| OLD | NEW |
| 1 Tests structured de-cloning of empty HMAC keys | 1 Tests structured de-cloning of empty HMAC keys |
| 2 | 2 |
| 3 On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE
". | 3 On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE
". |
| 4 | 4 |
| 5 | 5 |
| 6 | 6 |
| 7 Deserializing empty HMAC SHA-1 key... | 7 Deserializing empty HMAC SHA-1 key... |
| 8 PASS key.type is "secret" | 8 PASS key.type is "secret" |
| 9 PASS typeof key.extractable is 'boolean' | 9 PASS typeof key.extractable is 'boolean' |
| 10 PASS key.extractable is true | 10 PASS key.extractable is true |
| (...skipping 29 matching lines...) Expand all Loading... |
| 40 calling verify() with an invalid signature (SHA-256) ... | 40 calling verify() with an invalid signature (SHA-256) ... |
| 41 PASS typeof verifyResult is 'boolean' | 41 PASS typeof verifyResult is 'boolean' |
| 42 PASS verifyResult is false | 42 PASS verifyResult is false |
| 43 | 43 |
| 44 calling sign() (SHA-256) over empty input... | 44 calling sign() (SHA-256) over empty input... |
| 45 PASS: signature should be [b613679a0814d9ec772f95d778c35fc5ff1697c493715653c6c71
2144292c5ad] and was | 45 PASS: signature should be [b613679a0814d9ec772f95d778c35fc5ff1697c493715653c6c71
2144292c5ad] and was |
| 46 PASS successfullyParsed is true | 46 PASS successfullyParsed is true |
| 47 | 47 |
| 48 TEST COMPLETE | 48 TEST COMPLETE |
| 49 | 49 |
| OLD | NEW |