| Index: LayoutTests/crypto/subtle/aes-ctr/cloneKey-expected.txt
|
| diff --git a/LayoutTests/crypto/subtle/aes-ctr/cloneKey-expected.txt b/LayoutTests/crypto/subtle/aes-ctr/cloneKey-expected.txt
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..3dfb9e9f348c70c142f2ea231af231b8260b6ecd
|
| --- /dev/null
|
| +++ b/LayoutTests/crypto/subtle/aes-ctr/cloneKey-expected.txt
|
| @@ -0,0 +1,79 @@
|
| +Tests structured cloning of AES-CTR keys
|
| +
|
| +On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
|
| +
|
| +
|
| +PASS importedKey.extraProperty is "hi"
|
| +PASS importedKey.type is "secret"
|
| +PASS typeof importedKey.extractable is 'boolean'
|
| +PASS importedKey.extractable is true
|
| +PASS importedKey.algorithm.name is "AES-CTR"
|
| +PASS importedKey.algorithm.length is 128
|
| +PASS importedKey.usages.join(',') is "wrapKey,unwrapKey"
|
| +PASS importedKey is not clonedKey
|
| +PASS clonedKey.extraProperty is undefined.
|
| +PASS clonedKey.type is "secret"
|
| +PASS typeof clonedKey.extractable is 'boolean'
|
| +PASS clonedKey.extractable is true
|
| +PASS clonedKey.algorithm.name is "AES-CTR"
|
| +PASS clonedKey.algorithm.length is 128
|
| +PASS clonedKey.usages.join(',') is "wrapKey,unwrapKey"
|
| +Serialized key bytes: 3f004b010b10c1011030112233445566778899aabbccddeeff00
|
| +PASS: Cloned key exported data should be [30112233445566778899aabbccddeeff] and was
|
| +
|
| +PASS importedKey.extraProperty is "hi"
|
| +PASS importedKey.type is "secret"
|
| +PASS typeof importedKey.extractable is 'boolean'
|
| +PASS importedKey.extractable is true
|
| +PASS importedKey.algorithm.name is "AES-CTR"
|
| +PASS importedKey.algorithm.length is 256
|
| +PASS importedKey.usages.join(',') is "wrapKey,unwrapKey"
|
| +PASS importedKey is not clonedKey
|
| +PASS clonedKey.extraProperty is undefined.
|
| +PASS clonedKey.type is "secret"
|
| +PASS typeof clonedKey.extractable is 'boolean'
|
| +PASS clonedKey.extractable is true
|
| +PASS clonedKey.algorithm.name is "AES-CTR"
|
| +PASS clonedKey.algorithm.length is 256
|
| +PASS clonedKey.usages.join(',') is "wrapKey,unwrapKey"
|
| +Serialized key bytes: 3f004b010b20c1012000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f00
|
| +PASS: Cloned key exported data should be [00112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f] and was
|
| +
|
| +PASS importedKey.extraProperty is "hi"
|
| +PASS importedKey.type is "secret"
|
| +PASS typeof importedKey.extractable is 'boolean'
|
| +PASS importedKey.extractable is false
|
| +PASS importedKey.algorithm.name is "AES-CTR"
|
| +PASS importedKey.algorithm.length is 128
|
| +PASS importedKey.usages.join(',') is "wrapKey,unwrapKey"
|
| +PASS importedKey is not clonedKey
|
| +PASS clonedKey.extraProperty is undefined.
|
| +PASS clonedKey.type is "secret"
|
| +PASS typeof clonedKey.extractable is 'boolean'
|
| +PASS clonedKey.extractable is false
|
| +PASS clonedKey.algorithm.name is "AES-CTR"
|
| +PASS clonedKey.algorithm.length is 128
|
| +PASS clonedKey.usages.join(',') is "wrapKey,unwrapKey"
|
| +Serialized key bytes: 3f004b010b10c0011030112233445566778899aabbccddeeff00
|
| +
|
| +PASS importedKey.extraProperty is "hi"
|
| +PASS importedKey.type is "secret"
|
| +PASS typeof importedKey.extractable is 'boolean'
|
| +PASS importedKey.extractable is false
|
| +PASS importedKey.algorithm.name is "AES-CTR"
|
| +PASS importedKey.algorithm.length is 256
|
| +PASS importedKey.usages.join(',') is "wrapKey,unwrapKey"
|
| +PASS importedKey is not clonedKey
|
| +PASS clonedKey.extraProperty is undefined.
|
| +PASS clonedKey.type is "secret"
|
| +PASS typeof clonedKey.extractable is 'boolean'
|
| +PASS clonedKey.extractable is false
|
| +PASS clonedKey.algorithm.name is "AES-CTR"
|
| +PASS clonedKey.algorithm.length is 256
|
| +PASS clonedKey.usages.join(',') is "wrapKey,unwrapKey"
|
| +Serialized key bytes: 3f004b010b20c0012000112233445546778899aabbccddeeff000102030405060708090a0b0c0d0e0f00
|
| +
|
| +PASS successfullyParsed is true
|
| +
|
| +TEST COMPLETE
|
| +
|
|
|