| Index: LayoutTests/crypto/sign-verify-badParameters.html | 
| diff --git a/LayoutTests/crypto/sign-verify-badParameters.html b/LayoutTests/crypto/sign-verify-badParameters.html | 
| index 252de91485635a33031dc755346eea4ded1597d1..458acd28dcff92680a159b02fff01f25fa2ae564 100644 | 
| --- a/LayoutTests/crypto/sign-verify-badParameters.html | 
| +++ b/LayoutTests/crypto/sign-verify-badParameters.html | 
| @@ -32,33 +32,28 @@ importHmacKey().then(function(result) { | 
| // Pass invalid signature parameters to verify() | 
| return crypto.subtle.verify(hmac, key, null, data); | 
| }).then(failAndFinishJSTest, function(result) { | 
| -    error = result; | 
| -    shouldBeNull("error"); | 
| +    logError(result); | 
|  | 
| // Pass invalid signature parameters to verify() | 
| return crypto.subtle.verify(hmac, key, 'a', data); | 
| }).then(failAndFinishJSTest, function(result) { | 
| -    error = result; | 
| -    shouldBeNull("error"); | 
| +    logError(result); | 
|  | 
| // Pass invalid signature parameters to verify() | 
| return crypto.subtle.verify(hmac, key, [], data); | 
| }).then(failAndFinishJSTest, function(result) { | 
| -    error = result; | 
| -    shouldBeNull("error"); | 
| +    logError(result); | 
|  | 
| // Operation does not support signing. | 
| return crypto.subtle.sign({name: 'sha-1'}, key, data); | 
| }).then(failAndFinishJSTest, function(result) { | 
| -    error = result; | 
| -    shouldBeNull("error"); | 
| +    logError(result); | 
|  | 
| // Operation doesn't support signing (also given an invalid key, but the | 
| // first failure takes priority) | 
| return crypto.subtle.sign({name: 'RSAES-PKCS1-v1_5'}, key, data); | 
| }).then(failAndFinishJSTest, function(result) { | 
| -    error = result; | 
| -    shouldBeNull("error"); | 
| +    logError(result); | 
| }).then(finishJSTest, failAndFinishJSTest); | 
|  | 
| </script> | 
|  |