Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 12 additions & 0 deletions tests/node_compat/config.jsonc
Original file line number Diff line number Diff line change
Expand Up @@ -3068,19 +3068,31 @@
"parallel/test-weakref.js": {},
"parallel/test-webcrypto-cryptokey-workers.js": {},
"parallel/test-webcrypto-derivebits-argon2.js": {},
"parallel/test-webcrypto-digest.js": {
"ignore": true,
"reason": "Tests SubtleCrypto.digest with cSHAKE128 / cSHAKE256 (Customizable SHAKE per NIST SP 800-185, a Node-specific WebCrypto extension that requires OpenSSL >= 3 for the customization-string wrapper). Deno's ext/crypto/ does not register cSHAKE as a recognised digest algorithm (only the underlying SHAKE128/SHAKE256 are supported). Could be revisited if a SHA3-based cSHAKE implementation lands -- the cshake-rs crate (or a small wrapper around the existing sha3 / cshake crates) would cover the customization-string path"
},
"parallel/test-webcrypto-encap-decap-ml-kem.js": {},
"parallel/test-webcrypto-encrypt-decrypt-chacha20-poly1305.js": {},
"parallel/test-webcrypto-encrypt-decrypt-rsa.js": {},
"parallel/test-webcrypto-encrypt-decrypt.js": {},
"parallel/test-webcrypto-export-import-ml-dsa.js": {},
"parallel/test-webcrypto-export-import-ml-kem.js": {},
"parallel/test-webcrypto-get-public-key.mjs": {
"ignore": true,
"reason": "Tests `subtle.getPublicKey(privateKey, usages)` -- the WebCrypto Level 2 method that derives a public CryptoKey from a private one. Deno does not implement this method (`TypeError: subtle.getPublicKey is not a function`). Implementable on top of Deno's existing per-algorithm export/import paths, but would need to handle every supported algorithm (ECDH, ECDSA, Ed25519, RSA-OAEP, RSA-PSS, RSASSA-PKCS1-v1_5, X25519). Could be revisited as a discrete WebCrypto Level 2 add-on"
},
"parallel/test-webcrypto-getRandomValues.js": {},
"parallel/test-webcrypto-random.js": {},
"parallel/test-webcrypto-keygen-kmac.js": {
"ignore": true,
"reason": "Tests SubtleCrypto generateKey for KMAC128 / KMAC256, a Node-specific WebCrypto extension that requires OpenSSL >= 3 (test gates on hasOpenSSL(3)); Deno's ext/crypto/ does not register KMAC as a recognised SubtleCrypto algorithm. Could be revisited if KMAC is added — a SHA-3-based KMAC is implementable via the sha3 / cshake Rust crates"
},
"parallel/test-webcrypto-sign-verify-ml-dsa.js": {},
"parallel/test-webcrypto-sign-verify.js": {
"ignore": true,
"reason": "After RSASSA-PKCS1-v1_5 / RSA-PSS / ECDSA / HMAC blocks pass and the Ed448 case self-skips, the test continues into a `hasOpenSSL(3)`-gated KMAC128 / KMAC256 sign/verify block. Deno's ext/crypto/ does not register KMAC as a recognised SubtleCrypto algorithm (`NotSupportedError: Unrecognized algorithm name`), so the test fails before reaching the Ed25519 cases. Same blocker family as the already-ignored `test-webcrypto-keygen-kmac.js` and `test-webcrypto-sign-verify-kmac.js`. Could be revisited if KMAC is added"
},
"parallel/test-webcrypto-util.js": {
"ignore": true,
"reason": "Runs with --expose-internals and requires Node's internal/crypto/util JS module to whitebox-test the internal normalizeAlgorithm() helper; Deno's WebCrypto is implemented in Rust (ext/crypto/) and does not expose this Node-internal module"
Expand Down
Loading