mirror of
https://github.com/servo/servo.git
synced 2025-07-14 19:03:40 +01:00
Update WPT results.
This commit is contained in:
parent
bceaca9694
commit
3347094373
198 changed files with 7862 additions and 248 deletions
|
@ -0,0 +1,5 @@
|
||||||
|
[test_ecdh_bits.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: deriveBits() Using ECDH]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_ecdh_keys.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI:deriveKey() Using ECDH]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_hkdf.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: deriveBits() and deriveKey() Using HKDF]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_pbkdf2_empty_empty.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: deriveBits() and deriveKey() Using PBKDF2]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_pbkdf2_empty_long.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: deriveBits() and deriveKey() Using PBKDF2]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_pbkdf2_empty_short.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: deriveBits() and deriveKey() Using PBKDF2]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_pbkdf2_long_empty.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: deriveBits() and deriveKey() Using PBKDF2]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_pbkdf2_long_long.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: deriveBits() and deriveKey() Using PBKDF2]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_pbkdf2_long_short.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: deriveBits() and deriveKey() Using PBKDF2]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_pbkdf2_short_empty.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: deriveBits() and deriveKey() Using PBKDF2]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_pbkdf2_short_long.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: deriveBits() and deriveKey() Using PBKDF2]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_pbkdf2_short_short.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: deriveBits() and deriveKey() Using PBKDF2]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,242 @@
|
||||||
|
[test_digest.https.html]
|
||||||
|
type: testharness
|
||||||
|
[SHA-1 with empty source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[sha-1 with empty source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Sha-1 with empty source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-1 with empty source data and altered buffer after call]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-256 with empty source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[sha-256 with empty source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Sha-256 with empty source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-256 with empty source data and altered buffer after call]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-384 with empty source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[sha-384 with empty source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Sha-384 with empty source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-384 with empty source data and altered buffer after call]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-512 with empty source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[sha-512 with empty source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Sha-512 with empty source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-512 with empty source data and altered buffer after call]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-1 with short source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[sha-1 with short source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Sha-1 with short source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-1 with short source data and altered buffer after call]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-256 with short source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[sha-256 with short source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Sha-256 with short source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-256 with short source data and altered buffer after call]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-384 with short source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[sha-384 with short source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Sha-384 with short source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-384 with short source data and altered buffer after call]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-512 with short source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[sha-512 with short source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Sha-512 with short source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-512 with short source data and altered buffer after call]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-1 with medium source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[sha-1 with medium source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Sha-1 with medium source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-1 with medium source data and altered buffer after call]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-256 with medium source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[sha-256 with medium source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Sha-256 with medium source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-256 with medium source data and altered buffer after call]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-384 with medium source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[sha-384 with medium source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Sha-384 with medium source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-384 with medium source data and altered buffer after call]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-512 with medium source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[sha-512 with medium source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Sha-512 with medium source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-512 with medium source data and altered buffer after call]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-1 with long source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[sha-1 with long source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Sha-1 with long source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-1 with long source data and altered buffer after call]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-256 with long source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[sha-256 with long source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Sha-256 with long source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-256 with long source data and altered buffer after call]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-384 with long source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[sha-384 with long source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Sha-384 with long source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-384 with long source data and altered