| Index: LayoutTests/crypto/rsa-oaep-key-manipulation-expected.txt
|
| diff --git a/LayoutTests/crypto/rsa-oaep-key-manipulation-expected.txt b/LayoutTests/crypto/rsa-oaep-key-manipulation-expected.txt
|
| index 5c769a0cdbdb155ab62371d287315f6092c911e6..06038d5ccbe6656c357bbef94ed52c20f815e9d4 100644
|
| --- a/LayoutTests/crypto/rsa-oaep-key-manipulation-expected.txt
|
| +++ b/LayoutTests/crypto/rsa-oaep-key-manipulation-expected.txt
|
| @@ -7,13 +7,13 @@ Generating a key pair...
|
| PASS keyPair.toString() is '[object KeyPair]'
|
| PASS keyPair.publicKey.type is 'public'
|
| PASS keyPair.publicKey.algorithm.name is 'RSA-OAEP'
|
| -PASS keyPair.publicKey.algorithm.modulusLength is 2048
|
| +PASS keyPair.publicKey.algorithm.modulusLength is 512
|
| PASS keyPair.publicKey.usages is ["encrypt", "wrapKey"]
|
| PASS bytesToHexString(keyPair.publicKey.algorithm.publicExponent) is '010001'
|
| PASS keyPair.publicKey.algorithm.hash.name is 'SHA-1'
|
| PASS keyPair.privateKey.type is 'private'
|
| PASS keyPair.privateKey.algorithm.name is 'RSA-OAEP'
|
| -PASS keyPair.privateKey.algorithm.modulusLength is 2048
|
| +PASS keyPair.privateKey.algorithm.modulusLength is 512
|
| PASS keyPair.privateKey.usages is ["decrypt", "unwrapKey"]
|
| PASS bytesToHexString(keyPair.privateKey.algorithm.publicExponent) is '010001'
|
| PASS keyPair.privateKey.algorithm.hash.name is 'SHA-1'
|
| @@ -39,7 +39,7 @@ PASS bytesToHexString(Base64URL.parse(jwkPublicKey.e)) is '010001'
|
| Importing it back...
|
| PASS exportedPublicKey.type is 'public'
|
| PASS exportedPublicKey.algorithm.name is 'RSA-OAEP'
|
| -PASS exportedPublicKey.algorithm.modulusLength is 2048
|
| +PASS exportedPublicKey.algorithm.modulusLength is 512
|
| PASS bytesToHexString(exportedPublicKey.algorithm.publicExponent) is '010001'
|
| PASS exportedPublicKey.algorithm.hash.name is 'SHA-1'
|
| PASS exportedPublicKey.extractable is true
|
|
|