Index: LayoutTests/crypto/rsassa-pkcs1-v1_5-generate-key-expected.txt |
diff --git a/LayoutTests/crypto/rsassa-pkcs1-v1_5-generate-key-expected.txt b/LayoutTests/crypto/rsassa-pkcs1-v1_5-generate-key-expected.txt |
new file mode 100644 |
index 0000000000000000000000000000000000000000..3ade8bba1b310bcc32046eb9c7842fcca71440c6 |
--- /dev/null |
+++ b/LayoutTests/crypto/rsassa-pkcs1-v1_5-generate-key-expected.txt |
@@ -0,0 +1,26 @@ |
+Test generating an RSA key pair for RSASSA-PKCS1-v1_5. |
+ |
+On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE". |
+ |
+ |
+Generating a key pair... |
+PASS keyPair.toString() is '[object KeyPair]' |
+PASS keyPair.publicKey.type is 'public' |
+PASS keyPair.publicKey.algorithm.name is 'RSASSA-PKCS1-v1_5' |
+PASS keyPair.publicKey.algorithm.hash.name is 'SHA-256' |
+PASS keyPair.publicKey.algorithm.modulusLength is 2048 |
+PASS bytesToHexString(keyPair.publicKey.algorithm.publicExponent) is '010001' |
+PASS keyPair.publicKey.usages is ["verify"] |
+PASS keyPair.privateKey.type is 'private' |
+PASS keyPair.privateKey.algorithm.name is 'RSASSA-PKCS1-v1_5' |
+PASS keyPair.privateKey.algorithm.hash.name is 'SHA-256' |
+PASS keyPair.privateKey.algorithm.modulusLength is 2048 |
+PASS bytesToHexString(keyPair.privateKey.algorithm.publicExponent) is '010001' |
+PASS keyPair.privateKey.usages is ["sign"] |
+ |
+Testing that custom attributes on keys survive garbage collection... |
+PASS keyPair.publicKey.foo is 'bar' |
+PASS successfullyParsed is true |
+ |
+TEST COMPLETE |
+ |