@@ -114,7 +114,7 @@ routes.set("/crypto.subtle", async () => {
114
114
routes . set ( "/crypto.subtle.importKey/called-with-wrong-this" , async ( ) => {
115
115
error = await assertRejects ( async ( ) => {
116
116
await crypto . subtle . importKey . call ( undefined , 'jwk' , publicRsaJsonWebKeyData , rsaJsonWebKeyAlgorithm , publicRsaJsonWebKeyData . ext , publicRsaJsonWebKeyData . key_ops )
117
- } , TypeError , "Method SubtleCrypto.importKey called on receiver that's not an instance of SubtleCrypto" )
117
+ } , TypeError )
118
118
if ( error ) { return error ; }
119
119
return pass ( 'ok' ) ;
120
120
} ) ;
@@ -151,7 +151,7 @@ routes.set("/crypto.subtle", async () => {
151
151
routes . set ( "/crypto.subtle.importKey/first-parameter-non-existant-format" , async ( ) => {
152
152
let error = await assertRejects ( async ( ) => {
153
153
await crypto . subtle . importKey ( 'jake' , publicRsaJsonWebKeyData , rsaJsonWebKeyAlgorithm , publicRsaJsonWebKeyData . ext , publicRsaJsonWebKeyData . key_ops )
154
- } , Error , "Provided format parameter is not supported. Supported formats are: 'spki', 'pkcs8', 'jwk', and 'raw'" )
154
+ } , Error )
155
155
if ( error ) { return error ; }
156
156
return pass ( 'ok' ) ;
157
157
} ) ;
@@ -162,7 +162,7 @@ routes.set("/crypto.subtle", async () => {
162
162
routes . set ( "/crypto.subtle.importKey/second-parameter-invalid-format" , async ( ) => {
163
163
let error = await assertRejects ( async ( ) => {
164
164
await crypto . subtle . importKey ( 'jwk' , Symbol ( ) , rsaJsonWebKeyAlgorithm , publicRsaJsonWebKeyData . ext , publicRsaJsonWebKeyData . key_ops )
165
- } , Error , "The provided value is not of type JsonWebKey" )
165
+ } , Error )
166
166
if ( error ) { return error ; }
167
167
return pass ( 'ok' ) ;
168
168
} ) ;
@@ -172,7 +172,7 @@ routes.set("/crypto.subtle", async () => {
172
172
let error = await assertRejects ( async ( ) => {
173
173
delete publicRsaJsonWebKeyData . e ;
174
174
await crypto . subtle . importKey ( 'jwk' , publicRsaJsonWebKeyData , rsaJsonWebKeyAlgorithm , publicRsaJsonWebKeyData . ext , publicRsaJsonWebKeyData . key_ops )
175
- } , DOMException , "Data provided to an operation does not meet requirements" )
175
+ } , DOMException )
176
176
if ( error ) { return error ; }
177
177
return pass ( 'ok' ) ;
178
178
} ) ;
@@ -209,15 +209,15 @@ routes.set("/crypto.subtle", async () => {
209
209
let error = await assertRejects ( async ( ) => {
210
210
delete publicRsaJsonWebKeyData . kty ;
211
211
await crypto . subtle . importKey ( 'jwk' , publicRsaJsonWebKeyData , rsaJsonWebKeyAlgorithm , publicRsaJsonWebKeyData . ext , publicRsaJsonWebKeyData . key_ops )
212
- } , Error , "The required JWK member 'kty' was missing" )
212
+ } , Error )
213
213
if ( error ) { return error ; }
214
214
return pass ( 'ok' ) ;
215
215
} ) ;
216
216
routes . set ( "/crypto.subtle.importKey/rsa-jwk-public/second-parameter-invalid-kty-field" , async ( ) => {
217
217
let error = await assertRejects ( async ( ) => {
218
218
publicRsaJsonWebKeyData . kty = "jake" ;
219
219
await crypto . subtle . importKey ( 'jwk' , publicRsaJsonWebKeyData , rsaJsonWebKeyAlgorithm , publicRsaJsonWebKeyData . ext , publicRsaJsonWebKeyData . key_ops )
220
- } , Error , "The JWK 'kty' member was not 'RSA'" )
220
+ } , Error )
221
221
if ( error ) { return error ; }
222
222
return pass ( 'ok' ) ;
223
223
} ) ;
@@ -235,7 +235,7 @@ routes.set("/crypto.subtle", async () => {
235
235
const key_ops = Array . from ( publicRsaJsonWebKeyData . key_ops ) ;
236
236
publicRsaJsonWebKeyData . key_ops = "jake" ;
237
