| Index: third_party/WebKit/LayoutTests/crypto/subtle/aes-gcm/cloneKey-expected.txt
|
| diff --git a/third_party/WebKit/LayoutTests/crypto/subtle/aes-gcm/cloneKey-expected.txt b/third_party/WebKit/LayoutTests/crypto/subtle/aes-gcm/cloneKey-expected.txt
|
| index 1af0b9390ebdfcc073ee6bb56bb08fcfc2701262..ca5251abc379f83cac03a2885bdc76a7620679a2 100644
|
| --- a/third_party/WebKit/LayoutTests/crypto/subtle/aes-gcm/cloneKey-expected.txt
|
| +++ b/third_party/WebKit/LayoutTests/crypto/subtle/aes-gcm/cloneKey-expected.txt
|
| @@ -18,7 +18,7 @@ PASS clonedKey.extractable is true
|
| PASS clonedKey.algorithm.name is "AES-GCM"
|
| PASS clonedKey.algorithm.length is 128
|
| PASS clonedKey.usages.join(',') is "encrypt"
|
| -Serialized key bytes: 3f004b010910031030112233445566778899aabbccddeeff
|
| +Serialized key bytes: 4b010910031030112233445566778899aabbccddeeff
|
| PASS: Cloned key exported data should be [30112233445566778899aabbccddeeff] and was
|
|
|
| PASS importedKey.extraProperty is "hi"
|
| @@ -36,7 +36,7 @@ PASS clonedKey.extractable is true
|
| PASS clonedKey.algorithm.name is "AES-GCM"
|
| PASS clonedKey.algorithm.length is 256
|
| PASS clonedKey.usages.join(',') is "encrypt"
|
| -Serialized key bytes: 3f004b010920032000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f
|
| +Serialized key bytes: 4b010920032000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f
|
| PASS: Cloned key exported data should be [00112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f] and was
|
|
|
| PASS importedKey.extraProperty is "hi"
|
| @@ -54,7 +54,7 @@ PASS clonedKey.extractable is true
|
| PASS clonedKey.algorithm.name is "AES-GCM"
|
| PASS clonedKey.algorithm.length is 128
|
| PASS clonedKey.usages.join(',') is "decrypt,wrapKey"
|
| -Serialized key bytes: 3f004b010910451030112233445566778899aabbccddeeff
|
| +Serialized key bytes: 4b010910451030112233445566778899aabbccddeeff
|
| PASS: Cloned key exported data should be [30112233445566778899aabbccddeeff] and was
|
|
|
| PASS importedKey.extraProperty is "hi"
|
| @@ -72,7 +72,7 @@ PASS clonedKey.extractable is true
|
| PASS clonedKey.algorithm.name is "AES-GCM"
|
| PASS clonedKey.algorithm.length is 256
|
| PASS clonedKey.usages.join(',') is "decrypt,wrapKey"
|
| -Serialized key bytes: 3f004b010920452000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f
|
| +Serialized key bytes: 4b010920452000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f
|
| PASS: Cloned key exported data should be [00112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f] and was
|
|
|
| PASS importedKey.extraProperty is "hi"
|
| @@ -90,7 +90,7 @@ PASS clonedKey.extractable is true
|
| PASS clonedKey.algorithm.name is "AES-GCM"
|
| PASS clonedKey.algorithm.length is 128
|
| PASS clonedKey.usages.join(',') is "encrypt,wrapKey,unwrapKey"
|
| -Serialized key bytes: 3f004b010910c3011030112233445566778899aabbccddeeff00
|
| +Serialized key bytes: 4b010910c3011030112233445566778899aabbccddeeff00
|
| PASS: Cloned key exported data should be [30112233445566778899aabbccddeeff] and was
|
|
|
| PASS importedKey.extraProperty is "hi"
|
| @@ -108,7 +108,7 @@ PASS clonedKey.extractable is true
|
| PASS clonedKey.algorithm.name is "AES-GCM"
|
| PASS clonedKey.algorithm.length is 256
|
| PASS clonedKey.usages.join(',') is "encrypt,wrapKey,unwrapKey"
|
| -Serialized key bytes: 3f004b010920c3012000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f00
|
| +Serialized key bytes: 4b010920c3012000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f00
|
| PASS: Cloned key exported data should be [00112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f] and was
|
|
|
| PASS importedKey.extraProperty is "hi"
|
| @@ -126,7 +126,7 @@ PASS clonedKey.extractable is false
|
| PASS clonedKey.algorithm.name is "AES-GCM"
|
| PASS clonedKey.algorithm.length is 128
|
| PASS clonedKey.usages.join(',') is "encrypt"
|
| -Serialized key bytes: 3f004b010910021030112233445566778899aabbccddeeff
|
| +Serialized key bytes: 4b010910021030112233445566778899aabbccddeeff
|
|
|
| PASS importedKey.extraProperty is "hi"
|
| PASS importedKey.type is "secret"
|
| @@ -143,7 +143,7 @@ PASS clonedKey.extractable is false
|
| PASS clonedKey.algorithm.name is "AES-GCM"
|
| PASS clonedKey.algorithm.length is 256
|
| PASS clonedKey.usages.join(',') is "encrypt"
|
| -Serialized key bytes: 3f004b010920022000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f
|
| +Serialized key bytes: 4b010920022000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f
|
|
|
| PASS importedKey.extraProperty is "hi"
|
| PASS importedKey.type is "secret"
|
| @@ -160,7 +160,7 @@ PASS clonedKey.extractable is false
|
| PASS clonedKey.algorithm.name is "AES-GCM"
|
| PASS clonedKey.algorithm.length is 128
|
| PASS clonedKey.usages.join(',') is "decrypt,wrapKey"
|
| -Serialized key bytes: 3f004b010910441030112233445566778899aabbccddeeff
|
| +Serialized key bytes: 4b010910441030112233445566778899aabbccddeeff
|
|
|
| PASS importedKey.extraProperty is "hi"
|
| PASS importedKey.type is "secret"
|
| @@ -177,7 +177,7 @@ PASS clonedKey.extractable is false
|
| PASS clonedKey.algorithm.name is "AES-GCM"
|
| PASS clonedKey.algorithm.length is 256
|
| PASS clonedKey.usages.join(',') is "decrypt,wrapKey"
|
| -Serialized key bytes: 3f004b010920442000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f
|
| +Serialized key bytes: 4b010920442000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f
|
|
|
| PASS importedKey.extraProperty is "hi"
|
| PASS importedKey.type is "secret"
|
| @@ -194,7 +194,7 @@ PASS clonedKey.extractable is false
|
| PASS clonedKey.algorithm.name is "AES-GCM"
|
| PASS clonedKey.algorithm.length is 128
|
| PASS clonedKey.usages.join(',') is "encrypt,wrapKey,unwrapKey"
|
| -Serialized key bytes: 3f004b010910c2011030112233445566778899aabbccddeeff00
|
| +Serialized key bytes: 4b010910c2011030112233445566778899aabbccddeeff00
|
|
|
| PASS importedKey.extraProperty is "hi"
|
| PASS importedKey.type is "secret"
|
| @@ -211,7 +211,7 @@ PASS clonedKey.extractable is false
|
| PASS clonedKey.algorithm.name is "AES-GCM"
|
| PASS clonedKey.algorithm.length is 256
|
| PASS clonedKey.usages.join(',') is "encrypt,wrapKey,unwrapKey"
|
| -Serialized key bytes: 3f004b010920c2012000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f00
|
| +Serialized key bytes: 4b010920c2012000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f00
|
|
|
| PASS successfullyParsed is true
|
|
|
|
|