Upstream version 7.36.149.0
[platform/framework/web/crosswalk.git] / src / third_party / WebKit / LayoutTests / crypto / sign-verify-badParameters.html
index 707c7eb..458acd2 100644 (file)
@@ -30,22 +30,30 @@ importHmacKey().then(function(result) {
     key = result;
 
     // Pass invalid signature parameters to verify()
-    shouldThrow("crypto.subtle.verify(hmac, key, null, data)");
-    shouldThrow("crypto.subtle.verify(hmac, key, 'a', data)");
-    shouldThrow("crypto.subtle.verify(hmac, key, [], data)");
+    return crypto.subtle.verify(hmac, key, null, data);
+}).then(failAndFinishJSTest, function(result) {
+    logError(result);
+
+    // Pass invalid signature parameters to verify()
+    return crypto.subtle.verify(hmac, key, 'a', data);
+}).then(failAndFinishJSTest, function(result) {
+    logError(result);
+
+    // Pass invalid signature parameters to verify()
+    return crypto.subtle.verify(hmac, key, [], data);
+}).then(failAndFinishJSTest, function(result) {
+    logError(result);
 
     // Operation does not support signing.
     return crypto.subtle.sign({name: 'sha-1'}, key, data);
 }).then(failAndFinishJSTest, function(result) {
-    error = result;
-    shouldBeNull("error");
+    logError(result);
 
     // Operation doesn't support signing (also given an invalid key, but the
     // first failure takes priority)
     return crypto.subtle.sign({name: 'RSAES-PKCS1-v1_5'}, key, data);
 }).then(failAndFinishJSTest, function(result) {
-    error = result;
-    shouldBeNull("error");
+    logError(result);
 }).then(finishJSTest, failAndFinishJSTest);
 
 </script>