Index: LayoutTests/crypto/subtle/rsa-oaep-key-manipulation-expected.txt |
diff --git a/LayoutTests/crypto/subtle/rsa-oaep-key-manipulation-expected.txt b/LayoutTests/crypto/subtle/rsa-oaep-key-manipulation-expected.txt |
deleted file mode 100644 |
index 8247e2bc8049058bbc3712cc3b37a39ef090368b..0000000000000000000000000000000000000000 |
--- a/LayoutTests/crypto/subtle/rsa-oaep-key-manipulation-expected.txt |
+++ /dev/null |
@@ -1,50 +0,0 @@ |
-Test generating, importing and exporting RSA keys for RSA-OAEP. Test that they can't be used with another algorithm. |
- |
-On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE". |
- |
- |
-Generating a key pair... |
-PASS keyPair.toString() is '[object Object]' |
-PASS keyPair.publicKey.type is 'public' |
-PASS keyPair.publicKey.algorithm.name is 'RSA-OAEP' |
-PASS keyPair.publicKey.algorithm.modulusLength is 512 |
-PASS keyPair.publicKey.usages is ["encrypt", "wrapKey"] |
-PASS bytesToHexString(keyPair.publicKey.algorithm.publicExponent) is '010001' |
-PASS keyPair.publicKey.algorithm.hash.name is 'SHA-1' |
-PASS keyPair.privateKey.type is 'private' |
-PASS keyPair.privateKey.algorithm.name is 'RSA-OAEP' |
-PASS keyPair.privateKey.algorithm.modulusLength is 512 |
-PASS keyPair.privateKey.usages is ["decrypt", "unwrapKey"] |
-PASS bytesToHexString(keyPair.privateKey.algorithm.publicExponent) is '010001' |
-PASS keyPair.privateKey.algorithm.hash.name is 'SHA-1' |
- |
-Testing that the keys can't be used with different algorithms... |
-error is: InvalidAccessError: key.usages does not permit this operation |
-error is: InvalidAccessError: key.algorithm does not match that of operation |
- |
-Trying to export keys to raw... |
-error is: NotSupportedError: Unsupported export key format for algorithm |
-PASS Promise rejected for exporting public key |
-error is: NotSupportedError: Unsupported export key format for algorithm |
-PASS Promise rejected for exporting private key |
- |
-Exporting public key to JWK... |
-PASS jwkPublicKey.alg is 'RSA-OAEP' |
-PASS jwkPublicKey.ext is true |
-PASS jwkPublicKey.key_ops is ['encrypt', 'wrapKey'] |
-PASS jwkPublicKey.use is undefined |
-PASS jwkPublicKey.kty is 'RSA' |
-PASS bytesToHexString(Base64URL.parse(jwkPublicKey.e)) is '010001' |
- |
-Importing it back... |
-PASS exportedPublicKey.type is 'public' |
-PASS exportedPublicKey.algorithm.name is 'RSA-OAEP' |
-PASS exportedPublicKey.algorithm.modulusLength is 512 |
-PASS bytesToHexString(exportedPublicKey.algorithm.publicExponent) is '010001' |
-PASS exportedPublicKey.algorithm.hash.name is 'SHA-1' |
-PASS exportedPublicKey.extractable is true |
-PASS exportedPublicKey.usages is ['encrypt','wrapKey'] |
-PASS successfullyParsed is true |
- |
-TEST COMPLETE |
- |