Index: third_party/WebKit/LayoutTests/fast/peerconnection/RTCPeerConnection-generateCertificate-expected.txt |
diff --git a/third_party/WebKit/LayoutTests/fast/peerconnection/RTCPeerConnection-generateCertificate-expected.txt b/third_party/WebKit/LayoutTests/fast/peerconnection/RTCPeerConnection-generateCertificate-expected.txt |
index 2cf752a34435d2327fb2305e1394857ef2771b89..6b3430d64a28c90958b84c79c8d7025ed0b6f60d 100644 |
--- a/third_party/WebKit/LayoutTests/fast/peerconnection/RTCPeerConnection-generateCertificate-expected.txt |
+++ b/third_party/WebKit/LayoutTests/fast/peerconnection/RTCPeerConnection-generateCertificate-expected.txt |
@@ -6,11 +6,23 @@ On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE |
PASS generateCertificate({ name: "RSASSA-PKCS1-v1_5", modulusLength: 2048, publicExponent: new Uint8Array([1, 0, 1]), hash: "SHA-256" }) |
PASS certRSA is non-null. |
PASS new Date().getTime() < certRSA.expires is true |
+PASS certRSA.getFingerprints().length == 1 is true |
+PASS certRSA.getFingerprints()[0].algorithm === "sha-256" is true |
+PASS isFingerprintValue(certRSA.getFingerprints()[0].value) is true |
+PASS certRSA.getFingerprints()[0] != certRSA.getFingerprints()[0] is true |
PASS generateCertificate({ name: "ECDSA", namedCurve: "P-256" }) |
PASS certECDSA is non-null. |
PASS new Date().getTime() < certECDSA.expires is true |
+PASS certECDSA.getFingerprints().length == 1 is true |
+PASS certECDSA.getFingerprints()[0].algorithm === "sha-256" is true |
+PASS isFingerprintValue(certECDSA.getFingerprints()[0].value) is true |
+PASS certECDSA.getFingerprints()[0] != certECDSA.getFingerprints()[0] is true |
PASS certExpiresNegativeOneDay is non-null. |
PASS new Date().getTime() < certExpiresNegativeOneDay.expires is true |
+PASS certExpiresNegativeOneDay.getFingerprints().length == 1 is true |
+PASS certExpiresNegativeOneDay.getFingerprints()[0].algorithm === "sha-256" is true |
+PASS isFingerprintValue(certExpiresNegativeOneDay.getFingerprints()[0].value) is true |
+PASS certExpiresNegativeOneDay.getFingerprints()[0] != certExpiresNegativeOneDay.getFingerprints()[0] is true |
PASS certExpiresZero is non-null. |
PASS new Date().getTime() >= certExpiresZero.expires is true |
PASS certExpiresPositiveOneDay is non-null. |