buffer after call]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-512 with long source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[sha-512 with long source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Sha-512 with long source data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SHA-512 with long source data and altered buffer after call]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[AES-GCM with empty]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[RSA-OAEP with empty]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[PBKDF2 with empty]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[AES-KW with empty]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[AES-GCM with short]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[RSA-OAEP with short]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[PBKDF2 with short]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[AES-KW with short]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[AES-GCM with medium]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[RSA-OAEP with medium]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[PBKDF2 with medium]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[AES-KW with medium]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[AES-GCM with long]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[RSA-OAEP with long]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[PBKDF2 with long]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[AES-KW with long]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_aes_cbc.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: encrypt() Using AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_aes_ctr.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: encrypt() Using AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_aes_gcm.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: encrypt() Using AES-GCM]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_rsa_oaep.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: encrypt() Using RSA-OAEP]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_aes-cbc.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() Successful Calls]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_aes-ctr.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() Successful Calls]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_failures.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() for Failures]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_failures_AES-CBC.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() for Failures]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_failures_AES-CTR.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() for Failures]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_failures_AES-GCM.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() for Failures]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_failures_AES-KW.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() for Failures]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_failures_ECDH.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() for Failures]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_failures_ECDSA.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() for Failures]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_failures_HMAC.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() for Failures]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_failures_RSA-OAEP.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() for Failures]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_failures_RSA-PSS.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() for Failures]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_failures_RSASSA-PKCS1-v1_5.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() for Failures]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_successes_AES-CBC.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() Successful Calls]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_successes_AES-CTR.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() Successful Calls]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_successes_AES-GCM.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() Successful Calls]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_successes_AES-KW.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() Successful Calls]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_successes_ECDH.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() Successful Calls]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_successes_ECDSA.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() Successful Calls]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_successes_HMAC.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() Successful Calls]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_successes_RSA-OAEP.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() Successful Calls]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_successes_RSA-PSS.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() Successful Calls]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_successes_RSASSA-PKCS1-v1_5.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: generateKey() Successful Calls]
|
||||||
|
expected: FAIL
|
||||||
|
|
164
tests/wpt/metadata/WebCryptoAPI/idlharness.https.html.ini
Normal file
164
tests/wpt/metadata/WebCryptoAPI/idlharness.https.html.ini
Normal file
|
@ -0,0 +1,164 @@
|
||||||
|
[idlharness.https.html]
|
||||||
|
type: testharness
|
||||||
|
[Crypto interface: attribute subtle]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Crypto interface: crypto must inherit property "subtle" with the proper type (0)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CryptoKey interface: existence and properties of interface object]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CryptoKey interface object length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CryptoKey interface object name]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CryptoKey interface: existence and properties of interface prototype object]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CryptoKey interface: existence and properties of interface prototype object's "constructor" property]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CryptoKey interface: attribute type]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CryptoKey interface: attribute extractable]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CryptoKey interface: attribute algorithm]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CryptoKey interface: attribute usages]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: existence and properties of interface object]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface object length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface object name]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: existence and properties of interface prototype object]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: existence and properties of interface prototype object's "constructor" property]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: operation encrypt(AlgorithmIdentifier,CryptoKey,BufferSource)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: operation decrypt(AlgorithmIdentifier,CryptoKey,BufferSource)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: operation sign(AlgorithmIdentifier,CryptoKey,BufferSource)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: operation verify(AlgorithmIdentifier,CryptoKey,BufferSource,BufferSource)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: operation digest(AlgorithmIdentifier,BufferSource)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: operation generateKey(AlgorithmIdentifier,boolean,[object Object\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: operation deriveKey(AlgorithmIdentifier,CryptoKey,AlgorithmIdentifier,boolean,[object Object\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: operation deriveBits(AlgorithmIdentifier,CryptoKey,unsigned long)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: operation importKey(KeyFormat,[object Object\],[object Object\],AlgorithmIdentifier,boolean,[object Object\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: operation exportKey(KeyFormat,CryptoKey)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: operation wrapKey(KeyFormat,CryptoKey,CryptoKey,AlgorithmIdentifier)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: operation unwrapKey(KeyFormat,BufferSource,CryptoKey,AlgorithmIdentifier,AlgorithmIdentifier,boolean,[object Object\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto must be primary interface of crypto.subtle]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Stringification of crypto.subtle]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: crypto.subtle must inherit property "encrypt" with the proper type (0)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: calling encrypt(AlgorithmIdentifier,CryptoKey,BufferSource) on crypto.subtle with too few arguments must throw TypeError]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: crypto.subtle must inherit property "decrypt" with the proper type (1)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: calling decrypt(AlgorithmIdentifier,CryptoKey,BufferSource) on crypto.subtle with too few arguments must throw TypeError]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: crypto.subtle must inherit property "sign" with the proper type (2)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: calling sign(AlgorithmIdentifier,CryptoKey,BufferSource) on crypto.subtle with too few arguments must throw TypeError]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: crypto.subtle must inherit property "verify" with the proper type (3)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: calling verify(AlgorithmIdentifier,CryptoKey,BufferSource,BufferSource) on crypto.subtle with too few arguments must throw TypeError]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: crypto.subtle must inherit property "digest" with the proper type (4)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: calling digest(AlgorithmIdentifier,BufferSource) on crypto.subtle with too few arguments must throw TypeError]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: crypto.subtle must inherit property "generateKey" with the proper type (5)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: calling generateKey(AlgorithmIdentifier,boolean,[object Object\]) on crypto.subtle with too few arguments must throw TypeError]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: crypto.subtle must inherit property "deriveKey" with the proper type (6)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: calling deriveKey(AlgorithmIdentifier,CryptoKey,AlgorithmIdentifier,boolean,[object Object\]) on crypto.subtle with too few arguments must throw TypeError]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: crypto.subtle must inherit property "deriveBits" with the proper type (7)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: calling deriveBits(AlgorithmIdentifier,CryptoKey,unsigned long) on crypto.subtle with too few arguments must throw TypeError]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: crypto.subtle must inherit property "importKey" with the proper type (8)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: calling importKey(KeyFormat,[object Object\],[object Object\],AlgorithmIdentifier,boolean,[object Object\]) on crypto.subtle with too few arguments must throw TypeError]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: crypto.subtle must inherit property "exportKey" with the proper type (9)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: calling exportKey(KeyFormat,CryptoKey) on crypto.subtle with too few arguments must throw TypeError]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: crypto.subtle must inherit property "wrapKey" with the proper type (10)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: calling wrapKey(KeyFormat,CryptoKey,CryptoKey,AlgorithmIdentifier) on crypto.subtle with too few arguments must throw TypeError]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: crypto.subtle must inherit property "unwrapKey" with the proper type (11)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[SubtleCrypto interface: calling unwrapKey(KeyFormat,BufferSource,CryptoKey,AlgorithmIdentifier,AlgorithmIdentifier,boolean,[object Object\]) on crypto.subtle with too few arguments must throw TypeError]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,218 @@
|
||||||
|
[test_ec_importKey.https.html]
|
||||||
|
type: testharness
|
||||||
|
[Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, true, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-256}, true, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, true, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, true, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, false, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-256}, false, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, true, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-384}, true, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, true, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, true, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, false, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-384}, false, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, true, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, true, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, true, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, false, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDSA, namedCurve: P-521}, false, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, true, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-256}, true, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, false, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-256}, false, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, true, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-384}, true, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, false, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-384}, false, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, true, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, true, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, false, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (jwk, object(kty, crv, x, y), {name: ECDH, namedCurve: P-521}, false, [\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
File diff suppressed because it is too large
Load diff
|
@ -0,0 +1,704 @@
|
||||||
|
[test_symmetric_importKey.https.html]
|
||||||
|
type: testharness
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt, encrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [decrypt\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [unwrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [unwrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [unwrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [unwrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [unwrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [unwrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [unwrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,8 @@
|
||||||
|
[crypto-subtle-secure-context-available.https.sub.html]
|
||||||
|
type: testharness
|
||||||
|
[Secure context window has access to crypto.subtle]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Secure context worker has access to crypto.subtle]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_ecdsa.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: sign() and verify() Using ECDSA]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_hmac.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: sign() and verify() Using HMAC]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_rsa_pkcs.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: sign() and verify() Using RSASSA-PKCS1-v1_5]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_rsa_pss.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: sign() and verify() Using RSA-PSS]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[test_wrapKey_unwrapKey.https.html]
|
||||||
|
type: testharness
|
||||||
|
[WebCryptoAPI: wrapKey() and unwrapKey()]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[has-instance.html]
|
||||||
|
type: testharness
|
||||||
|
[instanceof must return false across different globals, for platform objects]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[interface-prototype-object.html]
|
||||||
|
type: testharness
|
||||||
|
[The class string of an interface prototype object is the concatenation of the interface's identifier and the string 'Prototype'.]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,14 @@
|
||||||
|
[legacy-callback-interface-object.html]
|
||||||
|
type: testharness
|
||||||
|
[Must be a function according to typeof]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Must have the correct [[Prototype\]\]]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Must have an own length property with value zero and the correct descriptors]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[instanceof must throw but only when we don't bail out early]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,20 @@
|
||||||
|
[put-forwards.html]
|
||||||
|
type: testharness
|
||||||
|
[Overriding getter of [PutForwards\] attribute]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Overriding setter of [PutForwards\] target attribute]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Overriding target of [PutForwards\] attribute]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Exception propagation from getter of [PutForwards\] attribute]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Exception propagation from setter of [PutForwards\] target attribute]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[TypeError when getter of [PutForwards\] attribute returns non-object]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,20 @@
|
||||||
|
[sequence-conversion.html]
|
||||||
|
type: testharness
|
||||||
|
[An array]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[A generator]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[An array with an overridden Symbol.iterator]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[An array with an overridden Symbol.iterator on the prototype]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[An array with an overridden %ArrayIterator%.prototype.next]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[A holey array with fallback to an accessor on the prototype]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[send-data-arraybufferview.htm]
|
||||||
|
type: testharness
|
||||||
|
[XMLHttpRequest: The send() method: ArrayBufferView data]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,8 @@
|
||||||
|
[access-control-expose-headers-parsing.window.html]
|
||||||
|
type: testharness
|
||||||
|
[Access-Control-Expose-Headers parsing: #1]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Access-Control-Expose-Headers parsing: #2]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -1,5 +0,0 @@
|
||||||
[MediaQueryList-001.html]
|
|
||||||
type: testharness
|
|
||||||
[matchMedia]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
|
@ -1,8 +1,5 @@
|
||||||
[offsetParent_element_test.html]
|
[offsetParent_element_test.html]
|
||||||
type: testharness
|
type: testharness
|
||||||
[Valid the algorithm rule of offsetParent check step 1]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Valid the algorithm rule of offsetParent check step 2]
|
[Valid the algorithm rule of offsetParent check step 2]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[scrollIntoView-empty-args.html]
|
||||||
|
type: testharness
|
||||||
|
[scrollIntoView should behave correctly when the arg is not fully specified as ScrollIntoViewOptions]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[scrollIntoView-shadow.html]
|
||||||
|
type: testharness
|
||||||
|
[scrollIntoView should behave correctly if applies to shadow dom elements]
|
||||||
|
expected: FAIL
|
||||||
|
|
14
tests/wpt/metadata/cssom-view/scrollIntoView-smooth.html.ini
Normal file
14
tests/wpt/metadata/cssom-view/scrollIntoView-smooth.html.ini
Normal file
|
@ -0,0 +1,14 @@
|
||||||
|
[scrollIntoView-smooth.html]
|
||||||
|
type: testharness
|
||||||
|
[Smooth scrollIntoView should scroll the element to the 'nearest' position]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Smooth scrollIntoView should scroll the element to the 'start' position]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Smooth scrollIntoView should scroll the element to the 'center' position]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Smooth scrollIntoView should scroll the element to the 'end' position]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,56 @@
|
||||||
|
[scrolling-quirks-vs-nonquirks.html]
|
||||||
|
type: testharness
|
||||||
|
