mirror of
https://github.com/servo/servo.git
synced 2025-09-30 16:49:16 +01:00
Remove legacy layout (layout 2013) (#35943)
We were already not compiling it and not running tests on it by default. So it's simpler to just completely remove it. Signed-off-by: Oriol Brufau <obrufau@igalia.com>
This commit is contained in:
parent
f93006af95
commit
7594dc6991
17224 changed files with 23 additions and 1584835 deletions
|
@ -1,2 +0,0 @@
|
|||
[cross-partition-navigation.tentative.https.html]
|
||||
expected: TIMEOUT
|
|
@ -1,2 +0,0 @@
|
|||
[cross-partition-worker-creation.tentative.https.html]
|
||||
expected: TIMEOUT
|
|
@ -1,2 +0,0 @@
|
|||
[cross-partition.tentative.https.html]
|
||||
expected: TIMEOUT
|
|
@ -1,58 +0,0 @@
|
|||
[Blob-constructor-endings.html]
|
||||
[The "endings" options property is used]
|
||||
expected: FAIL
|
||||
|
||||
[Input CRCR with endings 'native']
|
||||
expected: FAIL
|
||||
|
||||
[Input LFCRLFCR with endings 'native']
|
||||
expected: FAIL
|
||||
|
||||
[Invalid "endings" value: null]
|
||||
expected: FAIL
|
||||
|
||||
[Invalid "endings" value: {}]
|
||||
expected: FAIL
|
||||
|
||||
[Input CR with endings 'native']
|
||||
expected: FAIL
|
||||
|
||||
[CR/LF in adjacent input strings]
|
||||
expected: FAIL
|
||||
|
||||
[Input CRLFCRLF with endings 'native']
|
||||
expected: FAIL
|
||||
|
||||
[Invalid "endings" value: ""]
|
||||
expected: FAIL
|
||||
|
||||
[Input LFCR with endings 'native']
|
||||
expected: FAIL
|
||||
|
||||
[Invalid "endings" value: "Transparent"]
|
||||
expected: FAIL
|
||||
|
||||
[Input CRLFCR with endings 'native']
|
||||
expected: FAIL
|
||||
|
||||
[Input CRLFLF with endings 'native']
|
||||
expected: FAIL
|
||||
|
||||
[Input CRCRLF with endings 'native']
|
||||
expected: FAIL
|
||||
|
||||
[Input CRLF with endings 'native']
|
||||
expected: FAIL
|
||||
|
||||
[Invalid "endings" value: "NATIVE"]
|
||||
expected: FAIL
|
||||
|
||||
[Invalid "endings" value: 0]
|
||||
expected: FAIL
|
||||
|
||||
[Invalid "endings" value: "invalidEnumValue"]
|
||||
expected: FAIL
|
||||
|
||||
[Exception propagation from options]
|
||||
expected: FAIL
|
||||
|
|
@ -1,14 +0,0 @@
|
|||
[Blob-constructor.any.worker.html]
|
||||
[options properties should be accessed in lexicographic order.]
|
||||
expected: FAIL
|
||||
|
||||
[Passing a Float16Array as element of the blobParts array should work.]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[Blob-constructor.any.html]
|
||||
[options properties should be accessed in lexicographic order.]
|
||||
expected: FAIL
|
||||
|
||||
[Passing a Float16Array as element of the blobParts array should work.]
|
||||
expected: FAIL
|
|
@ -1,8 +0,0 @@
|
|||
[Blob-stream.any.html]
|
||||
[Reading Blob.stream() with BYOB reader]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[Blob-stream.any.worker.html]
|
||||
[Reading Blob.stream() with BYOB reader]
|
||||
expected: FAIL
|
|
@ -1,58 +0,0 @@
|
|||
[File-constructor-endings.html]
|
||||
[The "endings" options property is used]
|
||||
expected: FAIL
|
||||
|
||||
[Input CRCR with endings 'native']
|
||||
expected: FAIL
|
||||
|
||||
[Input LFCRLFCR with endings 'native']
|
||||
expected: FAIL
|
||||
|
||||
[Invalid "endings" value: null]
|
||||
expected: FAIL
|
||||
|
||||
[Invalid "endings" value: {}]
|
||||
expected: FAIL
|
||||
|
||||
[Input CR with endings 'native']
|
||||
expected: FAIL
|
||||
|
||||
[CR/LF in adjacent input strings]
|
||||
expected: FAIL
|
||||
|
||||
[Input CRLFCRLF with endings 'native']
|
||||
expected: FAIL
|
||||
|
||||
[Invalid "endings" value: ""]
|
||||
expected: FAIL
|
||||
|
||||
[Input LFCR with endings 'native']
|
||||
expected: FAIL
|
||||
|
||||
[Invalid "endings" value: "Transparent"]
|
||||
expected: FAIL
|
||||
|
||||
[Input CRLFCR with endings 'native']
|
||||
expected: FAIL
|
||||
|
||||
[Input CRLFLF with endings 'native']
|
||||
expected: FAIL
|
||||
|
||||
[Input CRCRLF with endings 'native']
|
||||
expected: FAIL
|
||||
|
||||
[Input CRLF with endings 'native']
|
||||
expected: FAIL
|
||||
|
||||
[Invalid "endings" value: "NATIVE"]
|
||||
expected: FAIL
|
||||
|
||||
[Invalid "endings" value: 0]
|
||||
expected: FAIL
|
||||
|
||||
[Invalid "endings" value: "invalidEnumValue"]
|
||||
expected: FAIL
|
||||
|
||||
[Exception propagation from options]
|
||||
expected: FAIL
|
||||
|
|
@ -1,8 +0,0 @@
|
|||
[File-constructor.any.worker.html]
|
||||
[No replacement when using special character in fileName]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[File-constructor.any.html]
|
||||
[No replacement when using special character in fileName]
|
||||
expected: FAIL
|
|
@ -1,37 +0,0 @@
|
|||
[send-file-form-controls.html]
|
||||
[Upload file-for-upload-in-form-ESC-[\x1b\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-BS-[\x08\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-VT-[\x0b\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-LF-CR-[\n\r\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-FF-[\x0c\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-LF-[\n\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-CR-LF-[\r\n\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-SPACE-[ \].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-CR-[\r\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-HT-[\t\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-NUL-[\x00\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-DEL-[\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
|
@ -1,19 +0,0 @@
|
|||
[send-file-form-iso-2022-jp.html]
|
||||
[Upload file-for-upload-in-form-☺😂.txt (windows-1252) in ISO-2022-JP form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-ABC~‾¥≈¤・・•∙·☼★星🌟星★☼·∙•・・¤≈¥‾~XYZ.txt (Unicode) in ISO-2022-JP form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-.txt (x-user-defined) in ISO-2022-JP form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-★星★.txt (JIS X 0201 and JIS X 0208) in ISO-2022-JP form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form.txt (ASCII) in ISO-2022-JP form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-☺😂.txt (Unicode) in ISO-2022-JP form]
|
||||
expected: FAIL
|
||||
|
|
@ -1,82 +0,0 @@
|
|||
[send-file-form-punctuation.html]
|
||||
[Upload file-for-upload-in-form-CIRCUMFLEX-ACCENT-[^\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-QUOTATION-MARK-["\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-LEFT-SQUARE-BRACKET-[[\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-EQUALS-SIGN-[=\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-TILDE-[~\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-LEFT-PARENTHESIS-[(\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-VERTICAL-LINE-[|\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-ASTERISK-[*\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-RIGHT-PARENTHESIS-[)\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-PERCENT-SIGN-[%\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-DOLLAR-SIGN-[$\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-COMMA-[,\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-RIGHT-CURLY-BRACKET-[}\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-QUESTION-MARK-[?\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-SOLIDUS-[/\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-LEFT-CURLY-BRACKET-[{\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-APOSTROPHE-['\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-RIGHT-SQUARE-BRACKET-[\]\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-COLON-[:\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload 'file-for-upload-in-form-single-quoted.txt' (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload "file-for-upload-in-form-double-quoted.txt" (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-SEMICOLON-[;\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-AMPERSAND-[&\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-PLUS-SIGN-[+\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-REVERSE-SOLIDUS-[\\\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-EXCLAMATION-MARK-[!\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-FULL-STOP-[.\].txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
|
@ -1,19 +0,0 @@
|
|||
[send-file-form-utf-8.html]
|
||||
[Upload file-for-upload-in-form-☺😂.txt (windows-1252) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-★星★.txt (JIS X 0201 and JIS X 0208) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-.txt (x-user-defined) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-ABC~‾¥≈¤・・•∙·☼★星🌟星★☼·∙•・・¤≈¥‾~XYZ.txt (Unicode) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form.txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-☺😂.txt (Unicode) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
|
@ -1,19 +0,0 @@
|
|||
[send-file-form-windows-1252.html]
|
||||
[Upload file-for-upload-in-form-ABC~‾¥≈¤・・•∙·☼★星🌟星★☼·∙•・・¤≈¥‾~XYZ.txt (Unicode) in windows-1252 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form.txt (ASCII) in windows-1252 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-☺😂.txt (Unicode) in windows-1252 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-★星★.txt (JIS X 0201 and JIS X 0208) in windows-1252 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-☺😂.txt (windows-1252) in windows-1252 form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-.txt (x-user-defined) in windows-1252 form]
|
||||
expected: FAIL
|
||||
|
|
@ -1,19 +0,0 @@
|
|||
[send-file-form-x-user-defined.html]
|
||||
[Upload file-for-upload-in-form.txt (ASCII) in x-user-defined form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-☺😂.txt (Unicode) in x-user-defined form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-★星★.txt (JIS X 0201 and JIS X 0208) in x-user-defined form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-☺😂.txt (windows-1252) in x-user-defined form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-.txt (x-user-defined) in x-user-defined form]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-ABC~‾¥≈¤・・•∙·☼★星🌟星★☼·∙•・・¤≈¥‾~XYZ.txt (Unicode) in x-user-defined form]
|
||||
expected: FAIL
|
||||
|
|
@ -1,4 +0,0 @@
|
|||
[send-file-form.html]
|
||||
[Upload file-for-upload-in-form.txt (ASCII) in UTF-8 form]
|
||||
expected: FAIL
|
||||
|
|
@ -1,74 +0,0 @@
|
|||
[send-file-formdata-controls.any.worker.html]
|
||||
[Upload file-for-upload-in-form-NUL-[\x00\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-BS-[\x08\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-VT-[\x0b\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-LF-[\n\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-LF-CR-[\n\r\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-CR-[\r\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-CR-LF-[\r\n\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-HT-[\t\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-FF-[\x0c\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-DEL-[\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-ESC-[\x1b\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-SPACE-[ \].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[send-file-formdata-controls.any.html]
|
||||
[Upload file-for-upload-in-form-NUL-[\x00\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-BS-[\x08\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-VT-[\x0b\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-LF-[\n\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-LF-CR-[\n\r\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-CR-[\r\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-CR-LF-[\r\n\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-HT-[\t\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-FF-[\x0c\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-DEL-[\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-ESC-[\x1b\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-SPACE-[ \].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
|
@ -1,164 +0,0 @@
|
|||
[send-file-formdata-punctuation.any.html]
|
||||
[Upload file-for-upload-in-form-QUOTATION-MARK-["\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload "file-for-upload-in-form-double-quoted.txt" (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-REVERSE-SOLIDUS-[\\\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-EXCLAMATION-MARK-[!\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-DOLLAR-SIGN-[$\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-PERCENT-SIGN-[%\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-AMPERSAND-[&\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-APOSTROPHE-['\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-LEFT-PARENTHESIS-[(\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-RIGHT-PARENTHESIS-[)\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-ASTERISK-[*\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-PLUS-SIGN-[+\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-COMMA-[,\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-FULL-STOP-[.\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-SOLIDUS-[/\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-COLON-[:\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-SEMICOLON-[;\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-EQUALS-SIGN-[=\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-QUESTION-MARK-[?\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-CIRCUMFLEX-ACCENT-[^\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-LEFT-SQUARE-BRACKET-[[\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-RIGHT-SQUARE-BRACKET-[\]\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-LEFT-CURLY-BRACKET-[{\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-VERTICAL-LINE-[|\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-RIGHT-CURLY-BRACKET-[}\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-TILDE-[~\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload 'file-for-upload-in-form-single-quoted.txt' (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[send-file-formdata-punctuation.any.worker.html]
|
||||
[Upload file-for-upload-in-form-QUOTATION-MARK-["\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload "file-for-upload-in-form-double-quoted.txt" (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-REVERSE-SOLIDUS-[\\\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-EXCLAMATION-MARK-[!\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-DOLLAR-SIGN-[$\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-PERCENT-SIGN-[%\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-AMPERSAND-[&\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-APOSTROPHE-['\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-LEFT-PARENTHESIS-[(\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-RIGHT-PARENTHESIS-[)\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-ASTERISK-[*\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-PLUS-SIGN-[+\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-COMMA-[,\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-FULL-STOP-[.\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-SOLIDUS-[/\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-COLON-[:\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-SEMICOLON-[;\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-EQUALS-SIGN-[=\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-QUESTION-MARK-[?\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-CIRCUMFLEX-ACCENT-[^\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-LEFT-SQUARE-BRACKET-[[\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-RIGHT-SQUARE-BRACKET-[\]\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-LEFT-CURLY-BRACKET-[{\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-VERTICAL-LINE-[|\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-RIGHT-CURLY-BRACKET-[}\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-TILDE-[~\].txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload 'file-for-upload-in-form-single-quoted.txt' (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
|
@ -1,38 +0,0 @@
|
|||
[send-file-formdata-utf-8.any.html]
|
||||
[Upload file-for-upload-in-form.txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-.txt (x-user-defined) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-☺😂.txt (windows-1252) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-★星★.txt (JIS X 0201 and JIS X 0208) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-☺😂.txt (Unicode) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-ABC~‾¥≈¤・・•∙·☼★星🌟星★☼·∙•・・¤≈¥‾~XYZ.txt (Unicode) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[send-file-formdata-utf-8.any.worker.html]
|
||||
[Upload file-for-upload-in-form.txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-.txt (x-user-defined) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-☺😂.txt (windows-1252) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-★星★.txt (JIS X 0201 and JIS X 0208) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-☺😂.txt (Unicode) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
[Upload file-for-upload-in-form-ABC~‾¥≈¤・・•∙·☼★星🌟星★☼·∙•・・¤≈¥‾~XYZ.txt (Unicode) in fetch with FormData]
|
||||
expected: FAIL
|
|
@ -1,8 +0,0 @@
|
|||
[send-file-formdata.any.html]
|
||||
[Upload file-for-upload-in-form.txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[send-file-formdata.any.worker.html]
|
||||
[Upload file-for-upload-in-form.txt (ASCII) in fetch with FormData]
|
||||
expected: FAIL
|
|
@ -1,5 +0,0 @@
|
|||
[historical.https.html]
|
||||
[Historical features]
|
||||
expected: FAIL
|
||||
[Service worker test setup]
|
||||
expected: FAIL
|
|
@ -1,20 +0,0 @@
|
|||
[idlharness.any.worker.html]
|
||||
[FileReader interface: operation readAsBinaryString(Blob)]
|
||||
expected: FAIL
|
||||
|
||||
[FileReader interface: new FileReader() must inherit property "readAsBinaryString(Blob)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
[FileReader interface: calling readAsBinaryString(Blob) on new FileReader() with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[idlharness.any.html]
|
||||
[FileReader interface: operation readAsBinaryString(Blob)]
|
||||
expected: FAIL
|
||||
|
||||
[FileReader interface: new FileReader() must inherit property "readAsBinaryString(Blob)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
[FileReader interface: calling readAsBinaryString(Blob) on new FileReader() with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
|
@ -1,19 +0,0 @@
|
|||
[idlharness.html]
|
||||
type: testharness
|
||||
[URL interface: operation createFor(Blob)]
|
||||
expected: FAIL
|
||||
|
||||
[FileReader interface: operation readAsBinaryString(Blob)]
|
||||
expected: FAIL
|
||||
|
||||
[FileReader interface: new FileReader() must inherit property "readAsBinaryString" with the proper type (1)]
|
||||
expected: FAIL
|
||||
|
||||
[FileReader interface: calling readAsBinaryString(Blob) on new FileReader() with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[FileReader interface: new FileReader() must inherit property "readAsBinaryString(Blob)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
[File API automated IDL tests]
|
||||
expected: FAIL
|
|
@ -1,31 +0,0 @@
|
|||
[idlharness.worker.html]
|
||||
type: testharness
|
||||
[ArrayBuffer interface: existence and properties of interface object]
|
||||
expected: FAIL
|
||||
|
||||
[URL interface: operation createFor(Blob)]
|
||||
expected: FAIL
|
||||
|
||||
[EventTarget interface: existence and properties of interface object]
|
||||
expected: FAIL
|
||||
|
||||
[Event interface: existence and properties of interface object]
|
||||
expected: FAIL
|
||||
|
||||
[FileReader interface: operation readAsBinaryString(Blob)]
|
||||
expected: FAIL
|
||||
|
||||
[FileReader interface: new FileReader() must inherit property "readAsBinaryString" with the proper type (1)]
|
||||
expected: FAIL
|
||||
|
||||
[FileReader interface: calling readAsBinaryString(Blob) on new FileReader() with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[FileReader interface: new FileReader() must inherit property "readAsBinaryString(Blob)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[idlharness]
|
||||
expected: FAIL
|
|
@ -1,8 +0,0 @@
|
|||
[filereader_readAsBinaryString.any.worker.html]
|
||||
[FileAPI Test: filereader_readAsBinaryString]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[filereader_readAsBinaryString.any.html]
|
||||
[FileAPI Test: filereader_readAsBinaryString]
|
||||
expected: FAIL
|
|
@ -1,14 +0,0 @@
|
|||
[filereader_readAsDataURL.any.worker.html]
|
||||
[readAsDataURL result for Blob with unspecified MIME type]
|
||||
expected: FAIL
|
||||
|
||||
[readAsDataURL result for empty Blob]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[filereader_readAsDataURL.any.html]
|
||||
[readAsDataURL result for Blob with unspecified MIME type]
|
||||
expected: FAIL
|
||||
|
||||
[readAsDataURL result for empty Blob]
|
||||
expected: FAIL
|
|
@ -1,20 +0,0 @@
|
|||
[filereader_result.any.html]
|
||||
[readAsBinaryString]
|
||||
expected: FAIL
|
||||
|
||||
[result is null during "loadstart" event for readAsBinaryString]
|
||||
expected: FAIL
|
||||
|
||||
[result is null during "progress" event for readAsBinaryString]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[filereader_result.any.worker.html]
|
||||
[readAsBinaryString]
|
||||
expected: FAIL
|
||||
|
||||
[result is null during "loadstart" event for readAsBinaryString]
|
||||
expected: FAIL
|
||||
|
||||
[result is null during "progress" event for readAsBinaryString]
|
||||
expected: FAIL
|
|
@ -1,4 +0,0 @@
|
|||
[unicode.html]
|
||||
[Blob/Unicode interaction: normalization and encoding]
|
||||
expected: FAIL
|
||||
|
|
@ -1,43 +0,0 @@
|
|||
[sandboxed-iframe.html]
|
||||
expected: TIMEOUT
|
||||
[Blob URLs can be used in <script> tags]
|
||||
expected: TIMEOUT
|
||||
|
||||
[Blob URLs can be used in iframes, and are treated same origin]
|
||||
expected: FAIL
|
||||
|
||||
[Blob URL fragment is implemented.]
|
||||
expected: TIMEOUT
|
||||
|
||||
[Blob URLs can be used in XHR]
|
||||
expected: FAIL
|
||||
|
||||
[XHR with a fragment should succeed]
|
||||
expected: FAIL
|
||||
|
||||
[Only exact matches should revoke URLs, using XHR]
|
||||
expected: FAIL
|
||||
|
||||
[Revoke blob URL after open(), will fetch]
|
||||
expected: FAIL
|
||||
|
||||
[Blob URLs can be used in fetch]
|
||||
expected: FAIL
|
||||
|
||||
[fetch with a fragment should succeed]
|
||||
expected: FAIL
|
||||
|
||||
[Only exact matches should revoke URLs, using fetch]
|
||||
expected: FAIL
|
||||
|
||||
[fetch should return Content-Type from Blob]
|
||||
expected: FAIL
|
||||
|
||||
[Revoke blob URL after creating Request, will fetch]
|
||||
expected: FAIL
|
||||
|
||||
[Revoke blob URL after calling fetch, fetch should succeed]
|
||||
expected: FAIL
|
||||
|
||||
[XHR should return Content-Type from Blob]
|
||||
expected: FAIL
|
|
@ -1,8 +0,0 @@
|
|||
[url-format.any.worker.html]
|
||||
[Generated Blob URLs are unique]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[url-format.any.html]
|
||||
[Generated Blob URLs are unique]
|
||||
expected: FAIL
|
|
@ -1,16 +0,0 @@
|
|||
[url-in-tags-revoke.window.html]
|
||||
expected: TIMEOUT
|
||||
[Fetching a blob URL immediately before revoking it works in an iframe.]
|
||||
expected: FAIL
|
||||
|
||||
[Fetching a blob URL immediately before revoking it works in an iframe navigation.]
|
||||
expected: FAIL
|
||||
|
||||
[Opening a blob URL in a new window immediately before revoking it works.]
|
||||
expected: FAIL
|
||||
|
||||
[Opening a blob URL in a noopener about:blank window immediately before revoking it works.]
|
||||
expected: TIMEOUT
|
||||
|
||||
[Opening a blob URL in a new window by clicking an <a> tag works immediately before revoking the URL.]
|
||||
expected: TIMEOUT
|
|
@ -1,5 +0,0 @@
|
|||
[url-in-tags.window.html]
|
||||
expected: TIMEOUT
|
||||
[Blob URL fragment is implemented.]
|
||||
expected: TIMEOUT
|
||||
|
|
@ -1,7 +0,0 @@
|
|||
[url-lifetime.html]
|
||||
[Terminating worker revokes its URLs]
|
||||
expected: FAIL
|
||||
|
||||
[Removing an iframe revokes its URLs]
|
||||
expected: FAIL
|
||||
|
|
@ -1,3 +0,0 @@
|
|||
[url-reload.window.html]
|
||||
[Reloading a blob URL succeeds even if the URL was revoked.]
|
||||
expected: FAIL
|
|
@ -1,14 +0,0 @@
|
|||
[url-with-fetch.any.worker.html]
|
||||
[Revoke blob URL after creating Request, will fetch]
|
||||
expected: FAIL
|
||||
|
||||
[Revoke blob URL after creating Request, then clone Request, will fetch]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[url-with-fetch.any.html]
|
||||
[Revoke blob URL after creating Request, will fetch]
|
||||
expected: FAIL
|
||||
|
||||
[Revoke blob URL after creating Request, then clone Request, will fetch]
|
||||
expected: FAIL
|
|
@ -1,10 +0,0 @@
|
|||
[url-with-xhr.any.html]
|
||||
[Revoke blob URL after open(), will fetch]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[url-with-xhr.any.worker.html]
|
||||
[Revoke blob URL after open(), will fetch]
|
||||
expected: FAIL
|
||||
|
||||
|
896030
tests/wpt/meta-legacy-layout/MANIFEST.json
vendored
896030
tests/wpt/meta-legacy-layout/MANIFEST.json
vendored
File diff suppressed because it is too large
Load diff
|
@ -1 +0,0 @@
|
|||
prefs: [dom_crypto_subtle_enabled: true]
|
|
@ -1,7 +0,0 @@
|
|||
[algorithm-discards-context.https.window.html]
|
||||
expected: TIMEOUT
|
||||
[Context is discarded in sign]
|
||||
expected: TIMEOUT
|
||||
|
||||
[Context is discarded in verify]
|
||||
expected: TIMEOUT
|
|
@ -1,8 +0,0 @@
|
|||
[crypto_key_cached_slots.https.any.html]
|
||||
[CryptoKey.usages getter returns cached object]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[crypto_key_cached_slots.https.any.worker.html]
|
||||
[CryptoKey.usages getter returns cached object]
|
||||
expected: FAIL
|
|
@ -1,99 +0,0 @@
|
|||
[cfrg_curves_bits_curve25519.https.any.worker.html]
|
||||
[X25519 key derivation checks for all-zero value result with a key of order 0]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 key derivation checks for all-zero value result with a key of order 1]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 key derivation checks for all-zero value result with a key of order 8]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 key derivation checks for all-zero value result with a key of order p-1 (order 2)]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 key derivation checks for all-zero value result with a key of order p (=0, order 4)]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 key derivation checks for all-zero value result with a key of order p+1 (=1, order 1)]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 short result]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 non-multiple of 8 bits]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 mismatched algorithms]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 no deriveBits usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 public property value is a secret key]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 asking for too many bits]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[cfrg_curves_bits_curve25519.https.any.html]
|
||||
expected: ERROR
|
||||
[X25519 key derivation checks for all-zero value result with a key of order 0]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 key derivation checks for all-zero value result with a key of order 1]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 key derivation checks for all-zero value result with a key of order 8]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 key derivation checks for all-zero value result with a key of order p-1 (order 2)]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 key derivation checks for all-zero value result with a key of order p (=0, order 4)]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 key derivation checks for all-zero value result with a key of order p+1 (=1, order 1)]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 short result]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 non-multiple of 8 bits]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 mismatched algorithms]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 no deriveBits usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 public property value is a secret key]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 asking for too many bits]
|
||||
expected: FAIL
|
|
@ -1,93 +0,0 @@
|
|||
[cfrg_curves_bits_curve448.https.any.html]
|
||||
expected: ERROR
|
||||
[X448 key derivation checks for all-zero value result with a key of order 0]
|
||||
expected: FAIL
|
||||
|
||||
[X448 key derivation checks for all-zero value result with a key of order 1]
|
||||
expected: FAIL
|
||||
|
||||
[X448 key derivation checks for all-zero value result with a key of order p-1 (order 2)]
|
||||
expected: FAIL
|
||||
|
||||
[X448 key derivation checks for all-zero value result with a key of order p (=0, order 4)]
|
||||
expected: FAIL
|
||||
|
||||
[X448 key derivation checks for all-zero value result with a key of order p+1 (=1, order 1)]
|
||||
expected: FAIL
|
||||
|
||||
[X448 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[X448 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[X448 short result]
|
||||
expected: FAIL
|
||||
|
||||
[X448 non-multiple of 8 bits]
|
||||
expected: FAIL
|
||||
|
||||
[X448 mismatched algorithms]
|
||||
expected: FAIL
|
||||
|
||||
[X448 no deriveBits usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[X448 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[X448 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[X448 public property value is a secret key]
|
||||
expected: FAIL
|
||||
|
||||
[X448 asking for too many bits]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[cfrg_curves_bits_curve448.https.any.worker.html]
|
||||
[X448 key derivation checks for all-zero value result with a key of order 0]
|
||||
expected: FAIL
|
||||
|
||||
[X448 key derivation checks for all-zero value result with a key of order 1]
|
||||
expected: FAIL
|
||||
|
||||
[X448 key derivation checks for all-zero value result with a key of order p-1 (order 2)]
|
||||
expected: FAIL
|
||||
|
||||
[X448 key derivation checks for all-zero value result with a key of order p (=0, order 4)]
|
||||
expected: FAIL
|
||||
|
||||
[X448 key derivation checks for all-zero value result with a key of order p+1 (=1, order 1)]
|
||||
expected: FAIL
|
||||
|
||||
[X448 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[X448 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[X448 short result]
|
||||
expected: FAIL
|
||||
|
||||
[X448 non-multiple of 8 bits]
|
||||
expected: FAIL
|
||||
|
||||
[X448 mismatched algorithms]
|
||||
expected: FAIL
|
||||
|
||||
[X448 no deriveBits usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[X448 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[X448 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[X448 public property value is a secret key]
|
||||
expected: FAIL
|
||||
|
||||
[X448 asking for too many bits]
|
||||
expected: FAIL
|
|
@ -1,87 +0,0 @@
|
|||
[cfrg_curves_keys_curve25519.https.any.worker.html]
|
||||
[X25519 deriveBits checks for all-zero value result with a key of order 0]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 deriveBits checks for all-zero value result with a key of order 1]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 deriveBits checks for all-zero value result with a key of order 8]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 deriveBits checks for all-zero value result with a key of order p-1 (order 2)]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 deriveBits checks for all-zero value result with a key of order p (=0, order 4)]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 deriveBits checks for all-zero value result with a key of order p+1 (=1, order 1)]
|
||||
expected: FAIL
|
||||
|
||||
[Key derivation using a X25519 generated keys.]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 mismatched algorithms]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 no deriveKey usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 public property value is a secret key]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[cfrg_curves_keys_curve25519.https.any.html]
|
||||
expected: ERROR
|
||||
[X25519 deriveBits checks for all-zero value result with a key of order 0]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 deriveBits checks for all-zero value result with a key of order 1]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 deriveBits checks for all-zero value result with a key of order 8]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 deriveBits checks for all-zero value result with a key of order p-1 (order 2)]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 deriveBits checks for all-zero value result with a key of order p (=0, order 4)]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 deriveBits checks for all-zero value result with a key of order p+1 (=1, order 1)]
|
||||
expected: FAIL
|
||||
|
||||
[Key derivation using a X25519 generated keys.]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 mismatched algorithms]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 no deriveKey usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 public property value is a secret key]
|
||||
expected: FAIL
|
|
@ -1,81 +0,0 @@
|
|||
[cfrg_curves_keys_curve448.https.any.html]
|
||||
expected: ERROR
|
||||
[X448 deriveBits checks for all-zero value result with a key of order 0]
|
||||
expected: FAIL
|
||||
|
||||
[X448 deriveBits checks for all-zero value result with a key of order 1]
|
||||
expected: FAIL
|
||||
|
||||
[X448 deriveBits checks for all-zero value result with a key of order p-1 (order 2)]
|
||||
expected: FAIL
|
||||
|
||||
[X448 deriveBits checks for all-zero value result with a key of order p (=0, order 4)]
|
||||
expected: FAIL
|
||||
|
||||
[X448 deriveBits checks for all-zero value result with a key of order p+1 (=1, order 1)]
|
||||
expected: FAIL
|
||||
|
||||
[Key derivation using a X448 generated keys.]
|
||||
expected: FAIL
|
||||
|
||||
[X448 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[X448 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[X448 mismatched algorithms]
|
||||
expected: FAIL
|
||||
|
||||
[X448 no deriveKey usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[X448 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[X448 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[X448 public property value is a secret key]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[cfrg_curves_keys_curve448.https.any.worker.html]
|
||||
[X448 deriveBits checks for all-zero value result with a key of order 0]
|
||||
expected: FAIL
|
||||
|
||||
[X448 deriveBits checks for all-zero value result with a key of order 1]
|
||||
expected: FAIL
|
||||
|
||||
[X448 deriveBits checks for all-zero value result with a key of order p-1 (order 2)]
|
||||
expected: FAIL
|
||||
|
||||
[X448 deriveBits checks for all-zero value result with a key of order p (=0, order 4)]
|
||||
expected: FAIL
|
||||
|
||||
[X448 deriveBits checks for all-zero value result with a key of order p+1 (=1, order 1)]
|
||||
expected: FAIL
|
||||
|
||||
[Key derivation using a X448 generated keys.]
|
||||
expected: FAIL
|
||||
|
||||
[X448 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[X448 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[X448 mismatched algorithms]
|
||||
expected: FAIL
|
||||
|
||||
[X448 no deriveKey usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[X448 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[X448 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[X448 public property value is a secret key]
|
||||
expected: FAIL
|
|
@ -1,4 +0,0 @@
|
|||
[derive_key_and_encrypt.https.any.worker.html]
|
||||
|
||||
[derive_key_and_encrypt.https.any.html]
|
||||
expected: ERROR
|
|
@ -1,104 +0,0 @@
|
|||
[derived_bits_length.https.any.html]
|
||||
[HKDF derivation with 0 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[ECDH derivation with 256 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[ECDH derivation with 0 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[ECDH derivation with null as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[ECDH derivation with undefined as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[ECDH derivation with omitted as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 derivation with 256 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 derivation with 0 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 derivation with null as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 derivation with undefined as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 derivation with omitted as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[HKDF derivation with 384 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[ECDH derivation with 384 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[ECDH derivation with 230 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 derivation with 384 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 derivation with 230 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[PBKDF2 derivation with 0 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[derived_bits_length.https.any.worker.html]
|
||||
[HKDF derivation with 0 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[ECDH derivation with 256 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[ECDH derivation with 0 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[ECDH derivation with null as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[ECDH derivation with undefined as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[ECDH derivation with omitted as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 derivation with 256 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 derivation with 0 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 derivation with null as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 derivation with undefined as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 derivation with omitted as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[HKDF derivation with 384 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[ECDH derivation with 384 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[ECDH derivation with 230 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 derivation with 384 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[X25519 derivation with 230 as 'length' parameter]
|
||||
expected: FAIL
|
||||
|
||||
[PBKDF2 derivation with 0 as 'length' parameter]
|
||||
expected: FAIL
|
|
@ -1,206 +0,0 @@
|
|||
[ecdh_bits.https.any.worker.html]
|
||||
[WebCryptoAPI: deriveBits() Using ECDH]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 short result]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 non-multiple of 8 bits]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 mismatched curves]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 public property of algorithm is not an ECDSA public key]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 no deriveBits usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 public property value is a secret key]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 asking for too many bits]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 short result]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 non-multiple of 8 bits]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 mismatched curves]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 public property of algorithm is not an ECDSA public key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 no deriveBits usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 public property value is a secret key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 asking for too many bits]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 short result]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 non-multiple of 8 bits]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 mismatched curves]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 public property of algorithm is not an ECDSA public key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 no deriveBits usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 public property value is a secret key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 asking for too many bits]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[ecdh_bits.https.any.html]
