OLD | NEW |
1 Tests structured de-cloning of empty HMAC keys | 1 Tests structured de-cloning of empty HMAC keys |
2 | 2 |
3 On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE
". | 3 On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE
". |
4 | 4 |
5 | 5 |
6 | 6 |
7 Deserializing empty HMAC SHA-1 key... | 7 Deserializing empty HMAC SHA-1 key... |
8 PASS key.type is "secret" | 8 PASS key.type is "secret" |
9 PASS typeof key.extractable is 'boolean' | 9 PASS typeof key.extractable is 'boolean' |
10 PASS key.extractable is true | 10 PASS key.extractable is true |
(...skipping 29 matching lines...) Expand all Loading... |
40 calling verify() with an invalid signature (SHA-256) ... | 40 calling verify() with an invalid signature (SHA-256) ... |
41 PASS typeof verifyResult is 'boolean' | 41 PASS typeof verifyResult is 'boolean' |
42 PASS verifyResult is false | 42 PASS verifyResult is false |
43 | 43 |
44 calling sign() (SHA-256) over empty input... | 44 calling sign() (SHA-256) over empty input... |
45 PASS: signature should be [b613679a0814d9ec772f95d778c35fc5ff1697c493715653c6c71
2144292c5ad] and was | 45 PASS: signature should be [b613679a0814d9ec772f95d778c35fc5ff1697c493715653c6c71
2144292c5ad] and was |
46 PASS successfullyParsed is true | 46 PASS successfullyParsed is true |
47 | 47 |
48 TEST COMPLETE | 48 TEST COMPLETE |
49 | 49 |
OLD | NEW |