[scrollingElement in non-quirks mode]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[scroll() on the root element in non-quirks mode]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[scrollBy() on the root element in non-quirks mode]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[scrollLeft/scrollTop on the root element in non-quirks mode]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[scrollWidth/scrollHeight on the root element in non-quirks mode]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[clientWidth/clientHeight on the root element in non-quirks mode]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[scroll() on the HTML body element in non-quirks mode]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[scrollBy() on the HTML body element in non-quirks mode]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[scrollLeft/scrollTop on the HTML body element in non-quirks mode]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[scrollLeft/scrollRight of the content in non-quirks mode]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[scrollingElement in quirks mode]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[scrollWidth/scrollHeight on the root element in quirks mode]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[scroll() on the HTML body element in quirks mode]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[scrollBy() on the HTML body element in quirks mode]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[scrollLeft/scrollTop on the HTML body element in quirks mode]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[scrollWidth/scrollHeight on the HTML body element in quirks mode]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[clientWidth/clientHeight on the HTML body element in quirks mode]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[scrollLeft/scrollRight of the content in quirks mode]
|
||||||
|
expected: FAIL
|
||||||
|
|
5
tests/wpt/metadata/cssom/CSSKeyframeRule.html.ini
Normal file
5
tests/wpt/metadata/cssom/CSSKeyframeRule.html.ini
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
[CSSKeyframeRule.html]
|
||||||
|
type: testharness
|
||||||
|
[CSSKeyframeRule: style property has [PutForwards\]]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[getComputedStyle-pseudo.html]
|
||||||
|
type: testharness
|
||||||
|
[Resolution of width is correct for ::before and ::after pseudo-elements of display: contents elements]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,8 @@
|
||||||
|
[insertRule-charset-no-index.html]
|
||||||
|
type: testharness
|
||||||
|
[inserRule with charset and omitted index argument]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[insertRule with charset and undefined index argument]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[insertRule-import-no-index.html]
|
||||||
|
type: testharness
|
||||||
|
[inserRule with import and omitted index argument]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,8 @@
|
||||||
|
[insertRule-namespace-no-index.html]
|
||||||
|
type: testharness
|
||||||
|
[inserRule with namespace and omitted index argument]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[inserRule with namespace and omitted index argument should insert import]
|
||||||
|
expected: FAIL
|
||||||
|
|
8
tests/wpt/metadata/cssom/insertRule-no-index.html.ini
Normal file
8
tests/wpt/metadata/cssom/insertRule-no-index.html.ini
Normal file
|
@ -0,0 +1,8 @@
|
||||||
|
[insertRule-no-index.html]
|
||||||
|
type: testharness
|
||||||
|
[inserRule with omitted index argument]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[insertRule with undefined index argument]
|
||||||
|
expected: FAIL
|
||||||
|
|
20
tests/wpt/metadata/cssom/variable-names.html.ini
Normal file
20
tests/wpt/metadata/cssom/variable-names.html.ini
Normal file
|
@ -0,0 +1,20 @@
|
||||||
|
[variable-names.html]
|
||||||
|
type: testharness
|
||||||
|
[custom property '--a']
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[custom property '--a;b']
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[custom property '---']
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[custom property '--\\']
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[custom property '--ab']
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[custom property '--0']
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,8 @@
|
||||||
|
[per-global.html]
|
||||||
|
type: testharness
|
||||||
|
[Navigating from the initial about:blank must not replace window.customElements]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[document.open() must replace window.customElements]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -12,3 +12,75 @@
|
||||||
[createDocument test: "http://example.com/","ெ:a",null,"INVALID_CHARACTER_ERR"]
|
[createDocument test: "http://example.com/","ெ:a",null,"INVALID_CHARACTER_ERR"]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: null,":foo",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: null,"foo:",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: null,"f:o:o",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: null,":",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: "",":foo",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: "","foo:",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: undefined,":foo",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: undefined,"foo:",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: undefined,"f::oo",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: "http://example.com/",":foo",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: "http://example.com/","f:o:o",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: "http://example.com/","foo:",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: "http://example.com/","f::oo",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: "http://example.com/","a:0",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: "http://example.com/","a:ெ",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: "http://example.com/","prefix::local",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: "/",":foo",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: "/","foo:",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: "http://www.w3.org/XML/1998/namespace",":foo",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: "http://www.w3.org/XML/1998/namespace","foo:",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: "http://www.w3.org/2000/xmlns/",":foo",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: "http://www.w3.org/2000/xmlns/","foo:",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: "foo:",":foo",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocument test: "foo:","foo:",null,"INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,11 @@
|
||||||
|
[DOMImplementation-createDocumentType.html]
|
||||||
|
type: testharness
|
||||||
|
[createDocumentType(":foo", "", "") should throw INVALID_CHARACTER_ERR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocumentType("foo:", "", "") should throw INVALID_CHARACTER_ERR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createDocumentType("prefix::local", "", "") should throw INVALID_CHARACTER_ERR]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,3 @@
|
||||||
|
[Document-constructor-svg.svg]
|
||||||
|
type: testharness
|
||||||
|
expected: TIMEOUT
|
|
@ -0,0 +1,3 @@
|
||||||
|
[Document-constructor-xml.xml]
|
||||||
|
type: testharness
|
||||||
|
expected: TIMEOUT
|
|
@ -594,3 +594,219 @@
|
||||||
[createElementNS test in XML document: "foo:","","INVALID_CHARACTER_ERR"]
|
[createElementNS test in XML document: "foo:","","INVALID_CHARACTER_ERR"]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: null,":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: null,":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: null,":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: null,"foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: null,"foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: null,"foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: null,"f:o:o","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: null,"f:o:o","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: null,"f:o:o","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: null,":","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: null,":","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: null,":","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: "",":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: "",":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: "",":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: "","foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: "","foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: "","foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: undefined,":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: undefined,":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: undefined,":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: undefined,"foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: undefined,"foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: undefined,"foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: undefined,"f::oo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: undefined,"f::oo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: undefined,"f::oo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: "http://example.com/",":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: "http://example.com/",":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: "http://example.com/",":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: "http://example.com/","f:o:o","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: "http://example.com/","f:o:o","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: "http://example.com/","f:o:o","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: "http://example.com/","foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: "http://example.com/","foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: "http://example.com/","foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: "http://example.com/","f::oo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: "http://example.com/","f::oo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: "http://example.com/","f::oo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: "http://example.com/","a:0","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: "http://example.com/","a:0","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: "http://example.com/","a:0","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: "http://example.com/","a:ெ","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: "http://example.com/","a:ெ","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: "http://example.com/","a:ெ","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: "http://example.com/","prefix::local","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: "http://example.com/","prefix::local","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: "http://example.com/","prefix::local","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: "/",":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: "/",":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: "/",":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: "/","foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: "/","foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: "/","foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: "http://www.w3.org/XML/1998/namespace",":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: "http://www.w3.org/XML/1998/namespace",":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: "http://www.w3.org/XML/1998/namespace",":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: "http://www.w3.org/XML/1998/namespace","foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: "http://www.w3.org/XML/1998/namespace","foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: "http://www.w3.org/XML/1998/namespace","foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: "http://www.w3.org/2000/xmlns/",":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: "http://www.w3.org/2000/xmlns/",":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: "http://www.w3.org/2000/xmlns/",":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: "http://www.w3.org/2000/xmlns/","foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: "http://www.w3.org/2000/xmlns/","foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: "http://www.w3.org/2000/xmlns/","foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: "foo:",":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: "foo:",":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: "foo:",":foo","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in HTML document: "foo:","foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XML document: "foo:","foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[createElementNS test in XHTML document: "foo:","foo:","INVALID_CHARACTER_ERR"]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
77
tests/wpt/metadata/dom/nodes/Element-classlist.html.ini
Normal file
77
tests/wpt/metadata/dom/nodes/Element-classlist.html.ini
Normal file
|
@ -0,0 +1,77 @@
|
||||||
|
[Element-classlist.html]
|
||||||
|
type: testharness
|
||||||
|
[classList.remove("a") with attribute value null (HTML node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.remove("a", "b") with attribute value null (HTML node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.replace("a", "a") with attribute value "a" (HTML node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.replace("a", "a") with attribute value "a a a b" (HTML node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.replace("c", "a") with attribute value "c b a" (HTML node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.remove("a") with attribute value null (XHTML node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.remove("a", "b") with attribute value null (XHTML node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.replace("a", "a") with attribute value "a" (XHTML node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.replace("a", "a") with attribute value "a a a b" (XHTML node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.replace("c", "a") with attribute value "c b a" (XHTML node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.remove("a") with attribute value null (MathML node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.remove("a", "b") with attribute value null (MathML node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.replace("a", "a") with attribute value "a" (MathML node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.replace("a", "a") with attribute value "a a a b" (MathML node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.replace("c", "a") with attribute value "c b a" (MathML node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.remove("a") with attribute value null (XML node with null namespace)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.remove("a", "b") with attribute value null (XML node with null namespace)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.replace("a", "a") with attribute value "a" (XML node with null namespace)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.replace("a", "a") with attribute value "a a a b" (XML node with null namespace)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.replace("c", "a") with attribute value "c b a" (XML node with null namespace)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.remove("a") with attribute value null (foo node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.remove("a", "b") with attribute value null (foo node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.replace("a", "a") with attribute value "a" (foo node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.replace("a", "a") with attribute value "a a a b" (foo node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[classList.replace("c", "a") with attribute value "c b a" (foo node)]
|
||||||
|
expected: FAIL
|
||||||
|
|
5
tests/wpt/metadata/dom/nodes/attributes.html.ini
Normal file
5
tests/wpt/metadata/dom/nodes/attributes.html.ini
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
[attributes.html]
|
||||||
|
type: testharness
|
||||||
|
[When qualifiedName does not match the QName production, an INVALID_CHARACTER_ERR exception is to be thrown.]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[DOMParser-parseFromString-xml-internal-subset.html]
|
||||||
|
type: testharness
|
||||||
|
[Parsing and serialization of doctype internal subset]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -9,3 +9,12 @@
|
||||||
[EventSource: cross-origin No allow-origin should fail]
|
[EventSource: cross-origin No allow-origin should fail]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[EventSource: cross-origin basic use]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[EventSource: cross-origin redirect use]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[EventSource: cross-origin redirect use recon]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -3,6 +3,6 @@
|
||||||
[CORS filter on Set-Cookie header]
|
[CORS filter on Set-Cookie header]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[CORS filter on Set-Cookie header, header is forbidden]
|
[CORS filter on Set-Cookie2 header, header is forbidden]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,8 +1,5 @@
|
||||||
[cors-filtering.html]
|
[cors-filtering.html]
|
||||||
type: testharness
|
type: testharness
|
||||||
[CORS filter on Set-Cookie header]
|
[CORS filter on Set-Cookie2 header, header is forbidden]
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[CORS filter on Set-Cookie header, header is forbidden]
|
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -24,3 +24,9 @@
|
||||||
[Correct operation ordering with repeated keys]
|
[Correct operation ordering with repeated keys]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[Basic operation with Symbol keys]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Operation with non-enumerable Symbol keys]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -27,3 +27,15 @@
|
||||||
[Consume empty ArrayBuffer request body as text]
|
[Consume empty ArrayBuffer request body as text]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[Consume request's body as json (error case)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Consume request's body as formData with correct multipart type (error case)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Consume request's body as formData with correct urlencoded type]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Consume request's body as formData without correct type (error case)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -37,3 +37,15 @@
|
||||||
[Consume empty ArrayBuffer response body as text]
|
[Consume empty ArrayBuffer response body as text]
|
||||||
expected: NOTRUN
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Consume response's body as json (error case)]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Consume response's body as formData with correct multipart type (error case)]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Consume response's body as formData with correct urlencoded type]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Consume response's body as formData without correct type (error case)]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,65 @@
|
||||||
|
[dangling-markup-mitigation.tentative.html]
|
||||||
|
type: testharness
|
||||||
|
[Fetch: /images/gre\\nen-1x1.png?img=<]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Fetch: /images/gre\\ren-1x1.png?img=<]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Fetch: /images/gre\\ten-1x1.png?img=<]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Fetch: /images/green-1x1.png?<\\n=block]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Fetch: /images/green-1x1.png?<\\r=block]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Fetch: /images/green-1x1.png?<\\t=block]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[<img id="dangling" src="/images/green-1x1.png?img=<b">]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[<img id="dangling" src="/images/green-1x1.png?img= b">]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[<img id="dangling" src="/images/green-1x1.png?img=&#10;b">]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[<img id="dangling" src="/images/green-1x1.png?img=&lt;b">]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[<img id="dangling" src="/images/green-1x1.png?img=&#10;b&lt;c">]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[\\n <img id="dangling" src="\\n /images/green-1x1.png?img=\\n ">\\n ]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[\\n <img id="dangling" src="\\n /images/green-1x1.png?img=&lt;\\n ">\\n ]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[\\n <img id="dangling" src="\\n /images/green-1x1.png?img=&#10;\\n ">\\n ]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[<img id="dangling" src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=">]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[<img id="dangling" src="data:image/png;base64, iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=">]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[<img id="dangling" src="data:image/png;base64,i VBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=">]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[<img id="dangling" src="data:image/svg+xml;utf8,\\n <svg width='1' height='1' xmlns='http://www.w3.org/2000/svg'>\\n <rect width='100%' height='100%' fill='rebeccapurple'/>\\n <rect x='10%' y='10%' width='80%' height='80%' fill='lightgreen'/>\\n </svg>">]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[<img id="dangling" src="/images/green-1x1.png?img= <b">]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[<img id="dangling" src="/images/green-1x1.png?img=< b">]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[\\n <img id="dangling" src="/images/green-1x1.png?img=\\n <\\n b\\n ">\\n ]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,20 @@
|
||||||
|
[embedded-credentials.tentative.sub.html]
|
||||||
|
type: testharness
|
||||||
|
