| Index: LayoutTests/crypto/sign-verify.html | 
| diff --git a/LayoutTests/crypto/sign-verify.html b/LayoutTests/crypto/sign-verify.html | 
| index f9a73fd651b1815a07c5dd424a535e978c5f8d13..2b2ae0c5fc38585586617f14d5233bc070e3cd8e 100644 | 
| --- a/LayoutTests/crypto/sign-verify.html | 
| +++ b/LayoutTests/crypto/sign-verify.html | 
| @@ -17,17 +17,17 @@ importHmacSha1Key().then(function(key) { | 
| hmacSha1Key = key; | 
| hmacSha1 = {name: 'hmac', hash: {name: 'Sha-1'}}; | 
|  | 
| -    // Pass invalid signature parameters to verify() | 
| -    shouldThrow("crypto.subtle.verify(hmacSha1, hmacSha1Key, null)"); | 
| -    shouldThrow("crypto.subtle.verify(hmacSha1, hmacSha1Key, 'a')"); | 
| -    shouldThrow("crypto.subtle.verify(hmacSha1, hmacSha1Key, [])"); | 
| - | 
| -    var data = asciiToArrayBuffer("hello"); | 
| +    data = asciiToArrayBuffer("hello"); | 
| var expectedSignature = asciiToArrayBuffer("signed HMAC:hello"); | 
|  | 
| -    var signPromise = crypto.subtle.sign(hmacSha1, hmacSha1Key).process(data).finish(); | 
| -    var verifyPromise = crypto.subtle.verify(hmacSha1, hmacSha1Key, expectedSignature).process(data).finish(); | 
| -    var badVerifyPromise = crypto.subtle.verify(hmacSha1, hmacSha1Key, asciiToArrayBuffer("badsignature")).process(data).finish(); | 
| +    // Pass invalid signature parameters to verify() | 
| +    shouldThrow("crypto.subtle.verify(hmacSha1, hmacSha1Key, null, data)"); | 
| +    shouldThrow("crypto.subtle.verify(hmacSha1, hmacSha1Key, 'a', data)"); | 
| +    shouldThrow("crypto.subtle.verify(hmacSha1, hmacSha1Key, [], data)"); | 
| + | 
| +    var signPromise = crypto.subtle.sign(hmacSha1, hmacSha1Key, data); | 
| +    var verifyPromise = crypto.subtle.verify(hmacSha1, hmacSha1Key, expectedSignature, data); | 
| +    var badVerifyPromise = crypto.subtle.verify(hmacSha1, hmacSha1Key, asciiToArrayBuffer("badsignature"), data); | 
|  | 
| Promise.every(signPromise, verifyPromise, badVerifyPromise).then(function(results) | 
| { | 
|  |