASS tmpKey.type is 'secret' 14 PASS tmpKey.type is 'secret'
14 PASS tmpKey.extractable is false 15 PASS tmpKey.extractable is false
15 PASS tmpKey.algorithm.name is 'HMAC' 16 PASS tmpKey.algorithm.name is 'HMAC'
16 PASS tmpKey.algorithm.hash.name is 'SHA-256' 17 PASS tmpKey.algorithm.hash.name is 'SHA-256'
18 PASS tmpKey.algorithm.length is 0
17 PASS tmpKey.usages.join(',') is 'sign,verify' 19 PASS tmpKey.usages.join(',') is 'sign,verify'
18 PASS tmpKey.type is 'secret' 20 PASS tmpKey.type is 'secret'
19 PASS tmpKey.extractable is false 21 PASS tmpKey.extractable is false
20 PASS tmpKey.algorithm.name is 'HMAC' 22 PASS tmpKey.algorithm.name is 'HMAC'
21 PASS tmpKey.algorithm.hash.name is 'SHA-1' 23 PASS tmpKey.algorithm.hash.name is 'SHA-1'
24 PASS tmpKey.algorithm.length is 80
22 PASS tmpKey.usages.join(',') is 'sign,verify' 25 PASS tmpKey.usages.join(',') is 'sign,verify'
23 PASS tmpKey.type is 'secret' 26 PASS tmpKey.type is 'secret'
24 PASS tmpKey.extractable is false 27 PASS tmpKey.extractable is false
25 PASS tmpKey.algorithm.name is 'HMAC' 28 PASS tmpKey.algorithm.name is 'HMAC'
26 PASS tmpKey.algorithm.hash.name is 'SHA-1' 29 PASS tmpKey.algorithm.hash.name is 'SHA-1'
30 PASS tmpKey.algorithm.length is 640
27 PASS tmpKey.usages.join(',') is 'sign,verify' 31 PASS tmpKey.usages.join(',') is 'sign,verify'
28 PASS tmpKey.type is 'secret' 32 PASS tmpKey.type is 'secret'
29 PASS tmpKey.extractable is false 33 PASS tmpKey.extractable is false
30 PASS tmpKey.algorithm.name is 'HMAC' 34 PASS tmpKey.algorithm.name is 'HMAC'
31 PASS tmpKey.algorithm.hash.name is 'SHA-256' 35 PASS tmpKey.algorithm.hash.name is 'SHA-256'
36 PASS tmpKey.algorithm.length is 320
32 PASS tmpKey.usages.join(',') is 'sign,verify' 37 PASS tmpKey.usages.join(',') is 'sign,verify'
33 PASS tmpKey.type is 'secret' 38 PASS tmpKey.type is 'secret'
34 PASS tmpKey.extractable is false 39 PASS tmpKey.extractable is false
35 PASS tmpKey.algorithm.name is 'HMAC' 40 PASS tmpKey.algorithm.name is 'HMAC'
36 PASS tmpKey.algorithm.hash.name is 'SHA-256' 41 PASS tmpKey.algorithm.hash.name is 'SHA-256'
42 PASS tmpKey.algorithm.length is 592
37 PASS tmpKey.usages.join(',') is 'sign,verify' 43 PASS tmpKey.usages.join(',') is 'sign,verify'
38 PASS: Mac should be [fbdb1d1b18aa6c08324b7d64b71fb76370690e1d] and was 44 PASS: Mac should be [fbdb1d1b18aa6c08324b7d64b71fb76370690e1d] and was
39 PASS: Mac should be [b613679a0814d9ec772f95d778c35fc5ff1697c493715653c6c71214429 2c5ad] and was 45 PASS: Mac should be [b613679a0814d9ec772f95d778c35fc5ff1697c493715653c6c71214429 2c5ad] and was
40 PASS: Mac should be [3c8162589aafaee024fc9a5ca50dd2336fe3eb28] and was 46 PASS: Mac should be [3c8162589aafaee024fc9a5ca50dd2336fe3eb28] and was
41 PASS: Mac should be [4ac41ab89f625c60125ed65ffa958c6b490ea670] and was 47 PASS: Mac should be [4ac41ab89f625c60125ed65ffa958c6b490ea670] and was
42 PASS: Mac should be [769f00d3e6a6cc1fb426a14a4f76c6462e6149726e0dee0ec0cf97a1660 5ac8b] and was 48 PASS: Mac should be [769f00d3e6a6cc1fb426a14a4f76c6462e6149726e0dee0ec0cf97a1660 5ac8b] and was
43 PASS: Mac should be [4f1ee7cb36c58803a8721d4ac8c4cf8cae5d8832392eed2a96dc5969425 2801b] and was 49 PASS: Mac should be [4f1ee7cb36c58803a8721d4ac8c4cf8cae5d8832392eed2a96dc5969425 2801b] and was
44 PASS verifyResult is true 50 PASS verifyResult is true
45 PASS verifyResult is true 51 PASS verifyResult is true
46 PASS verifyResult is true 52 PASS verifyResult is true
47 PASS verifyResult is true 53 PASS verifyResult is true
48 PASS verifyResult is true 54 PASS verifyResult is true
49 PASS verifyResult is true 55 PASS verifyResult is true
50 PASS verifyResult is false 56 PASS verifyResult is false
51 PASS verifyResult is false 57 PASS verifyResult is false
52 PASS verifyResult is false 58 PASS verifyResult is false
53 PASS verifyResult is false 59 PASS verifyResult is false
54 PASS verifyResult is false 60 PASS verifyResult is false
55 PASS verifyResult is false 61 PASS verifyResult is false
56 PASS crypto.subtle.verify(hmac, keys.hmacSha1, null, data) threw exception TypeE rror: Failed to execute 'verify' on 'SubtleCrypto': Invalid signature argument. 62 PASS crypto.subtle.verify(hmac, keys.hmacSha1, null, data) threw exception TypeE rror: Failed to execute 'verify' on 'SubtleCrypto': Invalid signature argument.
57 PASS crypto.subtle.verify(hmac, keys.hmacSha1, 'a', data) threw exception TypeEr ror: Failed to execute 'verify' on 'SubtleCrypto': Invalid signature argument. 63 PASS crypto.subtle.verify(hmac, keys.hmacSha1, 'a', data) threw exception TypeEr ror: Failed to execute 'verify' on 'SubtleCrypto': Invalid signature argument.
58 PASS crypto.subtle.verify(hmac, keys.hmacSha1, [], data) threw exception TypeErr or: Failed to execute 'verify' on 'SubtleCrypto': Invalid signature argument. 64 PASS crypto.subtle.verify(hmac, keys.hmacSha1, [], data) threw exception TypeErr or: Failed to execute 'verify' on 'SubtleCrypto': Invalid signature argument.
59 PASS: 'crypto.subtle.sign({name: 'sha-1'}, keys.hmacSha1, data)' rejected with n ull 65 PASS: 'crypto.subtle.sign({name: 'sha-1'}, keys.hmacSha1, data)' rejected with n ull
60 PASS: 'crypto.subtle.sign({name: 'RSAES-PKCS1-v1_5'}, keys.hmacSha1, data)' reje cted with null 66 PASS: 'crypto.subtle.sign({name: 'RSAES-PKCS1-v1_5'}, keys.hmacSha1, data)' reje cted with null
61 PASS successfullyParsed is true 67 PASS successfullyParsed is true
62 68
63 TEST COMPLETE 69 TEST COMPLETE
64 70
OLDNEW
« no previous file with comments | « LayoutTests/crypto/sign-verify.html ('k') | Source/modules/crypto/HmacKeyAlgorithm.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698