[Embedded credentials are treated as network errors.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Embedded credentials are treated as network errors in frames.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Embedded credentials are treated as network errors in new windows.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Embedded credentials matching the top-level are not treated as network errors for relative URLs.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Embedded credentials matching the top-level are not treated as network errors for same-origin URLs.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Embedded credentials matching the top-level are treated as network errors for cross-origin URLs.]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[element-request-fullscreen-active-document.html]
|
||||||
|
type: testharness
|
||||||
|
[Element#requestFullscreen() when the document is not the active document]
|
||||||
|
expected: FAIL
|
||||||
|
|
32
tests/wpt/metadata/fullscreen/interfaces.html.ini
Normal file
32
tests/wpt/metadata/fullscreen/interfaces.html.ini
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[interfaces.html]
|
||||||
|
type: testharness
|
||||||
|
[Document interface: attribute fullscreenEnabled]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Document interface: attribute fullscreen]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Document interface: operation exitFullscreen()]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Document interface: attribute fullscreenElement]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[ShadowRoot interface: attribute fullscreenElement]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Element interface: operation requestFullscreen()]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Element interface: attribute onfullscreenchange]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Element interface: attribute onfullscreenerror]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Element interface: document.createElementNS(null, "test") must inherit property "onfullscreenchange" with the proper type (35)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Element interface: document.createElementNS(null, "test") must inherit property "onfullscreenerror" with the proper type (36)]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[location-origin-idna.sub.window.html]
|
||||||
|
type: testharness
|
||||||
|
[Test that location.origin returns ASCII]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -1,6 +1,5 @@
|
||||||
[location-protocol-setter-non-broken.html]
|
[location-protocol-setter-non-broken.html]
|
||||||
type: testharness
|
type: testharness
|
||||||
expected: CRASH
|
|
||||||
[Set data URL frame location.protocol to x]
|
[Set data URL frame location.protocol to x]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -19,3 +18,18 @@
|
||||||
[Set data URL frame location.protocol to http+x]
|
[Set data URL frame location.protocol to http+x]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[Set HTTP URL frame location.protocol to x]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Set HTTP URL frame location.protocol to data]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Set HTTP URL frame location.protocol to ftp]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Set HTTP URL frame location.protocol to gopher]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Set HTTP URL frame location.protocol to http+x]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,8 @@
|
||||||
|
[per-global.window.html]
|
||||||
|
type: testharness
|
||||||
|
[Navigating from the initial about:blank must not replace window.location]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[document.open() must replace window.location]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,15 @@
|
||||||
|
[document_domain_setter_null.tentative.html]
|
||||||
|
type: testharness
|
||||||
|
expected: TIMEOUT
|
||||||
|
[Access allowed with no 'document.domain' modification. (Sanity check)]
|
||||||
|
expected: TIMEOUT
|
||||||
|
|
||||||
|
[No access when frame sets a `null` 'document.domain'.]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[No access when parent sets a `null` 'document.domain'.]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[No access when both sides set a `null` 'document.domain'.]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
|
@ -0,0 +1,12 @@
|
||||||
|
[document_domain_setter_srcdoc.html]
|
||||||
|
type: testharness
|
||||||
|
expected: TIMEOUT
|
||||||
|
[srcdoc can access with no 'document.domain' modification.]
|
||||||
|
expected: TIMEOUT
|
||||||
|
|
||||||
|
[srcdoc can access with valid 'document.domain'.]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[srcdoc can access when parent modifies 'document.domain'.]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
|
@ -4,3 +4,24 @@
|
||||||
[window.open() with 'noopener' should not reuse existing target]
|
[window.open() with 'noopener' should not reuse existing target]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[noopener needs to be present as a token on its own]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[noopener needs to be present as a token on its own again]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[noopener needs to be present as a token on its own yet again]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Trailing noopener should work]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Leading noopener should work]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Interior noopener should work]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[noopener window.open targeting _self]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
|
|
@ -1,5 +0,0 @@
|
||||||
[window-parent-null.html]
|
|
||||||
type: testharness
|
|
||||||
[`window.parent` null when parent browsing context container removed]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
|
@ -1,5 +0,0 @@
|
||||||
[window-top-null.html]
|
|
||||||
type: testharness
|
|
||||||
[`window.top`null when any ancestor browsing context container removed]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
|
@ -0,0 +1,26 @@
|
||||||
|
[nameditem-07.html]
|
||||||
|
type: testharness
|
||||||
|
[If there is one object, it should be returned (name)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[If there are two objects, a collection should be returned. (name)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[If there is one object, it should be returned (id)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[If there are two objects, a collection should be returned. (id)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[If there are two objects, a collection should be returned. (name and id)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[If there are two objects, a collection should be returned. (id and name)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[A name shouldn't affect getting an object by id]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[An id shouldn't affect getting an object by name]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[nameditem-08.html]
|
||||||
|
type: testharness
|
||||||
|
[If there is a div and object with same id, the object should be returned]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -1,5 +0,0 @@
|
||||||
[iframe_005.html]
|
|
||||||
type: testharness
|
|
||||||
[document.write external script into iframe write back into parent]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue