| Index: LayoutTests/crypto/sign-verify-badParameters.html
|
| diff --git a/LayoutTests/crypto/sign-verify-badParameters.html b/LayoutTests/crypto/sign-verify-badParameters.html
|
| index 252de91485635a33031dc755346eea4ded1597d1..458acd28dcff92680a159b02fff01f25fa2ae564 100644
|
| --- a/LayoutTests/crypto/sign-verify-badParameters.html
|
| +++ b/LayoutTests/crypto/sign-verify-badParameters.html
|
| @@ -32,33 +32,28 @@ importHmacKey().then(function(result) {
|
| // Pass invalid signature parameters to verify()
|
| return crypto.subtle.verify(hmac, key, null, data);
|
| }).then(failAndFinishJSTest, function(result) {
|
| - error = result;
|
| - shouldBeNull("error");
|
| + logError(result);
|
|
|
| // Pass invalid signature parameters to verify()
|
| return crypto.subtle.verify(hmac, key, 'a', data);
|
| }).then(failAndFinishJSTest, function(result) {
|
| - error = result;
|
| - shouldBeNull("error");
|
| + logError(result);
|
|
|
| // Pass invalid signature parameters to verify()
|
| return crypto.subtle.verify(hmac, key, [], data);
|
| }).then(failAndFinishJSTest, function(result) {
|
| - error = result;
|
| - shouldBeNull("error");
|
| + logError(result);
|
|
|
| // Operation does not support signing.
|
| return crypto.subtle.sign({name: 'sha-1'}, key, data);
|
| }).then(failAndFinishJSTest, function(result) {
|
| - error = result;
|
| - shouldBeNull("error");
|
| + logError(result);
|
|
|
| // Operation doesn't support signing (also given an invalid key, but the
|
| // first failure takes priority)
|
| return crypto.subtle.sign({name: 'RSAES-PKCS1-v1_5'}, key, data);
|
| }).then(failAndFinishJSTest, function(result) {
|
| - error = result;
|
| - shouldBeNull("error");
|
| + logError(result);
|
| }).then(finishJSTest, failAndFinishJSTest);
|
|
|
| </script>
|
|
|