Index: LayoutTests/crypto/hmac-legacy-empty-key-expected.txt |
diff --git a/LayoutTests/crypto/hmac-legacy-empty-key-expected.txt b/LayoutTests/crypto/hmac-legacy-empty-key-expected.txt |
deleted file mode 100644 |
index 109ecfadaa8f5f56227399752117125a0a37127f..0000000000000000000000000000000000000000 |
--- a/LayoutTests/crypto/hmac-legacy-empty-key-expected.txt |
+++ /dev/null |
@@ -1,49 +0,0 @@ |
-Tests structured de-cloning of empty HMAC keys |
- |
-On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE". |
- |
- |
- |
-Deserializing empty HMAC SHA-1 key... |
-PASS key.type is "secret" |
-PASS typeof key.extractable is 'boolean' |
-PASS key.extractable is true |
-PASS key.algorithm.name is "HMAC" |
-PASS key.algorithm.length is 0 |
-PASS key.algorithm.hash.name is "SHA-1" |
-PASS key.usages is ["sign", "verify"] |
- |
-Deserializing empty HMAC SHA-256 key... |
-PASS key.type is "secret" |
-PASS typeof key.extractable is 'boolean' |
-PASS key.extractable is true |
-PASS key.algorithm.name is "HMAC" |
-PASS key.algorithm.length is 0 |
-PASS key.algorithm.hash.name is "SHA-256" |
-PASS key.usages is ["sign", "verify"] |
- |
-calling verify() with a valid signature (SHA-1) ... |
-PASS typeof verifyResult is 'boolean' |
-PASS verifyResult is true |
- |
-calling verify() with an invalid signature (SHA-1) ... |
-PASS typeof verifyResult is 'boolean' |
-PASS verifyResult is false |
- |
-calling sign() (SHA-1) over empty input... |
-PASS: signature should be [fbdb1d1b18aa6c08324b7d64b71fb76370690e1d] and was |
- |
-calling verify() with a valid signature (SHA-256) ... |
-PASS typeof verifyResult is 'boolean' |
-PASS verifyResult is true |
- |
-calling verify() with an invalid signature (SHA-256) ... |
-PASS typeof verifyResult is 'boolean' |
-PASS verifyResult is false |
- |
-calling sign() (SHA-256) over empty input... |
-PASS: signature should be [b613679a0814d9ec772f95d778c35fc5ff1697c493715653c6c712144292c5ad] and was |
-PASS successfullyParsed is true |
- |
-TEST COMPLETE |
- |