Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(42)

Unified Diff: LayoutTests/crypto/rsa-oaep-generate-non-extractable-key-expected.txt

Issue 310513004: Import WebKit RSA-OAEP LayoutTests. (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: Add another test Created 6 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: LayoutTests/crypto/rsa-oaep-generate-non-extractable-key-expected.txt
diff --git a/LayoutTests/crypto/rsassa-pkcs1-v1_5-generate-key-expected.txt b/LayoutTests/crypto/rsa-oaep-generate-non-extractable-key-expected.txt
similarity index 64%
copy from LayoutTests/crypto/rsassa-pkcs1-v1_5-generate-key-expected.txt
copy to LayoutTests/crypto/rsa-oaep-generate-non-extractable-key-expected.txt
index 3ade8bba1b310bcc32046eb9c7842fcca71440c6..1bd17f049636aa9f7e1c084f0b5efe68dea94ae7 100644
--- a/LayoutTests/crypto/rsassa-pkcs1-v1_5-generate-key-expected.txt
+++ b/LayoutTests/crypto/rsa-oaep-generate-non-extractable-key-expected.txt
@@ -1,4 +1,4 @@
-Test generating an RSA key pair for RSASSA-PKCS1-v1_5.
+Test that even when non-extractability is requested, the public key is still extractable.
On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
@@ -6,20 +6,17 @@ On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE
Generating a key pair...
PASS keyPair.toString() is '[object KeyPair]'
PASS keyPair.publicKey.type is 'public'
-PASS keyPair.publicKey.algorithm.name is 'RSASSA-PKCS1-v1_5'
-PASS keyPair.publicKey.algorithm.hash.name is 'SHA-256'
+PASS keyPair.publicKey.extractable is true
+PASS keyPair.publicKey.algorithm.name is 'RSA-OAEP'
PASS keyPair.publicKey.algorithm.modulusLength is 2048
PASS bytesToHexString(keyPair.publicKey.algorithm.publicExponent) is '010001'
-PASS keyPair.publicKey.usages is ["verify"]
+PASS keyPair.publicKey.algorithm.hash.name is 'SHA-256'
PASS keyPair.privateKey.type is 'private'
-PASS keyPair.privateKey.algorithm.name is 'RSASSA-PKCS1-v1_5'
-PASS keyPair.privateKey.algorithm.hash.name is 'SHA-256'
+PASS keyPair.privateKey.extractable is false
+PASS keyPair.privateKey.algorithm.name is 'RSA-OAEP'
PASS keyPair.privateKey.algorithm.modulusLength is 2048
PASS bytesToHexString(keyPair.privateKey.algorithm.publicExponent) is '010001'
-PASS keyPair.privateKey.usages is ["sign"]
-
-Testing that custom attributes on keys survive garbage collection...
-PASS keyPair.publicKey.foo is 'bar'
+PASS keyPair.privateKey.algorithm.hash.name is 'SHA-256'
PASS successfullyParsed is true
TEST COMPLETE
« no previous file with comments | « LayoutTests/crypto/rsa-oaep-generate-non-extractable-key.html ('k') | LayoutTests/crypto/rsa-oaep-key-manipulation.html » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698