| Index: LayoutTests/crypto/clone-hmacKey-empty.html
 | 
| diff --git a/LayoutTests/crypto/clone-hmacKey-empty.html b/LayoutTests/crypto/clone-hmacKey-empty.html
 | 
| deleted file mode 100644
 | 
| index 5d45f84c8c8e649a5a5f65fe9e81ccb3d6121256..0000000000000000000000000000000000000000
 | 
| --- a/LayoutTests/crypto/clone-hmacKey-empty.html
 | 
| +++ /dev/null
 | 
| @@ -1,34 +0,0 @@
 | 
| -<!DOCTYPE html>
 | 
| -<html>
 | 
| -<head>
 | 
| -<script src="../resources/js-test.js"></script>
 | 
| -<script src="resources/common.js"></script>
 | 
| -</head>
 | 
| -<body>
 | 
| -<p id="description"></p>
 | 
| -<div id="console"></div>
 | 
| -
 | 
| -<script>
 | 
| -description("Tests structured de-cloning of empty HMAC keys");
 | 
| -
 | 
| -// It used to be possible to import empty HMAC keys, so it is possible that
 | 
| -// such keys were persisted to storage. This test verifies that such keys can
 | 
| -// still be successfully de-serialized.
 | 
| -//
 | 
| -// The version number of the serialized format used is 7.
 | 
| -
 | 
| -var serializedKeyHex = "ff073f004b0200050900";
 | 
| -
 | 
| -key = internals.deserializeBuffer(hexStringToUint8Array(serializedKeyHex).buffer);
 | 
| -
 | 
| -shouldEvaluateAs("key.type", "secret");
 | 
| -shouldEvaluateAs("key.extractable", true);
 | 
| -shouldEvaluateAs("key.algorithm.name", "HMAC");
 | 
| -shouldEvaluateAs("key.algorithm.length", 0);
 | 
| -shouldEvaluateAs("key.algorithm.hash.name", "SHA-1");
 | 
| -shouldEvaluateAs("key.usages.toString()", "sign");
 | 
| -
 | 
| -</script>
 | 
| -
 | 
| -</body>
 | 
| -</html>
 | 
| 
 |