Index: LayoutTests/crypto/clone-hmacKey-empty.html |
diff --git a/LayoutTests/crypto/clone-hmacKey-empty.html b/LayoutTests/crypto/clone-hmacKey-empty.html |
deleted file mode 100644 |
index 5d45f84c8c8e649a5a5f65fe9e81ccb3d6121256..0000000000000000000000000000000000000000 |
--- a/LayoutTests/crypto/clone-hmacKey-empty.html |
+++ /dev/null |
@@ -1,34 +0,0 @@ |
-<!DOCTYPE html> |
-<html> |
-<head> |
-<script src="../resources/js-test.js"></script> |
-<script src="resources/common.js"></script> |
-</head> |
-<body> |
-<p id="description"></p> |
-<div id="console"></div> |
- |
-<script> |
-description("Tests structured de-cloning of empty HMAC keys"); |
- |
-// It used to be possible to import empty HMAC keys, so it is possible that |
-// such keys were persisted to storage. This test verifies that such keys can |
-// still be successfully de-serialized. |
-// |
-// The version number of the serialized format used is 7. |
- |
-var serializedKeyHex = "ff073f004b0200050900"; |
- |
-key = internals.deserializeBuffer(hexStringToUint8Array(serializedKeyHex).buffer); |
- |
-shouldEvaluateAs("key.type", "secret"); |
-shouldEvaluateAs("key.extractable", true); |
-shouldEvaluateAs("key.algorithm.name", "HMAC"); |
-shouldEvaluateAs("key.algorithm.length", 0); |
-shouldEvaluateAs("key.algorithm.hash.name", "SHA-1"); |
-shouldEvaluateAs("key.usages.toString()", "sign"); |
- |
-</script> |
- |
-</body> |
-</html> |