mirror of
https://github.com/servo/servo.git
synced 2025-08-06 14:10:11 +01:00
Implement HMAC key generation (#34278)
* Implement HMAC key generation Signed-off-by: Simon Wülker <simon.wuelker@arcor.de> * Update WPT expectations Signed-off-by: Simon Wülker <simon.wuelker@arcor.de> --------- Signed-off-by: Simon Wülker <simon.wuelker@arcor.de>
This commit is contained in:
parent
11dfbd6f90
commit
2485bd9a63
5 changed files with 263 additions and 1874 deletions
File diff suppressed because it is too large
Load diff
|
@ -1,97 +1,49 @@
|
|||
[successes_HMAC.https.any.worker.html]
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -191,99 +143,51 @@
|
|||
[Success: generateKey({hash: SHA-512, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -383,99 +287,51 @@
|
|||
[Success: generateKey({hash: SHA-512, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -577,99 +433,51 @@
|
|||
|
||||
|
||||
[successes_HMAC.https.any.html]
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -769,99 +577,51 @@
|
|||
[Success: generateKey({hash: SHA-512, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -961,99 +721,51 @@
|
|||
[Success: generateKey({hash: SHA-512, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,76 +1,4 @@
|
|||
[ecdsa.https.any.worker.html]
|
||||
[generate wrong key step: ECDSA P-256 with SHA-1 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-256 with SHA-256 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-256 with SHA-384 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-256 with SHA-512 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-384 with SHA-1 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-384 with SHA-256 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-384 with SHA-384 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-384 with SHA-512 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-521 with SHA-1 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-521 with SHA-256 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-521 with SHA-384 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-521 with SHA-512 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-256 with SHA-1 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-256 with SHA-256 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-256 with SHA-384 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-256 with SHA-512 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-384 with SHA-1 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-384 with SHA-256 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-384 with SHA-384 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-384 with SHA-512 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-521 with SHA-1 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-521 with SHA-256 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-521 with SHA-384 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-521 with SHA-512 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 verification]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -755,80 +683,80 @@
|
|||
[importVectorKeys step: ECDSA P-521 with SHA-512 - The signature is all zeroes verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-256 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-384 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-512 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-1 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-256 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-384 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-512 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-1 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-256 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-384 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-512 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-256 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-384 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-512 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-1 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-256 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-384 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-512 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-1 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-256 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-384 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-512 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[ecdsa.https.any.html]
|
||||
[generate wrong key step: ECDSA P-256 with SHA-1 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-256 with SHA-256 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-256 with SHA-384 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-256 with SHA-512 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-384 with SHA-1 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-384 with SHA-256 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-384 with SHA-384 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-384 with SHA-512 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-521 with SHA-1 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-521 with SHA-256 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-521 with SHA-384 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-521 with SHA-512 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-256 with SHA-1 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-256 with SHA-256 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-256 with SHA-384 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-256 with SHA-512 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-384 with SHA-1 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-384 with SHA-256 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-384 with SHA-384 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-384 with SHA-512 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-521 with SHA-1 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-521 with SHA-256 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-521 with SHA-384 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: ECDSA P-521 with SHA-512 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 verification]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -1512,3 +1440,75 @@
|
|||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-512 - The signature is all zeroes verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-256 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-384 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-512 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-1 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-256 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-384 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-512 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-1 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-256 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-384 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-512 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-1 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-256 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-384 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-256 with SHA-512 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-1 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-256 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-384 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-384 with SHA-512 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-1 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-256 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-384 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: ECDSA P-521 with SHA-512 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue