mirror of
https://github.com/servo/servo.git
synced 2025-08-03 12:40:06 +01:00
Update web-platform-tests to revision b'6cf69a4f431581e9438681abc776029308ee8a8c' (#34265)
Signed-off-by: WPT Sync Bot <ghbot+wpt-sync@servo.org>
This commit is contained in:
parent
6955950948
commit
dca33f681a
473 changed files with 18149 additions and 16249 deletions
|
@ -12,15 +12,6 @@
|
||||||
[Context is discarded in verify]
|
[Context is discarded in verify]
|
||||||
expected: TIMEOUT
|
expected: TIMEOUT
|
||||||
|
|
||||||
[Context is discarded in deriveBits]
|
|
||||||
expected: TIMEOUT
|
|
||||||
|
|
||||||
[Context is discarded in deriveKey]
|
|
||||||
expected: TIMEOUT
|
|
||||||
|
|
||||||
[Context is discarded in deriveKey (2)]
|
|
||||||
expected: TIMEOUT
|
|
||||||
|
|
||||||
[Context is discarded in wrapKey]
|
[Context is discarded in wrapKey]
|
||||||
expected: TIMEOUT
|
expected: TIMEOUT
|
||||||
|
|
||||||
|
|
|
@ -1,19 +1,7 @@
|
||||||
[derived_bits_length.https.any.html]
|
[derived_bits_length.https.any.html]
|
||||||
[HKDF derivation with 256 as 'length' parameter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[HKDF derivation with 0 as 'length' parameter]
|
[HKDF derivation with 0 as 'length' parameter]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[HKDF derivation with null as 'length' parameter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[HKDF derivation with undefined as 'length' parameter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[HKDF derivation with omitted as 'length' parameter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[ECDH derivation with 256 as 'length' parameter]
|
[ECDH derivation with 256 as 'length' parameter]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -47,9 +35,6 @@
|
||||||
[HKDF derivation with 384 as 'length' parameter]
|
[HKDF derivation with 384 as 'length' parameter]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[HKDF derivation with 230 as 'length' parameter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[ECDH derivation with 384 as 'length' parameter]
|
[ECDH derivation with 384 as 'length' parameter]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -62,23 +47,14 @@
|
||||||
[X25519 derivation with 230 as 'length' parameter]
|
[X25519 derivation with 230 as 'length' parameter]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[PBKDF2 derivation with 0 as 'length' parameter]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[derived_bits_length.https.any.worker.html]
|
[derived_bits_length.https.any.worker.html]
|
||||||
[HKDF derivation with 256 as 'length' parameter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[HKDF derivation with 0 as 'length' parameter]
|
[HKDF derivation with 0 as 'length' parameter]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[HKDF derivation with null as 'length' parameter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[HKDF derivation with undefined as 'length' parameter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[HKDF derivation with omitted as 'length' parameter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[ECDH derivation with 256 as 'length' parameter]
|
[ECDH derivation with 256 as 'length' parameter]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -112,9 +88,6 @@
|
||||||
[HKDF derivation with 384 as 'length' parameter]
|
[HKDF derivation with 384 as 'length' parameter]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[HKDF derivation with 230 as 'length' parameter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[ECDH derivation with 384 as 'length' parameter]
|
[ECDH derivation with 384 as 'length' parameter]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -126,3 +99,6 @@
|
||||||
|
|
||||||
[X25519 derivation with 230 as 'length' parameter]
|
[X25519 derivation with 230 as 'length' parameter]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[PBKDF2 derivation with 0 as 'length' parameter]
|
||||||
|
expected: FAIL
|
||||||
|
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -2,12 +2,6 @@
|
||||||
[idlharness]
|
[idlharness]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[SubtleCrypto interface: operation sign(AlgorithmIdentifier, CryptoKey, BufferSource)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[SubtleCrypto interface: operation verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[SubtleCrypto interface: operation generateKey(AlgorithmIdentifier, boolean, [object Object\])]
|
[SubtleCrypto interface: operation generateKey(AlgorithmIdentifier, boolean, [object Object\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -26,18 +20,6 @@
|
||||||
[SubtleCrypto interface: operation unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, [object Object\])]
|
[SubtleCrypto interface: operation unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, [object Object\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[SubtleCrypto interface: crypto.subtle must inherit property "sign(AlgorithmIdentifier, CryptoKey, BufferSource)" with the proper type]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[SubtleCrypto interface: calling sign(AlgorithmIdentifier, CryptoKey, BufferSource) on crypto.subtle with too few arguments must throw TypeError]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[SubtleCrypto interface: crypto.subtle must inherit property "verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource)" with the proper type]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[SubtleCrypto interface: calling verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource) on crypto.subtle with too few arguments must throw TypeError]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[SubtleCrypto interface: crypto.subtle must inherit property "generateKey(AlgorithmIdentifier, boolean, [object Object\])" with the proper type]
|
[SubtleCrypto interface: crypto.subtle must inherit property "generateKey(AlgorithmIdentifier, boolean, [object Object\])" with the proper type]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -88,12 +70,6 @@
|
||||||
[idlharness]
|
[idlharness]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[SubtleCrypto interface: operation sign(AlgorithmIdentifier, CryptoKey, BufferSource)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[SubtleCrypto interface: operation verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[SubtleCrypto interface: operation generateKey(AlgorithmIdentifier, boolean, [object Object\])]
|
[SubtleCrypto interface: operation generateKey(AlgorithmIdentifier, boolean, [object Object\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -112,18 +88,6 @@
|
||||||
[SubtleCrypto interface: operation unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, [object Object\])]
|
[SubtleCrypto interface: operation unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, [object Object\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[SubtleCrypto interface: crypto.subtle must inherit property "sign(AlgorithmIdentifier, CryptoKey, BufferSource)" with the proper type]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[SubtleCrypto interface: calling sign(AlgorithmIdentifier, CryptoKey, BufferSource) on crypto.subtle with too few arguments must throw TypeError]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[SubtleCrypto interface: crypto.subtle must inherit property "verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource)" with the proper type]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[SubtleCrypto interface: calling verify(AlgorithmIdentifier, CryptoKey, BufferSource, BufferSource) on crypto.subtle with too few arguments must throw TypeError]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[SubtleCrypto interface: crypto.subtle must inherit property "generateKey(AlgorithmIdentifier, boolean, [object Object\])" with the proper type]
|
[SubtleCrypto interface: crypto.subtle must inherit property "generateKey(AlgorithmIdentifier, boolean, [object Object\])" with the proper type]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -215,249 +215,114 @@
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey\])]
|
[Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
[Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
[Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
[Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
[Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
[Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
[Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
[Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
[Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
[Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
[Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
[Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
[Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
[Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
[Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
[Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
[Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
[Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
[Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
[Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
[Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
[Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
[Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
[Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
[Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])]
|
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -692,87 +557,42 @@
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
[Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits, deriveKey, deriveBits, deriveKey\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits, deriveKey, deriveBits, deriveKey\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits, deriveKey, deriveBits, deriveKey\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
|
|
||||||
[symmetric_importKey.https.any.html]
|
[symmetric_importKey.https.any.html]
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt\])]
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt\])]
|
||||||
|
@ -991,249 +811,114 @@
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey\])]
|
[Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [unwrapKey\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
[Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
[Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
[Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
[Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
[Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
[Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
[Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
[Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
[Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
[Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
[Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
[Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
[Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
[Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
[Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
[Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
[Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
[Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
[Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
[Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
[Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
[Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
[Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
[Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
[Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])]
|
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -1468,83 +1153,38 @@
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
[Good parameters: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
[Good parameters: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits, deriveKey, deriveBits, deriveKey\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits, deriveKey, deriveBits, deriveKey\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits, deriveKey, deriveBits, deriveKey\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
2
tests/wpt/meta-legacy-layout/css/css-align/abspos/align-items-static-position.html.ini
vendored
Normal file
2
tests/wpt/meta-legacy-layout/css/css-align/abspos/align-items-static-position.html.ini
vendored
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
[align-items-static-position.html]
|
||||||
|
expected: FAIL
|
2
tests/wpt/meta-legacy-layout/css/css-backgrounds/border-image-021.html.ini
vendored
Normal file
2
tests/wpt/meta-legacy-layout/css/css-backgrounds/border-image-021.html.ini
vendored
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
[border-image-021.html]
|
||||||
|
expected: FAIL
|
2
tests/wpt/meta-legacy-layout/css/css-backgrounds/border-image-outset-004.html.ini
vendored
Normal file
2
tests/wpt/meta-legacy-layout/css/css-backgrounds/border-image-outset-004.html.ini
vendored
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
[border-image-outset-004.html]
|
||||||
|
expected: FAIL
|
3
tests/wpt/meta-legacy-layout/css/css-cascade/scope-import-implicit.tentative.html.ini
vendored
Normal file
3
tests/wpt/meta-legacy-layout/css/css-cascade/scope-import-implicit.tentative.html.ini
vendored
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
[scope-import-implicit.tentative.html]
|
||||||
|
[Scope-imported rule applies within implicit scope]
|
||||||
|
expected: FAIL
|
3
tests/wpt/meta-legacy-layout/css/css-cascade/scope-import-inner-scope.tentative.html.ini
vendored
Normal file
3
tests/wpt/meta-legacy-layout/css/css-cascade/scope-import-inner-scope.tentative.html.ini
vendored
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
[scope-import-inner-scope.tentative.html]
|
||||||
|
[@scope within scope-imported stylesheet matches]
|
||||||
|
expected: FAIL
|
3
tests/wpt/meta-legacy-layout/css/css-cascade/scope-import-multiple.tentative.html.ini
vendored
Normal file
3
tests/wpt/meta-legacy-layout/css/css-cascade/scope-import-multiple.tentative.html.ini
vendored
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
[scope-import-multiple.tentative.html]
|
||||||
|
[A stylesheet may be imported multiple times, and scoped differently]
|
||||||
|
expected: FAIL
|
6
tests/wpt/meta-legacy-layout/css/css-cascade/scope-import-parent-pseudo.tentative.html.ini
vendored
Normal file
6
tests/wpt/meta-legacy-layout/css/css-cascade/scope-import-parent-pseudo.tentative.html.ini
vendored
Normal file
|
@ -0,0 +1,6 @@
|
||||||
|
[scope-import-parent-pseudo.tentative.html]
|
||||||
|
[The & selector matches the scoping root]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[The & selector behaves like :scope]
|
||||||
|
expected: FAIL
|
3
tests/wpt/meta-legacy-layout/css/css-cascade/scope-import-scope-end.tentative.html.ini
vendored
Normal file
3
tests/wpt/meta-legacy-layout/css/css-cascade/scope-import-scope-end.tentative.html.ini
vendored
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
[scope-import-scope-end.tentative.html]
|
||||||
|
[Scope-imported rule applies within scope, above limit]
|
||||||
|
expected: FAIL
|
3
tests/wpt/meta-legacy-layout/css/css-cascade/scope-import-scope-pseudo.tentative.html.ini
vendored
Normal file
3
tests/wpt/meta-legacy-layout/css/css-cascade/scope-import-scope-pseudo.tentative.html.ini
vendored
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
[scope-import-scope-pseudo.tentative.html]
|
||||||
|
[The :scope pseudo-class works in imported stylesheets]
|
||||||
|
expected: FAIL
|
3
tests/wpt/meta-legacy-layout/css/css-cascade/scope-import-scope-start.tentative.html.ini
vendored
Normal file
3
tests/wpt/meta-legacy-layout/css/css-cascade/scope-import-scope-start.tentative.html.ini
vendored
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
[scope-import-scope-start.tentative.html]
|
||||||
|
[Scope-imported rule applies within scope]
|
||||||
|
expected: FAIL
|
|
@ -0,0 +1,6 @@
|
||||||
|
[query-container-name.html]
|
||||||
|
[match closest named container]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[match ancestor named container]
|
||||||
|
expected: FAIL
|
|
@ -0,0 +1,19 @@
|
||||||
|
[scroll-state-query-with-var.html]
|
||||||
|
expected: ERROR
|
||||||
|
[Matching --match-unknown]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Matching --match-unknown-fallback]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Matching --match-unregistered]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Matching --match-unregistered-number]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Matching --match-registered]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Matching --match-registered-number]
|
||||||
|
expected: NOTRUN
|
|
@ -0,0 +1,2 @@
|
||||||
|
[size-query-with-var.html]
|
||||||
|
expected: ERROR
|
2
tests/wpt/meta-legacy-layout/css/css-conditional/container-queries/var-evaluation.html.ini
vendored
Normal file
2
tests/wpt/meta-legacy-layout/css/css-conditional/container-queries/var-evaluation.html.ini
vendored
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
[var-evaluation.html]
|
||||||
|
expected: ERROR
|
|
@ -1,9 +1,15 @@
|
||||||
[generic-family-keywords-001.html]
|
[generic-family-keywords-001.html]
|
||||||
[@font-face matching for quoted and unquoted sans-serif]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[@font-face matching for quoted and unquoted emoji]
|
[@font-face matching for quoted and unquoted emoji]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[@font-face matching for quoted and unquoted ui-sans-serif]
|
[@font-face matching for quoted and unquoted ui-sans-serif]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[@font-face matching for quoted and unquoted ui-serif]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[@font-face matching for quoted and unquoted ui-monospace]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[@font-face matching for quoted and unquoted ui-rounded]
|
||||||
|
expected: FAIL
|
||||||
|
|
45
tests/wpt/meta-legacy-layout/css/css-gaps/tentative/parsing/gap-decorations-width-valid.html.ini
vendored
Normal file
45
tests/wpt/meta-legacy-layout/css/css-gaps/tentative/parsing/gap-decorations-width-valid.html.ini
vendored
Normal file
|
@ -0,0 +1,45 @@
|
||||||
|
[gap-decorations-width-valid.html]
|
||||||
|
[e.style['column-rule-width'\] = "repeat(4, thin)" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "repeat(3, thin medium thick)" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "repeat(1, 10px thin medium thick)" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "10px" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "repeat(4, medium)" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "10px 15px" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "10px 15px 20px 25px 30px" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "repeat(3, 10px) repeat(4, 15px)" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "10px repeat(3, 20px) 30px repeat(4, thin medium thick)" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "repeat(4, 10px 20px 30px) repeat(5, 40px) 50px" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "repeat(auto, thin)" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "repeat(auto, 10px 20px 30px)" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "repeat(auto, 10px 20px) 30px" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "repeat(4, 10px 20px 30px) repeat(auto, 40px)" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "10px repeat(auto, 20px 30px) repeat(4, thin 50px 60px)" should set the property value]
