| Index: third_party/WebKit/LayoutTests/crypto/subtle/hkdf/deriveKey-expected.txt
|
| diff --git a/third_party/WebKit/LayoutTests/crypto/subtle/hkdf/deriveKey-expected.txt b/third_party/WebKit/LayoutTests/crypto/subtle/hkdf/deriveKey-expected.txt
|
| index f58843627cb53a0f4f1705564f7f986fa5afa501..faf19044a13f2b22642d65adc03c4f0dc175f52d 100644
|
| --- a/third_party/WebKit/LayoutTests/crypto/subtle/hkdf/deriveKey-expected.txt
|
| +++ b/third_party/WebKit/LayoutTests/crypto/subtle/hkdf/deriveKey-expected.txt
|
| @@ -5,7 +5,7 @@ On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE
|
|
|
| PASS derivedKey.type is "secret"
|
| PASS typeof derivedKey.extractable is 'boolean'
|
| -PASS derivedKey.extractable is true
|
| +PASS derivedKey.extractable is false
|
| PASS derivedKey.algorithm.name is "AES-GCM"
|
| PASS derivedKey.usages.join(',') is "encrypt"
|
|
|
| @@ -13,12 +13,12 @@ Try to derive an HKDF key...
|
| error is: TypeError: No length was specified for the HKDF Derive Bits operation.
|
| PASS emptyKey.type is "secret"
|
| PASS typeof emptyKey.extractable is 'boolean'
|
| -PASS emptyKey.extractable is true
|
| +PASS emptyKey.extractable is false
|
| PASS emptyKey.algorithm.name is "HKDF"
|
| PASS emptyKey.usages.join(',') is "deriveKey"
|
| PASS derivedKey.type is "secret"
|
| PASS typeof derivedKey.extractable is 'boolean'
|
| -PASS derivedKey.extractable is true
|
| +PASS derivedKey.extractable is false
|
| PASS derivedKey.algorithm.name is "AES-GCM"
|
| PASS derivedKey.usages.join(',') is "encrypt"
|
| PASS successfullyParsed is true
|
|
|