Index: third_party/WebKit/LayoutTests/crypto/subtle/hkdf/deriveKey-expected.txt |
diff --git a/third_party/WebKit/LayoutTests/crypto/subtle/hkdf/deriveKey-expected.txt b/third_party/WebKit/LayoutTests/crypto/subtle/hkdf/deriveKey-expected.txt |
index f58843627cb53a0f4f1705564f7f986fa5afa501..faf19044a13f2b22642d65adc03c4f0dc175f52d 100644 |
--- a/third_party/WebKit/LayoutTests/crypto/subtle/hkdf/deriveKey-expected.txt |
+++ b/third_party/WebKit/LayoutTests/crypto/subtle/hkdf/deriveKey-expected.txt |
@@ -5,7 +5,7 @@ On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE |
PASS derivedKey.type is "secret" |
PASS typeof derivedKey.extractable is 'boolean' |
-PASS derivedKey.extractable is true |
+PASS derivedKey.extractable is false |
PASS derivedKey.algorithm.name is "AES-GCM" |
PASS derivedKey.usages.join(',') is "encrypt" |
@@ -13,12 +13,12 @@ Try to derive an HKDF key... |
error is: TypeError: No length was specified for the HKDF Derive Bits operation. |
PASS emptyKey.type is "secret" |
PASS typeof emptyKey.extractable is 'boolean' |
-PASS emptyKey.extractable is true |
+PASS emptyKey.extractable is false |
PASS emptyKey.algorithm.name is "HKDF" |
PASS emptyKey.usages.join(',') is "deriveKey" |
PASS derivedKey.type is "secret" |
PASS typeof derivedKey.extractable is 'boolean' |
-PASS derivedKey.extractable is true |
+PASS derivedKey.extractable is false |
PASS derivedKey.algorithm.name is "AES-GCM" |
PASS derivedKey.usages.join(',') is "encrypt" |
PASS successfullyParsed is true |