| Index: LayoutTests/crypto/subtle/pbkdf2-deriveBits-expected.txt
|
| diff --git a/LayoutTests/crypto/subtle/pbkdf2-deriveBits-expected.txt b/LayoutTests/crypto/subtle/pbkdf2-deriveBits-expected.txt
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..7944df297ffc05039613ef59b5d5ada0c5ea6242
|
| --- /dev/null
|
| +++ b/LayoutTests/crypto/subtle/pbkdf2-deriveBits-expected.txt
|
| @@ -0,0 +1,72 @@
|
| +Tests importKey/deriveBits for PBKDF2
|
| +
|
| +On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
|
| +
|
| +
|
| +PASS tmpKey.type is "secret"
|
| +PASS typeof tmpKey.extractable is 'boolean'
|
| +PASS tmpKey.extractable is false
|
| +PASS tmpKey.algorithm.name is "PBKDF2"
|
| +PASS tmpKey.usages.join(',') is "deriveKey,deriveBits"
|
| +PASS: deriveBits should be [0c60c80f961f0e71f3a9b524af6012062fe037a6] and was
|
| +PASS derivedBits.byteLength is 0
|
| +PASS tmpKey.type is "secret"
|
| +PASS typeof tmpKey.extractable is 'boolean'
|
| +PASS tmpKey.extractable is false
|
| +PASS tmpKey.algorithm.name is "PBKDF2"
|
| +PASS tmpKey.usages.join(',') is "deriveKey,deriveBits"
|
| +PASS: deriveBits should be [ea6c014dc72d6f8ccd1ed92ace1d41f0d8de8957] and was
|
| +PASS derivedBits.byteLength is 0
|
| +PASS tmpKey.type is "secret"
|
| +PASS typeof tmpKey.extractable is 'boolean'
|
| +PASS tmpKey.extractable is false
|
| +PASS tmpKey.algorithm.name is "PBKDF2"
|
| +PASS tmpKey.usages.join(',') is "deriveKey,deriveBits"
|
| +PASS: deriveBits should be [4b007901b765489abead49d926f721d065a429c1] and was
|
| +PASS derivedBits.byteLength is 0
|
| +PASS tmpKey.type is "secret"
|
| +PASS typeof tmpKey.extractable is 'boolean'
|
| +PASS tmpKey.extractable is false
|
| +PASS tmpKey.algorithm.name is "PBKDF2"
|
| +PASS tmpKey.usages.join(',') is "deriveKey,deriveBits"
|
| +PASS: deriveBits should be [3d2eec4fe41c849b80c8d83662c0e44a8b291a964cf2f07038] and was
|
| +PASS derivedBits.byteLength is 0
|
| +PASS tmpKey.type is "secret"
|
| +PASS typeof tmpKey.extractable is 'boolean'
|
| +PASS tmpKey.extractable is false
|
| +PASS tmpKey.algorithm.name is "PBKDF2"
|
| +PASS tmpKey.usages.join(',') is "deriveKey,deriveBits"
|
| +PASS: deriveBits should be [56fa6aa75548099dcc37d7f03425e0c3] and was
|
| +PASS derivedBits.byteLength is 0
|
| +PASS tmpKey.type is "secret"
|
| +PASS typeof tmpKey.extractable is 'boolean'
|
| +PASS tmpKey.extractable is false
|
| +PASS tmpKey.algorithm.name is "PBKDF2"
|
| +PASS tmpKey.usages.join(',') is "deriveKey,deriveBits"
|
| +PASS: deriveBits should be [a7950c143ec64e2b8d4bb1db8677188b] and was
|
| +PASS derivedBits.byteLength is 0
|
| +PASS tmpKey.type is "secret"
|
| +PASS typeof tmpKey.extractable is 'boolean'
|
| +PASS tmpKey.extractable is false
|
| +PASS tmpKey.algorithm.name is "PBKDF2"
|
| +PASS tmpKey.usages.join(',') is "deriveKey,deriveBits"
|
| +PASS: deriveBits should be [7deaf8b4a801011c1cd27f36e3bfc962] and was
|
| +PASS derivedBits.byteLength is 0
|
| +PASS tmpKey.type is "secret"
|
| +PASS typeof tmpKey.extractable is 'boolean'
|
| +PASS tmpKey.extractable is false
|
| +PASS tmpKey.algorithm.name is "PBKDF2"
|
| +PASS tmpKey.usages.join(',') is "deriveKey,deriveBits"
|
| +PASS: deriveBits should be [83eb100b6a3a975f0fe3ffcdc2419852] and was
|
| +PASS derivedBits.byteLength is 0
|
| +PASS tmpKey.type is "secret"
|
| +PASS typeof tmpKey.extractable is 'boolean'
|
| +PASS tmpKey.extractable is false
|
| +PASS tmpKey.algorithm.name is "PBKDF2"
|
| +PASS tmpKey.usages.join(',') is "deriveKey,deriveBits"
|
| +PASS: deriveBits should be [e4dfce3830983830c50c351a0b0f79e1] and was
|
| +PASS derivedBits.byteLength is 0
|
| +PASS successfullyParsed is true
|
| +
|
| +TEST COMPLETE
|
| +
|
|
|