зеркало из https://github.com/mozilla/gecko-dev.git
Backed out changeset 926f53cc7341 (bug 1433144) for build bustage on test_orphan_file_patterns on a CLOSED TREE
--HG-- rename : testing/web-platform/meta/xhr/__dir__.ini => testing/web-platform/meta/XMLHttpRequest/__dir__.ini rename : testing/web-platform/meta/xhr/abort-after-stop.htm.ini => testing/web-platform/meta/XMLHttpRequest/abort-after-stop.htm.ini rename : testing/web-platform/meta/xhr/access-control-basic-cors-safelisted-request-headers.htm.ini => testing/web-platform/meta/XMLHttpRequest/access-control-basic-cors-safelisted-request-headers.htm.ini rename : testing/web-platform/meta/xhr/access-control-preflight-credential-async.htm.ini => testing/web-platform/meta/XMLHttpRequest/access-control-preflight-credential-async.htm.ini rename : testing/web-platform/meta/xhr/access-control-preflight-credential-sync.htm.ini => testing/web-platform/meta/XMLHttpRequest/access-control-preflight-credential-sync.htm.ini rename : testing/web-platform/meta/xhr/data-uri.htm.ini => testing/web-platform/meta/XMLHttpRequest/data-uri.htm.ini rename : testing/web-platform/meta/xhr/event-upload-progress-crossorigin.htm.ini => testing/web-platform/meta/XMLHttpRequest/event-upload-progress-crossorigin.htm.ini rename : testing/web-platform/meta/xhr/historical.html.ini => testing/web-platform/meta/XMLHttpRequest/historical.html.ini rename : testing/web-platform/meta/xhr/open-during-abort-processing.htm.ini => testing/web-platform/meta/XMLHttpRequest/open-during-abort-processing.htm.ini rename : testing/web-platform/meta/xhr/open-url-multi-window-4.htm.ini => testing/web-platform/meta/XMLHttpRequest/open-url-multi-window-4.htm.ini rename : testing/web-platform/meta/xhr/open-url-multi-window-6.htm.ini => testing/web-platform/meta/XMLHttpRequest/open-url-multi-window-6.htm.ini rename : testing/web-platform/meta/xhr/overridemimetype-blob.html.ini => testing/web-platform/meta/XMLHttpRequest/overridemimetype-blob.html.ini rename : testing/web-platform/meta/xhr/responsetext-decoding.htm.ini => testing/web-platform/meta/XMLHttpRequest/responsetext-decoding.htm.ini rename : testing/web-platform/meta/xhr/responsexml-document-properties.htm.ini => testing/web-platform/meta/XMLHttpRequest/responsexml-document-properties.htm.ini rename : testing/web-platform/meta/xhr/send-authentication-basic.htm.ini => testing/web-platform/meta/XMLHttpRequest/send-authentication-basic.htm.ini rename : testing/web-platform/meta/xhr/send-receive-utf16.htm.ini => testing/web-platform/meta/XMLHttpRequest/send-receive-utf16.htm.ini rename : testing/web-platform/meta/xhr/send-redirect-to-cors.htm.ini => testing/web-platform/meta/XMLHttpRequest/send-redirect-to-cors.htm.ini rename : testing/web-platform/meta/xhr/send-response-event-order.htm.ini => testing/web-platform/meta/XMLHttpRequest/send-response-event-order.htm.ini rename : testing/web-platform/meta/xhr/send-response-upload-event-progress.htm.ini => testing/web-platform/meta/XMLHttpRequest/send-response-upload-event-progress.htm.ini rename : testing/web-platform/meta/xhr/send-sync-blocks-async.htm.ini => testing/web-platform/meta/XMLHttpRequest/send-sync-blocks-async.htm.ini rename : testing/web-platform/meta/xhr/setrequestheader-allow-empty-value.htm.ini => testing/web-platform/meta/XMLHttpRequest/setrequestheader-allow-empty-value.htm.ini rename : testing/web-platform/meta/xhr/setrequestheader-allow-whitespace-in-value.htm.ini => testing/web-platform/meta/XMLHttpRequest/setrequestheader-allow-whitespace-in-value.htm.ini rename : testing/web-platform/meta/xhr/setrequestheader-content-type.htm.ini => testing/web-platform/meta/XMLHttpRequest/setrequestheader-content-type.htm.ini rename : testing/web-platform/meta/xhr/xmlhttprequest-sync-default-feature-policy.sub.html.ini => testing/web-platform/meta/XMLHttpRequest/xmlhttprequest-sync-default-feature-policy.sub.html.ini rename : testing/web-platform/meta/xhr/xmlhttprequest-timeout-overridesexpires.html.ini => testing/web-platform/meta/XMLHttpRequest/xmlhttprequest-timeout-overridesexpires.html.ini rename : testing/web-platform/meta/quirks/line-height-calculation.html.ini => testing/web-platform/meta/quirks-mode/line-height-calculation.html.ini rename : testing/web-platform/meta/quirks/percentage-height-calculation.html.ini => testing/web-platform/meta/quirks-mode/percentage-height-calculation.html.ini rename : testing/web-platform/meta/quirks/table-cell-width-calculation.html.ini => testing/web-platform/meta/quirks-mode/table-cell-width-calculation.html.ini
This commit is contained in:
Родитель
02fd157dd1
Коммит
2d283eea75
|
@ -1,10 +0,0 @@
|
|||
[createImageBitmap-drawImage.html]
|
||||
[createImageBitmap from an OffscreenCanvas, and drawImage on the created ImageBitmap]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap from an OffscreenCanvas with negative sw/sh, and drawImage on the created ImageBitmap]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap from a Blob with negative sw/sh, and drawImage on the created ImageBitmap]
|
||||
expected: FAIL
|
||||
|
|
@ -80,78 +80,3 @@
|
|||
[createImageBitmap with an available but undecodable image source rejects with an InvalidStateError.]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a an HTMLCanvasElement source and sw set to 0]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a an HTMLCanvasElement source and sh set to 0]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a an HTMLCanvasElement source and oversized (unallocatable) crop region]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a an HTMLVideoElement source and sw set to 0]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a an HTMLVideoElement source and sh set to 0]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a an HTMLVideoElement source and oversized (unallocatable) crop region]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a an HTMLImageElement source and sw set to 0]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a an HTMLImageElement source and sh set to 0]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a an HTMLImageElement source and oversized (unallocatable) crop region]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a an OffscreenCanvas source and sw set to 0]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a an OffscreenCanvas source and sh set to 0]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a an OffscreenCanvas source and oversized (unallocatable) crop region]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a an ImageData source and sw set to 0]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a an ImageData source and sh set to 0]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a an ImageData source and oversized (unallocatable) crop region]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a an ImageBitmap source and sw set to 0]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a an ImageBitmap source and sh set to 0]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a an ImageBitmap source and oversized (unallocatable) crop region]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a a Blob source and sw set to 0]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a a Blob source and sh set to 0]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with an oversized canvas source.]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with an invalid OffscreenCanvas source.]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a broken image source.]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with an available but undecodable image source.]
|
||||
expected: FAIL
|
||||
|
||||
[createImageBitmap with a closed ImageBitmap.]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -0,0 +1,4 @@
|
|||
[Blob-Request-revoke-fetch.html]
|
||||
[Revoke blob URL after creating Request, will fetch]
|
||||
expected: FAIL
|
||||
|
|
@ -1,39 +0,0 @@
|
|||
[sandboxed-iframe.html]
|
||||
[Blob URL parses correctly]
|
||||
expected:
|
||||
if not debug and stylo and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
|
||||
if debug and stylo and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
|
||||
|
||||
[Only exact matches should revoke URLs, using XHR]
|
||||
expected: FAIL
|
||||
|
||||
[Appending a query string should cause XHR to fail]
|
||||
expected: FAIL
|
||||
|
||||
[XHR with method "HEAD" should fail]
|
||||
expected: FAIL
|
||||
|
||||
[XHR with method "POST" should fail]
|
||||
expected: FAIL
|
||||
|
||||
[XHR with method "DELETE" should fail]
|
||||
expected: FAIL
|
||||
|
||||
[XHR with method "OPTIONS" should fail]
|
||||
expected: FAIL
|
||||
|
||||
[XHR with method "PUT" should fail]
|
||||
expected: FAIL
|
||||
|
||||
[XHR with method "CUSTOM" should fail]
|
||||
expected: FAIL
|
||||
|
||||
[Only exact matches should revoke URLs, using fetch]
|
||||
expected: FAIL
|
||||
|
||||
[Appending a query string should cause fetch to fail]
|
||||
expected: FAIL
|
||||
|
||||
[Revoke blob URL after creating Request, will fetch]
|
||||
expected: FAIL
|
||||
|
|
@ -1,6 +0,0 @@
|
|||
[url-format.any.html]
|
||||
[Blob URL parses correctly]
|
||||
expected:
|
||||
if not debug and stylo and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
|
||||
if debug and stylo and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
[url-in-tags.window.html]
|
||||
[Blob URL fragment is implemented.]
|
||||
expected: FAIL
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
[url-lifetime.html]
|
||||
[Terminating worker revokes its URLs]
|
||||
expected: FAIL
|
||||
|
|
@ -1,28 +0,0 @@
|
|||
[url-with-fetch.any.html]
|
||||
[Only exact matches should revoke URLs, using fetch]
|
||||
expected: FAIL
|
||||
|
||||
[Appending a query string should cause fetch to fail]
|
||||
expected: FAIL
|
||||
|
||||
[Revoke blob URL after creating Request, will fetch]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[url-with-fetch.any.worker.html]
|
||||
expected:
|
||||
if debug and not stylo and e10s and (os == "linux") and (version == "Ubuntu 16.04") and (processor == "x86") and (bits == 32): CRASH
|
||||
if debug and not stylo and e10s and (os == "linux") and (version == "Ubuntu 16.04") and (processor == "x86_64") and (bits == 64): CRASH
|
||||
if debug and stylo and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): CRASH
|
||||
if debug and stylo and e10s and (os == "win") and (version == "10.0.15063") and (processor == "x86_64") and (bits == 64): CRASH
|
||||
if debug and stylo and e10s and (os == "linux") and (version == "Ubuntu 16.04") and (processor == "x86_64") and (bits == 64): CRASH
|
||||
if debug and stylo and e10s and (os == "linux") and (version == "Ubuntu 16.04") and (processor == "x86") and (bits == 32): CRASH
|
||||
[Only exact matches should revoke URLs, using fetch]
|
||||
expected: FAIL
|
||||
|
||||
[Appending a query string should cause fetch to fail]
|
||||
expected: FAIL
|
||||
|
||||
[Revoke blob URL after creating Request, will fetch]
|
||||
expected: FAIL
|
||||
|
|
@ -1,58 +0,0 @@
|
|||
[url-with-xhr.any.worker.html]
|
||||
expected: TIMEOUT
|
||||
[XHR of a revoked URL should fail]
|
||||
expected: TIMEOUT
|
||||
|
||||
[Only exact matches should revoke URLs, using XHR]
|
||||
expected: NOTRUN
|
||||
|
||||
[Appending a query string should cause XHR to fail]
|
||||
expected: NOTRUN
|
||||
|
||||
[Appending a path should cause XHR to fail]
|
||||
expected: NOTRUN
|
||||
|
||||
[XHR with method "HEAD" should fail]
|
||||
expected: NOTRUN
|
||||
|
||||
[XHR with method "POST" should fail]
|
||||
expected: NOTRUN
|
||||
|
||||
[XHR with method "DELETE" should fail]
|
||||
expected: NOTRUN
|
||||
|
||||
[XHR with method "OPTIONS" should fail]
|
||||
expected: NOTRUN
|
||||
|
||||
[XHR with method "PUT" should fail]
|
||||
expected: NOTRUN
|
||||
|
||||
[XHR with method "CUSTOM" should fail]
|
||||
expected: NOTRUN
|
||||
|
||||
|
||||
[url-with-xhr.any.html]
|
||||
[Only exact matches should revoke URLs, using XHR]
|
||||
expected: FAIL
|
||||
|
||||
[Appending a query string should cause XHR to fail]
|
||||
expected: FAIL
|
||||
|
||||
[XHR with method "HEAD" should fail]
|
||||
expected: FAIL
|
||||
|
||||
[XHR with method "POST" should fail]
|
||||
expected: FAIL
|
||||
|
||||
[XHR with method "DELETE" should fail]
|
||||
expected: FAIL
|
||||
|
||||
[XHR with method "OPTIONS" should fail]
|
||||
expected: FAIL
|
||||
|
||||
[XHR with method "PUT" should fail]
|
||||
expected: FAIL
|
||||
|
||||
[XHR with method "CUSTOM" should fail]
|
||||
expected: FAIL
|
||||
|
|
@ -1,2 +0,0 @@
|
|||
[ecdh_bits.https.worker.html]
|
||||
expected: TIMEOUT
|
|
@ -0,0 +1,5 @@
|
|||
[ecdh_bits.worker]
|
||||
expected: TIMEOUT
|
||||
|
||||
[ecdh_bits.worker.html]
|
||||
expected: TIMEOUT
|
|
@ -1,2 +0,0 @@
|
|||
[ecdh_keys.https.worker.html]
|
||||
expected: TIMEOUT
|
|
@ -0,0 +1,5 @@
|
|||
[ecdh_keys.worker]
|
||||
expected: TIMEOUT
|
||||
|
||||
[ecdh_keys.worker.html]
|
||||
expected: TIMEOUT
|
Разница между файлами не показана из-за своего большого размера
Загрузить разницу
Разница между файлами не показана из-за своего большого размера
Загрузить разницу
Разница между файлами не показана из-за своего большого размера
Загрузить разницу
Разница между файлами не показана из-за своего большого размера
Загрузить разницу
|
@ -1,37 +0,0 @@
|
|||
[aes_cbc.https.worker.html]
|
||||
[AES-CBC 128-bit key, 64-bit IV]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 128-bit key, 192-bit IV]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 192-bit key, 64-bit IV]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 192-bit key, 192-bit IV]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 256-bit key, 64-bit IV]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 256-bit key, 192-bit IV]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 128-bit key, 64-bit IV decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 128-bit key, 192-bit IV decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 192-bit key, 64-bit IV decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 192-bit key, 192-bit IV decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 256-bit key, 64-bit IV decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 256-bit key, 192-bit IV decryption]
|
||||
expected: FAIL
|
||||
|
|
@ -0,0 +1,75 @@
|
|||
[aes_cbc.worker]
|
||||
[AES-CBC 128-bit key, 64-bit IV]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 128-bit key, 192-bit IV]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 192-bit key, 64-bit IV]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 192-bit key, 192-bit IV]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 256-bit key, 64-bit IV]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 256-bit key, 192-bit IV]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 128-bit key, 64-bit IV decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 128-bit key, 192-bit IV decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 192-bit key, 64-bit IV decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 192-bit key, 192-bit IV decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 256-bit key, 64-bit IV decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 256-bit key, 192-bit IV decryption]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[aes_cbc.worker.html]
|
||||
[AES-CBC 128-bit key, 64-bit IV]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 128-bit key, 192-bit IV]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 192-bit key, 64-bit IV]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 192-bit key, 192-bit IV]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 256-bit key, 64-bit IV]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 256-bit key, 192-bit IV]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 128-bit key, 64-bit IV decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 128-bit key, 192-bit IV decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 192-bit key, 64-bit IV decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 192-bit key, 192-bit IV decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 256-bit key, 64-bit IV decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-CBC 256-bit key, 192-bit IV decryption]
|
||||
expected: FAIL
|
||||
|
|
@ -1,109 +0,0 @@
|
|||
[aes_gcm.https.worker.html]
|
||||
[AES-GCM 128-bit key, illegal tag length 24-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 48-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 72-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 95-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 129-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 256-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 24-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 48-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 72-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 95-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 129-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 256-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 24-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 48-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 72-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 95-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 129-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 256-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 24-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 48-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 72-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 95-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 129-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 256-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 24-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 48-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 72-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 95-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 129-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 256-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 24-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 48-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 72-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 95-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 129-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 256-bits decryption]
|
||||
expected: FAIL
|
||||
|
|
@ -0,0 +1,219 @@
|
|||
[aes_gcm.worker]
|
||||
[AES-GCM 128-bit key, illegal tag length 24-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 48-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 72-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 95-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 129-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 256-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 24-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 48-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 72-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 95-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 129-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 256-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 24-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 48-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 72-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 95-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 129-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 256-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 24-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 48-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 72-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 95-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 129-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 256-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 24-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 48-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 72-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 95-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 129-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 256-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 24-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 48-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 72-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 95-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 129-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 256-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[aes_gcm.worker.html]
|
||||
[AES-GCM 128-bit key, illegal tag length 24-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 48-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 72-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 95-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 129-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 256-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 24-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 48-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 72-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 95-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 129-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 256-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 24-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 48-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 72-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 95-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 129-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 256-bits]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 24-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 48-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 72-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 95-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 129-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, illegal tag length 256-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 24-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 48-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 72-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 95-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 129-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, illegal tag length 256-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 24-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 48-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 72-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 95-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 129-bits decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, illegal tag length 256-bits decryption]
|
||||
expected: FAIL
|
||||
|
|
@ -1,31 +0,0 @@
|
|||
[idlharness.https.worker.html]
|
||||
[ArrayBuffer interface: existence and properties of interface object]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface object]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface object length]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface object name]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface prototype object]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface prototype object's "constructor" property]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute type]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute extractable]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute algorithm]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute usages]
|
||||
expected: FAIL
|
||||
|
|
@ -0,0 +1,63 @@
|
|||
[idlharness.worker]
|
||||
[CryptoKey interface: existence and properties of interface object]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface object length]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface object name]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface prototype object]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface prototype object's "constructor" property]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute type]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute extractable]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute algorithm]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute usages]
|
||||
expected: FAIL
|
||||
|
||||
[ArrayBuffer interface: existence and properties of interface object]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[idlharness.worker.html]
|
||||
[ArrayBuffer interface: existence and properties of interface object]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface object]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface object length]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface object name]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface prototype object]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface prototype object's "constructor" property]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute type]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute extractable]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute algorithm]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute usages]
|
||||
expected: FAIL
|
||||
|
|
@ -1,91 +0,0 @@
|
|||
[ec_importKey.https.worker.html]
|
||||
[Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
|
@ -0,0 +1,183 @@
|
|||
[ec_importKey.worker]
|
||||
[Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[ec_importKey.worker.html]
|
||||
[Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
|
@ -1,505 +0,0 @@
|
|||
[ecdsa.https.worker.html]
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-256 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-384 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-512 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-1 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-256 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-384 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-512 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-1 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-256 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-384 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-512 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-256 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-384 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-512 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-1 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-256 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-384 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-512 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-1 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-256 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-384 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-512 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-256 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-384 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-512 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-1 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-256 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-384 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-512 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-1 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-256 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-384 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-512 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-256 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-384 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-512 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-1 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-256 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-384 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-512 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-1 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-256 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-384 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-512 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-256 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-384 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-512 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-1 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-256 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-384 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-512 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-1 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-256 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-384 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-512 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-256 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-384 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-512 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-1 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-256 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-384 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-512 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-1 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-256 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-384 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-512 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-256 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-384 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-512 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-1 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-256 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-384 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-512 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-1 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-256 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-384 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-512 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to wrong hash]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to wrong hash]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to wrong hash]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to wrong hash]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to wrong hash]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to wrong hash]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to wrong hash]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to wrong hash]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to wrong hash]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to wrong hash]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to wrong hash]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to wrong hash]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to bad hash name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to bad hash name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to bad hash name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to bad hash name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to bad hash name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to bad hash name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to bad hash name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to bad hash name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to bad hash name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to bad hash name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to bad hash name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to bad hash name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to shortened signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to shortened signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to shortened signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to shortened signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to shortened signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to shortened signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to shortened signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to shortened signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to shortened signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to shortened signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to shortened signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to shortened signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-256 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-384 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-512 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-1 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-256 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-384 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-512 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-1 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-512 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-256 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-256 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-384 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-512 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-256 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-1 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-384 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-512 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-1 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-512 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-256 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-384 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-384 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
Разница между файлами не показана из-за своего большого размера
Загрузить разницу
|
@ -1,213 +1,59 @@
|
|||
[wrapKey_unwrapKey.https.worker.html]
|
||||
expected: TIMEOUT
|
||||
[Can wrap and unwrap ECDH public key keys using spki and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Could not run all tests]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap ECDH private key non-extractable keys using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[wrapKey_unwrapKey.worker]
|
||||
[Can wrap and unwrap AES-KW keys using raw and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap AES-KW non-extractable keys using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using spki and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-CTR]
|
||||
[Can wrap and unwrap ECDH public key keys using spki and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap ECDSA private key non-extractable keys using jwk and AES-CTR]
|
||||
[Can wrap and unwrap ECDH public key keys using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using spki and AES-CBC]
|
||||
[Can wrap and unwrap ECDH private key keys using pkcs8 and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap ECDH private key non-extractable keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using raw and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap AES-KW non-extractable keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using spki and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap ECDSA private key non-extractable keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using spki and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap ECDH private key non-extractable keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using raw and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap AES-KW non-extractable keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using spki and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap ECDSA private key non-extractable keys using jwk and AES-GCM]
|
||||
[Can wrap and unwrap ECDH private key keys using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap RSA-PSS private key keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using spki and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap ECDH private key non-extractable keys using jwk and AES-KW]
|
||||
[Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CTR keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CBC keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using raw and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap AES-KW non-extractable keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-GCM keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-KW]
|
||||
[Can wrap and unwrap AES-KW keys using raw and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap HMAC keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-KW]
|
||||
[Can wrap and unwrap RSA-PSS private key keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using spki and AES-KW]
|
||||
|
@ -216,57 +62,414 @@
|
|||
[Can wrap and unwrap ECDSA public key keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-KW]
|
||||
[Can wrap and unwrap ECDH public key keys using spki and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap ECDSA private key non-extractable keys using jwk and AES-KW]
|
||||
[Can wrap and unwrap ECDH public key keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using spki and RSA-OAEP]
|
||||
[Can wrap and unwrap ECDH private key keys using pkcs8 and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using jwk and RSA-OAEP]
|
||||
[Can wrap and unwrap ECDH private key keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using jwk and RSA-OAEP]
|
||||
[Can wrap and unwrap AES-KW keys using raw and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys as non-extractable using jwk and RSA-OAEP]
|
||||
[Can wrap and unwrap AES-KW keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap ECDH private key non-extractable keys using jwk and RSA-OAEP]
|
||||
[Can wrap and unwrap ECDSA public key keys using spki and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using spki and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using pkcs8 and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using raw and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using spki and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using spki and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using pkcs8 and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap AES-KW non-extractable keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using spki and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using pkcs8 and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using spki and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using pkcs8 and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[wrapKey_unwrapKey.worker.html]
|
||||
expected: TIMEOUT
|
||||
[Can wrap and unwrap AES-KW keys using raw and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using spki and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using spki and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using pkcs8 and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap RSA-PSS private key keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CTR keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CBC keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-GCM keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using raw and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap HMAC keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using spki and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using spki and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using pkcs8 and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using raw and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using spki and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using spki and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using pkcs8 and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using raw and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using spki and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using spki and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using pkcs8 and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using spki and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA public key keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using pkcs8 and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using spki and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH public key keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using pkcs8 and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap AES-KW non-extractable keys using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Could not run all tests]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap ECDSA private key non-extractable keys using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap ECDH private key non-extractable keys using jwk and AES-CTR]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys as non-extractable using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap RSA-OAEP private key keys as non-extractable using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-GCM keys as non-extractable using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap AES-KW non-extractable keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap HMAC keys as non-extractable using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap ECDSA private key non-extractable keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap RSA-PSS private key keys as non-extractable using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap ECDH private key non-extractable keys using jwk and AES-KW]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap AES-KW non-extractable keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap ECDSA private key non-extractable keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap ECDH private key non-extractable keys using jwk and AES-GCM]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using raw and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap AES-KW non-extractable keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap ECDSA private key non-extractable keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys as non-extractable using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap ECDH private key non-extractable keys using jwk and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap AES-KW non-extractable keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDSA private key keys as non-extractable using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap ECDSA private key non-extractable keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap ECDH private key keys as non-extractable using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap ECDH private key non-extractable keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
|
@ -2,6 +2,3 @@
|
|||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[Accelerometer Feature Policy Test: Disabled]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -2,6 +2,3 @@
|
|||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[Accelerometer Feature Policy Test: Enabled by attribute redirect on load]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -2,6 +2,3 @@
|
|||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[Accelerometer Feature Policy Test: Enabled by attribute]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -2,6 +2,3 @@
|
|||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[Accelerometer Feature Policy Test: Enabled]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -2,6 +2,3 @@
|
|||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[Accelerometer Feature Policy Test: Enabled on self origin]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -2,6 +2,3 @@
|
|||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[AmbientLightSensor Feature Policy Test: Disabled]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -2,6 +2,3 @@
|
|||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[AmbientLightSensor Feature Policy Test: Enabled by attribute redirect on load]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -2,6 +2,3 @@
|
|||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[AmbientLightSensor Feature Policy Test: Enabled by attribute]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -2,6 +2,3 @@
|
|||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[AmbientLightSensor Feature Policy Test: Enabled]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -2,6 +2,3 @@
|
|||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[AmbientLightSensor Feature Policy Test: Enabled on self origin]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[beacon-navigate.html]
|
||||
expected: TIMEOUT
|
||||
[Verify 'navigator.sendbeacon()' successfully sends for variant: NoData-beacon-NAVIGATE]
|
||||
expected: TIMEOUT
|
||||
|
||||
[Verify 'navigator.sendbeacon()' successfully sends for variant: NullData-beacon-NAVIGATE]
|
||||
expected: TIMEOUT
|
||||
|
||||
[Verify 'navigator.sendbeacon()' successfully sends for variant: UndefinedData-beacon-NAVIGATE]
|
||||
expected: TIMEOUT
|
||||
|
||||
[Verify 'navigator.sendbeacon()' successfully sends for variant: SmallString-beacon-NAVIGATE]
|
||||
expected: TIMEOUT
|
||||
|
||||
[Verify 'navigator.sendbeacon()' successfully sends for variant: SmallBlob-beacon-NAVIGATE]
|
||||
expected: TIMEOUT
|
||||
|
||||
[Verify 'navigator.sendbeacon()' successfully sends for variant: SmallBufferSource-beacon-NAVIGATE]
|
||||
expected: TIMEOUT
|
||||
|
||||
[Verify 'navigator.sendbeacon()' successfully sends for variant: SmallFormData-beacon-NAVIGATE]
|
||||
expected: TIMEOUT
|
||||
|
||||
[Verify 'navigator.sendbeacon()' successfully sends for variant: SmallSafeContentTypeEncoded-beacon-NAVIGATE]
|
||||
expected: TIMEOUT
|
||||
|
||||
[Verify 'navigator.sendbeacon()' successfully sends for variant: SmallSafeContentTypeForm-beacon-NAVIGATE]
|
||||
expected: TIMEOUT
|
||||
|
||||
[Verify 'navigator.sendbeacon()' successfully sends for variant: SmallSafeContentTypeText-beacon-NAVIGATE]
|
||||
expected: TIMEOUT
|
||||
|
|
@ -1,2 +1,3 @@
|
|||
[report-uri-does-not-respect-base-uri.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[blob-urls-do-not-match-self.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[connect-src-beacon-redirect-to-blocked.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
[connect-src-eventsource-blocked.sub.html]
|
||||
type: testharness
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[connect-src-xmlhttprequest-redirect-to-blocked.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[worker-from-guid.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[font-stylesheet-font-blocked.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[generic-0_10_1.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[generic-0_2_2.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[generic-0_2_3.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[generic-0_8_1.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[report-blocked-data-uri.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[object-src-url-blocked.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,3 +0,0 @@
|
|||
[prefetch-allowed.html]
|
||||
[Prefetch succeeds when allowed by prefetch-src]
|
||||
expected: FAIL
|
|
@ -1,5 +0,0 @@
|
|||
[prefetch-blocked.html]
|
||||
expected: TIMEOUT
|
||||
[Blocked prefetch generates report.]
|
||||
expected: TIMEOUT
|
||||
|
|
@ -1,5 +0,0 @@
|
|||
[prefetch-header-allowed.html]
|
||||
expected: TIMEOUT
|
||||
[Prefetch via `Link` header succeeds when allowed by prefetch-src]
|
||||
expected: TIMEOUT
|
||||
|
|
@ -1,5 +0,0 @@
|
|||
[prefetch-header-blocked.html]
|
||||
expected: TIMEOUT
|
||||
[Prefetch via `Link` header succeeds when allowed by prefetch-src]
|
||||
expected: TIMEOUT
|
||||
|
|
@ -1,2 +1,3 @@
|
|||
[reporting-api-report-to-overrides-report-uri-1.https.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[reporting-api-report-to-overrides-report-uri-2.https.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[injected-inline-script-blocked.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[script-src-1_1.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -2,3 +2,4 @@
|
|||
disabled:
|
||||
if os == "win": bug 1172411
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -2,3 +2,4 @@
|
|||
disabled:
|
||||
if os == "win": bug 1094323
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -2,3 +2,4 @@
|
|||
disabled:
|
||||
if os == "win": bug 1094323
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[script-src-strict_dynamic_discard_whitelist.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[script-src-strict_dynamic_double_policy_different_nonce.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
[script-src-strict_dynamic_double_policy_report_only.html]
|
||||
type: testharness
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[script-src-strict_dynamic_javascript_uri.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[script-src-strict_dynamic_non_parser_inserted_incorrect_nonce.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[scripthash-unicode-normalization.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[scriptnonce-and-scripthash.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[scriptnonce-ignore-unsafeinline.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[securitypolicyviolation-block-image.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
[upgrade-insecure-requests-reporting.https.html]
|
||||
type: testharness
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[injected-inline-style-blocked.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,2 +1,3 @@
|
|||
[inline-style-allowed-while-cloning-objects.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
Некоторые файлы не были показаны из-за слишком большого количества измененных файлов Показать больше
Загрузка…
Ссылка в новой задаче