diff options
Diffstat (limited to 'testing/web-platform/meta/WebCryptoAPI/generateKey')
28 files changed, 955 insertions, 0 deletions
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.https.any.js.ini new file mode 100644 index 0000000000..b111d17818 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.https.any.js.ini @@ -0,0 +1,2 @@ +[failures_AES-CBC.https.any.worker.html] + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini new file mode 100644 index 0000000000..a9cfe36431 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini @@ -0,0 +1,8 @@ +[failures_AES-CTR.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_AES-CTR.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini new file mode 100644 index 0000000000..c4d448df14 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini @@ -0,0 +1,8 @@ +[failures_AES-GCM.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_AES-GCM.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini new file mode 100644 index 0000000000..16b793476a --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini @@ -0,0 +1,8 @@ +[failures_AES-KW.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_AES-KW.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini new file mode 100644 index 0000000000..fabdc0a3eb --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini @@ -0,0 +1,8 @@ +[failures_ECDH.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_ECDH.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini new file mode 100644 index 0000000000..04d4f618b3 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini @@ -0,0 +1,8 @@ +[failures_ECDSA.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_ECDSA.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini new file mode 100644 index 0000000000..2778d7434f --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini @@ -0,0 +1,85 @@ +[failures_Ed25519.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_Ed25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed25519}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed25519}, true, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini new file mode 100644 index 0000000000..8941a9ed9c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini @@ -0,0 +1,86 @@ +[failures_Ed448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed448}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed448}, true, [\])] + expected: FAIL + + +[failures_Ed448.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini new file mode 100644 index 0000000000..e55b53a962 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini @@ -0,0 +1,8 @@ +[failures_HMAC.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_HMAC.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini new file mode 100644 index 0000000000..f982a3bf10 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini @@ -0,0 +1,8 @@ +[failures_RSA-OAEP.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_RSA-OAEP.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini new file mode 100644 index 0000000000..436da8dc0c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini @@ -0,0 +1,8 @@ +[failures_RSA-PSS.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_RSA-PSS.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini new file mode 100644 index 0000000000..b39364a70b --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini @@ -0,0 +1,8 @@ +[failures_RSASSA-PKCS1-v1_5.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_RSASSA-PKCS1-v1_5.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini new file mode 100644 index 0000000000..e376ff05c3 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini @@ -0,0 +1,104 @@ +[failures_X25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({name: X25519}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: X25519}, true, [\])] + expected: FAIL + + +[failures_X25519.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini new file mode 100644 index 0000000000..2b307ee49e --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini @@ -0,0 +1,103 @@ +[failures_X448.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_X448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({name: X448}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: X448}, true, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini new file mode 100644 index 0000000000..91a523f00f --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini @@ -0,0 +1,8 @@ +[successes_AES-CBC.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_AES-CBC.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini new file mode 100644 index 0000000000..399972f3fd --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini @@ -0,0 +1,8 @@ +[successes_AES-CTR.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_AES-CTR.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini new file mode 100644 index 0000000000..0fdb35351c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini @@ -0,0 +1,8 @@ +[successes_AES-GCM.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_AES-GCM.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini new file mode 100644 index 0000000000..813b2e309d --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini @@ -0,0 +1,8 @@ +[successes_AES-KW.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_AES-KW.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini new file mode 100644 index 0000000000..4be8cda7fa --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini @@ -0,0 +1,8 @@ +[successes_ECDH.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_ECDH.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini new file mode 100644 index 0000000000..71add4fc60 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini @@ -0,0 +1,8 @@ +[successes_ECDSA.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_ECDSA.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini new file mode 100644 index 0000000000..ad20709733 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini @@ -0,0 +1,62 @@ +[successes_Ed25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: ED25519}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + +[successes_Ed25519.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini new file mode 100644 index 0000000000..77b604dcd1 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini @@ -0,0 +1,62 @@ +[successes_Ed448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: ED448}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed448}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + +[successes_Ed448.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini new file mode 100644 index 0000000000..255c9f33ac --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini @@ -0,0 +1,8 @@ +[successes_HMAC.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_HMAC.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini new file mode 100644 index 0000000000..490ddd3fec --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini @@ -0,0 +1,143 @@ +[successes_RSA-OAEP.https.any.worker.html?111-120] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?141-150] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?151-last] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?51-60] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?31-40] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?21-30] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?61-70] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?81-90] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?71-80] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?101-110] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?41-50] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?1-10] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?91-100] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?131-140] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?11-20] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?121-130] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.html?11-20] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?141-150] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?131-140] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?1-10] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?61-70] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?21-30] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?31-40] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?151-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?71-80] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?81-90] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?101-110] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?41-50] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?91-100] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?111-120] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?51-60] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?121-130] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini new file mode 100644 index 0000000000..3cfa96844b --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini @@ -0,0 +1,35 @@ +[successes_RSA-PSS.https.any.worker.html?11-20] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-PSS.https.any.worker.html?1-10] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-PSS.https.any.worker.html?31-last] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-PSS.https.any.worker.html?21-30] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-PSS.https.any.html?1-10] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.html?21-30] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.html?11-20] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.html?31-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini new file mode 100644 index 0000000000..ba8df85738 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini @@ -0,0 +1,35 @@ +[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?11-20] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?1-10] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?31-last] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?21-30] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSASSA-PKCS1-v1_5.https.any.html?21-30] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.html?1-10] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.html?11-20] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.html?31-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini new file mode 100644 index 0000000000..7659d99ecf --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini @@ -0,0 +1,55 @@ +[successes_X25519.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_X25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini new file mode 100644 index 0000000000..decd31f20a --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini @@ -0,0 +1,55 @@ +[successes_X448.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_X448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: X448}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL |