- From: Charles Engelke <w3c@engelke.com>
- Date: Fri, 8 Jul 2016 16:25:58 -0400
- To: "public-webcrypto@w3.org" <public-webcrypto@w3.org>
- Message-ID: <CAFeVzdw28gn8wLpCLZkbRsXMiiJV10GKGvjprN8PHt_Xeav8Zw@mail.gmail.com>
I have tests for generateKey, digest, encrypt, decrypt, sign, and verify methods. I also have tests for deriveKey and deriveBits for PBKDF2 only. Except for PBKDF2 all these tests have either been merged or have pull requests in the web-platform-tests Github repo. Both Chrome and Firefox pass all the tests with the following exceptions: - Chrome doesn't support 192-bit AES keys - Firefox apparently can't import ECDSA keys in pkcs8 and spki format, so the tests can't run - Many tests for throwing errors fail, usually due to the wrong kind of error being thrown. I'm in the process of submitting bug reports for all those errors. - Some tests complete operations that should fail due to incorrect key usages I've submitted (or in the last case below, commented on) bug reports, and expect to submit about six more for Mozilla. I also plan to test on Edge this weekend. I am going to try to finish testing deriveBits and deriveKey for all supported algorithms. Since Jim is working on importKey and exportKey, that will leave only wrapKey and unwrapKey to finish the test suite. Bug reports: Mozilla: crypto.subtle.generateKey does not check usages argument https://bugzilla.mozilla.org/show_bug.cgi?id=1270634 crypto.subtle.generateKey throws wrong exception for bad algorithm argument https://bugzilla.mozilla.org/show_bug.cgi?id=1270599 Chromium: crypto.subtle.generateKey throws wrong error https://bugs.chromium.org/p/chromium/issues/detail?id=611801 crypto.subtle.encrypt throws wrong error for AES-GCM with 256-bit tag https://bugs.chromium.org/p/chromium/issues/detail?id=626711 crypto.subtle.deriveBits does not throw error for null, 0, or negative length https://bugs.chromium.org/p/chromium/issues/detail?id=534964 Charlie
Received on Friday, 8 July 2016 20:26:30 UTC