Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(223)

Unified Diff: third_party/WebKit/LayoutTests/crypto/subtle/aes-cbc/cloneKey-expected.txt

Issue 2855123009: Expose SerializedScriptValue data through a non-copying view. (Closed)
Patch Set: update layout test results to not include padding Created 3 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | third_party/WebKit/LayoutTests/crypto/subtle/aes-gcm/cloneKey-expected.txt » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: third_party/WebKit/LayoutTests/crypto/subtle/aes-cbc/cloneKey-expected.txt
diff --git a/third_party/WebKit/LayoutTests/crypto/subtle/aes-cbc/cloneKey-expected.txt b/third_party/WebKit/LayoutTests/crypto/subtle/aes-cbc/cloneKey-expected.txt
index 79a4e555f0d549effb48ccc3b73c7bf43d717817..3a637070143aa08ff9e885db29060d83f42e8599 100644
--- a/third_party/WebKit/LayoutTests/crypto/subtle/aes-cbc/cloneKey-expected.txt
+++ b/third_party/WebKit/LayoutTests/crypto/subtle/aes-cbc/cloneKey-expected.txt
@@ -18,7 +18,7 @@ PASS clonedKey.extractable is true
PASS clonedKey.algorithm.name is "AES-CBC"
PASS clonedKey.algorithm.length is 128
PASS clonedKey.usages.join(',') is "encrypt"
-Serialized key bytes: 5c4b010110031030112233445566778899aabbccddeeff00
+Serialized key bytes: 5c4b010110031030112233445566778899aabbccddeeff
PASS: Cloned key exported data should be [30112233445566778899aabbccddeeff] and was
PASS importedKey.extraProperty is "hi"
@@ -36,7 +36,7 @@ PASS clonedKey.extractable is true
PASS clonedKey.algorithm.name is "AES-CBC"
PASS clonedKey.algorithm.length is 256
PASS clonedKey.usages.join(',') is "encrypt"
-Serialized key bytes: 5c4b010120032000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f00
+Serialized key bytes: 5c4b010120032000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f
PASS: Cloned key exported data should be [00112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f] and was
PASS importedKey.extraProperty is "hi"
@@ -54,7 +54,7 @@ PASS clonedKey.extractable is true
PASS clonedKey.algorithm.name is "AES-CBC"
PASS clonedKey.algorithm.length is 128
PASS clonedKey.usages.join(',') is "decrypt,wrapKey"
-Serialized key bytes: 5c4b010110451030112233445566778899aabbccddeeff00
+Serialized key bytes: 5c4b010110451030112233445566778899aabbccddeeff
PASS: Cloned key exported data should be [30112233445566778899aabbccddeeff] and was
PASS importedKey.extraProperty is "hi"
@@ -72,7 +72,7 @@ PASS clonedKey.extractable is true
PASS clonedKey.algorithm.name is "AES-CBC"
PASS clonedKey.algorithm.length is 256
PASS clonedKey.usages.join(',') is "decrypt,wrapKey"
-Serialized key bytes: 5c4b010120452000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f00
+Serialized key bytes: 5c4b010120452000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f
PASS: Cloned key exported data should be [00112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f] and was
PASS importedKey.extraProperty is "hi"
@@ -126,7 +126,7 @@ PASS clonedKey.extractable is false
PASS clonedKey.algorithm.name is "AES-CBC"
PASS clonedKey.algorithm.length is 128
PASS clonedKey.usages.join(',') is "encrypt"
-Serialized key bytes: 5c4b010110021030112233445566778899aabbccddeeff00
+Serialized key bytes: 5c4b010110021030112233445566778899aabbccddeeff
PASS importedKey.extraProperty is "hi"
PASS importedKey.type is "secret"
@@ -143,7 +143,7 @@ PASS clonedKey.extractable is false
PASS clonedKey.algorithm.name is "AES-CBC"
PASS clonedKey.algorithm.length is 256
PASS clonedKey.usages.join(',') is "encrypt"
-Serialized key bytes: 5c4b010120022000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f00
+Serialized key bytes: 5c4b010120022000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f
PASS importedKey.extraProperty is "hi"
PASS importedKey.type is "secret"
@@ -160,7 +160,7 @@ PASS clonedKey.extractable is false
PASS clonedKey.algorithm.name is "AES-CBC"
PASS clonedKey.algorithm.length is 128
PASS clonedKey.usages.join(',') is "decrypt,wrapKey"
-Serialized key bytes: 5c4b010110441030112233445566778899aabbccddeeff00
+Serialized key bytes: 5c4b010110441030112233445566778899aabbccddeeff
PASS importedKey.extraProperty is "hi"
PASS importedKey.type is "secret"
@@ -177,7 +177,7 @@ PASS clonedKey.extractable is false
PASS clonedKey.algorithm.name is "AES-CBC"
PASS clonedKey.algorithm.length is 256
PASS clonedKey.usages.join(',') is "decrypt,wrapKey"
-Serialized key bytes: 5c4b010120442000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f00
+Serialized key bytes: 5c4b010120442000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f
PASS importedKey.extraProperty is "hi"
PASS importedKey.type is "secret"
« no previous file with comments | « no previous file | third_party/WebKit/LayoutTests/crypto/subtle/aes-gcm/cloneKey-expected.txt » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698