Changeset 160491 in webkit
- Timestamp:
- Dec 12, 2013, 10:21:30 AM (12 years ago)
- Location:
- trunk
- Files:
-
- 65 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/LayoutTests/ChangeLog
r160489 r160491 1 2013-12-12 Alexey Proskuryakov <ap@apple.com> 2 3 Make algorithm.name return registered name, not normalized one 4 https://bugs.webkit.org/show_bug.cgi?id=125641 5 6 Reviewed by Anders Carlsson. 7 8 * crypto/subtle/aes-cbc-192-encrypt-decrypt-expected.txt: 9 * crypto/subtle/aes-cbc-192-encrypt-decrypt.html: 10 * crypto/subtle/aes-cbc-256-encrypt-decrypt-expected.txt: 11 * crypto/subtle/aes-cbc-256-encrypt-decrypt.html: 12 * crypto/subtle/aes-cbc-encrypt-decrypt-expected.txt: 13 * crypto/subtle/aes-cbc-encrypt-decrypt-with-padding-expected.txt: 14 * crypto/subtle/aes-cbc-encrypt-decrypt-with-padding.html: 15 * crypto/subtle/aes-cbc-encrypt-decrypt.html: 16 * crypto/subtle/aes-cbc-generate-key-expected.txt: 17 * crypto/subtle/aes-cbc-generate-key.html: 18 * crypto/subtle/aes-cbc-import-jwk-expected.txt: 19 * crypto/subtle/aes-cbc-import-jwk.html: 20 * crypto/subtle/aes-cbc-invalid-length-expected.txt: 21 * crypto/subtle/aes-cbc-invalid-length.html: 22 * crypto/subtle/aes-cbc-unwrap-failure-expected.txt: 23 * crypto/subtle/aes-cbc-unwrap-failure.html: 24 * crypto/subtle/aes-cbc-unwrap-rsa-expected.txt: 25 * crypto/subtle/aes-cbc-unwrap-rsa.html: 26 * crypto/subtle/aes-cbc-wrap-rsa-expected.txt: 27 * crypto/subtle/aes-cbc-wrap-rsa-non-extractable-expected.txt: 28 * crypto/subtle/aes-cbc-wrap-rsa-non-extractable.html: 29 * crypto/subtle/aes-cbc-wrap-rsa.html: 30 * crypto/subtle/aes-kw-key-manipulation-expected.txt: 31 * crypto/subtle/aes-kw-key-manipulation.html: 32 * crypto/subtle/aes-kw-wrap-unwrap-aes-expected.txt: 33 * crypto/subtle/aes-kw-wrap-unwrap-aes.html: 34 * crypto/subtle/aes-postMessage-expected.txt: 35 * crypto/subtle/aes-postMessage.html: 36 * crypto/subtle/hmac-generate-key-expected.txt: 37 * crypto/subtle/hmac-generate-key.html: 38 * crypto/subtle/hmac-import-jwk-expected.txt: 39 * crypto/subtle/hmac-import-jwk.html: 40 * crypto/subtle/hmac-postMessage-expected.txt: 41 * crypto/subtle/hmac-postMessage.html: 42 * crypto/subtle/hmac-sign-verify-empty-key-expected.txt: 43 * crypto/subtle/hmac-sign-verify-empty-key.html: 44 * crypto/subtle/hmac-sign-verify-expected.txt: 45 * crypto/subtle/hmac-sign-verify.html: 46 * crypto/subtle/postMessage-worker-expected.txt: 47 * crypto/subtle/postMessage-worker.html: 48 * crypto/subtle/resources/postMessage-worker.js: 49 * crypto/subtle/rsa-oaep-key-manipulation-expected.txt: 50 * crypto/subtle/rsa-oaep-key-manipulation.html: 51 * crypto/subtle/rsa-oaep-wrap-unwrap-aes-expected.txt: 52 * crypto/subtle/rsa-oaep-wrap-unwrap-aes.html: 53 * crypto/subtle/rsa-postMessage-expected.txt: 54 * crypto/subtle/rsa-postMessage.html: 55 * crypto/subtle/rsassa-pkcs1-v1_5-generate-key-expected.txt: 56 * crypto/subtle/rsassa-pkcs1-v1_5-generate-key.html: 57 * crypto/subtle/rsassa-pkcs1-v1_5-import-jwk-expected.txt: 58 * crypto/subtle/rsassa-pkcs1-v1_5-import-jwk.html: 59 1 60 2013-12-12 Michał Pakuła vel Rutka <m.pakula@samsung.com> 2 61 -
trunk/LayoutTests/crypto/subtle/aes-cbc-192-encrypt-decrypt-expected.txt
r159327 r160491 7 7 PASS key.type is 'secret' 8 8 PASS key.extractable is true 9 PASS key.algorithm.name is ' aes-cbc'9 PASS key.algorithm.name is 'AES-CBC' 10 10 PASS key.algorithm.length is 192 11 11 PASS key.usages is ['encrypt', 'decrypt'] -
trunk/LayoutTests/crypto/subtle/aes-cbc-192-encrypt-decrypt.html
r159379 r160491 24 24 shouldBe("key.type", "'secret'"); 25 25 shouldBe("key.extractable", "true"); 26 shouldBe("key.algorithm.name", "' aes-cbc'");26 shouldBe("key.algorithm.name", "'AES-CBC'"); 27 27 shouldBe("key.algorithm.length", "192"); 28 28 shouldBe("key.usages", "['encrypt', 'decrypt']"); -
trunk/LayoutTests/crypto/subtle/aes-cbc-256-encrypt-decrypt-expected.txt
r159327 r160491 7 7 PASS key.type is 'secret' 8 8 PASS key.extractable is true 9 PASS key.algorithm.name is ' aes-cbc'9 PASS key.algorithm.name is 'AES-CBC' 10 10 PASS key.algorithm.length is 256 11 11 PASS key.usages is ['encrypt', 'decrypt'] -
trunk/LayoutTests/crypto/subtle/aes-cbc-256-encrypt-decrypt.html
r159379 r160491 24 24 shouldBe("key.type", "'secret'"); 25 25 shouldBe("key.extractable", "true"); 26 shouldBe("key.algorithm.name", "' aes-cbc'");26 shouldBe("key.algorithm.name", "'AES-CBC'"); 27 27 shouldBe("key.algorithm.length", "256"); 28 28 shouldBe("key.usages", "['encrypt', 'decrypt']"); -
trunk/LayoutTests/crypto/subtle/aes-cbc-encrypt-decrypt-expected.txt