|
||||||
|
expected: FAIL
|
2
tests/wpt/meta-legacy-layout/css/css-overflow/line-clamp/line-clamp-032.tentative.html.ini
vendored
Normal file
2
tests/wpt/meta-legacy-layout/css/css-overflow/line-clamp/line-clamp-032.tentative.html.ini
vendored
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
[line-clamp-032.tentative.html]
|
||||||
|
expected: FAIL
|
2
tests/wpt/meta-legacy-layout/css/css-overflow/line-clamp/line-clamp-033.tentative.html.ini
vendored
Normal file
2
tests/wpt/meta-legacy-layout/css/css-overflow/line-clamp/line-clamp-033.tentative.html.ini
vendored
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
[line-clamp-033.tentative.html]
|
||||||
|
expected: FAIL
|
2
tests/wpt/meta-legacy-layout/css/css-overflow/scrollbar-large-scale-in-iframe.html.ini
vendored
Normal file
2
tests/wpt/meta-legacy-layout/css/css-overflow/scrollbar-large-scale-in-iframe.html.ini
vendored
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
[scrollbar-large-scale-in-iframe.html]
|
||||||
|
expected: FAIL
|
|
@ -0,0 +1,2 @@
|
||||||
|
[grid-aspect-ratio-align-items-center.html]
|
||||||
|
expected: FAIL
|
|
@ -1,3 +1,4 @@
|
||||||
[text-autospace-first-line-001.html]
|
[text-autospace-first-line-001.html]
|
||||||
|
expected: FAIL
|
||||||
[text-autospace-first-line-001]
|
[text-autospace-first-line-001]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
[text-autospace-ligature-001.html]
|
[text-autospace-ligature-001.html]
|
||||||
|
expected: FAIL
|
||||||
[text-autospace not implemented]
|
[text-autospace not implemented]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
|
@ -80,3 +80,11 @@
|
||||||
[Cancel the transition after it finishes]
|
[Cancel the transition after it finishes]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[Replacing a running transition should get transitioncancel earlier than transitionrun and transitionstart]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Replacing two running transitions on the same target should get two transitioncancel events earlier than two transitionrun events, per transition generation]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Replacing a running transition and forcing to flush the style together should get the correct event order]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -68,9 +68,6 @@
|
||||||
[CSS Values and Units Test: attr 24]
|
[CSS Values and Units Test: attr 24]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 15]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 19]
|
[CSS Values and Units Test: attr 19]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -86,32 +83,131 @@
|
||||||
[CSS Values and Units Test: attr 27]
|
[CSS Values and Units Test: attr 27]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 32]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 74]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 75]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 76]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 77]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 22]
|
[CSS Values and Units Test: attr 22]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 23]
|
[CSS Values and Units Test: attr 23]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 30]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 34]
|
[CSS Values and Units Test: attr 34]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 35]
|
[CSS Values and Units Test: attr 35]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 14]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 28]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 31]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 39]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 40]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 41]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 42]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 43]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 44]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 45]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 46]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 47]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 48]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 49]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 50]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 51]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 52]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 53]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 54]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 55]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 56]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 57]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 58]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 59]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 60]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 61]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 62]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 63]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 64]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 65]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 66]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 67]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 68]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 69]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 70]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 79]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 80]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 81]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 82]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -1,2 +1,3 @@
|
||||||
[vh_not_refreshing_on_chrome.html]
|
[vh_not_refreshing_on_chrome.html]
|
||||||
bug: https://github.com/servo/servo/issues/8984
|
bug: https://github.com/servo/servo/issues/8984
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -40,3 +40,9 @@
|
||||||
|
|
||||||
[Serialization should round-trip after setting e.style['filter'\] = "drop-shadow(rgba(4, 5, 6, 0.75) 1px 2px 3px)"]
|
[Serialization should round-trip after setting e.style['filter'\] = "drop-shadow(rgba(4, 5, 6, 0.75) 1px 2px 3px)"]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['filter'\] = "grayscale(calc(300%))" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['filter'\] = "grayscale(calc(101% * sign(1em - 1px)))" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
9
tests/wpt/meta-legacy-layout/dom/nodes/moveBefore/tentative/live-range-updates.html.ini
vendored
Normal file
9
tests/wpt/meta-legacy-layout/dom/nodes/moveBefore/tentative/live-range-updates.html.ini
vendored
Normal file
|
@ -0,0 +1,9 @@
|
||||||
|
[live-range-updates.html]
|
||||||
|
[moveBefore does not cause range startContainer to snap up to parent when startContainer is moved]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[moveBefore does not cause range startContainer to snap up to parent, when startContainer ancestor is moved]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[moveBefore does not cause range endContainer to snap up to parent, when endContainer ancestor is moved]
|
||||||
|
expected: FAIL
|
3
tests/wpt/meta-legacy-layout/dom/nodes/moveBefore/tentative/moveBefore-shadow-root.html.ini
vendored
Normal file
3
tests/wpt/meta-legacy-layout/dom/nodes/moveBefore/tentative/moveBefore-shadow-root.html.ini
vendored
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
[moveBefore-shadow-root.html]
|
||||||
|
[moveBefore() is allowed in ShadowRoots (i.e., connected DocumentFragments)]
|
||||||
|
expected: FAIL
|
|
@ -46,3 +46,6 @@
|
||||||
|
|
||||||
[sec-fetch-dest]
|
[sec-fetch-dest]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[sec-fetch-user]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -17,9 +17,6 @@
|
||||||
[sec-fetch-user - Not sent to non-trustworthy same-origin destination]
|
[sec-fetch-user - Not sent to non-trustworthy same-origin destination]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[sec-fetch-dest - Not sent to non-trustworthy same-site destination]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[sec-fetch-mode - Not sent to non-trustworthy cross-site destination]
|
[sec-fetch-mode - Not sent to non-trustworthy cross-site destination]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -5,5 +5,5 @@
|
||||||
[Navigating to a different document with link click]
|
[Navigating to a different document with link click]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Navigating to a different document with form submission]
|
[Navigating to a different document with location.href]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
|
@ -10,3 +10,6 @@
|
||||||
|
|
||||||
[load event does not fire on window.open('about:blank?foo')]
|
[load event does not fire on window.open('about:blank?foo')]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[load event does not fire on window.open('about:blank')]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -4,5 +4,4 @@
|
||||||
expected: TIMEOUT
|
expected: TIMEOUT
|
||||||
|
|
||||||
[When there's both a Refresh header and <meta> the Refresh header wins]
|
[When there's both a Refresh header and <meta> the Refresh header wins]
|
||||||
expected: TIMEOUT
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,11 @@
|
||||||
|
[subresource.any.html]
|
||||||
|
[Refresh does not affect XMLHttpRequest.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Refresh does not affect Image.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
|
[subresource.any.worker.html]
|
||||||
|
[Refresh does not affect XMLHttpRequest.]
