OLD | NEW |
| (Empty) |
1 Tests structured de-cloning of empty HMAC keys | |
2 | |
3 On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE
". | |
4 | |
5 | |
6 | |
7 Deserializing empty HMAC SHA-1 key... | |
8 PASS key.type is "secret" | |
9 PASS typeof key.extractable is 'boolean' | |
10 PASS key.extractable is true | |
11 PASS key.algorithm.name is "HMAC" | |
12 PASS key.algorithm.length is 0 | |
13 PASS key.algorithm.hash.name is "SHA-1" | |
14 PASS key.usages is ["sign", "verify"] | |
15 | |
16 Deserializing empty HMAC SHA-256 key... | |
17 PASS key.type is "secret" | |
18 PASS typeof key.extractable is 'boolean' | |
19 PASS key.extractable is true | |
20 PASS key.algorithm.name is "HMAC" | |
21 PASS key.algorithm.length is 0 | |
22 PASS key.algorithm.hash.name is "SHA-256" | |
23 PASS key.usages is ["sign", "verify"] | |
24 | |
25 calling verify() with a valid signature (SHA-1) ... | |
26 PASS typeof verifyResult is 'boolean' | |
27 PASS verifyResult is true | |
28 | |
29 calling verify() with an invalid signature (SHA-1) ... | |
30 PASS typeof verifyResult is 'boolean' | |
31 PASS verifyResult is false | |
32 | |
33 calling sign() (SHA-1) over empty input... | |
34 PASS: signature should be [fbdb1d1b18aa6c08324b7d64b71fb76370690e1d] and was | |
35 | |
36 calling verify() with a valid signature (SHA-256) ... | |
37 PASS typeof verifyResult is 'boolean' | |
38 PASS verifyResult is true | |
39 | |
40 calling verify() with an invalid signature (SHA-256) ... | |
41 PASS typeof verifyResult is 'boolean' | |
42 PASS verifyResult is false | |
43 | |
44 calling sign() (SHA-256) over empty input... | |
45 PASS: signature should be [b613679a0814d9ec772f95d778c35fc5ff1697c493715653c6c71
2144292c5ad] and was | |
46 PASS successfullyParsed is true | |
47 | |
48 TEST COMPLETE | |
49 | |
OLD | NEW |