237
await crypto . subtle . importKey ( 'jwk' , publicRsaJsonWebKeyData , rsaJsonWebKeyAlgorithm , publicRsaJsonWebKeyData . ext , key_ops )
238
- } , Error , "Failed to read the 'key_ops' property from 'JsonWebKey': The provided value cannot be converted to a sequence" )
238
+ } , Error )
239
239
if ( error ) { return error ; }
240
240
return pass ( 'ok' ) ;
241
241
} ) ;
@@ -254,7 +254,7 @@ routes.set("/crypto.subtle", async () => {
254
254
const key_ops = Array . from ( publicRsaJsonWebKeyData . key_ops ) ;
255
255
publicRsaJsonWebKeyData . key_ops = [ "sign" , "sign" ] ;
256
256
await crypto . subtle . importKey ( 'jwk' , publicRsaJsonWebKeyData , rsaJsonWebKeyAlgorithm , publicRsaJsonWebKeyData . ext , key_ops )
257
- } , Error , "The 'key_ops' member of the JWK dictionary contains duplicate usages" )
257
+ } , Error )
258
258
if ( error ) { return error ; }
259
259
return pass ( 'ok' ) ;
260
260
} ) ;
@@ -263,7 +263,7 @@ routes.set("/crypto.subtle", async () => {
263
263
const key_ops = Array . from ( publicRsaJsonWebKeyData . key_ops ) ;
264
264
publicRsaJsonWebKeyData . key_ops = [ "sign" , "jake" ] ;
265
265
await crypto . subtle . importKey ( 'jwk' , publicRsaJsonWebKeyData , rsaJsonWebKeyAlgorithm , publicRsaJsonWebKeyData . ext , key_ops )
266
- } , TypeError , "Invalid keyUsages argument" )
266
+ } , Error )
267
267
if ( error ) { return error ; }
268
268
return pass ( 'ok' ) ;
269
269
} ) ;
@@ -414,15 +414,15 @@ routes.set("/crypto.subtle", async () => {
414
414
let error = await assertRejects ( async ( ) => {
415
415
delete publicEcdsaJsonWebKeyData . kty ;
416
416
await crypto . subtle . importKey ( 'jwk' , publicEcdsaJsonWebKeyData , ecdsaJsonWebKeyAlgorithm , publicEcdsaJsonWebKeyData . ext , publicEcdsaJsonWebKeyData . key_ops )
417
- } , Error , "The required JWK member 'kty' was missing" )
417
+ } , Error )
418
418
if ( error ) { return error ; }
419
419
return pass ( 'ok' ) ;
420
420
} ) ;
421
421
routes . set ( "/crypto.subtle.importKey/ecdsa-jwk-public/second-parameter-invalid-kty-field" , async ( ) => {
422
422
let error = await assertRejects ( async ( ) => {
423
423
publicEcdsaJsonWebKeyData . kty = "jake" ;
424
424
await crypto . subtle . importKey ( 'jwk' , publicEcdsaJsonWebKeyData , ecdsaJsonWebKeyAlgorithm , publicEcdsaJsonWebKeyData . ext , publicEcdsaJsonWebKeyData . key_ops )
425
- } , Error , "The JWK 'kty' member was not 'EC'" )
425
+ } , Error )
426
426
if ( error ) { return error ; }
427
427
return pass ( 'ok' ) ;
428
428
} ) ;
@@ -440,7 +440,7 @@ routes.set("/crypto.subtle", async () => {
440
440
const key_ops = Array . from ( publicEcdsaJsonWebKeyData . key_ops ) ;
441
441
publicEcdsaJsonWebKeyData . key_ops = "jake" ;
442
442
await crypto . subtle . importKey ( 'jwk' , publicEcdsaJsonWebKeyData , ecdsaJsonWebKeyAlgorithm , publicEcdsaJsonWebKeyData . ext , key_ops )
443
- } , Error , "Failed to read the 'key_ops' property from 'JsonWebKey': The provided value cannot be converted to a sequence" )
443
+ } , Error )
444
444
if ( error ) { return error ; }
445
445
return pass ( 'ok' ) ;
446
446
} ) ;
@@ -459,7 +459,7 @@ routes.set("/crypto.subtle", async () => {
459
459
const key_ops = Array . from ( publicEcdsaJsonWebKeyData . key_ops ) ;
460
460
publicEcdsaJsonWebKeyData . key_ops = [ "sign" , "sign" ] ;
461
461
await crypto . subtle . importKey ( 'jwk' , publicEcdsaJsonWebKeyData , ecdsaJsonWebKeyAlgorithm , publicEcdsaJsonWebKeyData . ext , key_ops )
462
- } , Error , "The 'key_ops' member of the JWK dictionary contains duplicate usages" )
462
+ } , Error )
463
463
if ( error ) { return error ; }
464
464
return pass ( 'ok' ) ;
465
465
} ) ;
@@ -468,7 +468,7 @@ routes.set("/crypto.subtle", async () => {
468
468
const key_ops = Array . from ( publicEcdsaJsonWebKeyData . key_ops ) ;
469
469
publicEcdsaJsonWebKeyData . key_ops = [ "sign" , "jake" ] ;
470
470
await crypto . subtle . importKey ( 'jwk' , publicEcdsaJsonWebKeyData , ecdsaJsonWebKeyAlgorithm , publicEcdsaJsonWebKeyData . ext , key_ops )
471
- } , TypeError , "Invalid keyUsages argument" )
471
+ } , Error )
472
472
if ( error ) { return error ; }
473
473
return pass ( 'ok' ) ;
474
474
} ) ;
@@ -566,7 +566,7 @@ routes.set("/crypto.subtle", async () => {
566
566
let error = await assertRejects ( async ( ) => {
567
567
rsaJsonWebKeyAlgorithm . name = "`~!@#@#$Q%^%&^*" ;
568
568
await crypto . subtle . importKey ( 'jwk' , publicRsaJsonWebKeyData , rsaJsonWebKeyAlgorithm , publicRsaJsonWebKeyData . ext , publicRsaJsonWebKeyData . key_ops )
569
- } , Error , "Algorithm: Unrecognized name" )
569
+ } , Error )
570
570
if ( error ) { return error ; }
571
571
return pass ( 'ok' ) ;
572
572
} ) ;
@@ -605,14 +605,14 @@ routes.set("/crypto.subtle", async () => {
605
605
routes . set ( "/crypto.subtle.importKey/fifth-parameter-undefined" , async ( ) => {
606
606
let error = await assertRejects ( async ( ) => {
607
607
await crypto . subtle . importKey ( 'jwk' , publicRsaJsonWebKeyData , rsaJsonWebKeyAlgorithm , publicRsaJsonWebKeyData . ext , undefined )
608
- } , Error , "The provided value cannot be converted to a sequence" )
608
+ } , Error )
609
609
if ( error ) { return error ; }
610
610
return pass ( 'ok' ) ;
611
611
} ) ;
612
612
routes . set ( "/crypto.subtle.importKey/fifth-parameter-invalid" , async ( ) => {
613
613
let error = await assertRejects ( async ( ) => {
614
614
await crypto . subtle . importKey ( 'jwk' , publicRsaJsonWebKeyData , rsaJsonWebKeyAlgorithm , publicRsaJsonWebKeyData . ext , [ "jake" ] )
615
- } , Error , "SubtleCrypto.importKey: Invalid keyUsages argument" )
615
+ } , Error )
616
616
if ( error ) { return error ; }
617
617
return pass ( 'ok' ) ;
618
618
} ) ;
@@ -787,7 +787,7 @@ routes.set("/crypto.subtle", async () => {
787
787
routes . set ( "/crypto.subtle.digest/called-with-wrong-this" , async ( ) => {
788
788
error = await assertRejects ( async ( ) => {
789
789
await crypto . subtle . digest . call ( undefined )
790
- } , TypeError , "Method SubtleCrypto.digest called on receiver that's not an instance of SubtleCrypto" )
790
+ } , TypeError )
791
791
if ( error ) { return error ; }
792
792
return pass ( 'ok' )
793
793
} ) ;
@@ -835,7 +835,7 @@ routes.set("/crypto.subtle", async () => {
835
835
routes . set ( "/crypto.subtle.digest/second-parameter-undefined" , async ( ) => {
836
836
let error = await assertRejects ( async ( ) => {
837
837
await crypto . subtle . digest ( "sha-1" , undefined ) ;
838
- } , Error , "SubtleCrypto.digest: data must be of type ArrayBuffer or ArrayBufferView but got \"\"" ) ;
838
+ } , Error ) ;
839
839
if ( error ) { return error ; }
840
840
return pass ( 'ok' ) ;
841
841
} ) ;
@@ -912,7 +912,7 @@ routes.set("/crypto.subtle", async () => {
912
912
routes . set ( "/crypto.subtle.sign/called-with-wrong-this" , async ( ) => {
913
913
error = await assertRejects ( async ( ) => {
914
914
await crypto . subtle . sign . call ( undefined , rsaJsonWebKeyAlgorithm , publicRsaJsonWebKeyData , data )
915
- } , TypeError , "Method SubtleCrypto.sign called on receiver that's not an instance of SubtleCrypto" )
915
+ } , TypeError )
916
916
if ( error ) { return error ; }
917
917