|
||||||
|
expected: FAIL
|
|
@ -0,0 +1,3 @@
|
||||||
|
[traverse_the_history_5.html]
|
||||||
|
[Multiple history traversals, last would be aborted]
|
||||||
|
expected: FAIL
|
|
@ -0,0 +1,2 @@
|
||||||
|
[2d.canvas.host.size.large.html]
|
||||||
|
expected: CRASH
|
File diff suppressed because it is too large
Load diff
|
@ -0,0 +1,3 @@
|
||||||
|
[iframe-loading-lazy-nav-form-submit.html]
|
||||||
|
[Navigating iframe loading='lazy' before it is loaded: form submit]
|
||||||
|
expected: FAIL
|
|
@ -0,0 +1,2 @@
|
||||||
|
[iframe_sandbox_iframe_pdf_viewer.html]
|
||||||
|
expected: FAIL
|
|
@ -1,4 +1,4 @@
|
||||||
[iframe_sandbox_popups_escaping-1.html]
|
[iframe_sandbox_popups_escaping-1.html]
|
||||||
type: testharness
|
type: testharness
|
||||||
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
|
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
|
||||||
expected: TIMEOUT
|
expected: FAIL
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
[iframe_sandbox_popups_nonescaping-1.html]
|
[iframe_sandbox_popups_nonescaping-1.html]
|
||||||
type: testharness
|
type: testharness
|
||||||
expected: CRASH
|
expected: TIMEOUT
|
||||||
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
||||||
expected: FAIL
|
expected: NOTRUN
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
[iframe_sandbox_popups_nonescaping-2.html]
|
[iframe_sandbox_popups_nonescaping-2.html]
|
||||||
type: testharness
|
type: testharness
|
||||||
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
||||||
expected: NOTRUN
|
expected: FAIL
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
[iframe_sandbox_popups_nonescaping-3.html]
|
[iframe_sandbox_popups_nonescaping-3.html]
|
||||||
|
expected: TIMEOUT
|
||||||
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
||||||
expected: NOTRUN
|
expected: NOTRUN
|
||||||
|
|
|
@ -1,40 +1,6 @@
|
||||||
[submit-entity-body.html]
|
[submit-entity-body.html]
|
||||||
expected: TIMEOUT
|
|
||||||
[form submission from form should navigate to url with x-www-form-urlencoded]
|
|
||||||
expected: NOTRUN
|
|
||||||
|
|
||||||
[form submission from form should navigate to url with multipart/form-data]
|
|
||||||
expected: NOTRUN
|
|
||||||
|
|
||||||
[form submission from form should navigate to url with text/plain]
|
|
||||||
expected: NOTRUN
|
|
||||||
|
|
||||||
[form submission from button should navigate to url with x-www-form-urlencoded]
|
|
||||||
expected: NOTRUN
|
|
||||||
|
|
||||||
[form submission from button should navigate to url with multipart/form-data]
|
|
||||||
expected: NOTRUN
|
|
||||||
|
|
||||||
[form submission from button should navigate to url with text/plain]
|
|
||||||
expected: NOTRUN
|
|
||||||
|
|
||||||
[form submission from input should navigate to url with x-www-form-urlencoded]
|
|
||||||
expected: NOTRUN
|
|
||||||
|
|
||||||
[form submission from input should navigate to url with multipart/form-data]
|
|
||||||
expected: NOTRUN
|
|
||||||
|
|
||||||
[form submission from input should navigate to url with text/plain]
|
|
||||||
expected: NOTRUN
|
|
||||||
|
|
||||||
[form submission from submit input should contain submit button value]
|
|
||||||
expected: NOTRUN
|
|
||||||
|
|
||||||
[form submission from submit button should contain submit button value]
|
|
||||||
expected: NOTRUN
|
|
||||||
|
|
||||||
[form submission from image input should contain entries for its clicked coordinate]
|
[form submission from image input should contain entries for its clicked coordinate]
|
||||||
expected: NOTRUN
|
expected: FAIL
|
||||||
|
|
||||||
[form submission from image input should only contain entries for the submitter's clicked coordinate when multiple image inputs are present]
|
[form submission from image input should only contain entries for the submitter's clicked coordinate when multiple image inputs are present]
|
||||||
expected: NOTRUN
|
expected: FAIL
|
||||||
|
|
|
@ -181,3 +181,6 @@
|
||||||
|
|
||||||
[application/x-www-form-urlencoded: single quote in name (formdata event)]
|
[application/x-www-form-urlencoded: single quote in name (formdata event)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[application/x-www-form-urlencoded: Basic File test (formdata event)]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -1,3 +0,0 @@
|
||||||
[child-document-raf-order.html]
|
|
||||||
[Ordering of steps in "Update the Rendering" - child document requestAnimationFrame order]
|
|
||||||
expected: FAIL
|
|
|
@ -16,3 +16,15 @@
|
||||||
|
|
||||||
[Reload fetchStart > Original fetchStart]
|
[Reload fetchStart > Original fetchStart]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[Reload domComplete > Original domComplete]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Reload domContentLoadedEventEnd > Original domContentLoadedEventEnd]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Reload loadEventEnd > Original loadEventEnd]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Reload loadEventStart > Original loadEventStart]
|
||||||
|
expected: FAIL
|
||||||
|
|
52
tests/wpt/meta-legacy-layout/referrer-policy/generic/refresh-cross-origin.sub.html.ini
vendored
Normal file
52
tests/wpt/meta-legacy-layout/referrer-policy/generic/refresh-cross-origin.sub.html.ini
vendored
Normal file
|
@ -0,0 +1,52 @@
|
||||||
|
[refresh-cross-origin.sub.html]
|
||||||
|
expected: TIMEOUT
|
||||||
|
[cross-origin header refresh with referrer policy "no-referrer" refreshes with the empty string as referrer]
|
||||||
|
expected: TIMEOUT
|
||||||
|
|
||||||
|
[cross-origin meta refresh with referrer policy "no-referrer-when-downgrade" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[cross-origin header refresh with referrer policy "no-referrer-when-downgrade" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[cross-origin meta refresh with referrer policy "origin" refreshes with origin as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[cross-origin header refresh with referrer policy "origin" refreshes with origin as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[cross-origin meta refresh with referrer policy "origin-when-cross-origin" refreshes with origin as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[cross-origin header refresh with referrer policy "origin-when-cross-origin" refreshes with origin as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[cross-origin meta refresh with referrer policy "same-origin" refreshes with the empty string as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[cross-origin header refresh with referrer policy "same-origin" refreshes with the empty string as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[cross-origin meta refresh with referrer policy "strict-origin" refreshes with origin as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[cross-origin header refresh with referrer policy "strict-origin" refreshes with origin as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[cross-origin meta refresh with referrer policy "strict-origin-when-cross-origin" refreshes with origin as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[cross-origin header refresh with referrer policy "strict-origin-when-cross-origin" refreshes with origin as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[cross-origin meta refresh with referrer policy "unsafe-url" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[cross-origin header refresh with referrer policy "unsafe-url" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[cross-origin meta refresh with referrer policy "" refreshes with origin as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[cross-origin header refresh with referrer policy "" refreshes with origin as referrer]
|
||||||
|
expected: NOTRUN
|
52
tests/wpt/meta-legacy-layout/referrer-policy/generic/refresh-same-origin.html.ini
vendored
Normal file
52
tests/wpt/meta-legacy-layout/referrer-policy/generic/refresh-same-origin.html.ini
vendored
Normal file
|
@ -0,0 +1,52 @@
|
||||||
|
[refresh-same-origin.html]
|
||||||
|
expected: TIMEOUT
|
||||||
|
[same-origin header refresh with referrer policy "no-referrer" refreshes with the empty string as referrer]
|
||||||
|
expected: TIMEOUT
|
||||||
|
|
||||||
|
[same-origin meta refresh with referrer policy "no-referrer-when-downgrade" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-origin header refresh with referrer policy "no-referrer-when-downgrade" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-origin meta refresh with referrer policy "origin" refreshes with origin as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-origin header refresh with referrer policy "origin" refreshes with origin as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-origin meta refresh with referrer policy "origin-when-cross-origin" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-origin header refresh with referrer policy "origin-when-cross-origin" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-origin meta refresh with referrer policy "same-origin" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-origin header refresh with referrer policy "same-origin" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-origin meta refresh with referrer policy "strict-origin" refreshes with origin as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-origin header refresh with referrer policy "strict-origin" refreshes with origin as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-origin meta refresh with referrer policy "strict-origin-when-cross-origin" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-origin header refresh with referrer policy "strict-origin-when-cross-origin" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-origin meta refresh with referrer policy "unsafe-url" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-origin header refresh with referrer policy "unsafe-url" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-origin meta refresh with referrer policy "" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-origin header refresh with referrer policy "" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
52
tests/wpt/meta-legacy-layout/referrer-policy/generic/refresh-same-url.html.ini
vendored
Normal file
52
tests/wpt/meta-legacy-layout/referrer-policy/generic/refresh-same-url.html.ini
vendored
Normal file
|
@ -0,0 +1,52 @@
|
||||||
|
[refresh-same-url.html]
|
||||||
|
expected: TIMEOUT
|
||||||
|
[same-URL header refresh with referrer policy "no-referrer" refreshes with the empty string as referrer]
|
||||||
|
expected: TIMEOUT
|
||||||
|
|
||||||
|
[same-URL meta refresh with referrer policy "no-referrer-when-downgrade" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-URL header refresh with referrer policy "no-referrer-when-downgrade" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-URL meta refresh with referrer policy "origin" refreshes with origin as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-URL header refresh with referrer policy "origin" refreshes with origin as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-URL meta refresh with referrer policy "origin-when-cross-origin" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-URL header refresh with referrer policy "origin-when-cross-origin" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-URL meta refresh with referrer policy "same-origin" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-URL header refresh with referrer policy "same-origin" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-URL meta refresh with referrer policy "strict-origin" refreshes with origin as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-URL header refresh with referrer policy "strict-origin" refreshes with origin as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-URL meta refresh with referrer policy "strict-origin-when-cross-origin" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-URL header refresh with referrer policy "strict-origin-when-cross-origin" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-URL meta refresh with referrer policy "unsafe-url" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-URL header refresh with referrer policy "unsafe-url" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-URL meta refresh with referrer policy "" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[same-URL header refresh with referrer policy "" refreshes with full url as referrer]
