diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 01:47:29 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 01:47:29 +0000 |
commit | 0ebf5bdf043a27fd3dfb7f92e0cb63d88954c44d (patch) | |
tree | a31f07c9bcca9d56ce61e9a1ffd30ef350d513aa /testing/web-platform/meta/WebCryptoAPI/sign_verify | |
parent | Initial commit. (diff) | |
download | firefox-esr-0ebf5bdf043a27fd3dfb7f92e0cb63d88954c44d.tar.xz firefox-esr-0ebf5bdf043a27fd3dfb7f92e0cb63d88954c44d.zip |
Adding upstream version 115.8.0esr.upstream/115.8.0esr
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/meta/WebCryptoAPI/sign_verify')
5 files changed, 257 insertions, 0 deletions
diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini new file mode 100644 index 0000000000..82e2430519 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini @@ -0,0 +1,74 @@ +[ecdsa.https.any.worker.html] + [ECDSA P-256 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + +[ecdsa.https.any.html] + [ECDSA P-256 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-512 verification failure due to bad hash name] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini new file mode 100644 index 0000000000..d3ad2069a9 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini @@ -0,0 +1,162 @@ +[eddsa.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [importVectorKeys step: EdDSA Ed25519 verification] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 with altered data after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 with altered data after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 no verify usage] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 no verify usage] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 round trip] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 round trip] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to altered data] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to altered data] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verifying with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verifying with wrong algorithm name] + expected: FAIL + + [Sign and verify using generated Ed25519 keys.] + expected: FAIL + + [Sign and verify using generated Ed448 keys.] + expected: FAIL + + +[eddsa.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [importVectorKeys step: EdDSA Ed25519 verification] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 with altered data after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 with altered data after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 no verify usage] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 no verify usage] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 round trip] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 round trip] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to altered data] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to altered data] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verifying with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verifying with wrong algorithm name] + expected: FAIL + + [Sign and verify using generated Ed25519 keys.] + expected: FAIL + + [Sign and verify using generated Ed448 keys.] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini new file mode 100644 index 0000000000..030318f47d --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini @@ -0,0 +1,7 @@ +[hmac.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[hmac.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini new file mode 100644 index 0000000000..b4566ade12 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini @@ -0,0 +1,7 @@ +[rsa_pkcs.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[rsa_pkcs.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini new file mode 100644 index 0000000000..0b8a8bc8ea --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini @@ -0,0 +1,7 @@ +[rsa_pss.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[rsa_pss.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] |