diff --git a/resources/static/test/cases/common/js/user.js b/resources/static/test/cases/common/js/user.js index 8713e750ffe2d67d86d74d2de0362bb43db82a2d..585210585e97ad09063006488b9378834322ab08 100644 --- a/resources/static/test/cases/common/js/user.js +++ b/resources/static/test/cases/common/js/user.js @@ -53,6 +53,7 @@ var jwcrypto = require("./lib/jwcrypto"); // expiration date must be within 5 seconds of 2 minutes from now - see // issue 433 (https://github.com/mozilla/browserid/issues/433) + // An IE8 VM takes about 7 seconds to generate an assertion. var diff = Math.abs(expires - nowPlus2Mins); ok(diff < 5000, "expiration date must be within 5 seconds of 2 minutes from now: " + diff); diff --git a/resources/static/test/cases/dialog/js/modules/rp_info.js b/resources/static/test/cases/dialog/js/modules/rp_info.js index a73fe472c680de4d0ce16af7700835e9901e0f93..a16bb67ff5108a54554bf243c1a9a6bb95e778da 100644 --- a/resources/static/test/cases/dialog/js/modules/rp_info.js +++ b/resources/static/test/cases/dialog/js/modules/rp_info.js @@ -31,8 +31,12 @@ // could already be destroyed from the close } } - window.scriptRun = null; - delete window.scriptRun; + try { + var und; + window.scriptRun = und; + delete window.scriptRun; + } catch(e) { /* IE8 blows up trying to delete scriptRun */ } + testHelpers.teardown(); } }); diff --git a/resources/static/test/mocks/provisioning.js b/resources/static/test/mocks/provisioning.js index 13907e4d7b981c59658f65268b32cec9f8cdfe8c..59101556ff5ea3684383ecf05dcf008a9fc67e2d 100644 --- a/resources/static/test/mocks/provisioning.js +++ b/resources/static/test/mocks/provisioning.js @@ -23,7 +23,7 @@ BrowserID.Mocks.Provisioning = (function() { // network.withContext, add a random seed to ensure that we can get our // keypair. jwcrypto.addEntropy("H+ZgKuhjVckv/H4i0Qvj/JGJEGDVOXSIS5RCOjY9/Bo="); - jwcrypto.generateKeypair({algorithm: "DS", keysize: 256}, function(err, kp) { + jwcrypto.generateKeypair({algorithm: "DS", keysize: BrowserID.KEY_LENGTH}, function(err, kp) { keypair = kp; if (onsuccess) onsuccess(keypair, cert); });