Index: third_party/WebKit/LayoutTests/fast/mediastream/RTCPeerConnection-generateCertificate.html |
diff --git a/third_party/WebKit/LayoutTests/fast/mediastream/RTCPeerConnection-generateCertificate.html b/third_party/WebKit/LayoutTests/fast/mediastream/RTCPeerConnection-generateCertificate.html |
deleted file mode 100644 |
index ab0dbf2ce231622d52786736c1f0ef28652cb57d..0000000000000000000000000000000000000000 |
--- a/third_party/WebKit/LayoutTests/fast/mediastream/RTCPeerConnection-generateCertificate.html |
+++ /dev/null |
@@ -1,115 +0,0 @@ |
-<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN"> |
-<html> |
-<head> |
-<script src="../../resources/js-test.js"></script> |
-</head> |
-<body> |
-<script> |
-description("Tests RTCPeerConnection.generateCertificate RSA/ECDSA."); |
- |
-// Constants |
-var minuteInMs = 60 * 1000; |
-var dayInMs = 24 * 60 * minuteInMs; |
- |
-// Signature of the last generateCertificate call. |
-var generateCallString = null; |
-// Global certificate variables so that the "should..." methods can evaluate them. |
-var certRSA = null; |
-var certECDSA = null; |
-var certExpiresNegativeOneDay = null; |
-var certExpiresZero = null; |
-var certExpiresPositiveOneDay = null; |
- |
-// 1: RSA-2048 using public exponent = 65537. |
-function generate1RSA() |
-{ |
- generateCallString = 'generateCertificate({ name: "RSASSA-PKCS1-v1_5", modulusLength: 2048, publicExponent: new Uint8Array([1, 0, 1]), hash: "SHA-256" })'; |
- webkitRTCPeerConnection.generateCertificate({ name: "RSASSA-PKCS1-v1_5", modulusLength: 2048, publicExponent: new Uint8Array([1, 0, 1]), hash: "SHA-256" }) |
- .then(generate1RSASuccessful, generate1RSAFailed); |
-} |
-function generate1RSASuccessful(certificate) |
-{ |
- certRSA = certificate; |
- testPassed(generateCallString); |
- certificateSanityCheck('certRSA'); |
- generate2ECDSA(); |
-} |
-function generate1RSAFailed() |
-{ |
- testFailed(generateCallString); |
- generate2ECDSA(); |
-} |
- |
-// 2: ECDSA using NIST P-256. |
-function generate2ECDSA() |
-{ |
- generateCallString = 'generateCertificate({ name: "ECDSA", namedCurve: "P-256" })'; |
- webkitRTCPeerConnection.generateCertificate({ name: "ECDSA", namedCurve: "P-256" }) |
- .then(generate2ECDSASuccessful, generate2ECDSAFailed); |
-} |
-function generate2ECDSASuccessful(certificate) |
-{ |
- certECDSA = certificate; |
- testPassed(generateCallString); |
- certificateSanityCheck('certECDSA'); |
- generate3ExpiresNegativeOneDay(); |
-} |
-function generate2ECDSAFailed() |
-{ |
- testFailed(generateCallString); |
- generate3ExpiresNegativeOneDay(); |
-} |
- |
-// 3-5: Verify that the |expires| attribute works (generate ECDSA because its faster). |
-function generate3ExpiresNegativeOneDay() |
-{ |
- generateCallString = 'generateCertificate({ name: "ECDSA", namedCurve: "P-256", expires:-dayInMs })'; |
- webkitRTCPeerConnection.generateCertificate({ name: "ECDSA", namedCurve: "P-256", expires:-dayInMs }) |
- .then(function(certificate) { certExpiresNegativeOneDay = certificate; generate4ExpiresZero(); }, generate4ExpiresZero); |
-} |
-function generate4ExpiresZero() |
-{ |
- generateCallString = 'generateCertificate({ name: "ECDSA", namedCurve: "P-256", expires:0 })'; |
- webkitRTCPeerConnection.generateCertificate({ name: "ECDSA", namedCurve: "P-256", expires:0 }) |
- .then(function(certificate) { certExpiresZero = certificate; generate5ExpiresPositiveOneDay(); }, generate5ExpiresPositiveOneDay); |
-} |
-function generate5ExpiresPositiveOneDay() |
-{ |
- generateCallString = 'generateCertificate({ name: "ECDSA", namedCurve: "P-256", expires:dayInMs })'; // +1 day |
- webkitRTCPeerConnection.generateCertificate({ name: "ECDSA", namedCurve: "P-256", expires:dayInMs }) |
- .then(function(certificate) { certExpiresPositiveOneDay = certificate; generate3to5ExpiresResolved(); }, generate3to5ExpiresResolved); |
-} |
-function generate3to5ExpiresResolved() |
-{ |
- // A negative |expires| value is not a DOMTimeStamp, it should be ignored and |
- // generate a certificate that has not expired. |
- certificateSanityCheck('certExpiresNegativeOneDay'); |
- |
- // Check that the zero expiration certificate was generated but has expired. |
- shouldBeNonNull('certExpiresZero'); |
- shouldBeTrue('new Date().getTime() >= certExpiresZero.expires'); |
- |
- // Check that the +1 day expiration certificate expires in approximately 1 day (+/- 1 minute). |
- shouldBeNonNull('certExpiresPositiveOneDay'); |
- shouldBeTrue('Math.abs(certExpiresPositiveOneDay.expires - (new Date().getTime() + dayInMs)) <= minuteInMs'); |
- |
- finishJSTest(); |
-} |
- |
-// Helper functions. |
-function certificateSanityCheck(certVariableName) |
-{ |
- shouldBeNonNull(certVariableName); |
- shouldBeTrue('new Date().getTime() < ' + certVariableName + '.expires'); |
-} |
- |
-// Run each generate test sequentially. The ith generate method will make sure |
-// the (i+1)st generate method is executed when its promise's callbacks are |
-// invoked. generate2ECDSA's callback methods mark the end of the async tests. |
-generate1RSA(); |
- |
-window.jsTestIsAsync = true; |
-window.successfullyParsed = true; |
-</script> |
-</body> |
-</html> |