|
||||
[WebCryptoAPI: deriveBits() Using ECDH]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 short result]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 non-multiple of 8 bits]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 mismatched curves]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 public property of algorithm is not an ECDSA public key]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 no deriveBits usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 public property value is a secret key]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 asking for too many bits]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 short result]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 non-multiple of 8 bits]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 mismatched curves]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 public property of algorithm is not an ECDSA public key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 no deriveBits usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 public property value is a secret key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 asking for too many bits]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 short result]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 non-multiple of 8 bits]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 mismatched curves]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 public property of algorithm is not an ECDSA public key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 no deriveBits usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 public property value is a secret key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 asking for too many bits]
|
||||
expected: FAIL
|
|
@ -1,152 +0,0 @@
|
|||
[ecdh_keys.https.any.html]
|
||||
[WebCryptoAPI: deriveKey() Using ECDH]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 mismatched curves]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 public property of algorithm is not an ECDSA public key]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 no deriveKey usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 public property value is a secret key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 mismatched curves]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 public property of algorithm is not an ECDSA public key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 no deriveKey usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 public property value is a secret key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 mismatched curves]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 public property of algorithm is not an ECDSA public key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 no deriveKey usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 public property value is a secret key]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[ecdh_keys.https.any.worker.html]
|
||||
[WebCryptoAPI: deriveKey() Using ECDH]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 mismatched curves]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 public property of algorithm is not an ECDSA public key]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 no deriveKey usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-521 public property value is a secret key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 mismatched curves]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 public property of algorithm is not an ECDSA public key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 no deriveKey usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-256 public property value is a secret key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 good parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 mixed case parameters]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 mismatched curves]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 public property of algorithm is not an ECDSA public key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 no deriveKey usage for base key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 base key is not a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 public property value is a private key]
|
||||
expected: FAIL
|
||||
|
||||
[P-384 public property value is a secret key]
|
||||
expected: FAIL
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -1,434 +0,0 @@
|
|||
[aes_gcm.https.any.worker.html]
|
||||
[AES-GCM 128-bit key, 32-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 32-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 64-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 64-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 96-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 96-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 104-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 104-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 112-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 112-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 120-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 120-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 32-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 32-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 64-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 64-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 96-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 96-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 104-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 104-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 112-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 112-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 120-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 120-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 32-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 32-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 64-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 64-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 96-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 96-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 104-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 104-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 112-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 112-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 120-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 120-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 32-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 32-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 64-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 64-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 96-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 96-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 104-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 104-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 112-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 112-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 120-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 120-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 32-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 32-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 64-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 64-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 96-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 96-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 104-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 104-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 112-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 112-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 120-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 120-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 32-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 32-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 64-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 64-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 96-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 96-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 104-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 104-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 112-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 112-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 120-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 120-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[aes_gcm.https.any.html]
|
||||
[AES-GCM 128-bit key, 32-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 32-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 64-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 64-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 96-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 96-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 104-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 104-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 112-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 112-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 120-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 120-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 32-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 32-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 64-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 64-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 96-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 96-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 104-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 104-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 112-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 112-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 120-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 120-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 32-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 32-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 64-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 64-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 96-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 96-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 104-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 104-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 112-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 112-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 120-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 120-bit tag, 96-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 32-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 32-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 64-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 64-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 96-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 96-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 104-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 104-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 112-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 112-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 120-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 120-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 32-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 32-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 64-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 64-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 96-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 96-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 104-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 104-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 112-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 112-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 120-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 120-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 32-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 32-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 64-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 64-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 96-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 96-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 104-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 104-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 112-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 112-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 120-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 120-bit tag, 96-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
|
@ -1,434 +0,0 @@
|
|||
[aes_gcm_256_iv.https.any.html]
|
||||
[AES-GCM 128-bit key, 32-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 32-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 64-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 64-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 96-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 96-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 104-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 104-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 112-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 112-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 120-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 120-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 32-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 32-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 64-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 64-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 96-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 96-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 104-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 104-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 112-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 112-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 120-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 120-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 32-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 32-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 64-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 64-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 96-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 96-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 104-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 104-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 112-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 112-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 120-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 120-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 32-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 32-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 64-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 64-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 96-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 96-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 104-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 104-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 112-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 112-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 120-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 120-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 32-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 32-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 64-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 64-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 96-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 96-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 104-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 104-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 112-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 112-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 120-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 120-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 32-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 32-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 64-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 64-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 96-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 96-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 104-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 104-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 112-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 112-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 120-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 120-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[aes_gcm_256_iv.https.any.worker.html]
|
||||
[AES-GCM 128-bit key, 32-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 32-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 64-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 64-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 96-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 96-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 104-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 104-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 112-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 112-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 120-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 120-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 32-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 32-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 64-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 64-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 96-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 96-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 104-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 104-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 112-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 112-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 120-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 120-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 32-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 32-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 64-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 64-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 96-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 96-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 104-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 104-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 112-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 112-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 120-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 120-bit tag, 256-bit iv decryption]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 32-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 32-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 64-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 64-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 96-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 96-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 104-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 104-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 112-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 112-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, 120-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 128-bit key, no additional data, 120-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 32-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 32-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 64-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 64-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 96-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 96-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 104-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 104-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 112-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 112-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, 120-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 192-bit key, no additional data, 120-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 32-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 32-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 64-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 64-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 96-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 96-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 104-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 104-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 112-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 112-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, 120-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[AES-GCM 256-bit key, no additional data, 120-bit tag, 256-bit iv decryption with altered ciphertext]
|
||||
expected: FAIL
|
|
@ -1,650 +0,0 @@
|
|||
[rsa_oaep.https.any.html]
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and no label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and no label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and no label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and no label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and empty label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and empty label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and empty label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and empty label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and a label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and a label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and a label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and a label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and no label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and no label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and no label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and no label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and empty label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and empty label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and empty label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and empty label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and a label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and a label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and a label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and a label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and no label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and no label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and no label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and no label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and empty label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and empty label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and empty label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and empty label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and a label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and a label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and a label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and a label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and no label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and no label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and no label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and no label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and empty label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and empty label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and empty label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and empty label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and a label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and a label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and a label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and a label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and no label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and no label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and no label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and no label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and empty label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and empty label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and empty label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and empty label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and a label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and a label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and a label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and a label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and no label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and no label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and no label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and no label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and empty label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and empty label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and empty label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and empty label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and a label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and a label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and a label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and a label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and no label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and no label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and no label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and no label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and empty label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and empty label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and empty label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and empty label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and a label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and a label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and a label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and a label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and no label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and no label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and no label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and no label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and empty label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and empty label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and empty label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and empty label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and a label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and a label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and a label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and a label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and no label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and no label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and no label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and no label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and empty label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and empty label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and empty label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and empty label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and a label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and a label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and a label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and a label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[rsa_oaep.https.any.worker.html]
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and no label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and no label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and no label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and no label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and empty label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and empty label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and empty label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and empty label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and a label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and a label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and a label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and a label decryption]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and no label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and no label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and no label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and no label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and empty label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and empty label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and empty label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and empty label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and a label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and a label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and a label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and a label decryption with altered ciphertext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and no label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and no label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and no label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and no label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and empty label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and empty label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and empty label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and empty label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and a label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and a label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and a label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and a label using publicKey to decrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and no label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and no label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and no label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and no label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and empty label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and empty label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and empty label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and empty label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and a label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and a label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and a label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and a label no decrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and no label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and no label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and no label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and no label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and empty label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and empty label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and empty label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and empty label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and a label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and a label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and a label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and a label with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and no label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and no label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and no label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and no label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and empty label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and empty label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and empty label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and empty label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and a label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and a label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and a label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and a label]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and no label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and no label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and no label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and no label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and empty label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and empty label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and empty label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and empty label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and a label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and a label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and a label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and a label too long plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and no label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and no label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and no label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and no label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and empty label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and empty label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and empty label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and empty label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and a label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and a label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and a label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and a label using privateKey to encrypt]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and no label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and no label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and no label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and no label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and empty label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and empty label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and empty label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and empty label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-1 and a label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-256 and a label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-384 and a label no encrypt usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-OAEP with SHA-512 and a label no encrypt usage]
|
||||
expected: FAIL
|
|
@ -1,14 +0,0 @@
|
|||
[failures_AES-GCM.https.any.worker.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_AES-GCM.https.any.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
|
@ -1,590 +0,0 @@
|
|||
[failures_ECDH.https.any.worker.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-256}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-384}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_ECDH.https.any.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-256}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-384}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