r159379 r160491 7 7 PASS key.type is 'secret' 8 8 PASS key.extractable is true 9 PASS key.algorithm.name is ' aes-cbc'9 PASS key.algorithm.name is 'AES-CBC' 10 10 PASS key.algorithm.length is 128 11 11 PASS key.usages is ['encrypt', 'decrypt'] -
trunk/LayoutTests/crypto/subtle/aes-cbc-encrypt-decrypt-with-padding-expected.txt
r159327 r160491 7 7 PASS key.type is 'secret' 8 8 PASS key.extractable is true 9 PASS key.algorithm.name is ' aes-cbc'9 PASS key.algorithm.name is 'AES-CBC' 10 10 PASS key.algorithm.length is 128 11 11 PASS key.usages is ['encrypt', 'decrypt'] -
trunk/LayoutTests/crypto/subtle/aes-cbc-encrypt-decrypt-with-padding.html
r159379 r160491 24 24 shouldBe("key.type", "'secret'"); 25 25 shouldBe("key.extractable", "true"); 26 shouldBe("key.algorithm.name", "' aes-cbc'");26 shouldBe("key.algorithm.name", "'AES-CBC'"); 27 27 shouldBe("key.algorithm.length", "128"); 28 28 shouldBe("key.usages", "['encrypt', 'decrypt']"); -
trunk/LayoutTests/crypto/subtle/aes-cbc-encrypt-decrypt.html
r159379 r160491 24 24 shouldBe("key.type", "'secret'"); 25 25 shouldBe("key.extractable", "true"); 26 shouldBe("key.algorithm.name", "' aes-cbc'");26 shouldBe("key.algorithm.name", "'AES-CBC'"); 27 27 shouldBe("key.algorithm.length", "128"); 28 28 shouldBe("key.usages", "['encrypt', 'decrypt']"); -
trunk/LayoutTests/crypto/subtle/aes-cbc-generate-key-expected.txt
r158582 r160491 11 11 PASS key.type is 'secret' 12 12 PASS key.extractable is true 13 PASS key.algorithm.name is ' aes-cbc'13 PASS key.algorithm.name is 'AES-CBC' 14 14 PASS key.algorithm.length is 128 15 15 PASS key.usages is ['encrypt', 'decrypt'] -
trunk/LayoutTests/crypto/subtle/aes-cbc-generate-key.html
r159327 r160491 27 27 shouldBe("key.type", "'secret'"); 28 28 shouldBe("key.extractable", "true"); 29 shouldBe("key.algorithm.name", "' aes-cbc'");29 shouldBe("key.algorithm.name", "'AES-CBC'"); 30 30 shouldBe("key.algorithm.length", "128"); 31 31 shouldBe("key.usages", "['encrypt', 'decrypt']"); -
trunk/LayoutTests/crypto/subtle/aes-cbc-import-jwk-expected.txt
r159327 r160491 8 8 PASS key.type is 'secret' 9 9 PASS key.extractable is false 10 PASS key.algorithm.name is ' aes-cbc'10 PASS key.algorithm.name is 'AES-CBC' 11 11 PASS key.algorithm.length is 192 12 12 PASS key.usages is ["encrypt"] -
trunk/LayoutTests/crypto/subtle/aes-cbc-import-jwk.html
r160061 r160491 35 35 shouldBe("key.type", "'secret'"); 36 36 shouldBe("key.extractable", "false"); 37 shouldBe("key.algorithm.name", "' aes-cbc'");37 shouldBe("key.algorithm.name", "'AES-CBC'"); 38 38 shouldBe("key.algorithm.length", "192"); 39 39 shouldBe("key.usages", '["encrypt"]'); -
trunk/LayoutTests/crypto/subtle/aes-cbc-invalid-length-expected.txt
r159327 r160491 7 7 PASS key.type is 'secret' 8 8 PASS key.extractable is true 9 PASS key.algorithm.name is ' aes-cbc'9 PASS key.algorithm.name is 'AES-CBC' 10 10 PASS key.algorithm.length is 176 11 11 PASS key.usages is ['encrypt', 'decrypt'] -
trunk/LayoutTests/crypto/subtle/aes-cbc-invalid-length.html
r159327 r160491 24 24 shouldBe("key.type", "'secret'"); 25 25 shouldBe("key.extractable", "true"); 26 shouldBe("key.algorithm.name", "' aes-cbc'");26 shouldBe("key.algorithm.name", "'AES-CBC'"); 27 27 shouldBe("key.algorithm.length", "176"); 28 28 shouldBe("key.usages", "['encrypt', 'decrypt']"); -
trunk/LayoutTests/crypto/subtle/aes-cbc-unwrap-failure-expected.txt
r159637 r160491 5 5 6 6 Importing an unwrapping key... 7 PASS unwrappingKey.algorithm.name is ' aes-cbc'7 PASS unwrappingKey.algorithm.name is 'AES-CBC' 8 8 Unwrapping a key... 9 9 PASS Promise rejected -
trunk/LayoutTests/crypto/subtle/aes-cbc-unwrap-failure.html
r159637 r160491 23 23 crypto.subtle.importKey("raw", unwrappingKeyOctets, "AES-CBC", nonExtractable, ["unwrapKey"]).then(function(result) { 24 24 unwrappingKey = result; 25 shouldBe("unwrappingKey.algorithm.name", "' aes-cbc'");25 shouldBe("unwrappingKey.algorithm.name", "'AES-CBC'"); 26 26 var unwrapAlgorithm = {name: "AES-CBC", iv: hexStringToUint8Array("000102030405060708090a0b0c0d0e0f")}; 27 27 debug("Unwrapping a key..."); -
trunk/LayoutTests/crypto/subtle/aes-cbc-unwrap-rsa-expected.txt
r159637 r160491 5 5 6 6 Importing an unwrapping key... 7 PASS unwrappingKey.algorithm.name is ' aes-cbc'7 PASS unwrappingKey.algorithm.name is 'AES-CBC' 8 8 Unwrapping a key... 9 9 PASS unwrappedKey.toString() is '[object Key]' 10 10 PASS unwrappedKey.type is 'public' 11 11 PASS unwrappedKey.usages is ['sign','verify'] 12 PASS unwrappedKey.algorithm.name is ' rsassa-pkcs1-v1_5'12 PASS unwrappedKey.algorithm.name is 'RSASSA-PKCS1-v1_5' 13 13 PASS unwrappedKey.algorithm.modulusLength is 2048 14 14 PASS Base64URL.stringify(unwrappedKey.algorithm.publicExponent) is publicKeyJSON.e 15 PASS unwrappedKey.algorithm.hash.name is ' sha-256'15 PASS unwrappedKey.algorithm.hash.name is 'SHA-256' 16 16 PASS unwrappedKey.extractable is false 17 17 PASS successfullyParsed is true -
trunk/LayoutTests/crypto/subtle/aes-cbc-unwrap-rsa.html
r160061 r160491 32 32 crypto.subtle.importKey("raw", unwrappingKeyOctets, "AES-CBC", nonExtractable, ["unwrapKey"]).then(function(result) { 33 33 unwrappingKey = result; 34 shouldBe("unwrappingKey.algorithm.name", "' aes-cbc'");34 shouldBe("unwrappingKey.algorithm.name", "'AES-CBC'"); 35 35 var unwrapAlgorithm = {name: "AES-CBC", iv: hexStringToUint8Array("000102030405060708090a0b0c0d0e0f")}; 36 36 debug("Unwrapping a key..."); … … 42 42 shouldBe("unwrappedKey.type", "'public'"); 43 43 shouldBe("unwrappedKey.usages", "['sign','verify']"); 44 shouldBe("unwrappedKey.algorithm.name", "' rsassa-pkcs1-v1_5'");44 shouldBe("unwrappedKey.algorithm.name", "'RSASSA-PKCS1-v1_5'"); 45 45 shouldBe("unwrappedKey.algorithm.modulusLength", "2048"); 46 46 shouldBe("Base64URL.stringify(unwrappedKey.algorithm.publicExponent)", "publicKeyJSON.e"); 47 shouldBe("unwrappedKey.algorithm.hash.name", "' sha-256'");47 shouldBe("unwrappedKey.algorithm.hash.name", "'SHA-256'"); 48 48 shouldBe("unwrappedKey.extractable", "false"); 49 49 finishJSTest(); -
trunk/LayoutTests/crypto/subtle/aes-cbc-wrap-rsa-expected.txt
r159644 r160491 5 5 6 6 Importing a key to wrap... 7 PASS key.algorithm.name is ' rsassa-pkcs1-v1_5'7 PASS key.algorithm.name is 'RSASSA-PKCS1-v1_5' 8 8 Importing a key encryption key... 9 PASS wrappingKey.algorithm.name is ' aes-cbc'9 PASS wrappingKey.algorithm.name is 'AES-CBC' 10 10 PASS wrappedKey.toString() is '[object ArrayBuffer]' 11 11 PASS successfullyParsed is true -
trunk/LayoutTests/crypto/subtle/aes-cbc-wrap-rsa-non-extractable-expected.txt
r159644 r160491 5 5 6 6 Importing a key to wrap... 7 PASS key.algorithm.name is ' rsassa-pkcs1-v1_5'7 PASS key.algorithm.name is 'RSASSA-PKCS1-v1_5' 8 8 Importing a key encryption key... 9 PASS wrappingKey.algorithm.name is ' aes-cbc'9 PASS wrappingKey.algorithm.name is 'AES-CBC' 10 10 wrapping the key... 11 11 PASS Rejected -
trunk/LayoutTests/crypto/subtle/aes-cbc-wrap-rsa-non-extractable.html
r160061 r160491 32 32 crypto.subtle.importKey("jwk", jwkKeyAsArrayBuffer, null, extractable, ["sign", "verify"]).then(function(result) { 33 33 key = result; 34 shouldBe("key.algorithm.name", "' rsassa-pkcs1-v1_5'");34 shouldBe("key.algorithm.name", "'RSASSA-PKCS1-v1_5'"); 35 35 debug("Importing a key encryption key..."); 36 36 return crypto.subtle.importKey("raw", wrappingKeyOctets, "AES-CBC", nonExtractable, ["wrapKey"]); 37 37 }).then(function(result) { 38 38 wrappingKey = result; 39 shouldBe("wrappingKey.algorithm.name", "' aes-cbc'");39 shouldBe("wrappingKey.algorithm.name", "'AES-CBC'"); 40 40 var wrapAlgorithm = {name: "AES-CBC", iv: hexStringToUint8Array("000102030405060708090a0b0c0d0e0f")}; 41 41 debug("wrapping the key..."); -
trunk/LayoutTests/crypto/subtle/aes-cbc-wrap-rsa.html
r160061 r160491 32 32 crypto.subtle.importKey("jwk", jwkKeyAsArrayBuffer, null, extractable, ["sign", "verify"]).then(function(result) { 33 33 key = result; 34 shouldBe("key.algorithm.name", "' rsassa-pkcs1-v1_5'");34 shouldBe("key.algorithm.name", "'RSASSA-PKCS1-v1_5'"); 35 35 debug("Importing a key encryption key..."); 36 36 return crypto.subtle.importKey("raw", wrappingKeyOctets, "AES-CBC", nonExtractable, ["wrapKey"]); 37 37 }).then(function(result) { 38 38 wrappingKey = result; 39 shouldBe("wrappingKey.algorithm.name", "' aes-cbc'");39 shouldBe("wrappingKey.algorithm.name", "'AES-CBC'"); 40 40 var wrapAlgorithm = {name: "AES-CBC", iv: hexStringToUint8Array("000102030405060708090a0b0c0d0e0f")}; 41 41 return crypto.subtle.wrapKey("jwk", key, wrappingKey, wrapAlgorithm); -
trunk/LayoutTests/crypto/subtle/aes-kw-key-manipulation-expected.txt
r159966 r160491 7 7 PASS key.toString() is '[object Key]' 8 8 PASS key.type is 'secret' 9 PASS key.algorithm.name is ' aes-kw'9 PASS key.algorithm.name is 'AES-KW' 10 10 PASS key.algorithm.length is 256 11 11 … … 18 18 PASS importedKey.toString() is '[object Key]' 19 19 PASS importedKey.type is 'secret' 20 PASS importedKey.algorithm.name is ' aes-kw'20 PASS importedKey.algorithm.name is 'AES-KW' 21 21 PASS importedKey.algorithm.length is 256 22 22 PASS successfullyParsed is true -
trunk/LayoutTests/crypto/subtle/aes-kw-key-manipulation.html
r159966 r160491 21 21 shouldBe("key.toString()", "'[object Key]'"); 22 22 shouldBe("key.type", "'secret'"); 23 shouldBe("key.algorithm.name", "' aes-kw'");23 shouldBe("key.algorithm.name", "'AES-KW'"); 24 24 shouldBe("key.algorithm.length", "256"); 25 25 … … 40 40 shouldBe("importedKey.toString()", "'[object Key]'"); 41 41 shouldBe("importedKey.type", "'secret'"); 42 shouldBe("importedKey.algorithm.name", "' aes-kw'");42 shouldBe("importedKey.algorithm.name", "'AES-KW'"); 43 43 shouldBe("importedKey.algorithm.length", "256"); 44 44 -
trunk/LayoutTests/crypto/subtle/aes-kw-wrap-unwrap-aes-expected.txt
r159966 r160491 12 12 PASS unwrappedKey.type is 'secret' 13 13 PASS unwrappedKey.extractable is true 14 PASS unwrappedKey.algorithm.name is ' aes-cbc'14 PASS unwrappedKey.algorithm.name is 'AES-CBC' 15 15 PASS unwrappedKey.algorithm.length is 128 16 16 PASS unwrappedKey.usages is ['encrypt', 'decrypt', 'wrapKey', 'unwrapKey'] … … 23 23 PASS unwrappedKey.type is 'secret' 24 24 PASS unwrappedKey.extractable is true 25 PASS unwrappedKey.algorithm.name is ' aes-cbc'25 PASS unwrappedKey.algorithm.name is 'AES-CBC' 26 26 PASS unwrappedKey.algorithm.length is 128 27 27 PASS unwrappedKey.usages is ['encrypt', 'decrypt', 'wrapKey', 'unwrapKey'] -
trunk/LayoutTests/crypto/subtle/aes-kw-wrap-unwrap-aes.html
r159966 r160491 40 40 shouldBe("unwrappedKey.type", "'secret'"); 41 41 shouldBe("unwrappedKey.extractable", "true"); 42 shouldBe("unwrappedKey.algorithm.name", "' aes-cbc'");42 shouldBe("unwrappedKey.algorithm.name", "'AES-CBC'"); 43 43 shouldBe("unwrappedKey.algorithm.length", "128"); 44 44 shouldBe("unwrappedKey.usages", "['encrypt', 'decrypt', 'wrapKey', 'unwrapKey']"); … … 62 62 shouldBe("unwrappedKey.type", "'secret'"); 63 63 shouldBe("unwrappedKey.extractable", "true"); 64 shouldBe("unwrappedKey.algorithm.name", "' aes-cbc'");64 shouldBe("unwrappedKey.algorithm.name", "'AES-CBC'"); 65 65 shouldBe("unwrappedKey.algorithm.length", "128"); 66 66 shouldBe("unwrappedKey.usages", "['encrypt', 'decrypt', 'wrapKey', 'unwrapKey']"); -
trunk/LayoutTests/crypto/subtle/aes-postMessage-expected.txt
r160455 r160491 6 6 PASS key.type is 'secret' 7 7 PASS key.extractable is true 8 PASS key.algorithm.name is ' aes-cbc'8 PASS key.algorithm.name is 'AES-CBC' 9 9 PASS key.algorithm.length is 128 10 10 PASS key.usages is ["encrypt", "decrypt", "sign", "verify"] -
trunk/LayoutTests/crypto/subtle/aes-postMessage.html
r160455 r160491 17 17 shouldBe("key.type", "'secret'"); 18 18 shouldBe("key.extractable", "true"); 19 shouldBe("key.algorithm.name", "' aes-cbc'");19 shouldBe("key.algorithm.name", "'AES-CBC'"); 20 20 shouldBe("key.algorithm.length", "128"); 21 21 shouldBe("key.usages", '["encrypt", "decrypt", "sign", "verify"]'); -
trunk/LayoutTests/crypto/subtle/hmac-generate-key-expected.txt
r158582 r160491 12 12 PASS key.type is 'secret' 13 13 PASS key.extractable is true 14 PASS key.algorithm.name is ' hmac'14 PASS key.algorithm.name is 'HMAC' 15 15 PASS key.algorithm.length is 64 16 16 PASS key.usages is ["sign", "verify"] … … 19 19 PASS key.type is 'secret' 20 20 PASS key.extractable is true 21 PASS key.algorithm.name is ' hmac'21 PASS key.algorithm.name is 'HMAC' 22 22 PASS key.algorithm.length is 5 23 23 PASS key.usages is ["sign"] -
trunk/LayoutTests/crypto/subtle/hmac-generate-key.html
r159327 r160491 27 27 shouldBe("key.type", "'secret'"); 28 28 shouldBe("key.extractable", "true"); 29 shouldBe("key.algorithm.name", "' hmac'");29 shouldBe("key.algorithm.name", "'HMAC'"); 30 30 shouldBe("key.algorithm.length", "64"); 31 31 shouldBe("key.usages", '["sign", "verify"]'); … … 38 38 shouldBe("key.type", "'secret'"); 39 39 shouldBe("key.extractable", "true"); 40 shouldBe("key.algorithm.name", "' hmac'");40 shouldBe("key.algorithm.name", "'HMAC'"); 41 41 shouldBe("key.algorithm.length", "5"); 42 42 shouldBe("key.usages", '["sign"]'); -
trunk/LayoutTests/crypto/subtle/hmac-import-jwk-expected.txt
r159327 r160491 8 8 PASS key.type is 'secret' 9 9 PASS key.extractable is false 10 PASS key.algorithm.name is ' hmac'10 PASS key.algorithm.name is 'HMAC' 11 11 PASS key.algorithm.length is 32 12 12 PASS key.usages is ["sign", "verify"] -
trunk/LayoutTests/crypto/subtle/hmac-import-jwk.html
r160061 r160491 32 32 shouldBe("key.type", "'secret'"); 33 33 shouldBe("key.extractable", "false"); 34 shouldBe("key.algorithm.name", "' hmac'");34 shouldBe("key.algorithm.name", "'HMAC'"); 35 35 shouldBe("key.algorithm.length", "32"); 36 36 shouldBe("key.usages", '["sign", "verify"]'); -
trunk/LayoutTests/crypto/subtle/hmac-postMessage-expected.txt
r160455 r160491 6 6 PASS key.type is 'secret' 7 7 PASS key.extractable is true 8 PASS key.algorithm.name is ' hmac'8 PASS key.algorithm.name is 'HMAC' 9 9 PASS key.algorithm.length is 16 10 10 PASS key.usages is ["encrypt", "decrypt", "sign", "verify"] -
trunk/LayoutTests/crypto/subtle/hmac-postMessage.html
r160455 r160491 17 17 shouldBe("key.type", "'secret'"); 18 18 shouldBe("key.extractable", "true"); 19 shouldBe("key.algorithm.name", "' hmac'");19 shouldBe("key.algorithm.name", "'HMAC'"); 20 20 shouldBe("key.algorithm.length", "16"); 21 21 shouldBe("key.usages", '["encrypt", "decrypt", "sign", "verify"]'); -
trunk/LayoutTests/crypto/subtle/hmac-sign-verify-empty-key-expected.txt
r159327 r160491 7 7 PASS key.type is 'secret' 8 8 PASS key.extractable is true 9 PASS key.algorithm.name is ' hmac'9 PASS key.algorithm.name is 'HMAC' 10 10 PASS key.algorithm.length is 0 11 PASS key.algorithm.hash.name is ' sha-1'11 PASS key.algorithm.hash.name is 'SHA-1' 12 12 PASS key.usages is ['sign', 'verify'] 13 13 Using the key to sign 'foo'... -
trunk/LayoutTests/crypto/subtle/hmac-sign-verify-empty-key.html
r159379 r160491 22 22 shouldBe("key.type", "'secret'"); 23 23 shouldBe("key.extractable", "true"); 24 shouldBe("key.algorithm.name", "' hmac'");24 shouldBe("key.algorithm.name", "'HMAC'"); 25 25 shouldBe("key.algorithm.length", "0"); // See <https://www.w3.org/Bugs/Public/show_bug.cgi?id=23098>. 26 shouldBe("key.algorithm.hash.name", "' sha-1'");26 shouldBe("key.algorithm.hash.name", "'SHA-1'"); 27 27 shouldBe("key.usages", "['sign', 'verify']"); 28 28 -
trunk/LayoutTests/crypto/subtle/hmac-sign-verify-expected.txt
r159327 r160491 7 7 PASS key.type is 'secret' 8 8 PASS key.extractable is true 9 PASS key.algorithm.name is ' hmac'9 PASS key.algorithm.name is 'HMAC' 10 10 PASS key.algorithm.length is 1 11 PASS key.algorithm.hash.name is ' sha-1'11 PASS key.algorithm.hash.name is 'SHA-1' 12 12 PASS key.usages is ['sign', 'verify'] 13 13 Using the key to sign 'foo'... -
trunk/LayoutTests/crypto/subtle/hmac-sign-verify.html
r159379 r160491 22 22 shouldBe("key.type", "'secret'"); 23 23 shouldBe("key.extractable", "true"); 24 shouldBe("key.algorithm.name", "' hmac'");24 shouldBe("key.algorithm.name", "'HMAC'"); 25 25 shouldBe("key.algorithm.length", "1"); // See <https://www.w3.org/Bugs/Public/show_bug.cgi?id=23098>. 26 shouldBe("key.algorithm.hash.name", "' sha-1'");26 shouldBe("key.algorithm.hash.name", "'SHA-1'"); 27 27 shouldBe("key.usages", "['sign', 'verify']"); 28 28 -
trunk/LayoutTests/crypto/subtle/postMessage-worker-expected.txt
r160455 r160491 7 7 PASS key.type is 'secret' 8 8 PASS key.extractable is true 9 PASS key.algorithm.name is ' hmac'9 PASS key.algorithm.name is 'HMAC' 10 10 PASS key.algorithm.length is 16 11 11 PASS key.usages is ["encrypt", "decrypt", "sign", "verify"] -
trunk/LayoutTests/crypto/subtle/postMessage-worker.html
r160455 r160491 23 23 shouldBe("key.type", "'secret'"); 24 24 shouldBe("key.extractable", "true"); 25 shouldBe("key.algorithm.name", "' hmac'");25 shouldBe("key.algorithm.name", "'HMAC'"); 26 26 shouldBe("key.algorithm.length", "16"); 27 27 shouldBe("key.usages", '["encrypt", "decrypt", "sign", "verify"]'); -
trunk/LayoutTests/crypto/subtle/resources/postMessage-worker.js
r160455 r160491 6 6 else if (!key.extractable) 7 7 postMessage({ result:false, message:'key.extractable should be true' }); 8 else if (key.algorithm.name != " hmac")9 postMessage({ result:false, message:'key.algorithm.name should be " hmac"' });8 else if (key.algorithm.name != "HMAC") 9 postMessage({ result:false, message:'key.algorithm.name should be "HMAC"' }); 10 10 else if (key.usages.toString() != "encrypt,decrypt,sign,verify") 11 11 postMessage({ result:false, message:'key.usages should be ["encrypt", "decrypt", "sign", "verify"]' }); -
trunk/LayoutTests/crypto/subtle/rsa-oaep-key-manipulation-expected.txt
r160061 r160491 7 7 PASS keyPair.toString() is '[object KeyPair]' 8 8 PASS keyPair.publicKey.type is 'public' 9 PASS keyPair.publicKey.algorithm.name is ' rsa-oaep'9 PASS keyPair.publicKey.algorithm.name is 'RSA-OAEP' 10 10 PASS keyPair.publicKey.algorithm.modulusLength is 2048 11 11 PASS bytesToHexString(keyPair.publicKey.algorithm.publicExponent) is '010001' 12 12 PASS keyPair.publicKey.algorithm.hash is undefined. 13 13 PASS keyPair.privateKey.type is 'private' 14 PASS keyPair.privateKey.algorithm.name is ' rsa-oaep'14 PASS keyPair.privateKey.algorithm.name is 'RSA-OAEP' 15 15 PASS keyPair.privateKey.algorithm.modulusLength is 2048 16 16 PASS bytesToHexString(keyPair.privateKey.algorithm.publicExponent) is '010001' … … 34 34 Importing it back... 35 35 PASS exportedPublicKey.type is 'public' 36 PASS exportedPublicKey.algorithm.name is ' rsa-oaep'36 PASS exportedPublicKey.algorithm.name is 'RSA-OAEP' 37 37 PASS exportedPublicKey.algorithm.modulusLength is 2048 38 38 PASS bytesToHexString(exportedPublicKey.algorithm.publicExponent) is '010001' 39 PASS exportedPublicKey.algorithm.hash.name is ' sha-1'39 PASS exportedPublicKey.algorithm.hash.name is 'SHA-1' 40 40 PASS exportedPublicKey.extractable is true 41 41 PASS exportedPublicKey.usages is ['encrypt','decrypt','wrapKey','unwrapKey'] -
