| Index: LayoutTests/crypto/rsa-oaep-key-manipulation.html
 | 
| diff --git a/LayoutTests/crypto/rsa-oaep-key-manipulation.html b/LayoutTests/crypto/rsa-oaep-key-manipulation.html
 | 
| deleted file mode 100644
 | 
| index 83f6822f3837f0c5f375810d39289a4c7da8b9c2..0000000000000000000000000000000000000000
 | 
| --- a/LayoutTests/crypto/rsa-oaep-key-manipulation.html
 | 
| +++ /dev/null
 | 
| @@ -1,89 +0,0 @@
 | 
| -<!DOCTYPE html>
 | 
| -<html>
 | 
| -<head>
 | 
| -<script src="../resources/js-test.js"></script>
 | 
| -<script src="resources/common.js"></script>
 | 
| -</head>
 | 
| -<body>
 | 
| -<p id="description"></p>
 | 
| -<div id="console"></div>
 | 
| -
 | 
| -<script>
 | 
| -description("Test generating, importing and exporting RSA keys for RSA-OAEP. Test that they can't be used with another algorithm.");
 | 
| -
 | 
| -jsTestIsAsync = true;
 | 
| -
 | 
| -var algorithmKeyGen = {
 | 
| -    name: "RSA-OAEP",
 | 
| -    hash: {name: "sha-1"},
 | 
| -    // RsaKeyGenParams
 | 
| -    modulusLength: 512,
 | 
| -    publicExponent: new Uint8Array([0x01, 0x00, 0x01]),  // Equivalent to 65537
 | 
| -};
 | 
| -var extractable = true;
 | 
| -
 | 
| -debug("Generating a key pair...");
 | 
| -crypto.subtle.generateKey(algorithmKeyGen, extractable, ["encrypt", "decrypt", "wrapKey", "unwrapKey"]).then(function(result) {
 | 
| -    keyPair = result;
 | 
| -    shouldBe("keyPair.toString()", "'[object Object]'");
 | 
| -    shouldBe("keyPair.publicKey.type", "'public'");
 | 
| -    shouldBe("keyPair.publicKey.algorithm.name", "'RSA-OAEP'");
 | 
| -    shouldBe("keyPair.publicKey.algorithm.modulusLength", "512");
 | 
| -    shouldBe("keyPair.publicKey.usages", '["encrypt", "wrapKey"]');
 | 
| -    shouldBe("bytesToHexString(keyPair.publicKey.algorithm.publicExponent)", "'010001'");
 | 
| -    shouldBe("keyPair.publicKey.algorithm.hash.name", "'SHA-1'");
 | 
| -    shouldBe("keyPair.privateKey.type", "'private'");
 | 
| -    shouldBe("keyPair.privateKey.algorithm.name", "'RSA-OAEP'");
 | 
| -    shouldBe("keyPair.privateKey.algorithm.modulusLength", "512");
 | 
| -    shouldBe("keyPair.privateKey.usages", '["decrypt", "unwrapKey"]');
 | 
| -    shouldBe("bytesToHexString(keyPair.privateKey.algorithm.publicExponent)", "'010001'");
 | 
| -    shouldBe("keyPair.privateKey.algorithm.hash.name", "'SHA-1'");
 | 
| -
 | 
| -    debug("\nTesting that the keys can't be used with different algorithms...");
 | 
| -    iv = hexStringToUint8Array("000102030405060708090a0b0c0d0e0f");
 | 
| -
 | 
| -    return crypto.subtle.encrypt({name: "aes-cbc", iv: iv}, keyPair.privateKey, hexStringToUint8Array("00"));
 | 
| -}, failAndFinishJSTest).then(failAndFinishJSTest, function(result) {
 | 
| -    logError(result);
 | 
| -    return crypto.subtle.encrypt({name: "aes-cbc", iv: iv}, keyPair.publicKey, hexStringToUint8Array("00"));
 | 
| -}, failAndFinishJSTest).then(failAndFinishJSTest, function(result) {
 | 
| -    logError(result);
 | 
| -    debug("\nTrying to export keys to raw...");
 | 
| -    return crypto.subtle.exportKey('raw', keyPair.publicKey);
 | 
| -}, failAndFinishJSTest).then(failAndFinishJSTest, function(result) {
 | 
| -    logError(result);
 | 
| -    testPassed("Promise rejected for exporting public key");
 | 
| -    return crypto.subtle.exportKey('raw', keyPair.privateKey);
 | 
| -}).then(failAndFinishJSTest, function(result) {
 | 
| -    logError(result);
 | 
| -    testPassed("Promise rejected for exporting private key");
 | 
| -
 | 
| -    debug("\nExporting public key to JWK...");
 | 
| -    return crypto.subtle.exportKey("jwk", keyPair.publicKey);
 | 
| -}).then(function(result) {
 | 
| -    jwkPublicKey = result;
 | 
| -    shouldBe("jwkPublicKey.alg", "'RSA-OAEP'");
 | 
| -    shouldBe("jwkPublicKey.ext", "true");
 | 
| -    shouldBe("jwkPublicKey.key_ops", "['encrypt', 'wrapKey']");
 | 
| -    shouldBe("jwkPublicKey.use", "undefined");
 | 
| -    shouldBe("jwkPublicKey.kty", "'RSA'");
 | 
| -    shouldBe("bytesToHexString(Base64URL.parse(jwkPublicKey.e))", "'010001'");
 | 
| -
 | 
| -    debug("\nImporting it back...");
 | 
| -    return crypto.subtle.importKey("jwk", jwkPublicKey, { name: "RSA-OAEP", hash: {name: "sha-1"} }, extractable, ["encrypt", "wrapKey"]);
 | 
| -}).then(function(result) {
 | 
| -    exportedPublicKey = result;
 | 
| -    shouldBe("exportedPublicKey.type", "'public'");
 | 
| -    shouldBe("exportedPublicKey.algorithm.name", "'RSA-OAEP'");
 | 
| -    shouldBe("exportedPublicKey.algorithm.modulusLength", "512");
 | 
| -    shouldBe("bytesToHexString(exportedPublicKey.algorithm.publicExponent)", "'010001'");
 | 
| -    shouldBe("exportedPublicKey.algorithm.hash.name", "'SHA-1'");
 | 
| -    shouldBe("exportedPublicKey.extractable", "true");
 | 
| -    shouldBe("exportedPublicKey.usages", "['encrypt','wrapKey']");
 | 
| -
 | 
| -}).then(finishJSTest, failAndFinishJSTest);
 | 
| -
 | 
| -</script>
 | 
| -
 | 
| -</body>
 | 
| -</html>
 | 
| 
 |