Index: LayoutTests/crypto/subtle/hmac-export-key.html |
diff --git a/LayoutTests/crypto/subtle/hmac-export-key.html b/LayoutTests/crypto/subtle/hmac-export-key.html |
deleted file mode 100644 |
index bb80189cb6b0fd003037fc5b8648890a164fdd6f..0000000000000000000000000000000000000000 |
--- a/LayoutTests/crypto/subtle/hmac-export-key.html |
+++ /dev/null |
@@ -1,89 +0,0 @@ |
-<!DOCTYPE html> |
-<html> |
-<head> |
-<script src="../../resources/js-test.js"></script> |
-<script src="resources/common.js"></script> |
-</head> |
-<body> |
-<p id="description"></p> |
-<div id="console"></div> |
- |
-<script> |
-description("Test exporting an AES key."); |
- |
-jsTestIsAsync = true; |
- |
-var extractable = true; |
-var nonExtractable = false; |
- |
-var jwkKey = { |
- "kty": "oct", |
- "k": "ahjkn-_387fgnsibf23qsvahjkn-_387fgnsibf23qs" |
-}; |
- |
-debug("Importing a JWK key..."); |
-crypto.subtle.importKey("jwk", jwkKey, { name: "HMAC", hash: {name: "SHA-256"} }, extractable, ["sign", "verify"]).then(function(result) { |
- key = result; |
- |
- return crypto.subtle.exportKey(null, key); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- return crypto.subtle.exportKey(undefined, key); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- return crypto.subtle.exportKey({}, key); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- return crypto.subtle.exportKey("", key); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- return crypto.subtle.exportKey("foobar", key); |
-}).then(failAndFinishJSTest, function(result) { |
- logError(result); |
- |
- debug("Exporting the key as raw data..."); |
- return crypto.subtle.exportKey("raw", key); |
-}, failAndFinishJSTest).then(function(result) { |
- exportedData = result; |
- shouldBe("bytesToHexString(new Uint8Array(exportedData))", "'6a18e49feff7f3b7e09ec89b7f6deab2f6a18e49feff7f3b7e09ec89b7f6deab'"); |
- |
- debug("Exporting the key as JWK..."); |
- return crypto.subtle.exportKey("jwk", key); |
-}).then(function(result) { |
- exportedJWK = result; |
- shouldBe("exportedJWK.kty", "'oct'"); |
- shouldBe("exportedJWK.k", "'ahjkn-_387fgnsibf23qsvahjkn-_387fgnsibf23qs'"); |
- shouldBe("exportedJWK.alg", "'HS256'"); |
- shouldBe("exportedJWK.ext", "true"); |
- shouldBe("exportedJWK.use", "undefined"); |
- shouldBe("exportedJWK.key_ops", "['sign', 'verify']"); |
- |
- debug("\nImporting a key that's not extractable..."); |
- return crypto.subtle.importKey("jwk", jwkKey, { name: "HMAC", hash: {name: "SHA-256"} }, nonExtractable, ["sign", "verify"]); |
-}, failAndFinishJSTest).then(function(result) { |
- key = result; |
- |
- debug("\nTrying to export as raw..."); |
- return crypto.subtle.exportKey("raw", key); |
-}).then(function(result) { |
- testFailed("Promise wasn't rejected"); |
- finishJSTest(); |
-}, function(result) { |
- logError(result); |
- testPassed("Rejected, as expected"); |
- |
- debug("Trying to export as jwk..."); |
- return crypto.subtle.exportKey("jwk", key); |
-}).then(function(result) { |
- testFailed("Promise wasn't rejected"); |
- finishJSTest(); |
-}, function(result) { |
- logError(result); |
- testPassed("Rejected, as expected"); |
- |
- finishJSTest(); |
-}); |
-</script> |
- |
-</body> |
-</html> |