summaryrefslogtreecommitdiffstats
path: root/dom/u2f/tests/frame_appid_facet_insecure.html
diff options
context:
space:
mode:
authorMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
committerMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
commit5f8de423f190bbb79a62f804151bc24824fa32d8 (patch)
tree10027f336435511475e392454359edea8e25895d /dom/u2f/tests/frame_appid_facet_insecure.html
parent49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff)
downloadUXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip
Add m-esr52 at 52.6.0
Diffstat (limited to 'dom/u2f/tests/frame_appid_facet_insecure.html')
-rw-r--r--dom/u2f/tests/frame_appid_facet_insecure.html60
1 files changed, 60 insertions, 0 deletions
diff --git a/dom/u2f/tests/frame_appid_facet_insecure.html b/dom/u2f/tests/frame_appid_facet_insecure.html
new file mode 100644
index 000000000..c1e566005
--- /dev/null
+++ b/dom/u2f/tests/frame_appid_facet_insecure.html
@@ -0,0 +1,60 @@
+<!DOCTYPE html>
+<meta charset=utf-8>
+<head>
+ <script src="u2futil.js"></script>
+</head>
+<body>
+<p>Test for AppID / FacetID behavior for FIDO Universal Second Factor</p>
+<script class="testbody" type="text/javascript">
+"use strict";
+
+local_is(window.location.origin, "http://mochi.test:8888", "Is loaded correctly");
+
+var version = "U2F_V2";
+var challenge = new Uint8Array(16);
+
+local_expectThisManyTests(5);
+
+u2f.register(null, [{
+ version: version,
+ challenge: bytesToBase64UrlSafe(challenge),
+}], [], function(res){
+ local_isnot(res.errorCode, 0, "Insecure origin disallowed for null AppID");
+ local_completeTest();
+});
+
+u2f.register("", [{
+ version: version,
+ challenge: bytesToBase64UrlSafe(challenge),
+}], [], function(res){
+ local_isnot(res.errorCode, 0, "Insecure origin disallowed for empty AppID");
+ local_completeTest();
+});
+
+u2f.register("http://example.com/appId", [{
+ version: version,
+ challenge: bytesToBase64UrlSafe(challenge),
+}], [], function(res){
+ local_isnot(res.errorCode, 0, "Insecure origin disallowed for HTTP AppID");
+ local_completeTest();
+});
+
+u2f.register("https://example.com/appId", [{
+ version: version,
+ challenge: bytesToBase64UrlSafe(challenge),
+}], [], function(res){
+ local_isnot(res.errorCode, 0, "Insecure origin disallowed for HTTPS AppID from HTTP origin");
+ local_completeTest();
+});
+
+u2f.register(window.location.origin + "/otherAppId", [{
+ version: version,
+ challenge: bytesToBase64UrlSafe(challenge),
+}], [], function(res){
+ local_isnot(res.errorCode, 0, "Insecure origin disallowed for HTTP origin");
+ local_completeTest();
+});
+
+</script>
+</body>
+</html>