| Index: LayoutTests/crypto/subtle/pbkdf2-deriveKey-expected.txt
|
| diff --git a/LayoutTests/crypto/subtle/pbkdf2-deriveKey-expected.txt b/LayoutTests/crypto/subtle/pbkdf2-deriveKey-expected.txt
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..5435c1f4a8ab718e350ba4195d2671e4728628e7
|
| --- /dev/null
|
| +++ b/LayoutTests/crypto/subtle/pbkdf2-deriveKey-expected.txt
|
| @@ -0,0 +1,69 @@
|
| +Tests encrypt/decrypt for AES-CBC
|
| +
|
| +On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
|
| +
|
| +
|
| +PASS tmpKey.type is "secret"
|
| +PASS typeof tmpKey.extractable is 'boolean'
|
| +PASS tmpKey.extractable is false
|
| +PASS tmpKey.algorithm.name is "PBKDF2"
|
| +PASS tmpKey.usages.join(',') is "deriveKey,deriveBits"
|
| +PASS dkey.type is "secret"
|
| +PASS typeof dkey.extractable is 'boolean'
|
| +PASS dkey.extractable is true
|
| +PASS dkey.algorithm.name is "AES-CBC"
|
| +PASS dkey.algorithm.length is 128
|
| +PASS dkey.usages.join(',') is "encrypt"
|
| +PASS: Derivedkey should be [0c60c80f961f0e71f3a9b524af601206] and was
|
| +PASS tmpKey.type is "secret"
|
| +PASS typeof tmpKey.extractable is 'boolean'
|
| +PASS tmpKey.extractable is false
|
| +PASS tmpKey.algorithm.name is "PBKDF2"
|
| +PASS tmpKey.usages.join(',') is "deriveKey,deriveBits"
|
| +PASS dkey.type is "secret"
|
| +PASS typeof dkey.extractable is 'boolean'
|
| +PASS dkey.extractable is true
|
| +PASS dkey.algorithm.name is "AES-CBC"
|
| +PASS dkey.algorithm.length is 128
|
| +PASS dkey.usages.join(',') is "encrypt"
|
| +PASS: Derivedkey should be [ea6c014dc72d6f8ccd1ed92ace1d41f0] and was
|
| +PASS tmpKey.type is "secret"
|
| +PASS typeof tmpKey.extractable is 'boolean'
|
| +PASS tmpKey.extractable is false
|
| +PASS tmpKey.algorithm.name is "PBKDF2"
|
| +PASS tmpKey.usages.join(',') is "deriveKey,deriveBits"
|
| +PASS dkey.type is "secret"
|
| +PASS typeof dkey.extractable is 'boolean'
|
| +PASS dkey.extractable is true
|
| +PASS dkey.algorithm.name is "AES-CBC"
|
| +PASS dkey.algorithm.length is 128
|
| +PASS dkey.usages.join(',') is "encrypt"
|
| +PASS: Derivedkey should be [4b007901b765489abead49d926f721d0] and was
|
| +PASS tmpKey.type is "secret"
|
| +PASS typeof tmpKey.extractable is 'boolean'
|
| +PASS tmpKey.extractable is false
|
| +PASS tmpKey.algorithm.name is "PBKDF2"
|
| +PASS tmpKey.usages.join(',') is "deriveKey,deriveBits"
|
| +PASS dkey.type is "secret"
|
| +PASS typeof dkey.extractable is 'boolean'
|
| +PASS dkey.extractable is true
|
| +PASS dkey.algorithm.name is "AES-CBC"
|
| +PASS dkey.algorithm.length is 128
|
| +PASS dkey.usages.join(',') is "encrypt"
|
| +PASS: Derivedkey should be [3d2eec4fe41c849b80c8d83662c0e44a] and was
|
| +PASS tmpKey.type is "secret"
|
| +PASS typeof tmpKey.extractable is 'boolean'
|
| +PASS tmpKey.extractable is false
|
| +PASS tmpKey.algorithm.name is "PBKDF2"
|
| +PASS tmpKey.usages.join(',') is "deriveKey,deriveBits"
|
| +PASS dkey.type is "secret"
|
| +PASS typeof dkey.extractable is 'boolean'
|
| +PASS dkey.extractable is true
|
| +PASS dkey.algorithm.name is "AES-CBC"
|
| +PASS dkey.algorithm.length is 128
|
| +PASS dkey.usages.join(',') is "encrypt"
|
| +PASS: Derivedkey should be [56fa6aa75548099dcc37d7f03425e0c3] and was
|
| +PASS successfullyParsed is true
|
| +
|
| +TEST COMPLETE
|
| +
|
|
|