| Index: LayoutTests/crypto/rsassa-pkcs1-v1_5-generate-key.html
|
| diff --git a/LayoutTests/crypto/rsassa-pkcs1-v1_5-generate-key.html b/LayoutTests/crypto/rsassa-pkcs1-v1_5-generate-key.html
|
| index 648bdde8be234ea1b926813768fc7faea0024427..0eba937e178a02f71e43657ebd07de076d97ca22 100644
|
| --- a/LayoutTests/crypto/rsassa-pkcs1-v1_5-generate-key.html
|
| +++ b/LayoutTests/crypto/rsassa-pkcs1-v1_5-generate-key.html
|
| @@ -17,7 +17,7 @@ var algorithmKeyGen = {
|
| name: "RSASSA-PKCS1-v1_5",
|
| hash: {name: "sha-256"},
|
| // RsaKeyGenParams
|
| - modulusLength: 2048,
|
| + modulusLength: 512,
|
| publicExponent: new Uint8Array([0x01, 0x00, 0x01]), // Equivalent to 65537
|
| };
|
| var extractable = true;
|
| @@ -29,13 +29,13 @@ crypto.subtle.generateKey(algorithmKeyGen, extractable, ["sign", "verify"]).then
|
| shouldBe("keyPair.publicKey.type", "'public'");
|
| shouldBe("keyPair.publicKey.algorithm.name", "'RSASSA-PKCS1-v1_5'");
|
| shouldBe("keyPair.publicKey.algorithm.hash.name", "'SHA-256'");
|
| - shouldBe("keyPair.publicKey.algorithm.modulusLength", "2048");
|
| + shouldBe("keyPair.publicKey.algorithm.modulusLength", "512");
|
| shouldBe("bytesToHexString(keyPair.publicKey.algorithm.publicExponent)", "'010001'");
|
| shouldBe("keyPair.publicKey.usages", '["verify"]');
|
| shouldBe("keyPair.privateKey.type", "'private'");
|
| shouldBe("keyPair.privateKey.algorithm.name", "'RSASSA-PKCS1-v1_5'");
|
| shouldBe("keyPair.privateKey.algorithm.hash.name", "'SHA-256'");
|
| - shouldBe("keyPair.privateKey.algorithm.modulusLength", "2048");
|
| + shouldBe("keyPair.privateKey.algorithm.modulusLength", "512");
|
| shouldBe("bytesToHexString(keyPair.privateKey.algorithm.publicExponent)", "'010001'");
|
| shouldBe("keyPair.privateKey.usages", '["sign"]');
|
|
|
|
|