|
@ -1,482 +0,0 @@
|
|||
[failures_ECDSA.https.any.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_ECDSA.https.any.worker.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
|
@ -1,158 +0,0 @@
|
|||
[failures_Ed25519.https.any.worker.html]
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_Ed25519.https.any.html]
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
|
@ -1,158 +0,0 @@
|
|||
[failures_Ed448.https.any.worker.html]
|
||||
[Bad usages: generateKey({name: Ed448}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_Ed448.https.any.html]
|
||||
[Bad usages: generateKey({name: Ed448}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
|
@ -1,110 +0,0 @@
|
|||
[failures_HMAC.https.any.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, name: HMAC}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, name: HMAC}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, name: HMAC}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, name: HMAC}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-384, name: HMAC}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-384, name: HMAC}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-512, name: HMAC}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-512, name: HMAC}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_HMAC.https.any.worker.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, name: HMAC}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, name: HMAC}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, name: HMAC}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, name: HMAC}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-384, name: HMAC}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-384, name: HMAC}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-512, name: HMAC}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-512, name: HMAC}, true, [\])]
|
||||
expected: FAIL
|
File diff suppressed because it is too large
Load diff
|
@ -1,422 +0,0 @@
|
|||
[failures_RSA-PSS.https.any.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_RSA-PSS.https.any.worker.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
|
@ -1,422 +0,0 @@
|
|||
[failures_RSASSA-PKCS1-v1_5.https.any.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_RSASSA-PKCS1-v1_5.https.any.worker.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
|
@ -1,194 +0,0 @@
|
|||
[failures_X25519.https.any.worker.html]
|
||||
[Bad usages: generateKey({name: X25519}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_X25519.https.any.html]
|
||||
[Bad usages: generateKey({name: X25519}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X25519}, true, [\])]
|
||||
expected: FAIL
|
|
@ -1,194 +0,0 @@
|
|||
[failures_X448.https.any.html]
|
||||
[Bad usages: generateKey({name: X448}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_X448.https.any.worker.html]
|
||||
[Bad usages: generateKey({name: X448}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X448}, true, [\])]
|
||||
expected: FAIL
|
|
@ -1,14 +0,0 @@
|
|||
[successes_AES-GCM.https.any.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_AES-GCM.https.any.worker.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
|
@ -1,446 +0,0 @@
|
|||
[successes_ECDH.https.any.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_ECDH.https.any.worker.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
|
@ -1,338 +0,0 @@
|
|||
[successes_ECDSA.https.any.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_ECDSA.https.any.worker.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
|
@ -1,110 +0,0 @@
|
|||
[successes_Ed25519.https.any.worker.html]
|
||||
[Success: generateKey({name: ED25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_Ed25519.https.any.html]
|
||||
[Success: generateKey({name: ED25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
|
@ -1,110 +0,0 @@
|
|||
[successes_Ed448.https.any.worker.html]
|
||||
[Success: generateKey({name: ED448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_Ed448.https.any.html]
|
||||
[Success: generateKey({name: ED448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
|
@ -1,878 +0,0 @@
|
|||
[successes_HMAC.https.any.worker.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: HMAC}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: HMAC}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: HMAC}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: HMAC}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: HMAC}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: HMAC}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: HMAC}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: HMAC}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: Hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: Hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: Hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: Hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: Hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: Hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: Hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: Hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: Hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: Hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: Hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: Hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: Hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: Hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: Hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: Hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_HMAC.https.any.html]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: HMAC}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: HMAC}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: HMAC}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: HMAC}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: HMAC}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: HMAC}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: HMAC}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: HMAC}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: HMAC}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: HMAC}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: HMAC}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: HMAC}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: HMAC}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: HMAC}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: HMAC}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: HMAC}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: HMAC}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, length: 160, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, length: 256, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, length: 384, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, length: 512, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: Hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: Hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: Hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: Hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: Hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: Hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: Hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: Hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: Hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: Hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: Hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: Hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-384, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: Hmac}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: Hmac}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: Hmac}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: Hmac}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: Hmac}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: Hmac}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: Hmac}, false, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-512, name: Hmac}, true, [sign, verify, sign, verify\])]
|
||||
expected: FAIL
|
File diff suppressed because it is too large
Load diff
|
@ -1,278 +0,0 @@
|
|||
[successes_RSA-PSS.https.any.html?11-20]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.worker.html?11-20]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.html?31-last]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.html?1-10]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.worker.html?1-10]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.html?21-30]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.worker.html?31-last]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.worker.html?21-30]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
|
@ -1,278 +0,0 @@
|
|||
[successes_RSASSA-PKCS1-v1_5.https.any.html?1-10]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.html?31-last]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?11-20]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.html?21-30]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?1-10]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?31-last]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.html?11-20]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?21-30]
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
|
@ -1,98 +0,0 @@
|
|||
[successes_X25519.https.any.html]
|
||||
[Success: generateKey({name: X25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_X25519.https.any.worker.html]
|
||||
[Success: generateKey({name: X25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
|
@ -1,98 +0,0 @@
|
|||
[successes_X448.https.any.html]
|
||||
[Success: generateKey({name: X448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_X448.https.any.worker.html]
|
||||
[Success: generateKey({name: X448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
|
@ -1,8 +0,0 @@
|
|||
[getRandomValues.any.worker.html]
|
||||
[Float16 arrays]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[getRandomValues.any.html]
|
||||
[Float16 arrays]
|
||||
expected: FAIL
|
|
@ -1,6 +0,0 @@
|
|||
[historical.any.html]
|
||||
|
||||
[historical.any.worker.html]
|
||||
|
||||
[historical.any.sharedworker.html]
|
||||
expected: ERROR
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -1,494 +0,0 @@
|
|||
[okp_importKey_Ed25519.https.any.worker.html]
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(kty, crv, x), {name: Ed25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(kty, crv, x), {name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(kty, crv, x), {name: Ed25519}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, false, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, false, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), Ed25519, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), Ed25519, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(kty, crv, x), Ed25519, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), Ed25519, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), Ed25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), Ed25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(kty, crv, x), Ed25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), Ed25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), Ed25519, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), Ed25519, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(kty, crv, x), Ed25519, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), Ed25519, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (pkcs8, buffer(48), Ed25519, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), Ed25519, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(crv, d, x, kty), Ed25519, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (pkcs8, buffer(48), Ed25519, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), Ed25519, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(crv, d, x, kty), Ed25519, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), Ed25519, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), Ed25519, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), Ed25519, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), Ed25519, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), Ed25519, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), Ed25519, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), Ed25519, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), Ed25519, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), Ed25519, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (pkcs8, buffer(48), Ed25519, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), Ed25519, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (pkcs8, buffer(48), Ed25519, false, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), Ed25519, false, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(kty, crv, x), {name: Ed25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(kty, crv, x), {name: Ed25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(kty, crv, x), Ed25519, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(kty, crv, x), Ed25519, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(kty, crv, x), {name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(kty, crv, x), {name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(kty, crv, x), Ed25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(kty, crv, x), Ed25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(kty, crv, x), {name: Ed25519}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(kty, crv, x), {name: Ed25519}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(kty, crv, x), Ed25519, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(kty, crv, x), Ed25519, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(crv, d, x, kty), Ed25519, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(crv, d, x, kty), Ed25519, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(crv, d, x, kty), Ed25519, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(crv, d, x, kty), Ed25519, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[okp_importKey_Ed25519.https.any.html]
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(kty, crv, x), {name: Ed25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(kty, crv, x), {name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(kty, crv, x), {name: Ed25519}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, false, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, false, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), Ed25519, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), Ed25519, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(kty, crv, x), Ed25519, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), Ed25519, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), Ed25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), Ed25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(kty, crv, x), Ed25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), Ed25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), Ed25519, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), Ed25519, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(kty, crv, x), Ed25519, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), Ed25519, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (pkcs8, buffer(48), Ed25519, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), Ed25519, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(crv, d, x, kty), Ed25519, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (pkcs8, buffer(48), Ed25519, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), Ed25519, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed25519 (jwk, object(crv, d, x, kty), Ed25519, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), Ed25519, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), Ed25519, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), Ed25519, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), Ed25519, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), Ed25519, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), Ed25519, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (spki, buffer(44), Ed25519, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(kty, crv, x), Ed25519, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (raw, buffer(32), Ed25519, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (pkcs8, buffer(48), Ed25519, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), Ed25519, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (pkcs8, buffer(48), Ed25519, false, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), Ed25519, false, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(kty, crv, x), {name: Ed25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(kty, crv, x), {name: Ed25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(kty, crv, x), Ed25519, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(kty, crv, x), Ed25519, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(kty, crv, x), {name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(kty, crv, x), {name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(kty, crv, x), Ed25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(kty, crv, x), Ed25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(kty, crv, x), {name: Ed25519}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(kty, crv, x), {name: Ed25519}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(kty, crv, x), Ed25519, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(kty, crv, x), Ed25519, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(crv, d, x, kty), Ed25519, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(crv, d, x, kty), Ed25519, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed25519: Ed25519 (jwk, object(crv, d, x, kty), Ed25519, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed25519 (jwk, object(crv, d, x, kty), Ed25519, true, [sign, sign\])]
|
||||
expected: FAIL
|
|
@ -1,494 +0,0 @@
|
|||
[okp_importKey_Ed448.https.any.worker.html]
