| Index: LayoutTests/crypto/subtle/clone-hmacKey-empty.html
|
| diff --git a/LayoutTests/crypto/subtle/clone-hmacKey-empty.html b/LayoutTests/crypto/subtle/clone-hmacKey-empty.html
|
| deleted file mode 100644
|
| index 0d422e30cc29d21296d7f05c1a55669c1f6d4ec5..0000000000000000000000000000000000000000
|
| --- a/LayoutTests/crypto/subtle/clone-hmacKey-empty.html
|
| +++ /dev/null
|
| @@ -1,34 +0,0 @@
|
| -<!DOCTYPE html>
|
| -<html>
|
| -<head>
|
| -<script src="../../resources/js-test.js"></script>
|
| -<script src="resources/common.js"></script>
|
| -</head>
|
| -<body>
|
| -<p id="description"></p>
|
| -<div id="console"></div>
|
| -
|
| -<script>
|
| -description("Tests structured de-cloning of empty HMAC keys");
|
| -
|
| -// It used to be possible to import empty HMAC keys, so it is possible that
|
| -// such keys were persisted to storage. This test verifies that such keys can
|
| -// still be successfully de-serialized.
|
| -//
|
| -// The version number of the serialized format used is 7.
|
| -
|
| -var serializedKeyHex = "ff073f004b0200050900";
|
| -
|
| -key = internals.deserializeBuffer(hexStringToUint8Array(serializedKeyHex).buffer);
|
| -
|
| -shouldEvaluateAs("key.type", "secret");
|
| -shouldEvaluateAs("key.extractable", true);
|
| -shouldEvaluateAs("key.algorithm.name", "HMAC");
|
| -shouldEvaluateAs("key.algorithm.length", 0);
|
| -shouldEvaluateAs("key.algorithm.hash.name", "SHA-1");
|
| -shouldEvaluateAs("key.usages.toString()", "sign");
|
| -
|
| -</script>
|
| -
|
| -</body>
|
| -</html>
|
|
|