trunk/LayoutTests/crypto/subtle/rsa-oaep-key-manipulation.html
r160061 r160491 27 27 shouldBe("keyPair.toString()", "'[object KeyPair]'"); 28 28 shouldBe("keyPair.publicKey.type", "'public'"); 29 shouldBe("keyPair.publicKey.algorithm.name", "' rsa-oaep'");29 shouldBe("keyPair.publicKey.algorithm.name", "'RSA-OAEP'"); 30 30 shouldBe("keyPair.publicKey.algorithm.modulusLength", "2048"); 31 31 shouldBe("bytesToHexString(keyPair.publicKey.algorithm.publicExponent)", "'010001'"); 32 32 shouldBeUndefined("keyPair.publicKey.algorithm.hash"); 33 33 shouldBe("keyPair.privateKey.type", "'private'"); 34 shouldBe("keyPair.privateKey.algorithm.name", "' rsa-oaep'");34 shouldBe("keyPair.privateKey.algorithm.name", "'RSA-OAEP'"); 35 35 shouldBe("keyPair.privateKey.algorithm.modulusLength", "2048"); 36 36 shouldBe("bytesToHexString(keyPair.privateKey.algorithm.publicExponent)", "'010001'"); … … 66 66 exportedPublicKey = result; 67 67 shouldBe("exportedPublicKey.type", "'public'"); 68 shouldBe("exportedPublicKey.algorithm.name", "' rsa-oaep'");68 shouldBe("exportedPublicKey.algorithm.name", "'RSA-OAEP'"); 69 69 shouldBe("exportedPublicKey.algorithm.modulusLength", "2048"); 70 70 shouldBe("bytesToHexString(exportedPublicKey.algorithm.publicExponent)", "'010001'"); 71 shouldBe("exportedPublicKey.algorithm.hash.name", "' sha-1'");71 shouldBe("exportedPublicKey.algorithm.hash.name", "'SHA-1'"); 72 72 shouldBe("exportedPublicKey.extractable", "true"); 73 73 shouldBe("exportedPublicKey.usages", "['encrypt','decrypt','wrapKey','unwrapKey']"); -
trunk/LayoutTests/crypto/subtle/rsa-oaep-wrap-unwrap-aes-expected.txt
r159944 r160491 12 12 PASS unwrappedKey.type is 'secret' 13 13 PASS unwrappedKey.extractable is true 14 PASS unwrappedKey.algorithm.name is ' aes-cbc'14 PASS unwrappedKey.algorithm.name is 'AES-CBC' 15 15 PASS unwrappedKey.algorithm.length is 256 16 16 PASS unwrappedKey.usages is ['encrypt', 'decrypt'] … … 24 24 PASS unwrappedKey.type is 'secret' 25 25 PASS unwrappedKey.extractable is true 26 PASS unwrappedKey.algorithm.name is ' aes-cbc'26 PASS unwrappedKey.algorithm.name is 'AES-CBC' 27 27 PASS unwrappedKey.algorithm.length is 256 28 28 PASS unwrappedKey.usages is ['encrypt', 'decrypt'] -
trunk/LayoutTests/crypto/subtle/rsa-oaep-wrap-unwrap-aes.html
r159944 r160491 63 63 shouldBe("unwrappedKey.type", "'secret'"); 64 64 shouldBe("unwrappedKey.extractable", "true"); 65 shouldBe("unwrappedKey.algorithm.name", "' aes-cbc'");65 shouldBe("unwrappedKey.algorithm.name", "'AES-CBC'"); 66 66 shouldBe("unwrappedKey.algorithm.length", "256"); 67 67 shouldBe("unwrappedKey.usages", "['encrypt', 'decrypt']"); … … 86 86 shouldBe("unwrappedKey.type", "'secret'"); 87 87 shouldBe("unwrappedKey.extractable", "true"); 88 shouldBe("unwrappedKey.algorithm.name", "' aes-cbc'");88 shouldBe("unwrappedKey.algorithm.name", "'AES-CBC'"); 89 89 shouldBe("unwrappedKey.algorithm.length", "256"); 90 90 shouldBe("unwrappedKey.usages", "['encrypt', 'decrypt']"); -
trunk/LayoutTests/crypto/subtle/rsa-postMessage-expected.txt
r160455 r160491 7 7 PASS key.type is 'private' 8 8 PASS key.extractable is true 9 PASS key.algorithm.name is ' rsassa-pkcs1-v1_5'9 PASS key.algorithm.name is 'RSASSA-PKCS1-v1_5' 10 10 PASS key.algorithm.modulusLength is 2048 11 11 PASS bytesToHexString(key.algorithm.publicExponent) is '010001' -
trunk/LayoutTests/crypto/subtle/rsa-postMessage.html
r160455 r160491 31 31 shouldBe("key.type", "'private'"); 32 32 shouldBe("key.extractable", "true"); 33 shouldBe("key.algorithm.name", "' rsassa-pkcs1-v1_5'");33 shouldBe("key.algorithm.name", "'RSASSA-PKCS1-v1_5'"); 34 34 shouldBe("key.algorithm.modulusLength", "2048"); 35 35 shouldBe("bytesToHexString(key.algorithm.publicExponent)", "'010001'"); -
trunk/LayoutTests/crypto/subtle/rsassa-pkcs1-v1_5-generate-key-expected.txt
r159327 r160491 7 7 PASS keyPair.toString() is '[object KeyPair]' 8 8 PASS keyPair.publicKey.type is 'public' 9 PASS keyPair.publicKey.algorithm.name is ' rsassa-pkcs1-v1_5'9 PASS keyPair.publicKey.algorithm.name is 'RSASSA-PKCS1-v1_5' 10 10 PASS keyPair.publicKey.algorithm.modulusLength is 2048 11 11 PASS bytesToHexString(keyPair.publicKey.algorithm.publicExponent) is '010001' 12 12 PASS keyPair.publicKey.algorithm.hash is undefined. 13 13 PASS keyPair.privateKey.type is 'private' 14 PASS keyPair.privateKey.algorithm.name is ' rsassa-pkcs1-v1_5'14 PASS keyPair.privateKey.algorithm.name is 'RSASSA-PKCS1-v1_5' 15 15 PASS keyPair.privateKey.algorithm.modulusLength is 2048 16 16 PASS bytesToHexString(keyPair.privateKey.algorithm.publicExponent) is '010001' -
