<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>
<!DOCTYPE bugzilla SYSTEM "https://bugs.webkit.org/page.cgi?id=bugzilla.dtd">

<bugzilla version="5.0.4.1"
          urlbase="https://bugs.webkit.org/"
          
          maintainer="admin@webkit.org"
>

    <bug>
          <bug_id>159638</bug_id>
          
          <creation_ts>2016-07-11 12:35:03 -0700</creation_ts>
          <short_desc>Improve test coverage for imported/w3c/WebCryptoAPI/</short_desc>
          <delta_ts>2016-12-10 02:12:12 -0800</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>1</classification_id>
          <classification>Unclassified</classification>
          <product>WebKit</product>
          <component>WebCore Misc.</component>
          <version>WebKit Nightly Build</version>
          <rep_platform>Unspecified</rep_platform>
          <op_sys>Unspecified</op_sys>
          <bug_status>RESOLVED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc></bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords>InRadar</keywords>
          <priority>P2</priority>
          <bug_severity>Normal</bug_severity>
          <target_milestone>---</target_milestone>
          <dependson>159636</dependson>
    
    <dependson>159979</dependson>
    
    <dependson>163953</dependson>
    
    <dependson>165629</dependson>
    
    <dependson>165680</dependson>
          <blocked>160880</blocked>
          <everconfirmed>1</everconfirmed>
          <reporter name="Jiewen Tan">jiewen_tan</reporter>
          <assigned_to name="Nobody">webkit-unassigned</assigned_to>
          <cc>ap</cc>
    
    <cc>bfulgham</cc>
    
    <cc>cdumez</cc>
    
    <cc>jiewen_tan</cc>
    
    <cc>rob</cc>
    
    <cc>ryanhaddad</cc>
    
    <cc>webkit-bug-importer</cc>
          

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>1209748</commentid>
    <comment_count>0</comment_count>
    <who name="Jiewen Tan">jiewen_tan</who>
    <bug_when>2016-07-11 12:35:03 -0700</bug_when>
    <thetext>Improve test coverage for imported/w3c/WebCryptoAPI/</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>1210794</commentid>
    <comment_count>1</comment_count>
    <who name="Jiewen Tan">jiewen_tan</who>
    <bug_when>2016-07-13 17:10:39 -0700</bug_when>
    <thetext>imported/w3c/WebCryptoAPI/encrypt_decrypt/test_aes_cbc.html [ Skip ]
imported/w3c/WebCryptoAPI/encrypt_decrypt/test_aes_ctr.html [ Skip ]
imported/w3c/WebCryptoAPI/encrypt_decrypt/test_aes_gcm.html [ Skip ]
imported/w3c/WebCryptoAPI/encrypt_decrypt/test_rsa_oaep.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_aes-cbc.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_aes-ctr.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_failures_AES-CBC.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_failures_AES-CTR.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_failures_AES-GCM.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_failures_AES-KW.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_failures_ECDH.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_failures_ECDSA.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_failures_HMAC.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_failures_RSA-OAEP.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_failures_RSA-PSS.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_failures_RSASSA-PKCS1-v1_5.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_failures.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_successes_AES-CBC.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_successes_AES-CTR.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_successes_AES-GCM.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_successes_AES-KW.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_successes_ECDH.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_successes_ECDSA.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_successes_HMAC.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_successes_RSA-OAEP.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_successes_RSA-PSS.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_successes_RSASSA-PKCS1-v1_5.html [ Skip ]
imported/w3c/WebCryptoAPI/generateKey/test_successes.html [ Skip ]
imported/w3c/WebCryptoAPI/idlharness.html [ Skip ]</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>1212935</commentid>
    <comment_count>2</comment_count>
    <who name="Jiewen Tan">jiewen_tan</who>
    <bug_when>2016-07-20 16:26:53 -0700</bug_when>
    <thetext>Fix timeout of imported/w3c/WebCryptoAPI/idlharness.html.

Committed r203476: &lt;http://trac.webkit.org/changeset/203476&gt;</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>1220401</commentid>
    <comment_count>3</comment_count>
    <who name="Radar WebKit Bug Importer">webkit-bug-importer</who>
    <bug_when>2016-08-16 00:43:31 -0700</bug_when>
    <thetext>&lt;rdar://problem/27862255&gt;</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>1244273</commentid>
    <comment_count>4</comment_count>
    <who name="Jiewen Tan">jiewen_tan</who>
    <bug_when>2016-10-25 10:46:14 -0700</bug_when>
    <thetext>The following tests are enabled in Committed r207809: &lt;http://trac.webkit.org/changeset/207809&gt;
imported/w3c/WebCryptoAPI/generateKey/test_aes-cbc.html
imported/w3c/WebCryptoAPI/generateKey/test_aes-ctr.html
imported/w3c/WebCryptoAPI/generateKey/test_failures_AES-CBC.html
imported/w3c/WebCryptoAPI/generateKey/test_failures_AES-CTR.html
imported/w3c/WebCryptoAPI/generateKey/test_failures_AES-GCM.html
imported/w3c/WebCryptoAPI/generateKey/test_failures_AES-KW.html
imported/w3c/WebCryptoAPI/generateKey/test_failures_ECDH.html
imported/w3c/WebCryptoAPI/generateKey/test_failures_ECDSA.html
imported/w3c/WebCryptoAPI/generateKey/test_failures_HMAC.html
imported/w3c/WebCryptoAPI/generateKey/test_failures_RSA-OAEP.html
imported/w3c/WebCryptoAPI/generateKey/test_failures_RSA-PSS.html
imported/w3c/WebCryptoAPI/generateKey/test_failures_RSASSA-PKCS1-v1_5.html
imported/w3c/WebCryptoAPI/generateKey/test_failures.html
imported/w3c/WebCryptoAPI/generateKey/test_successes_AES-CBC.html
imported/w3c/WebCryptoAPI/generateKey/test_successes_AES-CTR.html
imported/w3c/WebCryptoAPI/generateKey/test_successes_AES-GCM.html
imported/w3c/WebCryptoAPI/generateKey/test_successes_AES-KW.html
imported/w3c/WebCryptoAPI/generateKey/test_successes_ECDH.html
imported/w3c/WebCryptoAPI/generateKey/test_successes_ECDSA.html
imported/w3c/WebCryptoAPI/generateKey/test_successes_HMAC.html
imported/w3c/WebCryptoAPI/generateKey/test_successes_RSA-OAEP.html
imported/w3c/WebCryptoAPI/generateKey/test_successes_RSA-PSS.html
imported/w3c/WebCryptoAPI/generateKey/test_successes_RSASSA-PKCS1-v1_5.html
imported/w3c/WebCryptoAPI/generateKey/test_successes.html</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>1244274</commentid>
    <comment_count>5</comment_count>
    <who name="Ryan Haddad">ryanhaddad</who>
    <bug_when>2016-10-25 10:47:44 -0700</bug_when>
    <thetext>The following tests are also flaky timeouts:

imported/w3c/WebCryptoAPI/generateKey/test_successes.html
imported/w3c/WebCryptoAPI/generateKey/test_failures.html
imported/w3c/WebCryptoAPI/generateKey/test_successes_RSA-OAEP.html
imported/w3c/WebCryptoAPI/generateKey/test_successes_RSASSA-PKCS1-v1_5.html

https://build.webkit.org/results/Apple%20Yosemite%20Debug%20WK2%20(Tests)/r207818%20(15854)/results.html</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>1252884</commentid>
    <comment_count>6</comment_count>
    <who name="Jiewen Tan">jiewen_tan</who>
    <bug_when>2016-11-18 14:55:43 -0800</bug_when>
    <thetext>The following tests are enabled in Committed r208891: &lt;http://trac.webkit.org/changeset/208891&gt;:
imported/w3c/WebCryptoAPI/encrypt_decrypt/test_aes_cbc.html
imported/w3c/WebCryptoAPI/encrypt_decrypt/test_aes_ctr.html
imported/w3c/WebCryptoAPI/encrypt_decrypt/test_aes_gcm.html
imported/w3c/WebCryptoAPI/encrypt_decrypt/test_rsa_oaep.html</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>1257496</commentid>
    <comment_count>7</comment_count>
    <who name="Jiewen Tan">jiewen_tan</who>
    <bug_when>2016-12-07 17:31:27 -0800</bug_when>
    <thetext>Current status of all tests:
1. idlharness.html [46/64]
2. test_getRandomValues.html [4/4]
3. digest/test_digest.html [80/80]
4. encrypt_decrypt/test_aes_cbc.html [30/42]
5. encrypt_decrypt/test_aes_ctr.html [0/33]*
6. encrypt_decrypt/test_aes_gcm.html [0/330]*
7. encrypt_decrypt/test_rsa_oaep.html [96/108]
8. generateKey/test_aes-cbc.html [288/288]
9. generateKey/test_aes-ctr.html [0/288]*
10. generateKey/test_failures_AES-CBC.html [738/738]
11. generateKey/test_failures_AES-CBC.html [324/738]*
12. generateKey/test_failures_AES-GCM.html [324/738]*
13. generateKey/test_failures_AES-KW.html [480/480]
14. generateKey/test_failures_ECDH.html [344/440]*
15. generateKey/test_failures_ECDSA.htm [340/418]*
16. generateKey/test_failures_HMAC.html [452/452]
17. generateKey/test_failures_RSA-OAEP.html [496/496]
18. generateKey/test_failures_RSA-PSS.html [324/392]*
19. generateKey/test_failures_RSASSA-PKCS1-v1_5.html [392/392]
20. generateKey/test_failures.html [1298/2368]**
21. generateKey/test_successes_AES-CBC.html [288/288]
22. generateKey/test_successes_AES-CTR.html [0/288]*
23. generateKey/test_successes_AES-GCM.html [0/288]*
24. generateKey/test_successes_AES-KW.html [72/72]
25. generateKey/test_successes_ECDH.html [0/72]*
26. generateKey/test_successes_ECDSA.html [0/54]*
27. generateKey/test_successes_HMAC.html [96/96]
28. generateKey/test_successes_RSA-OAEP.html [156/156]
29. generateKey/test_successes_RSA-PSS.html [0/36]*
30. generateKey/test_successes_RSASSA-PKCS1-v1_5.html [36/36]
31. generateKey/test_successes.html [648/738]**
* are algorithms that we haven&apos;t supported yet.
** are superset tests.

I will start investigating why 1, 4 and 7 don&apos;t pass all tests.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>1257504</commentid>
    <comment_count>8</comment_count>
    <who name="Jiewen Tan">jiewen_tan</who>
    <bug_when>2016-12-07 17:50:25 -0800</bug_when>
    <thetext>Committed r209508: &lt;http://trac.webkit.org/changeset/209508&gt;</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>1257915</commentid>
    <comment_count>9</comment_count>
    <who name="Jiewen Tan">jiewen_tan</who>
    <bug_when>2016-12-08 15:15:45 -0800</bug_when>
    <thetext>idlharness.html is tracked in Bug 165629.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>1257972</commentid>
    <comment_count>10</comment_count>
    <who name="Jiewen Tan">jiewen_tan</who>
    <bug_when>2016-12-08 17:27:10 -0800</bug_when>
    <thetext>Failing tests of encrypt_decrypt/test_aes_cbc.html are:
FAIL AES-CBC 128-bit key with mismatched key and algorithm assert_equals: Mismatch should cause InvalidAccessError instead of The operation is not supported. expected &quot;InvalidAccessError&quot; but got &quot;NotSupportedError&quot;
FAIL AES-CBC 192-bit key with mismatched key and algorithm assert_equals: Mismatch should cause InvalidAccessError instead of The operation is not supported. expected &quot;InvalidAccessError&quot; but got &quot;NotSupportedError&quot;
FAIL AES-CBC 256-bit key with mismatched key and algorithm assert_equals: Mismatch should cause InvalidAccessError instead of The operation is not supported. expected &quot;InvalidAccessError&quot; but got &quot;NotSupportedError&quot;

FAIL AES-CBC 128-bit key, zeroPadChar assert_unreached: should have thrown exception for test AES-CBC 128-bit key, zeroPadChar Reached unreachable code
FAIL AES-CBC 128-bit key, bigPadChar assert_unreached: should have thrown exception for test AES-CBC 128-bit key, bigPadChar Reached unreachable code
FAIL AES-CBC 128-bit key, inconsistentPadChars assert_unreached: should have thrown exception for test AES-CBC 128-bit key, inconsistentPadChars Reached unreachable code
FAIL AES-CBC 192-bit key, zeroPadChar assert_unreached: should have thrown exception for test AES-CBC 192-bit key, zeroPadChar Reached unreachable code
FAIL AES-CBC 192-bit key, bigPadChar assert_unreached: should have thrown exception for test AES-CBC 192-bit key, bigPadChar Reached unreachable code
FAIL AES-CBC 192-bit key, inconsistentPadChars assert_unreached: should have thrown exception for test AES-CBC 192-bit key, inconsistentPadChars Reached unreachable code
FAIL AES-CBC 256-bit key, zeroPadChar assert_unreached: should have thrown exception for test AES-CBC 256-bit key, zeroPadChar Reached unreachable code
FAIL AES-CBC 256-bit key, bigPadChar assert_unreached: should have thrown exception for test AES-CBC 256-bit key, bigPadChar Reached unreachable code
FAIL AES-CBC 256-bit key, inconsistentPadChars assert_unreached: should have thrown exception for test AES-CBC 256-bit key, inconsistentPadChars Reached unreachable code

For the first group, the test case use &quot;AES-GCM&quot; as the mismatched algorithm name, which we haven&apos;t support yet. Therefore, we return NotSupportedError instead of InvalidAccessError.

For the second group, our underlying SecLibrary silently bypass the failures. Actually I don&apos;t think there is a failure in our SecLibrary as adding a wrong padding to the plain text will just result in another new plain text. Since we hand over all the padding jobs to the underlying SecLibrary, we should not follow the spec to remove bad padding. Otherwise, it will produce corrupted decrypted text. Mark as NTF.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>1258289</commentid>
    <comment_count>11</comment_count>
    <who name="Jiewen Tan">jiewen_tan</who>
    <bug_when>2016-12-09 13:39:28 -0800</bug_when>
    <thetext>encrypt_decrypt/test_rsa_oaep.html is tracked in Bug 165680.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>1258662</commentid>
    <comment_count>12</comment_count>
    <who name="Jiewen Tan">jiewen_tan</who>
    <bug_when>2016-12-10 02:09:42 -0800</bug_when>
    <thetext>Close this umbrella bug as all of its depending bugs are fixed.

Final Results:
1. idlharness.html [64/64]
2. test_getRandomValues.html [4/4]
3. digest/test_digest.html [80/80]
4. encrypt_decrypt/test_aes_cbc.html [30/42]***
5. encrypt_decrypt/test_aes_ctr.html [0/33]*
6. encrypt_decrypt/test_aes_gcm.html [0/330]*
7. encrypt_decrypt/test_rsa_oaep.html [108/108]
8. generateKey/test_aes-cbc.html [288/288]
9. generateKey/test_aes-ctr.html [0/288]*
10. generateKey/test_failures_AES-CBC.html [738/738]
11. generateKey/test_failures_AES-CBC.html [324/738]*
12. generateKey/test_failures_AES-GCM.html [324/738]*
13. generateKey/test_failures_AES-KW.html [480/480]
14. generateKey/test_failures_ECDH.html [344/440]*
15. generateKey/test_failures_ECDSA.htm [340/418]*
16. generateKey/test_failures_HMAC.html [452/452]
17. generateKey/test_failures_RSA-OAEP.html [496/496]
18. generateKey/test_failures_RSA-PSS.html [324/392]*
19. generateKey/test_failures_RSASSA-PKCS1-v1_5.html [392/392]
20. generateKey/test_failures.html [1298/2368]**
21. generateKey/test_successes_AES-CBC.html [288/288]
22. generateKey/test_successes_AES-CTR.html [0/288]*
23. generateKey/test_successes_AES-GCM.html [0/288]*
24. generateKey/test_successes_AES-KW.html [72/72]
25. generateKey/test_successes_ECDH.html [0/72]*
26. generateKey/test_successes_ECDSA.html [0/54]*
27. generateKey/test_successes_HMAC.html [96/96]
28. generateKey/test_successes_RSA-OAEP.html [156/156]
29. generateKey/test_successes_RSA-PSS.html [0/36]*
30. generateKey/test_successes_RSASSA-PKCS1-v1_5.html [36/36]
31. generateKey/test_successes.html [648/738]**
* are algorithms that we haven&apos;t supported yet.
** are superset tests.
*** are marked as NTBF. See comments above.</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>