|
||||||
|
expected: NOTRUN
|
28
tests/wpt/meta-legacy-layout/resource-timing/nested-context-navigations-iframe.html.ini
vendored
Normal file
28
tests/wpt/meta-legacy-layout/resource-timing/nested-context-navigations-iframe.html.ini
vendored
Normal file
|
@ -0,0 +1,28 @@
|
||||||
|
[nested-context-navigations-iframe.html]
|
||||||
|
expected: TIMEOUT
|
||||||
|
[Test that iframe navigations are not observable by the parent, even after history navigations by the parent]
|
||||||
|
expected: TIMEOUT
|
||||||
|
|
||||||
|
[Test that crossorigin iframe navigations are not observable by the parent, even after history navigations by the parent]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Test that cross-site iframe navigations are not observable by the parent, even after history navigations by the parent]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Test that iframe navigations are not observable by the parent]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Test that crossorigin iframe navigations are not observable by the parent]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Test that cross-site iframe navigations are not observable by the parent]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Test that iframe refreshes are not observable by the parent]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Test that crossorigin iframe refreshes are not observable by the parent]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Test that cross-site iframe refreshes are not observable by the parent]
|
||||||
|
expected: NOTRUN
|
2
tests/wpt/meta-legacy-layout/wasm/jsapi/idlharness-shadowrealm.window.js.ini
vendored
Normal file
2
tests/wpt/meta-legacy-layout/wasm/jsapi/idlharness-shadowrealm.window.js.ini
vendored
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
[idlharness-shadowrealm.window.html]
|
||||||
|
expected: ERROR
|
|
@ -1,4 +0,0 @@
|
||||||
[localstorage-about-blank-3P-iframe-opens-3P-window.partitioned.html]
|
|
||||||
expected: TIMEOUT
|
|
||||||
[StorageKey: test 3P about:blank window opened from a 3P iframe]
|
|
||||||
expected: TIMEOUT
|
|
|
@ -1,3 +0,0 @@
|
||||||
[WorkerGlobalScope-close.html]
|
|
||||||
[Test sending a message after closing.]
|
|
||||||
expected: FAIL
|
|
3
tests/wpt/meta-legacy-layout/xhr/open-url-multi-window-5.htm.ini
vendored
Normal file
3
tests/wpt/meta-legacy-layout/xhr/open-url-multi-window-5.htm.ini
vendored
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
[open-url-multi-window-5.htm]
|
||||||
|
[XMLHttpRequest: open() resolving URLs (multi-Window; 5)]
|
||||||
|
expected: FAIL
|
2845
tests/wpt/meta/MANIFEST.json
vendored
2845
tests/wpt/meta/MANIFEST.json
vendored
File diff suppressed because it is too large
Load diff
|
@ -44,6 +44,12 @@
|
||||||
[X25519 derivation with 230 as 'length' parameter]
|
[X25519 derivation with 230 as 'length' parameter]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[HKDF derivation with 0 as 'length' parameter]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[PBKDF2 derivation with 0 as 'length' parameter]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[derived_bits_length.https.any.worker.html]
|
[derived_bits_length.https.any.worker.html]
|
||||||
[ECDH derivation with 256 as 'length' parameter]
|
[ECDH derivation with 256 as 'length' parameter]
|
||||||
|
@ -90,3 +96,9 @@
|
||||||
|
|
||||||
[X25519 derivation with 230 as 'length' parameter]
|
[X25519 derivation with 230 as 'length' parameter]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[HKDF derivation with 0 as 'length' parameter]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[PBKDF2 derivation with 0 as 'length' parameter]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -959,6 +959,30 @@
|
||||||
[empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key]
|
[empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, empty salt, SHA-384, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, empty salt, SHA-384, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, empty salt, SHA-512, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, empty salt, SHA-512, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, empty salt, SHA-1, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, empty salt, SHA-1, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, empty salt, SHA-256, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, empty salt, SHA-256, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[hkdf.https.any.worker.html?1-1000]
|
[hkdf.https.any.worker.html?1-1000]
|
||||||
[short derivedKey, normal salt, SHA-384, with normal info]
|
[short derivedKey, normal salt, SHA-384, with normal info]
|
||||||
|
@ -2551,6 +2575,48 @@
|
||||||
[Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key]
|
[Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, normal salt, SHA-384, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, normal salt, SHA-384, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, normal salt, SHA-512, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, normal salt, SHA-512, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, normal salt, SHA-1, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, normal salt, SHA-1, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, normal salt, SHA-256, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, normal salt, SHA-256, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, empty salt, SHA-384, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, empty salt, SHA-384, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, empty salt, SHA-512, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, empty salt, SHA-512, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, empty salt, SHA-1, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, empty salt, SHA-1, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[hkdf.https.any.html?3001-last]
|
[hkdf.https.any.html?3001-last]
|
||||||
[Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key]
|
[Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key]
|
||||||
|
@ -3513,6 +3579,30 @@
|
||||||
[empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key]
|
[empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, empty salt, SHA-384, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, empty salt, SHA-384, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, empty salt, SHA-512, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, empty salt, SHA-512, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, empty salt, SHA-1, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, empty salt, SHA-1, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, empty salt, SHA-256, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, empty salt, SHA-256, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[hkdf.https.any.worker.html?1001-2000]
|
[hkdf.https.any.worker.html?1001-2000]
|
||||||
[Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info]
|
[Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info]
|
||||||
|
@ -5030,6 +5120,45 @@
|
||||||
[Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key]
|
[Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, empty salt, SHA-256, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, empty salt, SHA-256, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, normal salt, SHA-384, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, normal salt, SHA-384, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, normal salt, SHA-512, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, normal salt, SHA-512, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, normal salt, SHA-1, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, normal salt, SHA-1, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, normal salt, SHA-256, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, normal salt, SHA-256, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, empty salt, SHA-384, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, empty salt, SHA-384, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, empty salt, SHA-512, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[hkdf.https.any.html?1-1000]
|
[hkdf.https.any.html?1-1000]
|
||||||
[short derivedKey, normal salt, SHA-384, with normal info]
|
[short derivedKey, normal salt, SHA-384, with normal info]
|
||||||
|
@ -6622,6 +6751,48 @@
|
||||||
[Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key]
|
[Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, normal salt, SHA-384, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, normal salt, SHA-384, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, normal salt, SHA-512, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, normal salt, SHA-512, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, normal salt, SHA-1, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, normal salt, SHA-1, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, normal salt, SHA-256, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, normal salt, SHA-256, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, empty salt, SHA-384, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, empty salt, SHA-384, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, empty salt, SHA-512, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, empty salt, SHA-512, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, empty salt, SHA-1, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, empty salt, SHA-1, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[hkdf.https.any.html?1001-2000]
|
[hkdf.https.any.html?1001-2000]
|
||||||
[Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info]
|
[Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info]
|
||||||
|
@ -8139,6 +8310,45 @@
|
||||||
[Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key]
|
[Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, empty salt, SHA-256, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short derivedKey, empty salt, SHA-256, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, normal salt, SHA-384, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, normal salt, SHA-384, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, normal salt, SHA-512, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, normal salt, SHA-512, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, normal salt, SHA-1, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, normal salt, SHA-1, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, normal salt, SHA-256, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, normal salt, SHA-256, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, empty salt, SHA-384, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, empty salt, SHA-384, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, empty salt, SHA-512, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[hkdf.https.any.worker.html?2001-3000]
|
[hkdf.https.any.worker.html?2001-3000]
|
||||||
[Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info]
|
[Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info]
|
||||||
|
@ -9728,6 +9938,45 @@
|
||||||
[Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
|
[Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, empty salt, SHA-512, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, empty salt, SHA-1, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, empty salt, SHA-1, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, empty salt, SHA-256, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, empty salt, SHA-256, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, normal salt, SHA-384, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, normal salt, SHA-384, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, normal salt, SHA-512, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, normal salt, SHA-512, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, normal salt, SHA-1, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, normal salt, SHA-1, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, normal salt, SHA-256, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, normal salt, SHA-256, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[hkdf.https.any.html?2001-3000]
|
[hkdf.https.any.html?2001-3000]
|
||||||
[Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info]
|
[Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info]
|
||||||
|
@ -11316,3 +11565,42 @@
|
||||||
|
|
||||||
[Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
|
[Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, empty salt, SHA-512, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, empty salt, SHA-1, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, empty salt, SHA-1, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, empty salt, SHA-256, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long derivedKey, empty salt, SHA-256, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, normal salt, SHA-384, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, normal salt, SHA-384, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, normal salt, SHA-512, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, normal salt, SHA-512, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, normal salt, SHA-1, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, normal salt, SHA-1, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, normal salt, SHA-256, with normal info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty derivedKey, normal salt, SHA-256, with empty info with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -1295,6 +1295,48 @@
|
||||||
[Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
|
[Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-384, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-512, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-512, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-512, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-1, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-1, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-1, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-256, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-256, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-256, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-384, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-384, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-384, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[pbkdf2.https.any.html?4001-5000]
|
[pbkdf2.https.any.html?4001-5000]
|
||||||
[Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
|
[Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
|
||||||
|
@ -2638,6 +2680,42 @@
|
||||||
[Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
|
[Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-512, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-512, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-512, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-1, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-1, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-1, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-256, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-256, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-256, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-384, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-384, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-384, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[pbkdf2.https.any.html?6001-7000]
|
[pbkdf2.https.any.html?6001-7000]
|
||||||
[Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
|
[Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
|
||||||
|
@ -3975,6 +4053,42 @@
|
||||||
[Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1 iterations]
|
[Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1 iterations]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-512, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-512, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-1, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-1, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-1, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-256, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-256, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-256, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-384, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-384, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-384, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-512, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[pbkdf2.https.any.worker.html?2001-3000]
|
[pbkdf2.https.any.worker.html?2001-3000]
|
||||||
[Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
|
[Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
|
||||||
|
@ -5309,6 +5423,42 @@
|
||||||
[Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
|
[Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-384, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-512, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-512, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-512, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-1, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-1, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-1, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-256, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-256, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-256, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-384, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-384, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[pbkdf2.https.any.worker.html?8001-last]
|
[pbkdf2.https.any.worker.html?8001-last]
|
||||||
[Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
|
[Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
|
||||||
|
@ -6127,6 +6277,27 @@
|
||||||
[Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 0 iterations]
|
[Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 0 iterations]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-512, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-1, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-1, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-1, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-256, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-256, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-256, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[pbkdf2.https.any.worker.html?4001-5000]
|
[pbkdf2.https.any.worker.html?4001-5000]
|
||||||
[Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
|
[Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
|
||||||
|
@ -7470,6 +7641,42 @@
|
||||||
[Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
|
[Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-512, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-512, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-512, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-1, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-1, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-1, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-256, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-256, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-256, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-384, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-384, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-384, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[pbkdf2.https.any.worker.html?6001-7000]
|
[pbkdf2.https.any.worker.html?6001-7000]
|
||||||
[Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
|
[Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
|
||||||
|
@ -8807,6 +9014,42 @@
|
||||||
[Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1 iterations]
|
[Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1 iterations]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-512, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-512, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-1, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-1, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-1, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-256, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-256, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-256, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-384, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-384, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-384, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-512, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[pbkdf2.https.any.worker.html?1001-2000]
|
[pbkdf2.https.any.worker.html?1001-2000]
|
||||||
[Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1 iterations]
|
[Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1 iterations]
|
||||||
|
@ -10120,6 +10363,48 @@
|
||||||
[Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
|
[Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-384, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-384, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-512, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-512, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-512, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-1, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-1, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-1, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-256, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-256, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-256, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-384, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-384, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[pbkdf2.https.any.html?1001-2000]
|
[pbkdf2.https.any.html?1001-2000]
|
||||||
[Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1 iterations]
|
[Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1 iterations]
|
||||||
|
@ -11433,6 +11718,48 @@
|
||||||
[Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
|
[Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-384, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-384, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-512, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-512, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-512, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-1, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-1, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-1, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-256, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-256, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-256, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-384, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-384, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[pbkdf2.https.any.worker.html?5001-6000]
|
[pbkdf2.https.any.worker.html?5001-6000]
|
||||||
[long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
|
[long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
|
||||||
|
@ -12728,6 +13055,48 @@
|
||||||
[Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
|
[Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-512, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-512, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-512, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-1, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-1, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-1, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-256, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-256, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-256, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-384, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-384, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-384, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-512, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[pbkdf2.https.any.html?1-1000]
|
[pbkdf2.https.any.html?1-1000]
|
||||||
[Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
|
[Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
|
||||||
|
@ -14044,6 +14413,45 @@
|
||||||
[Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
|
[Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-384, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-384, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-384, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-512, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-512, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-512, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-1, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-1, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-1, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-256, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-256, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-256, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-384, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[pbkdf2.https.any.html?7001-8000]
|
[pbkdf2.https.any.html?7001-8000]
|
||||||
[Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
|
[Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
|
||||||
|
@ -15348,6 +15756,45 @@
|
||||||
[Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1000 iterations]
|
[Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1000 iterations]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-512, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-512, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-1, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-1, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-1, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-256, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-256, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-256, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-384, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-384, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-384, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-512, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-512, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[pbkdf2.https.any.worker.html?7001-8000]
|
[pbkdf2.https.any.worker.html?7001-8000]
|
||||||
[Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
|
[Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
|
||||||
|
@ -16652,6 +17099,45 @@
|
||||||
[Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1000 iterations]
|
[Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1000 iterations]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-512, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-512, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-1, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-1, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-1, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-256, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-256, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, long salt, SHA-256, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-384, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-384, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-384, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-512, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-512, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[pbkdf2.https.any.worker.html?3001-4000]
|
[pbkdf2.https.any.worker.html?3001-4000]
|
||||||
[Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 1000 iterations]
|
[Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 1000 iterations]
|
||||||
|
@ -17950,6 +18436,48 @@
|
||||||
[Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
|
[Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-384, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-512, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-512, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-512, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-1, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-1, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-1, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-256, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-256, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-256, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-384, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-384, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, long salt, SHA-384, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[pbkdf2.https.any.html?2001-3000]
|
[pbkdf2.https.any.html?2001-3000]
|
||||||
[Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
|
[Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
|
||||||
|
@ -19284,6 +19812,42 @@
|
||||||
[Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
|
[Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-384, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-512, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-512, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-512, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-1, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-1, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-1, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-256, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-256, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, empty salt, SHA-256, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-384, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, short salt, SHA-384, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[pbkdf2.https.any.html?8001-last]
|
[pbkdf2.https.any.html?8001-last]
|
||||||
[Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
|
[Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
|
||||||
|
@ -20102,6 +20666,27 @@
|
||||||
[Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 0 iterations]
|
[Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 0 iterations]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-512, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-1, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-1, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-1, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-256, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-256, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, empty salt, SHA-256, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[pbkdf2.https.any.html?5001-6000]
|
[pbkdf2.https.any.html?5001-6000]
|
||||||
[long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
|
[long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
|
||||||
|
@ -21397,6 +21982,48 @@
|
||||||
[Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
|
[Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-512, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-512, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-512, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-1, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-1, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-1, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-256, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-256, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[long password, empty salt, SHA-256, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-384, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-384, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-384, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[empty password, short salt, SHA-512, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[pbkdf2.https.any.worker.html?1-1000]
|
[pbkdf2.https.any.worker.html?1-1000]
|
||||||
[Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
|
[Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
|
||||||
|
@ -22712,3 +23339,42 @@
|
||||||
|
|
||||||
[Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
|
[Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-384, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-384, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-384, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-512, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-512, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-512, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-1, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-1, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-1, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-256, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-256, with 1000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, short salt, SHA-256, with 100000 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[short password, long salt, SHA-384, with 1 iterations with 0 length]
|
||||||
|
expected: FAIL
|
||||||
|
|
2
tests/wpt/meta/css/css-align/abspos/align-items-static-position.html.ini
vendored
Normal file
2
tests/wpt/meta/css/css-align/abspos/align-items-static-position.html.ini
vendored
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
[align-items-static-position.html]
|
||||||
|
expected: FAIL
|
2
tests/wpt/meta/css/css-backgrounds/border-image-021.html.ini
vendored
Normal file
2
tests/wpt/meta/css/css-backgrounds/border-image-021.html.ini
vendored
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
[border-image-021.html]
|
||||||
|
expected: FAIL
|
2
tests/wpt/meta/css/css-backgrounds/border-image-outset-004.html.ini
vendored
Normal file
2
tests/wpt/meta/css/css-backgrounds/border-image-outset-004.html.ini
vendored
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
[border-image-outset-004.html]
|
||||||
|
expected: FAIL
|
3
tests/wpt/meta/css/css-cascade/scope-import-implicit.tentative.html.ini
vendored
Normal file
3
tests/wpt/meta/css/css-cascade/scope-import-implicit.tentative.html.ini
vendored
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
[scope-import-implicit.tentative.html]
|
||||||
|
[Scope-imported rule applies within implicit scope]
|
||||||
|
expected: FAIL
|
3
tests/wpt/meta/css/css-cascade/scope-import-inner-scope.tentative.html.ini
vendored
Normal file
3
tests/wpt/meta/css/css-cascade/scope-import-inner-scope.tentative.html.ini
vendored
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
[scope-import-inner-scope.tentative.html]
|
||||||
|
[@scope within scope-imported stylesheet matches]
|
||||||
|
expected: FAIL
|
3
tests/wpt/meta/css/css-cascade/scope-import-multiple.tentative.html.ini
vendored
Normal file
3
tests/wpt/meta/css/css-cascade/scope-import-multiple.tentative.html.ini
vendored
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
[scope-import-multiple.tentative.html]
|
||||||
|
[A stylesheet may be imported multiple times, and scoped differently]
|
||||||
|
expected: FAIL
|
6
tests/wpt/meta/css/css-cascade/scope-import-parent-pseudo.tentative.html.ini
vendored
Normal file
6
tests/wpt/meta/css/css-cascade/scope-import-parent-pseudo.tentative.html.ini
vendored
Normal file
|
@ -0,0 +1,6 @@
|
||||||
|
[scope-import-parent-pseudo.tentative.html]
|
||||||
|
[The & selector matches the scoping root]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[The & selector behaves like :scope]
|
||||||
|
expected: FAIL
|
3
tests/wpt/meta/css/css-cascade/scope-import-scope-end.tentative.html.ini
vendored
Normal file
3
tests/wpt/meta/css/css-cascade/scope-import-scope-end.tentative.html.ini
vendored
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
[scope-import-scope-end.tentative.html]
|
||||||
|
[Scope-imported rule applies within scope, above limit]
|
||||||
|
expected: FAIL
|
3
tests/wpt/meta/css/css-cascade/scope-import-scope-pseudo.tentative.html.ini
vendored
Normal file
3
tests/wpt/meta/css/css-cascade/scope-import-scope-pseudo.tentative.html.ini
vendored
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
[scope-import-scope-pseudo.tentative.html]
|
||||||
|
[The :scope pseudo-class works in imported stylesheets]
|
||||||
|
expected: FAIL
|
3
tests/wpt/meta/css/css-cascade/scope-import-scope-start.tentative.html.ini
vendored
Normal file
3
tests/wpt/meta/css/css-cascade/scope-import-scope-start.tentative.html.ini
vendored
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
[scope-import-scope-start.tentative.html]
|
||||||
|
[Scope-imported rule applies within scope]
|
||||||
|
expected: FAIL
|
6
tests/wpt/meta/css/css-conditional/container-queries/query-container-name.html.ini
vendored
Normal file
6
tests/wpt/meta/css/css-conditional/container-queries/query-container-name.html.ini
vendored
Normal file
|
@ -0,0 +1,6 @@
|
||||||
|
[query-container-name.html]
|
||||||
|
[match closest named container]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[match ancestor named container]
|
||||||
|
expected: FAIL
|
|
@ -0,0 +1,19 @@
|
||||||
|
[scroll-state-query-with-var.html]
|
||||||
|
expected: ERROR
|
||||||
|