trunk/LayoutTests/crypto/subtle/rsassa-pkcs1-v1_5-generate-key.html
r159327 r160491 27 27 shouldBe("keyPair.toString()", "'[object KeyPair]'"); 28 28 shouldBe("keyPair.publicKey.type", "'public'"); 29 shouldBe("keyPair.publicKey.algorithm.name", "' rsassa-pkcs1-v1_5'");29 shouldBe("keyPair.publicKey.algorithm.name", "'RSASSA-PKCS1-v1_5'"); 30 30 shouldBe("keyPair.publicKey.algorithm.modulusLength", "2048"); 31 31 shouldBe("bytesToHexString(keyPair.publicKey.algorithm.publicExponent)", "'010001'"); 32 32 shouldBeUndefined("keyPair.publicKey.algorithm.hash"); 33 33 shouldBe("keyPair.privateKey.type", "'private'"); 34 shouldBe("keyPair.privateKey.algorithm.name", "' rsassa-pkcs1-v1_5'");34 shouldBe("keyPair.privateKey.algorithm.name", "'RSASSA-PKCS1-v1_5'"); 35 35 shouldBe("keyPair.privateKey.algorithm.modulusLength", "2048"); 36 36 shouldBe("bytesToHexString(keyPair.privateKey.algorithm.publicExponent)", "'010001'"); -
trunk/LayoutTests/crypto/subtle/rsassa-pkcs1-v1_5-import-jwk-expected.txt
r159327 r160491 8 8 PASS publicKey.type is 'public' 9 9 PASS publicKey.usages is ['sign','verify'] 10 PASS publicKey.algorithm.name is ' rsassa-pkcs1-v1_5'10 PASS publicKey.algorithm.name is 'RSASSA-PKCS1-v1_5' 11 11 PASS publicKey.algorithm.modulusLength is 2048 12 12 PASS bytesToHexString(publicKey.algorithm.publicExponent) is '010001' 13 PASS publicKey.algorithm.hash.name is ' sha-256'13 PASS publicKey.algorithm.hash.name is 'SHA-256' 14 14 15 15 Importing a private key... … … 17 17 PASS privateKey.type is 'private' 18 18 PASS privateKey.usages is ['sign','verify'] 19 PASS privateKey.algorithm.name is ' rsassa-pkcs1-v1_5'19 PASS privateKey.algorithm.name is 'RSASSA-PKCS1-v1_5' 20 20 PASS privateKey.algorithm.modulusLength is 2048 21 21 PASS bytesToHexString(privateKey.algorithm.publicExponent) is '010001' 22 PASS privateKey.algorithm.hash.name is ' sha-256'22 PASS privateKey.algorithm.hash.name is 'SHA-256' 23 23 PASS successfullyParsed is true 24 24 -
trunk/LayoutTests/crypto/subtle/rsassa-pkcs1-v1_5-import-jwk.html
r159327 r160491 42 42 shouldBe("publicKey.type", "'public'"); 43 43 shouldBe("publicKey.usages", "['sign','verify']"); 44 shouldBe("publicKey.algorithm.name", "' rsassa-pkcs1-v1_5'");44 shouldBe("publicKey.algorithm.name", "'RSASSA-PKCS1-v1_5'"); 45 45 shouldBe("publicKey.algorithm.modulusLength", "2048"); 46 46 shouldBe("bytesToHexString(publicKey.algorithm.publicExponent)", "'010001'"); 47 shouldBe("publicKey.algorithm.hash.name", "' sha-256'");47 shouldBe("publicKey.algorithm.hash.name", "'SHA-256'"); 48 48 debug("\nImporting a private key..."); 49 49 return crypto.subtle.importKey("jwk", asciiToUint8Array(JSON.stringify(privateKeyJSON)), null, extractable, ["sign", "verify"]); … … 53 53 shouldBe("privateKey.type", "'private'"); 54 54 shouldBe("privateKey.usages", "['sign','verify']"); 55 shouldBe("privateKey.algorithm.name", "' rsassa-pkcs1-v1_5'");55 shouldBe("privateKey.algorithm.name", "'RSASSA-PKCS1-v1_5'"); 56 56 shouldBe("privateKey.algorithm.modulusLength", "2048"); 57 57 shouldBe("bytesToHexString(privateKey.algorithm.publicExponent)", "'010001'"); 58 shouldBe("privateKey.algorithm.hash.name", "' sha-256'");58 shouldBe("privateKey.algorithm.hash.name", "'SHA-256'"); 59 59 finishJSTest(); 60 60 }); -
trunk/Source/WebCore/ChangeLog
r160487 r160491 1 2013-12-12 Alexey Proskuryakov <ap@apple.com> 2 3 Make algorithm.name return registered name, not normalized one 4 https://bugs.webkit.org/show_bug.cgi?id=125641 5 6 Reviewed by Anders Carlsson. 7 8 Currently, WebCrypto editor's draft stipulates that algorithm name is lowercased 9 as part of normalization. 10 11 But it makes little sense to register algorithms as mixed (mostly upper) case, yet 12 return the name lowercased. Other implementations don't bother respecting this, 13 and signs are that the spec will change. 14 15 I'd like to match other implementations here, because sticking to the spec only 16 makes us fail 3rd party test suites for no good reason. 17 18 Updated many existing tests. 19 20 * crypto/CryptoAlgorithmRegistry.cpp: 21 (WebCore::CryptoAlgorithmRegistry::getIdentifierForName): 22 (WebCore::CryptoAlgorithmRegistry::registerAlgorithm): 23 * crypto/CryptoAlgorithmRegistry.h: 24 * crypto/algorithms/CryptoAlgorithmAES_CBC.cpp: 25 * crypto/algorithms/CryptoAlgorithmAES_KW.cpp: 26 * crypto/algorithms/CryptoAlgorithmHMAC.cpp: 27 * crypto/algorithms/CryptoAlgorithmRSASSA_PKCS1_v1_5.cpp: 28 * crypto/algorithms/CryptoAlgorithmRSA_OAEP.cpp: 29 * crypto/algorithms/CryptoAlgorithmSHA1.cpp: 30 * crypto/algorithms/CryptoAlgorithmSHA224.cpp: 31 * crypto/algorithms/CryptoAlgorithmSHA256.cpp: 32 * crypto/algorithms/CryptoAlgorithmSHA384.cpp: 33 * crypto/algorithms/CryptoAlgorithmSHA512.cpp: 34 1 35 2013-12-12 Csaba Osztrogonác <ossy@webkit.org> 2 36 -