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(kty, crv, x), {name: Ed448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(kty, crv, x), {name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(kty, crv, x), {name: Ed448}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, false, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, false, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), Ed448, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), Ed448, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(kty, crv, x), Ed448, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), Ed448, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), Ed448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), Ed448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(kty, crv, x), Ed448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), Ed448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), Ed448, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), Ed448, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(kty, crv, x), Ed448, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), Ed448, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (pkcs8, buffer(73), Ed448, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), Ed448, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(crv, d, x, kty), Ed448, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (pkcs8, buffer(73), Ed448, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), Ed448, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(crv, d, x, kty), Ed448, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), Ed448, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), Ed448, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), Ed448, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), Ed448, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), Ed448, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), Ed448, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), Ed448, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), Ed448, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), Ed448, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (pkcs8, buffer(73), Ed448, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), Ed448, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (pkcs8, buffer(73), Ed448, false, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), Ed448, false, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(kty, crv, x), {name: Ed448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(kty, crv, x), {name: Ed448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(kty, crv, x), Ed448, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(kty, crv, x), Ed448, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(kty, crv, x), {name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(kty, crv, x), {name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(kty, crv, x), Ed448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(kty, crv, x), Ed448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(kty, crv, x), {name: Ed448}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(kty, crv, x), {name: Ed448}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(kty, crv, x), Ed448, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(kty, crv, x), Ed448, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(crv, d, x, kty), Ed448, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(crv, d, x, kty), Ed448, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(crv, d, x, kty), Ed448, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(crv, d, x, kty), Ed448, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[okp_importKey_Ed448.https.any.html]
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(kty, crv, x), {name: Ed448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(kty, crv, x), {name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(kty, crv, x), {name: Ed448}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, false, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, false, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), Ed448, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), Ed448, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(kty, crv, x), Ed448, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), Ed448, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), Ed448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), Ed448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(kty, crv, x), Ed448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), Ed448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), Ed448, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), Ed448, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(kty, crv, x), Ed448, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), Ed448, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (pkcs8, buffer(73), Ed448, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), Ed448, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(crv, d, x, kty), Ed448, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (pkcs8, buffer(73), Ed448, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), Ed448, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: Ed448 (jwk, object(crv, d, x, kty), Ed448, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), Ed448, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), Ed448, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), Ed448, false, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), Ed448, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), Ed448, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), Ed448, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (spki, buffer(69), Ed448, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(kty, crv, x), Ed448, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (raw, buffer(57), Ed448, false, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (pkcs8, buffer(73), Ed448, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), Ed448, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (pkcs8, buffer(73), Ed448, false, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), Ed448, false, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(kty, crv, x), {name: Ed448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(kty, crv, x), {name: Ed448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(kty, crv, x), Ed448, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(kty, crv, x), Ed448, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(kty, crv, x), {name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(kty, crv, x), {name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(kty, crv, x), Ed448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(kty, crv, x), Ed448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(kty, crv, x), {name: Ed448}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(kty, crv, x), {name: Ed448}, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(kty, crv, x), Ed448, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(kty, crv, x), Ed448, true, [verify, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(crv, d, x, kty), Ed448, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(crv, d, x, kty), Ed448, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg Ed448: Ed448 (jwk, object(crv, d, x, kty), Ed448, true, [sign, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg EdDSA: Ed448 (jwk, object(crv, d, x, kty), Ed448, true, [sign, sign\])]
|
||||
expected: FAIL
|
|
@ -1,386 +0,0 @@
|
|||
[okp_importKey_X25519.https.any.html]
|
||||
[Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(kty, crv, x), {name: X25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (spki, buffer(44), X25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(kty, crv, x), X25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(kty, crv, x), X25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (raw, buffer(32), X25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), X25519, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), X25519, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(crv, d, x, kty), X25519, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), X25519, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), X25519, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(crv, d, x, kty), X25519, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), X25519, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), X25519, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(crv, d, x, kty), X25519, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), X25519, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), X25519, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(crv, d, x, kty), X25519, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (spki, buffer(44), X25519, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(kty, crv, x), X25519, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (raw, buffer(32), X25519, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), X25519, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), X25519, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), X25519, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), X25519, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), X25519, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), X25519, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), X25519, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), X25519, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(kty, crv, x), {name: X25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(kty, crv, x), X25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(crv, d, x, kty), X25519, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(crv, d, x, kty), X25519, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(crv, d, x, kty), X25519, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(crv, d, x, kty), X25519, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[okp_importKey_X25519.https.any.worker.html]
|
||||
[Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(kty, crv, x), {name: X25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (spki, buffer(44), X25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(kty, crv, x), X25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(kty, crv, x), X25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (raw, buffer(32), X25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), X25519, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), X25519, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(crv, d, x, kty), X25519, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), X25519, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), X25519, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(crv, d, x, kty), X25519, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), X25519, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), X25519, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(crv, d, x, kty), X25519, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), X25519, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), X25519, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X25519 (jwk, object(crv, d, x, kty), X25519, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (spki, buffer(44), X25519, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(kty, crv, x), X25519, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (raw, buffer(32), X25519, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), X25519, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), X25519, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), X25519, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), X25519, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), X25519, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), X25519, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (pkcs8, buffer(48), X25519, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X25519 bits (jwk, object(crv, d, x, kty), X25519, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(kty, crv, x), {name: X25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(kty, crv, x), X25519, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(crv, d, x, kty), X25519, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(crv, d, x, kty), X25519, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(crv, d, x, kty), X25519, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X25519 (jwk, object(crv, d, x, kty), X25519, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
|
@ -1,386 +0,0 @@
|
|||
[okp_importKey_X448.https.any.worker.html]
|
||||
[Good parameters: X448 bits (spki, buffer(68), {name: X448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(kty, crv, x), {name: X448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (raw, buffer(56), {name: X448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (spki, buffer(68), {name: X448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (raw, buffer(56), {name: X448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (spki, buffer(68), X448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(kty, crv, x), X448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(kty, crv, x), X448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (raw, buffer(56), X448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), X448, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), X448, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), X448, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), X448, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (spki, buffer(68), X448, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(kty, crv, x), X448, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (raw, buffer(56), X448, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), X448, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), X448, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), X448, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), X448, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(kty, crv, x), {name: X448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(kty, crv, x), X448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[okp_importKey_X448.https.any.html]
|
||||
[Good parameters: X448 bits (spki, buffer(68), {name: X448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(kty, crv, x), {name: X448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (raw, buffer(56), {name: X448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (spki, buffer(68), {name: X448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (raw, buffer(56), {name: X448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (spki, buffer(68), X448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(kty, crv, x), X448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(kty, crv, x), X448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (raw, buffer(56), X448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), X448, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), X448, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), X448, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), X448, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with ignored JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (spki, buffer(68), X448, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(kty, crv, x), X448, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (raw, buffer(56), X448, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), X448, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), X448, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), X448, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (pkcs8, buffer(72), X448, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters: X448 bits (jwk, object(crv, d, x, kty), X448, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(kty, crv, x), {name: X448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(kty, crv, x), X448, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Good parameters with JWK alg: X448 (jwk, object(crv, d, x, kty), X448, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -1,80 +0,0 @@
|
|||
[eddsa_curve25519.https.any.html]
|
||||
[EdDSA Ed25519 verification]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 with altered data after call]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 verification failure due to altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 verification failure due to shortened signature]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 verification failure due to altered data]
|
||||
expected: FAIL
|
||||
|
||||
[Sign and verify using generated Ed25519 keys.]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[eddsa_curve25519.https.any.worker.html]
|
||||
[EdDSA Ed25519 verification]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 with altered data after call]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 verification failure due to altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 verification failure due to shortened signature]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed25519 verification failure due to altered data]
|
||||
expected: FAIL
|
||||
|
||||
[Sign and verify using generated Ed25519 keys.]
|
||||
expected: FAIL
|
|
@ -1,80 +0,0 @@
|
|||
[eddsa_curve448.https.any.worker.html]
|
||||
[EdDSA Ed448 verification]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 with altered data after call]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 verification failure due to altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 verification failure due to shortened signature]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 verification failure due to altered data]
|
||||
expected: FAIL
|
||||
|
||||
[Sign and verify using generated Ed448 keys.]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[eddsa_curve448.https.any.html]
|
||||
[EdDSA Ed448 verification]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 with altered data after call]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 verification failure due to altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 verification failure due to shortened signature]
|
||||
expected: FAIL
|
||||
|
||||
[EdDSA Ed448 verification failure due to altered data]
|
||||
expected: FAIL
|
||||
|
||||
[Sign and verify using generated Ed448 keys.]
