Index: LayoutTests/crypto/sign-verify.html |
diff --git a/LayoutTests/crypto/sign-verify.html b/LayoutTests/crypto/sign-verify.html |
index 8a3c54622af17eb759627f87c9dcb14ab2ce32e9..03add1c251d4bab813e951b2d6c9277f3a713a51 100644 |
--- a/LayoutTests/crypto/sign-verify.html |
+++ b/LayoutTests/crypto/sign-verify.html |
@@ -44,41 +44,15 @@ importTestKeys().then(function(importedKeys) { |
shouldThrow("crypto.subtle.sign({name: 'hmac', hash: {name: 'foo'}}, keys.hmacSha1, data)"); |
shouldThrow("crypto.subtle.sign({name: 'hmac', hash: {name: 'AES-CBC'}}, keys.hmacSha1, data)"); |
- // --------------------------------------------------- |
- // RSASSA-PKCS1-v1_5 normalization failures (RsaSsaParams) |
- // --------------------------------------------------- |
- shouldThrow("crypto.subtle.sign({name: 'RSASSA-PKCS1-v1_5'}, keys.rsaSsaSha1, data)"); |
- shouldThrow("crypto.subtle.sign({name: 'RSASSA-PKCS1-v1_5', hash: 3}, keys.rsaSsaSha1, data)"); |
- shouldThrow("crypto.subtle.sign({name: 'RSASSA-PKCS1-v1_5', hash: null}, keys.rsaSsaSha1, data)"); |
- shouldThrow("crypto.subtle.sign({name: 'RSASSA-PKCS1-v1_5', hash: {}}, keys.rsaSsaSha1, data)"); |
- shouldThrow("crypto.subtle.sign({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'foo'}}, keys.rsaSsaSha1, data)"); |
- shouldThrow("crypto.subtle.sign({name: 'RSASSA-PKCS1-v1_5', hash: {name: 'AES-CBC'}}, keys.rsaSsaSha1, data)"); |
- |
return crypto.subtle.sign(hmacSha1, keys.hmacSha1, data); |
}).then(function(result) { |
- signResult = result; |
- shouldBe("signResult.byteLength", "17"); |
- |
- expectedSignature = asciiToArrayBuffer("signed HMAC:hello"); |
- return crypto.subtle.verify(hmacSha1, keys.hmacSha1, expectedSignature, data); |
-}).then(function(result) { |
- verifyResult = result; |
- shouldBe("verifyResult", "true"); |
+ signResult = arrayBufferToHexString(result); |
+ shouldBe("signResult", "'[89 0d 9b 89 4b 23 97 69 ac 77 25 04 66 dc e4 2a f9 26 ed 76]'"); |
return crypto.subtle.verify(hmacSha1, keys.hmacSha1, asciiToArrayBuffer("badsignature"), data); |
}).then(function(result) { |
verifyResult = result; |
shouldBe("verifyResult", "false"); |
- |
- return crypto.subtle.generateKey({name: 'hmac', hash: {name: 'sha-1' }, length: 48}, false, ['sign']); |
-}).then(function(result) { |
- generatedHmacSha1Key = result; |
- |
- // Cannot use an HMAC SHA-1 key for signing HMAC SHA-256 |
- shouldThrow("crypto.subtle.sign({name: 'hmac', hash: {name: 'sha-256'}}, generatedHmacSha1Key, data)"); |
- |
- // However it can be used to sign for HMAC SHA-1 |
- shouldNotThrow("crypto.subtle.sign(hmacSha1, generatedHmacSha1Key, data)"); |
}).then(finishJSTest, failAndFinishJSTest); |
</script> |