return pass ( 'ok' ) ;
918
918
} ) ;
@@ -961,7 +961,7 @@ routes.set("/crypto.subtle", async () => {
961
961
routes . set ( "/crypto.subtle.sign/second-parameter-invalid-format" , async ( ) => {
962
962
let error = await assertRejects ( async ( ) => {
963
963
await crypto . subtle . sign ( rsaJsonWebKeyAlgorithm , "jake" , data )
964
- } , Error , "parameter 2 is not of type 'CryptoKey'" )
964
+ } , Error )
965
965
if ( error ) { return error ; }
966
966
return pass ( 'ok' ) ;
967
967
} ) ;
@@ -980,7 +980,7 @@ routes.set("/crypto.subtle", async () => {
980
980
let error = await assertRejects ( async ( ) => {
981
981
const key = await crypto . subtle . importKey ( 'jwk' , publicRsaJsonWebKeyData , rsaJsonWebKeyAlgorithm , publicRsaJsonWebKeyData . ext , publicRsaJsonWebKeyData . key_ops ) ;
982
982
await crypto . subtle . sign ( rsaJsonWebKeyAlgorithm , key , undefined )
983
- } , Error , "SubtleCrypto.sign: data must be of type ArrayBuffer or ArrayBufferView but got \"\"" )
983
+ } , Error )
984
984
if ( error ) { return error ; }
985
985
return pass ( 'ok' ) ;
986
986
} ) ;
@@ -1060,7 +1060,7 @@ routes.set("/crypto.subtle", async () => {
1060
1060
error = await assertRejects ( async ( ) => {
1061
1061
const key = await crypto . subtle . importKey ( 'jwk' , publicRsaJsonWebKeyData , rsaJsonWebKeyAlgorithm , publicRsaJsonWebKeyData . ext , publicRsaJsonWebKeyData . key_ops ) ;
1062
1062
await crypto . subtle . verify . call ( undefined , rsaJsonWebKeyAlgorithm , key , new Uint8Array , new Uint8Array )
1063
- } , TypeError , "Method SubtleCrypto.verify called on receiver that's not an instance of SubtleCrypto" )
1063
+ } , TypeError )
1064
1064
if ( error ) { return error ; }
1065
1065
return pass ( 'ok' ) ;
1066
1066
} ) ;
@@ -1109,7 +1109,7 @@ routes.set("/crypto.subtle", async () => {
1109
1109
routes . set ( "/crypto.subtle.verify/second-parameter-invalid-format" , async ( ) => {
1110
1110
let error = await assertRejects ( async ( ) => {
1111
1111
await crypto . subtle . verify ( rsaJsonWebKeyAlgorithm , "jake" , new Uint8Array , new Uint8Array )
1112
- } , Error , "parameter 2 is not of type 'CryptoKey'" )
1112
+ } , Error )
1113
1113
if ( error ) { return error ; }
1114
1114
return pass ( 'ok' ) ;
1115
1115
} ) ;
@@ -1128,7 +1128,7 @@ routes.set("/crypto.subtle", async () => {
1128
1128
let error = await assertRejects ( async ( ) => {
1129
1129
const key = await crypto . subtle . importKey ( 'jwk' , publicRsaJsonWebKeyData , rsaJsonWebKeyAlgorithm , publicRsaJsonWebKeyData . ext , publicRsaJsonWebKeyData . key_ops ) ;
1130
1130
await crypto . subtle . verify ( rsaJsonWebKeyAlgorithm , key , undefined , new Uint8Array ( ) ) ;
1131
- } , Error , "SubtleCrypto.verify: signature (argument 3) must be of type ArrayBuffer or ArrayBufferView but got \"\"" )
1131
+ } , Error )
1132
1132
if ( error ) { return error ; }
1133
1133
return pass ( 'ok' ) ;
1134
1134
} ) ;
@@ -1139,7 +1139,7 @@ routes.set("/crypto.subtle", async () => {
1139
1139
let error = await assertRejects ( async ( ) => {
1140
1140
const key = await crypto . subtle . importKey ( 'jwk' , publicRsaJsonWebKeyData , rsaJsonWebKeyAlgorithm , publicRsaJsonWebKeyData . ext , publicRsaJsonWebKeyData . key_ops ) ;
1141
1141
await crypto . subtle . verify ( rsaJsonWebKeyAlgorithm , key , new Uint8Array ( ) , undefined ) ;
1142
- } , Error , "SubtleCrypto.verify: data (argument 4) must be of type ArrayBuffer or ArrayBufferView but got \"\"" )
1142
+ } , Error )
1143
1143
if ( error ) { return error ; }
1144
1144
return pass ( 'ok' ) ;
1145
1145
} ) ;
0 commit comments