| Index: chrome/test/data/extensions/api_test/enterprise_platform_keys/basic.js
|
| diff --git a/chrome/test/data/extensions/api_test/enterprise_platform_keys/basic.js b/chrome/test/data/extensions/api_test/enterprise_platform_keys/basic.js
|
| index da0d2f189b2451b5c9892272b27c0c483b908639..c833c2ccecd21629edd264da5eef899a46c870bd 100644
|
| --- a/chrome/test/data/extensions/api_test/enterprise_platform_keys/basic.js
|
| +++ b/chrome/test/data/extensions/api_test/enterprise_platform_keys/basic.js
|
| @@ -278,8 +278,8 @@ function runTests(userToken) {
|
| name: "RSASSA-PKCS1-v1_5",
|
| // RsaHashedKeyGenParams
|
| modulusLength: 512,
|
| - publicExponent:
|
| - new Uint8Array([0x01, 0x00, 0x01]), // Equivalent to 65537
|
| + // Use some non-standard exponent. This one is equivalent to 257
|
| + publicExponent: new Uint8Array([0x01, 0x01]),
|
| hash: {
|
| name: "SHA-1",
|
| }
|
| @@ -309,17 +309,27 @@ function runTests(userToken) {
|
| assertTrue(false, "Export failed: " + error);
|
| })
|
| .then(callbackPass(function(signature) {
|
| + var importParams = {
|
| + name: algorithm.name,
|
| + // RsaHashedImportParams
|
| + hash: {
|
| + name: "SHA-1",
|
| + }
|
| + };
|
| assertTrue(!!signature, "No signature.");
|
| assertTrue(signature.length != 0, "Signature is empty.");
|
| cachedSignature = signature;
|
| return window.crypto.subtle.importKey(
|
| - "spki", cachedSpki, algorithm, false, ["verify"]);
|
| + "spki", cachedSpki, importParams, false, ["verify"]);
|
| }),
|
| function(error) { assertTrue(false, "Sign failed: " + error); })
|
| .then(callbackPass(function(webCryptoPublicKey) {
|
| assertTrue(!!webCryptoPublicKey);
|
| assertEq(algorithm.modulusLength,
|
| webCryptoPublicKey.algorithm.modulusLength);
|
| + console.log(algorithm.publicExponent);
|
| + assertEq(algorithm.publicExponent,
|
| + webCryptoPublicKey.algorithm.publicExponent);
|
| return window.crypto.subtle.verify(
|
| algorithm, webCryptoPublicKey, cachedSignature, data);
|
| }),
|
|
|