diff options
author | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
---|---|---|
committer | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
commit | 5f8de423f190bbb79a62f804151bc24824fa32d8 (patch) | |
tree | 10027f336435511475e392454359edea8e25895d /dom/u2f/tests/frame_appid_facet_insecure.html | |
parent | 49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff) | |
download | UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip |
Add m-esr52 at 52.6.0
Diffstat (limited to 'dom/u2f/tests/frame_appid_facet_insecure.html')
-rw-r--r-- | dom/u2f/tests/frame_appid_facet_insecure.html | 60 |
1 files changed, 60 insertions, 0 deletions
diff --git a/dom/u2f/tests/frame_appid_facet_insecure.html b/dom/u2f/tests/frame_appid_facet_insecure.html new file mode 100644 index 000000000..c1e566005 --- /dev/null +++ b/dom/u2f/tests/frame_appid_facet_insecure.html @@ -0,0 +1,60 @@ +<!DOCTYPE html> +<meta charset=utf-8> +<head> + <script src="u2futil.js"></script> +</head> +<body> +<p>Test for AppID / FacetID behavior for FIDO Universal Second Factor</p> +<script class="testbody" type="text/javascript"> +"use strict"; + +local_is(window.location.origin, "http://mochi.test:8888", "Is loaded correctly"); + +var version = "U2F_V2"; +var challenge = new Uint8Array(16); + +local_expectThisManyTests(5); + +u2f.register(null, [{ + version: version, + challenge: bytesToBase64UrlSafe(challenge), +}], [], function(res){ + local_isnot(res.errorCode, 0, "Insecure origin disallowed for null AppID"); + local_completeTest(); +}); + +u2f.register("", [{ + version: version, + challenge: bytesToBase64UrlSafe(challenge), +}], [], function(res){ + local_isnot(res.errorCode, 0, "Insecure origin disallowed for empty AppID"); + local_completeTest(); +}); + +u2f.register("http://example.com/appId", [{ + version: version, + challenge: bytesToBase64UrlSafe(challenge), +}], [], function(res){ + local_isnot(res.errorCode, 0, "Insecure origin disallowed for HTTP AppID"); + local_completeTest(); +}); + +u2f.register("https://example.com/appId", [{ + version: version, + challenge: bytesToBase64UrlSafe(challenge), +}], [], function(res){ + local_isnot(res.errorCode, 0, "Insecure origin disallowed for HTTPS AppID from HTTP origin"); + local_completeTest(); +}); + +u2f.register(window.location.origin + "/otherAppId", [{ + version: version, + challenge: bytesToBase64UrlSafe(challenge), +}], [], function(res){ + local_isnot(res.errorCode, 0, "Insecure origin disallowed for HTTP origin"); + local_completeTest(); +}); + +</script> +</body> +</html> |