| Index: LayoutTests/crypto/rsa-importKey-badUsages.html
|
| diff --git a/LayoutTests/crypto/rsa-importKey-badUsages.html b/LayoutTests/crypto/rsa-importKey-badUsages.html
|
| deleted file mode 100644
|
| index 183c4f4f5dd48e4f369e4ebc6360547a3ddaaf6b..0000000000000000000000000000000000000000
|
| --- a/LayoutTests/crypto/rsa-importKey-badUsages.html
|
| +++ /dev/null
|
| @@ -1,75 +0,0 @@
|
| -<!DOCTYPE html>
|
| -<html>
|
| -<head>
|
| -<script src="../resources/js-test.js"></script>
|
| -<script src="resources/common.js"></script>
|
| -<script src="resources/keys.js"></script>
|
| -</head>
|
| -<body>
|
| -<p id="description"></p>
|
| -<div id="console"></div>
|
| -
|
| -<script>
|
| -description("Tests that importing keys with invalid usages should fail with SyntaxError.");
|
| -
|
| -jsTestIsAsync = true;
|
| -
|
| -function importPkcs8ForDecryption()
|
| -{
|
| - var keyData = hexStringToUint8Array(kKeyData.rsa1.pkcs8);
|
| - var usages = ['decrypt'];
|
| - var extractable = false;
|
| - var algorithm = {name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}};
|
| -
|
| - return crypto.subtle.importKey('pkcs8', keyData, algorithm, extractable, usages);
|
| -}
|
| -
|
| -function importSpkiForEncryption()
|
| -{
|
| - var keyData = hexStringToUint8Array(kKeyData.rsa1.spki);
|
| - var usages = ['encrypt'];
|
| - var extractable = false;
|
| - var algorithm = {name: 'RSASSA-PKCS1-v1_5', hash: {name: 'sha-1'}};
|
| -
|
| - return crypto.subtle.importKey('spki', keyData, algorithm, extractable, usages);
|
| -}
|
| -
|
| -function importJwkPublicKeyForSigning()
|
| -{
|
| - var keyData = kKeyData.jwkRSAPublicKeyJSON;
|
| - var usages = ['sign'];
|
| - var extractable = false;
|
| - var algorithm = {name: 'RSASSA-PKCS1-v1_5', hash: {name: "sha-1"}};
|
| -
|
| - return crypto.subtle.importKey('jwk', keyData, algorithm, extractable, usages);
|
| -}
|
| -
|
| -function importJwkPrivateKeyForEncryption()
|
| -{
|
| - var keyData = kKeyData.jwkRSAPrivateKeyJSON;
|
| - var usages = ['encrypt'];
|
| - var extractable = false;
|
| - var algorithm = {name: 'RSASSA-PKCS1-v1_5', hash: {name: "sha-1"}};
|
| -
|
| - return crypto.subtle.importKey('jwk', keyData, algorithm, extractable, usages);
|
| -}
|
| -
|
| -importPkcs8ForDecryption().then(failAndFinishJSTest, function(result) {
|
| - logError(result);
|
| -
|
| - return importSpkiForEncryption();
|
| -}).then(failAndFinishJSTest, function(result) {
|
| - logError(result);
|
| -
|
| - return importJwkPublicKeyForSigning();
|
| -}).then(failAndFinishJSTest, function(result) {
|
| - logError(result);
|
| -
|
| - return importJwkPrivateKeyForEncryption();
|
| -}).then(failAndFinishJSTest, function(result) {
|
| - logError(result);
|
| -}).then(finishJSTest, failAndFinishJSTest);
|
| -</script>
|
| -
|
| -</body>
|
| -</html>
|
|
|