trunk/Source/WebCore/crypto/CryptoAlgorithmRegistry.cpp
r160455 r160491 58 58 MutexLocker lock(registryMutex()); 59 59 60 auto iter = m_nameToIdentifierMap.find(name.isolatedCopy() .lower());60 auto iter = m_nameToIdentifierMap.find(name.isolatedCopy()); 61 61 if (iter == m_nameToIdentifierMap.end()) 62 62 return false; … … 86 86 void CryptoAlgorithmRegistry::registerAlgorithm(const String& name, CryptoAlgorithmIdentifier identifier, CryptoAlgorithmConstructor constructor) 87 87 { 88 ASSERT(name == name.lower());89 90 88 MutexLocker lock(registryMutex()); 91 89 -
trunk/Source/WebCore/crypto/CryptoAlgorithmRegistry.h
r159717 r160491 64 64 65 65 void registerAlgorithm(const String& name, CryptoAlgorithmIdentifier, CryptoAlgorithmConstructor); 66 HashMap<String, CryptoAlgorithmIdentifier > m_nameToIdentifierMap;66 HashMap<String, CryptoAlgorithmIdentifier, CaseFoldingHash> m_nameToIdentifierMap; 67 67 HashMap<unsigned, String> m_identifierToNameMap; 68 68 HashMap<unsigned, CryptoAlgorithmConstructor> m_identifierToConstructorMap; -
trunk/Source/WebCore/crypto/algorithms/CryptoAlgorithmAES_CBC.cpp
r159717 r160491 37 37 namespace WebCore { 38 38 39 const char* const CryptoAlgorithmAES_CBC::s_name = " aes-cbc";39 const char* const CryptoAlgorithmAES_CBC::s_name = "AES-CBC"; 40 40 41 41 CryptoAlgorithmAES_CBC::CryptoAlgorithmAES_CBC() -
trunk/Source/WebCore/crypto/algorithms/CryptoAlgorithmAES_KW.cpp
r159966 r160491 36 36 namespace WebCore { 37 37 38 const char* const CryptoAlgorithmAES_KW::s_name = " aes-kw";38 const char* const CryptoAlgorithmAES_KW::s_name = "AES-KW"; 39 39 40 40 CryptoAlgorithmAES_KW::CryptoAlgorithmAES_KW() -
trunk/Source/WebCore/crypto/algorithms/CryptoAlgorithmHMAC.cpp
r159975 r160491 37 37 namespace WebCore { 38 38 39 const char* const CryptoAlgorithmHMAC::s_name = " hmac";39 const char* const CryptoAlgorithmHMAC::s_name = "HMAC"; 40 40 41 41 CryptoAlgorithmHMAC::CryptoAlgorithmHMAC() -
trunk/Source/WebCore/crypto/algorithms/CryptoAlgorithmRSASSA_PKCS1_v1_5.cpp
r159717 r160491 38 38 namespace WebCore { 39 39 40 const char* const CryptoAlgorithmRSASSA_PKCS1_v1_5::s_name = " rsassa-pkcs1-v1_5";40 const char* const CryptoAlgorithmRSASSA_PKCS1_v1_5::s_name = "RSASSA-PKCS1-v1_5"; 41 41 42 42 CryptoAlgorithmRSASSA_PKCS1_v1_5::CryptoAlgorithmRSASSA_PKCS1_v1_5() -
trunk/Source/WebCore/crypto/algorithms/CryptoAlgorithmRSA_OAEP.cpp
r159944 r160491 38 38 namespace WebCore { 39 39 40 const char* const CryptoAlgorithmRSA_OAEP::s_name = " rsa-oaep";40 const char* const CryptoAlgorithmRSA_OAEP::s_name = "RSA-OAEP"; 41 41 42 42 CryptoAlgorithmRSA_OAEP::CryptoAlgorithmRSA_OAEP() -
trunk/Source/WebCore/crypto/algorithms/CryptoAlgorithmSHA1.cpp
r159578 r160491 33 33 namespace WebCore { 34 34 35 const char* const CryptoAlgorithmSHA1::s_name = " sha-1";35 const char* const CryptoAlgorithmSHA1::s_name = "SHA-1"; 36 36 37 37 CryptoAlgorithmSHA1::CryptoAlgorithmSHA1() -
trunk/Source/WebCore/crypto/algorithms/CryptoAlgorithmSHA224.cpp
r159578 r160491 33 33 namespace WebCore { 34 34 35 const char* const CryptoAlgorithmSHA224::s_name = " sha-224";35 const char* const CryptoAlgorithmSHA224::s_name = "SHA-224"; 36 36 37 37 CryptoAlgorithmSHA224::CryptoAlgorithmSHA224() -
trunk/Source/WebCore/crypto/algorithms/CryptoAlgorithmSHA256.cpp
r159578 r160491 33 33 namespace WebCore { 34 34 35 const char* const CryptoAlgorithmSHA256::s_name = " sha-256";35 const char* const CryptoAlgorithmSHA256::s_name = "SHA-256"; 36 36 37 37 CryptoAlgorithmSHA256::CryptoAlgorithmSHA256() -
trunk/Source/WebCore/crypto/algorithms/CryptoAlgorithmSHA384.cpp
r159578 r160491 33 33 namespace WebCore { 34 34 35 const char* const CryptoAlgorithmSHA384::s_name = " sha-384";35 const char* const CryptoAlgorithmSHA384::s_name = "SHA-384"; 36 36 37 37 CryptoAlgorithmSHA384::CryptoAlgorithmSHA384() -
trunk/Source/WebCore/crypto/algorithms/CryptoAlgorithmSHA512.cpp
r159578 r160491 33 33 namespace WebCore { 34 34 35 const char* const CryptoAlgorithmSHA512::s_name = " sha-512";35 const char* const CryptoAlgorithmSHA512::s_name = "SHA-512"; 36 36 37 37 CryptoAlgorithmSHA512::CryptoAlgorithmSHA512()
Note:
See TracChangeset
for help on using the changeset viewer.