From 26a029d407be480d791972afb5975cf62c9360a6 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Fri, 19 Apr 2024 02:47:55 +0200 Subject: Adding upstream version 124.0.1. Signed-off-by: Daniel Baumann --- .../sign_verify/ecdsa.https.any.js.ini | 74 ++++++++++ .../sign_verify/eddsa.https.any.js.ini | 162 +++++++++++++++++++++ .../WebCryptoAPI/sign_verify/hmac.https.any.js.ini | 7 + .../sign_verify/rsa_pkcs.https.any.js.ini | 7 + .../sign_verify/rsa_pss.https.any.js.ini | 7 + 5 files changed, 257 insertions(+) create mode 100644 testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini create mode 100644 testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini create mode 100644 testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini create mode 100644 testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini create mode 100644 testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini (limited to 'testing/web-platform/meta/WebCryptoAPI/sign_verify') diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini new file mode 100644 index 0000000000..82e2430519 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini @@ -0,0 +1,74 @@ +[ecdsa.https.any.worker.html] + [ECDSA P-256 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + +[ecdsa.https.any.html] + [ECDSA P-256 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-512 verification failure due to bad hash name] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini new file mode 100644 index 0000000000..d3ad2069a9 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini @@ -0,0 +1,162 @@ +[eddsa.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [importVectorKeys step: EdDSA Ed25519 verification] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 with altered data after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 with altered data after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 no verify usage] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 no verify usage] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 round trip] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 round trip] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to altered data] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to altered data] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verifying with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verifying with wrong algorithm name] + expected: FAIL + + [Sign and verify using generated Ed25519 keys.] + expected: FAIL + + [Sign and verify using generated Ed448 keys.] + expected: FAIL + + +[eddsa.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [importVectorKeys step: EdDSA Ed25519 verification] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 with altered data after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 with altered data after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 no verify usage] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 no verify usage] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 round trip] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 round trip] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to altered data] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to altered data] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verifying with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verifying with wrong algorithm name] + expected: FAIL + + [Sign and verify using generated Ed25519 keys.] + expected: FAIL + + [Sign and verify using generated Ed448 keys.] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini new file mode 100644 index 0000000000..030318f47d --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini @@ -0,0 +1,7 @@ +[hmac.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[hmac.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini new file mode 100644 index 0000000000..b4566ade12 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini @@ -0,0 +1,7 @@ +[rsa_pkcs.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[rsa_pkcs.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini new file mode 100644 index 0000000000..0b8a8bc8ea --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini @@ -0,0 +1,7 @@ +[rsa_pss.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[rsa_pss.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] -- cgit v1.2.3