Index: LayoutTests/crypto/subtle/ecdh-deriveKey-failures-expected.txt |
diff --git a/LayoutTests/crypto/subtle/ecdh-deriveKey-failures-expected.txt b/LayoutTests/crypto/subtle/ecdh-deriveKey-failures-expected.txt |
deleted file mode 100644 |
index 387b498cfaceffc93cec5e5c516b981d22f2938a..0000000000000000000000000000000000000000 |
--- a/LayoutTests/crypto/subtle/ecdh-deriveKey-failures-expected.txt |
+++ /dev/null |
@@ -1,63 +0,0 @@ |
-Tests deriveKey() with various bad parameters for ECDH |
- |
-On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE". |
- |
- |
-Importing the private key... |
-Importing the public key... |
- |
-Deriving an AES key with no length... |
-error is: TypeError: AesDerivedKeyParams: length: Missing required property |
- |
-Deriving an AES key with bad length... |
-error is: OperationError: AES key length must be 128 or 256 bits |
- |
-Deriving an AES key with unsupported length... |
-error is: OperationError: 192-bit AES keys are not supported |
- |
-Deriving an AES-CBC key with unsupported usage (sign)... |
-error is: SyntaxError: Cannot create a key using the specified key usages. |
- |
-Deriving using an ECDH key that has deriveBits but NOT deriveKey... usage |
-error is: InvalidAccessError: key.usages does not permit this operation |
- |
-Deriving using public instead of private key... |
-error is: InvalidAccessError: key.usages does not permit this operation |
- |
-Deriving using private instead of public key... |
-error is: InvalidAccessError: The public parameter for ECDH key derivation is not a public EC key |
- |
-Deriving a key larger than the field size of P-521... |
-error is: OperationError: Length specified for ECDH key derivation is too large. Maximum allowed is 528 bits |
- |
-Deriving a zero-length HMAC key... |
-error is: TypeError: HMAC key length must not be zero |
- |
-Deriving a key larger than field size of P-521, by requesting an HMAC SHA-512 key with no length... |
-error is: OperationError: Length specified for ECDH key derivation is too large. Maximum allowed is 528 bits |
- |
-Deriving a key using mismatched curves on public/private keys... |
-error is: InvalidAccessError: The public parameter for ECDH key derivation is for a different named curve |
- |
-Deriving a key using a public EC key for different algorithm (ECDSA)... |
-error is: InvalidAccessError: The public parameter for ECDH key derivation must be for ECDH |
- |
-Deriving a key using an AES key for public key... |
-error is: InvalidAccessError: The public parameter for ECDH key derivation is not a public EC key |
- |
-Deriving a key without specifying the "public" parameter... |
-error is: TypeError: EcdhKeyDeriveParams: public: Missing required property |
- |
-Deriving a key having specified a bogus "public" parameter... |
-error is: TypeError: EcdhKeyDeriveParams: public: Must be a CryptoKey |
- |
-Deriving an ECDH key using ECDH... |
-error is: NotSupportedError: ECDH: Unsupported operation: get key length |
- |
-Deriving an RSA-OAEP key using ECDH... |
-error is: NotSupportedError: RSA-OAEP: Unsupported operation: get key length |
- |
-PASS successfullyParsed is true |
- |
-TEST COMPLETE |
- |