- From: Richard Barnes <rlb@ipv.sx>
- Date: Thu, 9 Oct 2014 17:26:12 -0400
- To: Harry Halpin <hhalpin@w3.org>
- Cc: "public-webcrypto@w3.org" <public-webcrypto@w3.org>
- Message-ID: <CAL02cgTAi881GprQQCqZd+EYa39Oqa9Ct+K12mGZr3vf82PwBg@mail.gmail.com>
All of the tests we've been writing for Firefox can be found here: http://dxr.mozilla.org/mozilla-central/source/dom/crypto/test On Thu, Oct 9, 2014 at 9:44 AM, Harry Halpin <hhalpin@w3.org> wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Everyone, > > I know it may seem impossible, but if we can get through the bugs by > the next telecon, we'll be in CR. This means we need to collect tests > from all the browser implementers. > > The current best W3C docs on testing are here: > > http://testthewebforward.org/docs/ > > Robin Berjon from W3C will stop by our F2F again to discuss testing. > > If you belong to a browser vendor, see if you can make it to discuss > testing. And everyone who plans to contribute tests, please give a > read to the URL beforehand. > > cheers, > harry > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.11 (GNU/Linux) > > iQIcBAEBAgAGBQJUNpEvAAoJEPgwUoSfMzqcmj4P/0hNE2PbQ3Z2C+YuWgCvV5Sg > buRFCTYNuccFcm6ai30cyvJFOrqlvkD131GfTKj2eWTnE+upAvqiyYKEL26mMy16 > rWPm0/OUvvZeQSFnPufmKM+CFcLby2aygXSQ8N0lEV9KMS/d90LTtV7F8EVqv6VI > jflaR4CHY7UoLjPmPaIG5mOfVpY1VpYUo+8oIkkufWcrHpQLVlh4puCEADljD9TU > Tul43rlKF3S63TuOKZPaIlSXoMLKgkLDak3Ji4l1Jdi9r+XQoajJM5+i+XrtNyn8 > 7A61PPcsgNIKld+oX0Bd33iqjUlITjo81ruWWjNUoaM3Wm0ssIDr26Zer0kfQdS2 > tMgLEYGFWDXxU45Kg7CsxKQ1qEv10qq44ocwJgbd+H1iutrUBX5IyI/VOZ5lSMDT > +7gyDe+Rna3UQh2/9LrvXtXz+J7WmFGOYt/y5jnwIKoY9CQqI7d8JKq//Rb52F9O > 397AitiVSmoZfZ8yqzPYi1UEi1Ixk/Rdt1KlunQpz8vR1IVdXqED4qXYi6wv1/a/ > CAR0Vyj0lDxkXUHwC9cR+N5ramVSJU1VcztbnzJGNb6l8hCcLCYeW0xOvfmvQn9E > x/r9hjqirsfZK8HbcCrzaTbzu1+DxclqdenqXoewpsOmh7mfXdFpFIzhKtx2G6XD > 2MBrZq4+tigJHjJVILiL > =aFQs > -----END PGP SIGNATURE----- > >
Received on Thursday, 9 October 2014 21:26:39 UTC