| Index: LayoutTests/crypto/rsassa-pkcs1-v1_5-generate-key-expected.txt
|
| diff --git a/LayoutTests/crypto/rsassa-pkcs1-v1_5-generate-key-expected.txt b/LayoutTests/crypto/rsassa-pkcs1-v1_5-generate-key-expected.txt
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..3ade8bba1b310bcc32046eb9c7842fcca71440c6
|
| --- /dev/null
|
| +++ b/LayoutTests/crypto/rsassa-pkcs1-v1_5-generate-key-expected.txt
|
| @@ -0,0 +1,26 @@
|
| +Test generating an RSA key pair for RSASSA-PKCS1-v1_5.
|
| +
|
| +On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
|
| +
|
| +
|
| +Generating a key pair...
|
| +PASS keyPair.toString() is '[object KeyPair]'
|
| +PASS keyPair.publicKey.type is 'public'
|
| +PASS keyPair.publicKey.algorithm.name is 'RSASSA-PKCS1-v1_5'
|
| +PASS keyPair.publicKey.algorithm.hash.name is 'SHA-256'
|
| +PASS keyPair.publicKey.algorithm.modulusLength is 2048
|
| +PASS bytesToHexString(keyPair.publicKey.algorithm.publicExponent) is '010001'
|
| +PASS keyPair.publicKey.usages is ["verify"]
|
| +PASS keyPair.privateKey.type is 'private'
|
| +PASS keyPair.privateKey.algorithm.name is 'RSASSA-PKCS1-v1_5'
|
| +PASS keyPair.privateKey.algorithm.hash.name is 'SHA-256'
|
| +PASS keyPair.privateKey.algorithm.modulusLength is 2048
|
| +PASS bytesToHexString(keyPair.privateKey.algorithm.publicExponent) is '010001'
|
| +PASS keyPair.privateKey.usages is ["sign"]
|
| +
|
| +Testing that custom attributes on keys survive garbage collection...
|
| +PASS keyPair.publicKey.foo is 'bar'
|
| +PASS successfullyParsed is true
|
| +
|
| +TEST COMPLETE
|
| +
|
|
|