key = result;
// Pass invalid signature parameters to verify()
- shouldThrow("crypto.subtle.verify(hmac, key, null, data)");
- shouldThrow("crypto.subtle.verify(hmac, key, 'a', data)");
- shouldThrow("crypto.subtle.verify(hmac, key, [], data)");
+ return crypto.subtle.verify(hmac, key, null, data);
+}).then(failAndFinishJSTest, function(result) {
+ logError(result);
+
+ // Pass invalid signature parameters to verify()
+ return crypto.subtle.verify(hmac, key, 'a', data);
+}).then(failAndFinishJSTest, function(result) {
+ logError(result);
+
+ // Pass invalid signature parameters to verify()
+ return crypto.subtle.verify(hmac, key, [], data);
+}).then(failAndFinishJSTest, function(result) {
+ logError(result);
// Operation does not support signing.
return crypto.subtle.sign({name: 'sha-1'}, key, data);
}).then(failAndFinishJSTest, function(result) {
- error = result;
- shouldBeNull("error");
+ logError(result);
// Operation doesn't support signing (also given an invalid key, but the
// first failure takes priority)
return crypto.subtle.sign({name: 'RSAES-PKCS1-v1_5'}, key, data);
}).then(failAndFinishJSTest, function(result) {
- error = result;
- shouldBeNull("error");
+ logError(result);
}).then(finishJSTest, failAndFinishJSTest);
</script>