[Matching --match-unknown]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Matching --match-unknown-fallback]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Matching --match-unregistered]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Matching --match-unregistered-number]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Matching --match-registered]
|
||||||
|
expected: NOTRUN
|
||||||
|
|
||||||
|
[Matching --match-registered-number]
|
||||||
|
expected: NOTRUN
|
2
tests/wpt/meta/css/css-conditional/container-queries/size-query-with-var.html.ini
vendored
Normal file
2
tests/wpt/meta/css/css-conditional/container-queries/size-query-with-var.html.ini
vendored
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
[size-query-with-var.html]
|
||||||
|
expected: ERROR
|
2
tests/wpt/meta/css/css-conditional/container-queries/var-evaluation.html.ini
vendored
Normal file
2
tests/wpt/meta/css/css-conditional/container-queries/var-evaluation.html.ini
vendored
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
[var-evaluation.html]
|
||||||
|
expected: ERROR
|
45
tests/wpt/meta/css/css-gaps/tentative/parsing/gap-decorations-width-valid.html.ini
vendored
Normal file
45
tests/wpt/meta/css/css-gaps/tentative/parsing/gap-decorations-width-valid.html.ini
vendored
Normal file
|
@ -0,0 +1,45 @@
|
||||||
|
[gap-decorations-width-valid.html]
|
||||||
|
[e.style['column-rule-width'\] = "repeat(4, thin)" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "repeat(3, thin medium thick)" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "repeat(1, 10px thin medium thick)" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "10px" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "repeat(4, medium)" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "10px 15px" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "10px 15px 20px 25px 30px" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "repeat(3, 10px) repeat(4, 15px)" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "10px repeat(3, 20px) 30px repeat(4, thin medium thick)" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "repeat(4, 10px 20px 30px) repeat(5, 40px) 50px" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "repeat(auto, thin)" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "repeat(auto, 10px 20px 30px)" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "repeat(auto, 10px 20px) 30px" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "repeat(4, 10px 20px 30px) repeat(auto, 40px)" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['column-rule-width'\] = "10px repeat(auto, 20px 30px) repeat(4, thin 50px 60px)" should set the property value]
|
||||||
|
expected: FAIL
|
2
tests/wpt/meta/css/css-overflow/line-clamp/line-clamp-032.tentative.html.ini
vendored
Normal file
2
tests/wpt/meta/css/css-overflow/line-clamp/line-clamp-032.tentative.html.ini
vendored
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
[line-clamp-032.tentative.html]
|
||||||
|
expected: FAIL
|
2
tests/wpt/meta/css/css-overflow/line-clamp/line-clamp-033.tentative.html.ini
vendored
Normal file
2
tests/wpt/meta/css/css-overflow/line-clamp/line-clamp-033.tentative.html.ini
vendored
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
[line-clamp-033.tentative.html]
|
||||||
|
expected: FAIL
|
2
tests/wpt/meta/css/css-sizing/aspect-ratio/grid-aspect-ratio-align-items-center.html.ini
vendored
Normal file
2
tests/wpt/meta/css/css-sizing/aspect-ratio/grid-aspect-ratio-align-items-center.html.ini
vendored
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
[grid-aspect-ratio-align-items-center.html]
|
||||||
|
expected: FAIL
|
|
@ -1,3 +1,4 @@
|
||||||
[text-autospace-first-line-001.html]
|
[text-autospace-first-line-001.html]
|
||||||
|
expected: FAIL
|
||||||
[text-autospace-first-line-001]
|
[text-autospace-first-line-001]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
[text-autospace-ligature-001.html]
|
[text-autospace-ligature-001.html]
|
||||||
|
expected: FAIL
|
||||||
[text-autospace not implemented]
|
[text-autospace not implemented]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
|
@ -80,3 +80,11 @@
|
||||||
[Cancel the transition after it finishes]
|
[Cancel the transition after it finishes]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[Replacing a running transition should get transitioncancel earlier than transitionrun and transitionstart]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Replacing two running transitions on the same target should get two transitioncancel events earlier than two transitionrun events, per transition generation]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Replacing a running transition and forcing to flush the style together should get the correct event order]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -68,9 +68,6 @@
|
||||||
[CSS Values and Units Test: attr 24]
|
[CSS Values and Units Test: attr 24]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 15]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 19]
|
[CSS Values and Units Test: attr 19]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -86,32 +83,131 @@
|
||||||
[CSS Values and Units Test: attr 27]
|
[CSS Values and Units Test: attr 27]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 32]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 74]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 75]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 76]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 77]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 22]
|
[CSS Values and Units Test: attr 22]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 23]
|
[CSS Values and Units Test: attr 23]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 30]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 34]
|
[CSS Values and Units Test: attr 34]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[CSS Values and Units Test: attr 35]
|
[CSS Values and Units Test: attr 35]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 14]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 28]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 31]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 39]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 40]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 41]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 42]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 43]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 44]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 45]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 46]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 47]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 48]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 49]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 50]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 51]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 52]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 53]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 54]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 55]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 56]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 57]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 58]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 59]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 60]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 61]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 62]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 63]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 64]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 65]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 66]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 67]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 68]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 69]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 70]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 79]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 80]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 81]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[CSS Values and Units Test: attr 82]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -7,3 +7,9 @@
|
||||||
|
|
||||||
[e.style['filter'\] = "blur(10px) url(\\"picture.svg#f\\") contrast(20) brightness(30)" should set the property value]
|
[e.style['filter'\] = "blur(10px) url(\\"picture.svg#f\\") contrast(20) brightness(30)" should set the property value]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['filter'\] = "grayscale(calc(300%))" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[e.style['filter'\] = "grayscale(calc(101% * sign(1em - 1px)))" should set the property value]
|
||||||
|
expected: FAIL
|
||||||
|
|
9
tests/wpt/meta/dom/nodes/moveBefore/tentative/live-range-updates.html.ini
vendored
Normal file
9
tests/wpt/meta/dom/nodes/moveBefore/tentative/live-range-updates.html.ini
vendored
Normal file
|
@ -0,0 +1,9 @@
|
||||||
|
[live-range-updates.html]
|
||||||
|
[moveBefore does not cause range startContainer to snap up to parent when startContainer is moved]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[moveBefore does not cause range startContainer to snap up to parent, when startContainer ancestor is moved]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[moveBefore does not cause range endContainer to snap up to parent, when endContainer ancestor is moved]
|
||||||
|
expected: FAIL
|
3
tests/wpt/meta/dom/nodes/moveBefore/tentative/moveBefore-shadow-root.html.ini
vendored
Normal file
3
tests/wpt/meta/dom/nodes/moveBefore/tentative/moveBefore-shadow-root.html.ini
vendored
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
[moveBefore-shadow-root.html]
|
||||||
|
[moveBefore() is allowed in ShadowRoots (i.e., connected DocumentFragments)]
|
||||||
|
expected: FAIL
|
|
@ -1,8 +1,5 @@
|
||||||
[element-img-environment-change.https.sub.html]
|
[element-img-environment-change.https.sub.html]
|
||||||
expected: TIMEOUT
|
expected: TIMEOUT
|
||||||
[sec-fetch-site - Same origin, no attributes]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[sec-fetch-site - Cross-site, no attributes]
|
[sec-fetch-site - Cross-site, no attributes]
|
||||||
expected: TIMEOUT
|
expected: TIMEOUT
|
||||||
|
|
||||||
|
|
|
@ -41,6 +41,3 @@
|
||||||
|
|
||||||
[sec-fetch-site - HTTPS downgrade-upgrade, no attributes]
|
[sec-fetch-site - HTTPS downgrade-upgrade, no attributes]
|
||||||
expected: NOTRUN
|
expected: NOTRUN
|
||||||
|
|
||||||
[sec-fetch-site - Not sent to non-trustworthy same-origin destination, no attributes]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
|
@ -0,0 +1,3 @@
|
||||||
|
[navigation-unload-same-origin-fragment.html]
|
||||||
|
[Tests that a fragment navigation in the unload handler will not block the initial navigation]
|
||||||
|
expected: FAIL
|
|
@ -4,4 +4,4 @@
|
||||||
expected: TIMEOUT
|
expected: TIMEOUT
|
||||||
|
|
||||||
[When there's both a Refresh header and <meta> the Refresh header wins]
|
[When there's both a Refresh header and <meta> the Refresh header wins]
|
||||||
expected: TIMEOUT
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,11 @@
|
||||||
|
[subresource.any.html]
|
||||||
|
[Refresh does not affect XMLHttpRequest.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Refresh does not affect Image.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
|
[subresource.any.worker.html]
|
||||||
|
[Refresh does not affect XMLHttpRequest.]
|
||||||
|
expected: FAIL
|
|
@ -1,5 +1,5 @@
|
||||||
[createImageBitmap-serializable.html]
|
[createImageBitmap-serializable.html]
|
||||||
expected: TIMEOUT
|
expected: ERROR
|
||||||
[Serialize ImageBitmap created from a vector SVGImageElement]
|
[Serialize ImageBitmap created from a vector SVGImageElement]
|
||||||
expected: NOTRUN
|
expected: NOTRUN
|
||||||
|
|
||||||
|
|
|
@ -1,4 +0,0 @@
|
||||||
[2d.canvas.host.size.large.html]
|
|
||||||
expected: CRASH
|
|
||||||
[OffscreenCanvas test: 2d.canvas.host.size.large]
|
|
||||||
expected: FAIL
|
|
|
@ -1,2 +0,0 @@
|
||||||
[2d.canvas.host.size.large.worker.html]
|
|
||||||
expected: CRASH
|
|
3703
tests/wpt/meta/html/dom/idlharness.https.html.ini
vendored
3703
tests/wpt/meta/html/dom/idlharness.https.html.ini
vendored
File diff suppressed because it is too large
Load diff
|
@ -0,0 +1,2 @@
|
||||||
|
[iframe_sandbox_iframe_pdf_viewer.html]
|
||||||
|
expected: FAIL
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue