| Index: LayoutTests/crypto/sign-verify-expected.txt
|
| diff --git a/LayoutTests/crypto/sign-verify-expected.txt b/LayoutTests/crypto/sign-verify-expected.txt
|
| index a262800e135104f4cd2ffb090b67059d0a5e8a77..743ce8a4c8f4486e16ff616f3414934bbc1d663f 100644
|
| --- a/LayoutTests/crypto/sign-verify-expected.txt
|
| +++ b/LayoutTests/crypto/sign-verify-expected.txt
|
| @@ -11,53 +11,53 @@ PASS tmpKey.algorithm.name is 'HMAC'
|
| PASS tmpKey.algorithm.hash.name is 'SHA-1'
|
| PASS tmpKey.algorithm.length is 0
|
| PASS tmpKey.usages.join(',') is 'sign,verify'
|
| +PASS: Mac should be [fbdb1d1b18aa6c08324b7d64b71fb76370690e1d] and was
|
| +PASS verifyResult is true
|
| +PASS verifyResult is false
|
| PASS tmpKey.type is 'secret'
|
| PASS tmpKey.extractable is false
|
| PASS tmpKey.algorithm.name is 'HMAC'
|
| PASS tmpKey.algorithm.hash.name is 'SHA-256'
|
| PASS tmpKey.algorithm.length is 0
|
| PASS tmpKey.usages.join(',') is 'sign,verify'
|
| +PASS: Mac should be [b613679a0814d9ec772f95d778c35fc5ff1697c493715653c6c712144292c5ad] and was
|
| +PASS verifyResult is true
|
| +PASS verifyResult is false
|
| PASS tmpKey.type is 'secret'
|
| PASS tmpKey.extractable is false
|
| PASS tmpKey.algorithm.name is 'HMAC'
|
| PASS tmpKey.algorithm.hash.name is 'SHA-1'
|
| PASS tmpKey.algorithm.length is 80
|
| PASS tmpKey.usages.join(',') is 'sign,verify'
|
| +PASS: Mac should be [3c8162589aafaee024fc9a5ca50dd2336fe3eb28] and was
|
| +PASS verifyResult is true
|
| +PASS verifyResult is false
|
| PASS tmpKey.type is 'secret'
|
| PASS tmpKey.extractable is false
|
| PASS tmpKey.algorithm.name is 'HMAC'
|
| PASS tmpKey.algorithm.hash.name is 'SHA-1'
|
| PASS tmpKey.algorithm.length is 640
|
| PASS tmpKey.usages.join(',') is 'sign,verify'
|
| +PASS: Mac should be [4ac41ab89f625c60125ed65ffa958c6b490ea670] and was
|
| +PASS verifyResult is true
|
| +PASS verifyResult is false
|
| PASS tmpKey.type is 'secret'
|
| PASS tmpKey.extractable is false
|
| PASS tmpKey.algorithm.name is 'HMAC'
|
| PASS tmpKey.algorithm.hash.name is 'SHA-256'
|
| PASS tmpKey.algorithm.length is 320
|
| PASS tmpKey.usages.join(',') is 'sign,verify'
|
| +PASS: Mac should be [769f00d3e6a6cc1fb426a14a4f76c6462e6149726e0dee0ec0cf97a16605ac8b] and was
|
| +PASS verifyResult is true
|
| +PASS verifyResult is false
|
| PASS tmpKey.type is 'secret'
|
| PASS tmpKey.extractable is false
|
| PASS tmpKey.algorithm.name is 'HMAC'
|
| PASS tmpKey.algorithm.hash.name is 'SHA-256'
|
| PASS tmpKey.algorithm.length is 592
|
| PASS tmpKey.usages.join(',') is 'sign,verify'
|
| -PASS: Mac should be [fbdb1d1b18aa6c08324b7d64b71fb76370690e1d] and was
|
| -PASS: Mac should be [b613679a0814d9ec772f95d778c35fc5ff1697c493715653c6c712144292c5ad] and was
|
| -PASS: Mac should be [3c8162589aafaee024fc9a5ca50dd2336fe3eb28] and was
|
| -PASS: Mac should be [4ac41ab89f625c60125ed65ffa958c6b490ea670] and was
|
| -PASS: Mac should be [769f00d3e6a6cc1fb426a14a4f76c6462e6149726e0dee0ec0cf97a16605ac8b] and was
|
| PASS: Mac should be [4f1ee7cb36c58803a8721d4ac8c4cf8cae5d8832392eed2a96dc59694252801b] and was
|
| PASS verifyResult is true
|
| -PASS verifyResult is true
|
| -PASS verifyResult is true
|
| -PASS verifyResult is true
|
| -PASS verifyResult is true
|
| -PASS verifyResult is true
|
| -PASS verifyResult is false
|
| -PASS verifyResult is false
|
| -PASS verifyResult is false
|
| -PASS verifyResult is false
|
| -PASS verifyResult is false
|
| PASS verifyResult is false
|
| PASS crypto.subtle.verify(hmac, keys.hmacSha1, null, data) threw exception TypeError: Failed to execute 'verify' on 'SubtleCrypto': Invalid signature argument.
|
| PASS crypto.subtle.verify(hmac, keys.hmacSha1, 'a', data) threw exception TypeError: Failed to execute 'verify' on 'SubtleCrypto': Invalid signature argument.
|
|
|