|
||||
expected: FAIL
|
|
@ -1,86 +0,0 @@
|
|||
[eddsa_small_order_points.https.any.html]
|
||||
[Ed25519 Verification checks with small-order key of order - Test 0]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 1]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 2]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 3]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 4]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 5]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 6]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 7]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 8]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 9]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 10]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 11]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 12]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 13]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[eddsa_small_order_points.https.any.worker.html]
|
||||
[Ed25519 Verification checks with small-order key of order - Test 0]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 1]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 2]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 3]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 4]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 5]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 6]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 7]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 8]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 9]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 10]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 11]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 12]
|
||||
expected: FAIL
|
||||
|
||||
[Ed25519 Verification checks with small-order key of order - Test 13]
|
||||
expected: FAIL
|
|
@ -1,242 +0,0 @@
|
|||
[hmac.https.any.html]
|
||||
[generate wrong key step: HMAC with SHA-1 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: HMAC with SHA-256 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: HMAC with SHA-384 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: HMAC with SHA-512 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: HMAC with SHA-1 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: HMAC with SHA-256 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: HMAC with SHA-384 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: HMAC with SHA-512 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-1 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-256 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-384 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-512 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-1 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-256 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-384 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-512 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-1 with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-256 with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-384 with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-512 with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-1 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-256 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-384 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-512 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-1 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-256 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-384 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-512 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-1 verification failure due to wrong plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-256 verification failure due to wrong plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-384 verification failure due to wrong plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-512 verification failure due to wrong plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-1 verification failure due to wrong signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-256 verification failure due to wrong signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-384 verification failure due to wrong signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-512 verification failure due to wrong signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-1 verification failure due to short signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-256 verification failure due to short signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-384 verification failure due to short signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-512 verification failure due to short signature]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[hmac.https.any.worker.html]
|
||||
[generate wrong key step: HMAC with SHA-1 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: HMAC with SHA-256 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: HMAC with SHA-384 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: HMAC with SHA-512 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: HMAC with SHA-1 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: HMAC with SHA-256 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: HMAC with SHA-384 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[generate wrong key step: HMAC with SHA-512 verifying with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-1 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-256 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-384 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-512 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-1 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-256 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-384 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-512 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-1 with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-256 with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-384 with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-512 with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-1 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-256 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-384 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-512 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-1 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-256 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-384 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-512 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-1 verification failure due to wrong plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-256 verification failure due to wrong plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-384 verification failure due to wrong plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-512 verification failure due to wrong plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-1 verification failure due to wrong signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-256 verification failure due to wrong signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-384 verification failure due to wrong signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-512 verification failure due to wrong signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-1 verification failure due to short signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-256 verification failure due to short signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-384 verification failure due to short signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: HMAC with SHA-512 verification failure due to short signature]
|
||||
expected: FAIL
|
|
@ -1,266 +0,0 @@
|
|||
[rsa_pkcs.https.any.worker.html]
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[rsa_pkcs.https.any.html]
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-1 verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-256 verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-384 verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSASSA-PKCS1-v1_5 with SHA-512 verification failure with altered plaintext]
|
||||
expected: FAIL
|
|
@ -1,578 +0,0 @@
|
|||
[rsa_pss.https.any.worker.html]
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt verification failure with wrong saltLength]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt verification failure with wrong saltLength]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt verification failure with wrong saltLength]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt verification failure with wrong saltLength]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted verification failure with wrong saltLength]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted verification failure with wrong saltLength]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted verification failure with wrong saltLength]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted verification failure with wrong saltLength]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[rsa_pss.https.any.html]
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted verification]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted verification with altered signature after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted with altered plaintext after call]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted using privateKey to verify]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted using publicKey to sign]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted no verify usage]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted round trip]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted signing with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted verification with wrong algorithm name]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted verification failure with altered signature]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt verification failure with wrong saltLength]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt verification failure with wrong saltLength]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt verification failure with wrong saltLength]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt verification failure with wrong saltLength]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted verification failure with wrong saltLength]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted verification failure with wrong saltLength]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted verification failure with wrong saltLength]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted verification failure with wrong saltLength]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1 and no salt verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256 and no salt verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384 and no salt verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512 and no salt verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-1, salted verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-256, salted verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-384, salted verification failure with altered plaintext]
|
||||
expected: FAIL
|
||||
|
||||
[importVectorKeys step: RSA-PSS with SHA-512, salted verification failure with altered plaintext]
|
||||
expected: FAIL
|
|
@ -1,122 +0,0 @@
|
|||
[wrapKey_unwrapKey.https.any.worker.html]
|
||||
[Can wrap and unwrap AES-CTR keys using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CTR keys as non-extractable using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CTR keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CTR keys as non-extractable using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap AES-CTR non-extractable keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CBC keys using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CBC keys as non-extractable using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CBC keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CBC keys as non-extractable using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap AES-CBC non-extractable keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-GCM keys using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-GCM keys as non-extractable using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-GCM keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-GCM keys as non-extractable using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap AES-GCM non-extractable keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap AES-KW non-extractable keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[wrapKey_unwrapKey.https.any.html]
|
||||
[Can wrap and unwrap AES-CTR keys using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CTR keys as non-extractable using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CTR keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CTR keys as non-extractable using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap AES-CTR non-extractable keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CBC keys using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CBC keys as non-extractable using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CBC keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CBC keys as non-extractable using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap AES-CBC non-extractable keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-GCM keys using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-GCM keys as non-extractable using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-GCM keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-GCM keys as non-extractable using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap AES-GCM non-extractable keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using raw and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-KW keys as non-extractable using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
||||
|
||||
[Can unwrap AES-KW non-extractable keys using jwk and RSA-OAEP]
|
||||
expected: FAIL
|
1
tests/wpt/meta-legacy-layout/__dir__.ini
vendored
1
tests/wpt/meta-legacy-layout/__dir__.ini
vendored
|
@ -1 +0,0 @@
|
|||
prefs: ["dom_imagebitmap_enabled:true"]
|
|
@ -1 +0,0 @@
|
|||
prefs: ["dom_bluetooth_enabled:true"]
|
|
@ -1,2 +0,0 @@
|
|||
prefs: ["dom_bluetooth_enabled:true"]
|
||||
disabled: "#23066"
|
|
@ -1,84 +0,0 @@
|
|||
[clipboard-item.https.html]
|
||||
[ClipboardItem({string, Blob}) succeeds with different types]
|
||||
expected: FAIL
|
||||
|
||||
[ClipboardItem() succeeds with empty options]
|
||||
expected: FAIL
|
||||
|
||||
[ClipboardItem({}) fails with empty dictionary input]
|
||||
expected: FAIL
|
||||
|
||||
[ClipboardItem(Blob) fails]
|
||||
expected: FAIL
|
||||
|
||||
[ClipboardItem() fails with null input]
|
||||
expected: FAIL
|
||||
|
||||
[ClipboardItem() fails with no input]
|
||||
expected: FAIL
|
||||
|
||||
[types() returns correct values]
|
||||
expected: FAIL
|
||||
|
||||
[getType(DOMString valid type) succeeds with correct output]
|
||||
expected: FAIL
|
||||
|
||||
[getType(DOMString invalid type) succeeds with correct output]
|
||||
expected: FAIL
|
||||
|
||||
[getType(DOMString type) rejects correctly when querying for missing type]
|
||||
expected: FAIL
|
||||
|
||||
[getType(DOMString valid type) converts DOMString to Blob]
|
||||
expected: FAIL
|
||||
|
||||
[getType(DOMString invalid type) converts DOMString to Blob]
|
||||
expected: FAIL
|
||||
|
||||
[supports(text/plain) returns true]
|
||||
expected: FAIL
|
||||
|
||||
[supports(text/html) returns true]
|
||||
expected: FAIL
|
||||
|
||||
[supports(image/png) returns true]
|
||||
expected: FAIL
|
||||
|
||||
[supports(text/uri-list) returns true]
|
||||
expected: FAIL
|
||||
|
||||
[supports(image/svg+xml) returns true]
|
||||
expected: FAIL
|
||||
|
||||
[supports(web foo/bar) returns true]
|
||||
expected: FAIL
|
||||
|
||||
[supports(web text/html) returns true]
|
||||
expected: FAIL
|
||||
|
||||
[supports(web ) returns false]
|
||||
expected: FAIL
|
||||
|
||||
[supports(web) returns false]
|
||||
expected: FAIL
|
||||
|
||||
[supports(web foo) returns false]
|
||||
expected: FAIL
|
||||
|
||||
[supports(foo/bar) returns false]
|
||||
expected: FAIL
|
||||
|
||||
[supports(weB text/html) returns false]
|
||||
expected: FAIL
|
||||
|
||||
[supports( web text/html) returns false]
|
||||
expected: FAIL
|
||||
|
||||
[supports(not a/real type) returns false]
|
||||
expected: FAIL
|
||||
|
||||
[supports() returns false]
|
||||
expected: FAIL
|
||||
|
||||
[supports( ) returns false]
|
||||
expected: FAIL
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue