Index: LayoutTests/crypto/sign-verify.html |
diff --git a/LayoutTests/crypto/sign-verify.html b/LayoutTests/crypto/sign-verify.html |
index f9a73fd651b1815a07c5dd424a535e978c5f8d13..2b2ae0c5fc38585586617f14d5233bc070e3cd8e 100644 |
--- a/LayoutTests/crypto/sign-verify.html |
+++ b/LayoutTests/crypto/sign-verify.html |
@@ -17,17 +17,17 @@ importHmacSha1Key().then(function(key) { |
hmacSha1Key = key; |
hmacSha1 = {name: 'hmac', hash: {name: 'Sha-1'}}; |
- // Pass invalid signature parameters to verify() |
- shouldThrow("crypto.subtle.verify(hmacSha1, hmacSha1Key, null)"); |
- shouldThrow("crypto.subtle.verify(hmacSha1, hmacSha1Key, 'a')"); |
- shouldThrow("crypto.subtle.verify(hmacSha1, hmacSha1Key, [])"); |
- |
- var data = asciiToArrayBuffer("hello"); |
+ data = asciiToArrayBuffer("hello"); |
var expectedSignature = asciiToArrayBuffer("signed HMAC:hello"); |
- var signPromise = crypto.subtle.sign(hmacSha1, hmacSha1Key).process(data).finish(); |
- var verifyPromise = crypto.subtle.verify(hmacSha1, hmacSha1Key, expectedSignature).process(data).finish(); |
- var badVerifyPromise = crypto.subtle.verify(hmacSha1, hmacSha1Key, asciiToArrayBuffer("badsignature")).process(data).finish(); |
+ // Pass invalid signature parameters to verify() |
+ shouldThrow("crypto.subtle.verify(hmacSha1, hmacSha1Key, null, data)"); |
+ shouldThrow("crypto.subtle.verify(hmacSha1, hmacSha1Key, 'a', data)"); |
+ shouldThrow("crypto.subtle.verify(hmacSha1, hmacSha1Key, [], data)"); |
+ |
+ var signPromise = crypto.subtle.sign(hmacSha1, hmacSha1Key, data); |
+ var verifyPromise = crypto.subtle.verify(hmacSha1, hmacSha1Key, expectedSignature, data); |
+ var badVerifyPromise = crypto.subtle.verify(hmacSha1, hmacSha1Key, asciiToArrayBuffer("badsignature"), data); |
Promise.every(signPromise, verifyPromise, badVerifyPromise).then(function(results) |
{ |