File: subresource-ed25519.tentative.html

package info (click to toggle)
firefox-esr 78.15.0esr-1~deb11u1
  • links: PTS, VCS
  • area: main
  • in suites: bullseye
  • size: 3,301,156 kB
  • sloc: cpp: 5,665,905; javascript: 4,798,386; ansic: 2,878,233; python: 977,004; asm: 270,347; xml: 181,456; java: 111,756; sh: 72,926; makefile: 21,819; perl: 13,380; cs: 4,725; yacc: 4,565; objc: 3,026; pascal: 1,787; lex: 1,720; ada: 1,681; exp: 505; php: 436; lisp: 260; awk: 152; ruby: 103; csh: 80; sed: 53; sql: 45
file content (83 lines) | stat: -rw-r--r-- 2,730 bytes parent folder | download | duplicates (8)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
<!DOCTYPE html>
<meta charset=utf-8>
<title>Subresource Integrity</title>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/resources/sriharness.js"></script>

<div id="log"></div>

<div id="container"></div>
<script>
    var public_key = "qGFmwTxlocg707D1cX4w60iTwtfwbMLf8ITDyfko7s0="
    new SRIScriptTest(
        true,
        "Ed255519 signature, passes.",
        "ed25519-signature.js?1",
        "ed25519-" + public_key
    ).execute();
    new SRIScriptTest(
        false,
        "Ed255519 signature, fails because key is malformed.",
        "ed25519-signature.js?2",
        "ed25519-PotatoPotatoPotato"
    ).execute();
    new SRIScriptTest(
        false,
        "Ed255519 signature, fails because wrong key.",
        "ed25519-signature.js?3",
        "ed25519-PotatoPotatoPotatoPotatoPotatoAvocadoPotato="
    ).execute();
    new SRIScriptTest(
        false,
        "Ed255519 signature, fails because no signature in response header.",
        "ed25519-no-signature.js",
        "ed25519-" + public_key
    ).execute();
    new SRIScriptTest(
        false,
        "Ed255519 signature, fails because incorrect signature in response.",
        "ed25519-broken-signature.js",
        "ed25519-" + public_key
    ).execute();
    new SRIScriptTest(
        true,
        "Ed255519 signature, passes if any (first) of two keys passes.",
        "ed25519-signature.js?4",
        "ed25519-" + public_key +
            " ed25519-PotatoPotatoPotatoPotatoPotatoAvocadoPotato="
    ).execute();
    new SRIScriptTest(
        true,
        "Ed255519 signature, passes if any (second) of two keys passes.",
        "ed25519-signature.js?5",
        "ed25519-PotatoPotatoPotatoPotatoPotatoAvocadoPotato= ed25519-" +
            public_key
    ).execute();
    new SRIScriptTest(
        true,
        "Ed255519 signature, passes because at least one signature matches.",
        "ed25519-multi-signature.js",
        "ed25519-" + public_key
    ).execute();
    new SRIScriptTest(
        true,
        "Ed255519 signature, passes (as above), with commas between values.",
        "ed25519-multi-signature2.js",
        "ed25519-" + public_key
    ).execute();
    new SRIScriptTest(
        true,
        "Ed255519 signature, passes (as above), with multiple headers.",
        "ed25519-multi-signature-headers.js",
        "ed25519-" + public_key
    ).execute();
    new SRIScriptTest(
        true,
        "Ed255519 signature, passes, with multiple signature + multiple keys.",
        "ed25519-multi-signature.js?2",
        "ed25519-PotatoPotatoPotatoPotatoPotatoAvocadoPotato= ed25519-" +
            public_key
    ).execute();
</script>