diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 17:32:43 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 17:32:43 +0000 |
commit | 6bf0a5cb5034a7e684dcc3500e841785237ce2dd (patch) | |
tree | a68f146d7fa01f0134297619fbe7e33db084e0aa /testing/web-platform/meta/WebCryptoAPI/generateKey | |
parent | Initial commit. (diff) | |
download | thunderbird-upstream.tar.xz thunderbird-upstream.zip |
Adding upstream version 1:115.7.0.upstream/1%115.7.0upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/meta/WebCryptoAPI/generateKey')
27 files changed, 1453 insertions, 0 deletions
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini new file mode 100644 index 0000000000..c1d28527e5 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini @@ -0,0 +1,7 @@ +[failures_AES-CTR.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[failures_AES-CTR.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini new file mode 100644 index 0000000000..52e022b43f --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini @@ -0,0 +1,7 @@ +[failures_AES-GCM.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[failures_AES-GCM.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini new file mode 100644 index 0000000000..2fc5839c41 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini @@ -0,0 +1,7 @@ +[failures_AES-KW.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[failures_AES-KW.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini new file mode 100644 index 0000000000..e7a7a9a1a2 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini @@ -0,0 +1,7 @@ +[failures_ECDH.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[failures_ECDH.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini new file mode 100644 index 0000000000..c6104227ec --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini @@ -0,0 +1,7 @@ +[failures_ECDSA.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[failures_ECDSA.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini new file mode 100644 index 0000000000..e6e9903bc3 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini @@ -0,0 +1,162 @@ +[failures_Ed25519.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed25519}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed25519}, true, [\])] + expected: FAIL + + +[failures_Ed25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed25519}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed25519}, true, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini new file mode 100644 index 0000000000..176963bdc3 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini @@ -0,0 +1,162 @@ +[failures_Ed448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed448}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed448}, true, [\])] + expected: FAIL + + +[failures_Ed448.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed448}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed448}, true, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini new file mode 100644 index 0000000000..e020fe4b59 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini @@ -0,0 +1,7 @@ +[failures_HMAC.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[failures_HMAC.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini new file mode 100644 index 0000000000..9cc9d4e55c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini @@ -0,0 +1,7 @@ +[failures_RSA-OAEP.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[failures_RSA-OAEP.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini new file mode 100644 index 0000000000..df0d770ad4 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini @@ -0,0 +1,7 @@ +[failures_RSA-PSS.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[failures_RSA-PSS.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini new file mode 100644 index 0000000000..3225308e18 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini @@ -0,0 +1,7 @@ +[failures_RSASSA-PKCS1-v1_5.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[failures_RSASSA-PKCS1-v1_5.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini new file mode 100644 index 0000000000..f512be11d7 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini @@ -0,0 +1,198 @@ +[failures_X25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({name: X25519}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: X25519}, true, [\])] + expected: FAIL + + +[failures_X25519.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({name: X25519}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: X25519}, true, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini new file mode 100644 index 0000000000..d107f088c9 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini @@ -0,0 +1,198 @@ +[failures_X448.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({name: X448}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: X448}, true, [\])] + expected: FAIL + + +[failures_X448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({name: X448}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: X448}, true, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini new file mode 100644 index 0000000000..154517b671 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini @@ -0,0 +1,7 @@ +[successes_AES-CBC.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_AES-CBC.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini new file mode 100644 index 0000000000..077e3bc36b --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini @@ -0,0 +1,7 @@ +[successes_AES-CTR.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_AES-CTR.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini new file mode 100644 index 0000000000..ebf49847b2 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini @@ -0,0 +1,7 @@ +[successes_AES-GCM.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_AES-GCM.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini new file mode 100644 index 0000000000..f38ab81c97 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini @@ -0,0 +1,7 @@ +[successes_AES-KW.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_AES-KW.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini new file mode 100644 index 0000000000..52c399a706 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini @@ -0,0 +1,7 @@ +[successes_ECDH.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_ECDH.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini new file mode 100644 index 0000000000..851344cdd8 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini @@ -0,0 +1,7 @@ +[successes_ECDSA.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_ECDSA.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini new file mode 100644 index 0000000000..349f03a13c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini @@ -0,0 +1,114 @@ +[successes_Ed25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: ED25519}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + +[successes_Ed25519.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: ED25519}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini new file mode 100644 index 0000000000..e7d962950c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini @@ -0,0 +1,114 @@ +[successes_Ed448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: ED448}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed448}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + +[successes_Ed448.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: ED448}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed448}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini new file mode 100644 index 0000000000..7b674a7c6d --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini @@ -0,0 +1,7 @@ +[successes_HMAC.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_HMAC.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini new file mode 100644 index 0000000000..1853e2b6ff --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini @@ -0,0 +1,127 @@ +[successes_RSA-OAEP.https.any.worker.html?111-120] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?141-150] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?151-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?51-60] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?31-40] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?21-30] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?61-70] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?81-90] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?71-80] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?101-110] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?41-50] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?1-10] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?91-100] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?131-140] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?11-20] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?121-130] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?11-20] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?141-150] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?131-140] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?1-10] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?61-70] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?21-30] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?31-40] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?151-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?71-80] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?81-90] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?101-110] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?41-50] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?91-100] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?111-120] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?51-60] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?121-130] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini new file mode 100644 index 0000000000..12aa721b5c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini @@ -0,0 +1,31 @@ +[successes_RSA-PSS.https.any.worker.html?11-20] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.worker.html?1-10] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.worker.html?31-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.worker.html?21-30] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.html?1-10] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.html?21-30] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.html?11-20] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.html?31-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini new file mode 100644 index 0000000000..6987fd4ac9 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini @@ -0,0 +1,31 @@ +[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?11-20] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?1-10] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?31-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?21-30] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.html?21-30] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.html?1-10] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.html?11-20] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.html?31-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini new file mode 100644 index 0000000000..caed7f3b6b --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini @@ -0,0 +1,102 @@ +[successes_X25519.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + +[successes_X25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini new file mode 100644 index 0000000000..3ccabaf4e2 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini @@ -0,0 +1,102 @@ +[successes_X448.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: X448}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + +[successes_X448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: X448}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL |