1 Tests structured de-cloning of empty HMAC keys
3 On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
7 Deserializing empty HMAC SHA-1 key...
8 PASS key.type is "secret"
9 PASS typeof key.extractable is 'boolean'
10 PASS key.extractable is true
11 PASS key.algorithm.name is "HMAC"
12 PASS key.algorithm.length is 0
13 PASS key.algorithm.hash.name is "SHA-1"
14 PASS key.usages is ["sign", "verify"]
16 Deserializing empty HMAC SHA-256 key...
17 PASS key.type is "secret"
18 PASS typeof key.extractable is 'boolean'
19 PASS key.extractable is true
20 PASS key.algorithm.name is "HMAC"
21 PASS key.algorithm.length is 0
22 PASS key.algorithm.hash.name is "SHA-256"
23 PASS key.usages is ["sign", "verify"]
25 calling verify() with a valid signature (SHA-1) ...
26 PASS typeof verifyResult is 'boolean'
27 PASS verifyResult is true
29 calling verify() with an invalid signature (SHA-1) ...
30 PASS typeof verifyResult is 'boolean'
31 PASS verifyResult is false
33 calling sign() (SHA-1) over empty input...
34 PASS: signature should be [fbdb1d1b18aa6c08324b7d64b71fb76370690e1d] and was
36 calling verify() with a valid signature (SHA-256) ...
37 PASS typeof verifyResult is 'boolean'
38 PASS verifyResult is true
40 calling verify() with an invalid signature (SHA-256) ...
41 PASS typeof verifyResult is 'boolean'
42 PASS verifyResult is false
44 calling sign() (SHA-256) over empty input...
45 PASS: signature should be [b613679a0814d9ec772f95d778c35fc5ff1697c493715653c6c712144292c5ad] and was
46 PASS successfullyParsed is true