Index: LayoutTests/crypto/importKey-badParameters.html |
diff --git a/LayoutTests/crypto/importKey-badParameters.html b/LayoutTests/crypto/importKey-badParameters.html |
deleted file mode 100644 |
index 1e51953877d6a350aef63e653706b0d862167974..0000000000000000000000000000000000000000 |
--- a/LayoutTests/crypto/importKey-badParameters.html |
+++ /dev/null |
@@ -1,70 +0,0 @@ |
-<!DOCTYPE html> |
-<html> |
-<head> |
-<script src="../resources/js-test.js"></script> |
-<script src="resources/common.js"></script> |
-</head> |
-<body> |
-<p id="description"></p> |
-<div id="console"></div> |
- |
-<script> |
-description("Tests calling cypto.subtle.importKey with bad parameters"); |
- |
-jsTestIsAsync = true; |
- |
-var aesCbc = {name: 'aes-cbc'}; |
-var aesKeyBytes = new Uint8Array(16); |
-var extractable = true; |
- |
-// Undefined key usage. |
-// FIXME: http://crbug.com/262383 |
-//shouldThrow("crypto.subtle.importKey('raw', aesKeyBytes, aesCbc, extractable, undefined)"); |
- |
-Promise.resolve(null).then(function() { |
- // Invalid data |
- return crypto.subtle.importKey('raw', [], aesCbc, extractable, ['encrypt']); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- |
- // 'null' treated as a Dictionary with default values - an empty dictionary |
- return crypto.subtle.importKey('raw', null, aesCbc, extractable, ['encrypt']); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- |
- // Invalid algorithm |
- return crypto.subtle.importKey('raw', aesKeyBytes, null, extractable, ['encrypt']); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- |
- // Invalid format. |
- return crypto.subtle.importKey('invalid format', aesKeyBytes, aesCbc, extractable, ['encrypt']); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- |
- // Invalid key usage (case sensitive). |
- return crypto.subtle.importKey('raw', aesKeyBytes, aesCbc, extractable, ['ENCRYPT']); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- |
- // If both the format and key usage are bogus, should complain about the |
- // format first. |
- return crypto.subtle.importKey('invalid format', aesKeyBytes, aesCbc, extractable, ['ENCRYPT']); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- |
- // Missing hash parameter for HMAC. |
- return crypto.subtle.importKey('raw', new Uint8Array(20), {name: 'hmac'}, extractable, ['sign']); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- |
- // SHA-1 doesn't support the importKey operation. |
- return crypto.subtle.importKey('raw', new Uint8Array(20), {name: 'sha-1'}, extractable, ['sign']); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
-}).then(finishJSTest, failAndFinishJSTest); |
- |
-</script> |
- |
-</body> |
-</html> |