mirror of
https://github.com/servo/servo.git
synced 2025-08-03 12:40:06 +01:00
crypto: Add support for AES-CTR operations (#33963)
* Add support for AES-CTR operations Signed-off-by: Daniel Adams <msub2official@gmail.com> * Update expectations Signed-off-by: Daniel Adams <msub2official@gmail.com> * clippy Signed-off-by: Daniel Adams <msub2official@gmail.com> * Consolidate encrypt/decrypt for AES-CTR Signed-off-by: Daniel Adams <msub2official@gmail.com> * Update expectations Signed-off-by: Daniel Adams <msub2official@gmail.com> --------- Signed-off-by: Daniel Adams <msub2official@gmail.com>
This commit is contained in:
parent
1c26c0335e
commit
7b392db02f
17 changed files with 339 additions and 9646 deletions
10
Cargo.lock
generated
10
Cargo.lock
generated
|
@ -1362,6 +1362,15 @@ dependencies = [
|
||||||
"syn",
|
"syn",
|
||||||
]
|
]
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "ctr"
|
||||||
|
version = "0.9.2"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "0369ee1ad671834580515889b80f2ea915f23b8be8d0daa4bbaf2ac5c7590835"
|
||||||
|
dependencies = [
|
||||||
|
"cipher",
|
||||||
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "cursor-icon"
|
name = "cursor-icon"
|
||||||
version = "1.1.0"
|
version = "1.1.0"
|
||||||
|
@ -6065,6 +6074,7 @@ dependencies = [
|
||||||
"cookie 0.18.1",
|
"cookie 0.18.1",
|
||||||
"crossbeam-channel",
|
"crossbeam-channel",
|
||||||
"cssparser",
|
"cssparser",
|
||||||
|
"ctr",
|
||||||
"data-url",
|
"data-url",
|
||||||
"deny_public_fields",
|
"deny_public_fields",
|
||||||
"devtools_traits",
|
"devtools_traits",
|
||||||
|
|
|
@ -41,6 +41,7 @@ content-security-policy = { version = "0.5", features = ["serde"] }
|
||||||
cookie = { package = "cookie", version = "0.18" }
|
cookie = { package = "cookie", version = "0.18" }
|
||||||
crossbeam-channel = "0.5"
|
crossbeam-channel = "0.5"
|
||||||
cssparser = { version = "0.34", features = ["serde"] }
|
cssparser = { version = "0.34", features = ["serde"] }
|
||||||
|
ctr = "0.9.2"
|
||||||
darling = { version = "0.20", default-features = false }
|
darling = { version = "0.20", default-features = false }
|
||||||
data-url = "0.3"
|
data-url = "0.3"
|
||||||
devtools_traits = { path = "components/shared/devtools" }
|
devtools_traits = { path = "components/shared/devtools" }
|
||||||
|
|
|
@ -46,6 +46,7 @@ content-security-policy = { workspace = true }
|
||||||
cookie = { workspace = true }
|
cookie = { workspace = true }
|
||||||
crossbeam-channel = { workspace = true }
|
crossbeam-channel = { workspace = true }
|
||||||
cssparser = { workspace = true }
|
cssparser = { workspace = true }
|
||||||
|
ctr = { workspace = true }
|
||||||
data-url = { workspace = true }
|
data-url = { workspace = true }
|
||||||
deny_public_fields = { path = "../deny_public_fields" }
|
deny_public_fields = { path = "../deny_public_fields" }
|
||||||
devtools_traits = { workspace = true }
|
devtools_traits = { workspace = true }
|
||||||
|
|
|
@ -7,7 +7,7 @@ use std::rc::Rc;
|
||||||
|
|
||||||
use aes::cipher::block_padding::Pkcs7;
|
use aes::cipher::block_padding::Pkcs7;
|
||||||
use aes::cipher::generic_array::GenericArray;
|
use aes::cipher::generic_array::GenericArray;
|
||||||
use aes::cipher::{BlockDecryptMut, BlockEncryptMut, KeyIvInit};
|
use aes::cipher::{BlockDecryptMut, BlockEncryptMut, KeyIvInit, StreamCipher};
|
||||||
use aes::{Aes128, Aes192, Aes256};
|
use aes::{Aes128, Aes192, Aes256};
|
||||||
use base64::prelude::*;
|
use base64::prelude::*;
|
||||||
use dom_struct::dom_struct;
|
use dom_struct::dom_struct;
|
||||||
|
@ -24,8 +24,8 @@ use crate::dom::bindings::codegen::Bindings::CryptoKeyBinding::{
|
||||||
CryptoKeyMethods, KeyType, KeyUsage,
|
CryptoKeyMethods, KeyType, KeyUsage,
|
||||||
};
|
};
|
||||||
use crate::dom::bindings::codegen::Bindings::SubtleCryptoBinding::{
|
use crate::dom::bindings::codegen::Bindings::SubtleCryptoBinding::{
|
||||||
AesCbcParams, AesKeyGenParams, Algorithm, AlgorithmIdentifier, JsonWebKey, KeyAlgorithm,
|
AesCbcParams, AesCtrParams, AesKeyGenParams, Algorithm, AlgorithmIdentifier, JsonWebKey,
|
||||||
KeyFormat, SubtleCryptoMethods,
|
KeyAlgorithm, KeyFormat, SubtleCryptoMethods,
|
||||||
};
|
};
|
||||||
use crate::dom::bindings::codegen::UnionTypes::{
|
use crate::dom::bindings::codegen::UnionTypes::{
|
||||||
ArrayBufferViewOrArrayBuffer, ArrayBufferViewOrArrayBufferOrJsonWebKey,
|
ArrayBufferViewOrArrayBuffer, ArrayBufferViewOrArrayBufferOrJsonWebKey,
|
||||||
|
@ -97,6 +97,9 @@ type Aes192CbcEnc = cbc::Encryptor<Aes192>;
|
||||||
type Aes192CbcDec = cbc::Decryptor<Aes192>;
|
type Aes192CbcDec = cbc::Decryptor<Aes192>;
|
||||||
type Aes256CbcEnc = cbc::Encryptor<Aes256>;
|
type Aes256CbcEnc = cbc::Encryptor<Aes256>;
|
||||||
type Aes256CbcDec = cbc::Decryptor<Aes256>;
|
type Aes256CbcDec = cbc::Decryptor<Aes256>;
|
||||||
|
type Aes128Ctr = ctr::Ctr64BE<Aes128>;
|
||||||
|
type Aes192Ctr = ctr::Ctr64BE<Aes192>;
|
||||||
|
type Aes256Ctr = ctr::Ctr64BE<Aes256>;
|
||||||
|
|
||||||
#[dom_struct]
|
#[dom_struct]
|
||||||
pub struct SubtleCrypto {
|
pub struct SubtleCrypto {
|
||||||
|
@ -177,6 +180,18 @@ impl SubtleCryptoMethods for SubtleCrypto {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
Ok(NormalizedAlgorithm::AesCtrParams(key_gen_params)) => {
|
||||||
|
if !valid_usage || key_gen_params.name != key_alg {
|
||||||
|
Err(Error::InvalidAccess)
|
||||||
|
} else {
|
||||||
|
match subtle.encrypt_decrypt_aes_ctr(
|
||||||
|
key_gen_params, &key, &data, cx, array_buffer_ptr.handle_mut()
|
||||||
|
) {
|
||||||
|
Ok(_) => Ok(array_buffer_ptr.handle()),
|
||||||
|
Err(e) => Err(e),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
_ => Err(Error::NotSupported),
|
_ => Err(Error::NotSupported),
|
||||||
};
|
};
|
||||||
match text {
|
match text {
|
||||||
|
@ -234,6 +249,18 @@ impl SubtleCryptoMethods for SubtleCrypto {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
Ok(NormalizedAlgorithm::AesCtrParams(key_gen_params)) => {
|
||||||
|
if !valid_usage || key_gen_params.name != key_alg {
|
||||||
|
Err(Error::InvalidAccess)
|
||||||
|
} else {
|
||||||
|
match subtle.encrypt_decrypt_aes_ctr(
|
||||||
|
key_gen_params, &key, &data, cx, array_buffer_ptr.handle_mut()
|
||||||
|
) {
|
||||||
|
Ok(_) => Ok(array_buffer_ptr.handle()),
|
||||||
|
Err(e) => Err(e),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
_ => Err(Error::NotSupported),
|
_ => Err(Error::NotSupported),
|
||||||
};
|
};
|
||||||
match text {
|
match text {
|
||||||
|
@ -274,7 +301,7 @@ impl SubtleCryptoMethods for SubtleCrypto {
|
||||||
let promise = trusted_promise.root();
|
let promise = trusted_promise.root();
|
||||||
let key = match alg {
|
let key = match alg {
|
||||||
Ok(NormalizedAlgorithm::AesKeyGenParams(key_gen_params)) => {
|
Ok(NormalizedAlgorithm::AesKeyGenParams(key_gen_params)) => {
|
||||||
subtle.generate_key_aes_cbc(key_usages, key_gen_params, extractable)
|
subtle.generate_key_aes(key_usages, key_gen_params, extractable)
|
||||||
},
|
},
|
||||||
_ => Err(Error::NotSupported),
|
_ => Err(Error::NotSupported),
|
||||||
};
|
};
|
||||||
|
@ -349,7 +376,8 @@ impl SubtleCryptoMethods for SubtleCrypto {
|
||||||
};
|
};
|
||||||
|
|
||||||
let imported_key = match alg.name.as_str() {
|
let imported_key = match alg.name.as_str() {
|
||||||
ALG_AES_CBC => subtle.import_key_aes_cbc(format, &data, extractable, key_usages),
|
ALG_AES_CBC => subtle.import_key_aes(format, &data, extractable, key_usages, ALG_AES_CBC),
|
||||||
|
ALG_AES_CTR => subtle.import_key_aes(format, &data, extractable, key_usages, ALG_AES_CTR),
|
||||||
_ => Err(Error::NotSupported),
|
_ => Err(Error::NotSupported),
|
||||||
};
|
};
|
||||||
match imported_key {
|
match imported_key {
|
||||||
|
@ -394,7 +422,7 @@ impl SubtleCryptoMethods for SubtleCrypto {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
let exported_key = match alg_name.as_str() {
|
let exported_key = match alg_name.as_str() {
|
||||||
ALG_AES_CBC => subtle.export_key_aes_cbc(format, &key),
|
ALG_AES_CBC | ALG_AES_CTR => subtle.export_key_aes(format, &key),
|
||||||
_ => Err(Error::NotSupported),
|
_ => Err(Error::NotSupported),
|
||||||
};
|
};
|
||||||
match exported_key {
|
match exported_key {
|
||||||
|
@ -427,6 +455,7 @@ pub enum NormalizedAlgorithm {
|
||||||
#[allow(dead_code)]
|
#[allow(dead_code)]
|
||||||
Algorithm(SubtleAlgorithm),
|
Algorithm(SubtleAlgorithm),
|
||||||
AesCbcParams(SubtleAesCbcParams),
|
AesCbcParams(SubtleAesCbcParams),
|
||||||
|
AesCtrParams(SubtleAesCtrParams),
|
||||||
AesKeyGenParams(SubtleAesKeyGenParams),
|
AesKeyGenParams(SubtleAesKeyGenParams),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -467,9 +496,29 @@ impl From<RootedTraceableBox<AesCbcParams>> for SubtleAesCbcParams {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[derive(Clone)]
|
||||||
|
pub struct SubtleAesCtrParams {
|
||||||
|
pub name: String,
|
||||||
|
pub counter: Vec<u8>,
|
||||||
|
pub length: u8,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl From<RootedTraceableBox<AesCtrParams>> for SubtleAesCtrParams {
|
||||||
|
fn from(params: RootedTraceableBox<AesCtrParams>) -> Self {
|
||||||
|
let counter = match ¶ms.counter {
|
||||||
|
ArrayBufferViewOrArrayBuffer::ArrayBufferView(view) => view.to_vec(),
|
||||||
|
ArrayBufferViewOrArrayBuffer::ArrayBuffer(buffer) => buffer.to_vec(),
|
||||||
|
};
|
||||||
|
SubtleAesCtrParams {
|
||||||
|
name: params.parent.name.to_string(),
|
||||||
|
counter,
|
||||||
|
length: params.length,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
#[derive(Clone)]
|
#[derive(Clone)]
|
||||||
pub struct SubtleAesKeyGenParams {
|
pub struct SubtleAesKeyGenParams {
|
||||||
#[allow(dead_code)]
|
|
||||||
pub name: String,
|
pub name: String,
|
||||||
pub length: u16,
|
pub length: u16,
|
||||||
}
|
}
|
||||||
|
@ -477,7 +526,7 @@ pub struct SubtleAesKeyGenParams {
|
||||||
impl From<AesKeyGenParams> for SubtleAesKeyGenParams {
|
impl From<AesKeyGenParams> for SubtleAesKeyGenParams {
|
||||||
fn from(params: AesKeyGenParams) -> Self {
|
fn from(params: AesKeyGenParams) -> Self {
|
||||||
SubtleAesKeyGenParams {
|
SubtleAesKeyGenParams {
|
||||||
name: params.parent.name.to_string(),
|
name: params.parent.name.to_string().to_uppercase(),
|
||||||
length: params.length,
|
length: params.length,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -507,7 +556,15 @@ fn normalize_algorithm(
|
||||||
};
|
};
|
||||||
Ok(NormalizedAlgorithm::AesCbcParams(params.into()))
|
Ok(NormalizedAlgorithm::AesCbcParams(params.into()))
|
||||||
},
|
},
|
||||||
(ALG_AES_CBC, "generateKey") => {
|
(ALG_AES_CTR, "encrypt") | (ALG_AES_CTR, "decrypt") => {
|
||||||
|
let params_result =
|
||||||
|
AesCtrParams::new(cx, value.handle()).map_err(|_| Error::Operation)?;
|
||||||
|
let ConversionResult::Success(params) = params_result else {
|
||||||
|
return Err(Error::Syntax);
|
||||||
|
};
|
||||||
|
Ok(NormalizedAlgorithm::AesCtrParams(params.into()))
|
||||||
|
},
|
||||||
|
(ALG_AES_CBC, "generateKey") | (ALG_AES_CTR, "generateKey") => {
|
||||||
let params_result =
|
let params_result =
|
||||||
AesKeyGenParams::new(cx, value.handle()).map_err(|_| Error::Operation)?;
|
AesKeyGenParams::new(cx, value.handle()).map_err(|_| Error::Operation)?;
|
||||||
let ConversionResult::Success(params) = params_result else {
|
let ConversionResult::Success(params) = params_result else {
|
||||||
|
@ -518,6 +575,9 @@ fn normalize_algorithm(
|
||||||
(ALG_AES_CBC, "importKey") => Ok(NormalizedAlgorithm::Algorithm(SubtleAlgorithm {
|
(ALG_AES_CBC, "importKey") => Ok(NormalizedAlgorithm::Algorithm(SubtleAlgorithm {
|
||||||
name: ALG_AES_CBC.to_string(),
|
name: ALG_AES_CBC.to_string(),
|
||||||
})),
|
})),
|
||||||
|
(ALG_AES_CTR, "importKey") => Ok(NormalizedAlgorithm::Algorithm(SubtleAlgorithm {
|
||||||
|
name: ALG_AES_CTR.to_string(),
|
||||||
|
})),
|
||||||
_ => Err(Error::NotSupported),
|
_ => Err(Error::NotSupported),
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
@ -605,8 +665,46 @@ impl SubtleCrypto {
|
||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// <https://w3c.github.io/webcrypto/#aes-ctr-operations>
|
||||||
|
fn encrypt_decrypt_aes_ctr(
|
||||||
|
&self,
|
||||||
|
params: SubtleAesCtrParams,
|
||||||
|
key: &CryptoKey,
|
||||||
|
data: &[u8],
|
||||||
|
cx: JSContext,
|
||||||
|
handle: MutableHandleObject,
|
||||||
|
) -> Result<(), Error> {
|
||||||
|
if params.counter.len() != 16 || params.length == 0 || params.length > 128 {
|
||||||
|
return Err(Error::Operation);
|
||||||
|
}
|
||||||
|
|
||||||
|
let mut ciphertext = Vec::from(data);
|
||||||
|
let counter = GenericArray::from_slice(¶ms.counter);
|
||||||
|
|
||||||
|
match key.handle() {
|
||||||
|
Handle::Aes128(data) => {
|
||||||
|
let key_data = GenericArray::from_slice(data);
|
||||||
|
Aes128Ctr::new(key_data, counter).apply_keystream(&mut ciphertext)
|
||||||
|
},
|
||||||
|
Handle::Aes192(data) => {
|
||||||
|
let key_data = GenericArray::from_slice(data);
|
||||||
|
Aes192Ctr::new(key_data, counter).apply_keystream(&mut ciphertext)
|
||||||
|
},
|
||||||
|
Handle::Aes256(data) => {
|
||||||
|
let key_data = GenericArray::from_slice(data);
|
||||||
|
Aes256Ctr::new(key_data, counter).apply_keystream(&mut ciphertext)
|
||||||
|
},
|
||||||
|
};
|
||||||
|
|
||||||
|
create_buffer_source::<ArrayBufferU8>(cx, &ciphertext, handle)
|
||||||
|
.expect("failed to create buffer source for exported key.");
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
/// <https://w3c.github.io/webcrypto/#aes-cbc-operations>
|
/// <https://w3c.github.io/webcrypto/#aes-cbc-operations>
|
||||||
fn generate_key_aes_cbc(
|
/// <https://w3c.github.io/webcrypto/#aes-ctr-operations>
|
||||||
|
fn generate_key_aes(
|
||||||
&self,
|
&self,
|
||||||
usages: Vec<KeyUsage>,
|
usages: Vec<KeyUsage>,
|
||||||
key_gen_params: SubtleAesKeyGenParams,
|
key_gen_params: SubtleAesKeyGenParams,
|
||||||
|
@ -631,25 +729,31 @@ impl SubtleCrypto {
|
||||||
return Err(Error::Syntax);
|
return Err(Error::Syntax);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
let name = match key_gen_params.name.as_str() {
|
||||||
|
ALG_AES_CBC => DOMString::from(ALG_AES_CBC),
|
||||||
|
ALG_AES_CTR => DOMString::from(ALG_AES_CTR),
|
||||||
|
_ => return Err(Error::NotSupported),
|
||||||
|
};
|
||||||
|
|
||||||
Ok(CryptoKey::new(
|
Ok(CryptoKey::new(
|
||||||
&self.global(),
|
&self.global(),
|
||||||
KeyType::Secret,
|
KeyType::Secret,
|
||||||
extractable,
|
extractable,
|
||||||
KeyAlgorithm {
|
KeyAlgorithm { name },
|
||||||
name: DOMString::from(ALG_AES_CBC),
|
|
||||||
},
|
|
||||||
usages,
|
usages,
|
||||||
handle,
|
handle,
|
||||||
))
|
))
|
||||||
}
|
}
|
||||||
|
|
||||||
/// <https://w3c.github.io/webcrypto/#aes-cbc-operations>
|
/// <https://w3c.github.io/webcrypto/#aes-cbc-operations>
|
||||||
fn import_key_aes_cbc(
|
/// <https://w3c.github.io/webcrypto/#aes-ctr-operations>
|
||||||
|
fn import_key_aes(
|
||||||
&self,
|
&self,
|
||||||
format: KeyFormat,
|
format: KeyFormat,
|
||||||
data: &[u8],
|
data: &[u8],
|
||||||
extractable: bool,
|
extractable: bool,
|
||||||
usages: Vec<KeyUsage>,
|
usages: Vec<KeyUsage>,
|
||||||
|
alg: &str,
|
||||||
) -> Result<DomRoot<CryptoKey>, Error> {
|
) -> Result<DomRoot<CryptoKey>, Error> {
|
||||||
if usages.iter().any(|usage| {
|
if usages.iter().any(|usage| {
|
||||||
!matches!(
|
!matches!(
|
||||||
|
@ -669,35 +773,37 @@ impl SubtleCrypto {
|
||||||
256 => Handle::Aes256(data.to_vec()),
|
256 => Handle::Aes256(data.to_vec()),
|
||||||
_ => return Err(Error::Data),
|
_ => return Err(Error::Data),
|
||||||
};
|
};
|
||||||
|
let name = DOMString::from(alg);
|
||||||
Ok(CryptoKey::new(
|
Ok(CryptoKey::new(
|
||||||
&self.global(),
|
&self.global(),
|
||||||
KeyType::Secret,
|
KeyType::Secret,
|
||||||
extractable,
|
extractable,
|
||||||
KeyAlgorithm {
|
KeyAlgorithm { name },
|
||||||
name: DOMString::from(ALG_AES_CBC),
|
|
||||||
},
|
|
||||||
usages,
|
usages,
|
||||||
handle,
|
handle,
|
||||||
))
|
))
|
||||||
}
|
}
|
||||||
|
|
||||||
/// <https://w3c.github.io/webcrypto/#aes-cbc-operations>
|
/// <https://w3c.github.io/webcrypto/#aes-cbc-operations>
|
||||||
fn export_key_aes_cbc(
|
/// <https://w3c.github.io/webcrypto/#aes-ctr-operations>
|
||||||
&self,
|
fn export_key_aes(&self, format: KeyFormat, key: &CryptoKey) -> Result<AesExportedKey, Error> {
|
||||||
format: KeyFormat,
|
|
||||||
key: &CryptoKey,
|
|
||||||
) -> Result<AesExportedKey, Error> {
|
|
||||||
match format {
|
match format {
|
||||||
KeyFormat::Raw => match key.handle() {
|
KeyFormat::Raw => match key.handle() {
|
||||||
Handle::Aes128(key) => Ok(AesExportedKey::Raw(key.as_slice().to_vec())),
|
Handle::Aes128(key_data) => Ok(AesExportedKey::Raw(key_data.as_slice().to_vec())),
|
||||||
Handle::Aes192(key) => Ok(AesExportedKey::Raw(key.as_slice().to_vec())),
|
Handle::Aes192(key_data) => Ok(AesExportedKey::Raw(key_data.as_slice().to_vec())),
|
||||||
Handle::Aes256(key) => Ok(AesExportedKey::Raw(key.as_slice().to_vec())),
|
Handle::Aes256(key_data) => Ok(AesExportedKey::Raw(key_data.as_slice().to_vec())),
|
||||||
},
|
},
|
||||||
KeyFormat::Jwk => {
|
KeyFormat::Jwk => {
|
||||||
let (alg, k) = match key.handle() {
|
let (alg, k) = match key.handle() {
|
||||||
Handle::Aes128(key) => data_to_jwk_params("A128CBC", key.as_slice()),
|
Handle::Aes128(key_data) => {
|
||||||
Handle::Aes192(key) => data_to_jwk_params("A192CBC", key.as_slice()),
|
data_to_jwk_params(key.algorithm().as_str(), "128", key_data.as_slice())
|
||||||
Handle::Aes256(key) => data_to_jwk_params("A256CBC", key.as_slice()),
|
},
|
||||||
|
Handle::Aes192(key_data) => {
|
||||||
|
data_to_jwk_params(key.algorithm().as_str(), "192", key_data.as_slice())
|
||||||
|
},
|
||||||
|
Handle::Aes256(key_data) => {
|
||||||
|
data_to_jwk_params(key.algorithm().as_str(), "256", key_data.as_slice())
|
||||||
|
},
|
||||||
};
|
};
|
||||||
let jwk = JsonWebKey {
|
let jwk = JsonWebKey {
|
||||||
alg: Some(alg),
|
alg: Some(alg),
|
||||||
|
@ -731,8 +837,13 @@ pub enum AesExportedKey {
|
||||||
Jwk(Box<JsonWebKey>),
|
Jwk(Box<JsonWebKey>),
|
||||||
}
|
}
|
||||||
|
|
||||||
fn data_to_jwk_params(alg: &str, key: &[u8]) -> (DOMString, DOMString) {
|
fn data_to_jwk_params(alg: &str, size: &str, key: &[u8]) -> (DOMString, DOMString) {
|
||||||
|
let jwk_alg = match alg {
|
||||||
|
ALG_AES_CBC => DOMString::from(format!("A{}CBC", size)),
|
||||||
|
ALG_AES_CTR => DOMString::from(format!("A{}CTR", size)),
|
||||||
|
_ => unreachable!(),
|
||||||
|
};
|
||||||
let mut data = BASE64_STANDARD.encode(key);
|
let mut data = BASE64_STANDARD.encode(key);
|
||||||
data.retain(|c| c != '=');
|
data.retain(|c| c != '=');
|
||||||
(DOMString::from(alg), DOMString::from(data))
|
(jwk_alg, DOMString::from(data))
|
||||||
}
|
}
|
||||||
|
|
|
@ -86,6 +86,12 @@ dictionary AesCbcParams : Algorithm {
|
||||||
required BufferSource iv;
|
required BufferSource iv;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
// AES_CTR
|
||||||
|
dictionary AesCtrParams : Algorithm {
|
||||||
|
required BufferSource counter;
|
||||||
|
required [EnforceRange] octet length;
|
||||||
|
};
|
||||||
|
|
||||||
// JWK
|
// JWK
|
||||||
dictionary RsaOtherPrimesInfo {
|
dictionary RsaOtherPrimesInfo {
|
||||||
// The following fields are defined in Section 6.3.2.7 of JSON Web Algorithms
|
// The following fields are defined in Section 6.3.2.7 of JSON Web Algorithms
|
||||||
|
|
|
@ -1,20 +0,0 @@
|
||||||
[aes_cbc.https.any.html]
|
|
||||||
[AES-CBC 128-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[AES-CBC 192-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[AES-CBC 256-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
|
|
||||||
[aes_cbc.https.any.worker.html]
|
|
||||||
[AES-CBC 128-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[AES-CBC 192-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[AES-CBC 256-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
|
@ -1,200 +0,0 @@
|
||||||
[aes_ctr.https.any.worker.html]
|
|
||||||
[importKey step: AES-CTR 128-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key with altered plaintext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key with altered plaintext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key with altered plaintext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 128-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 192-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 256-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 128-bit key with altered ciphertext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 192-bit key with altered ciphertext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 256-bit key with altered ciphertext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key without encrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key without encrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key without encrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key without decrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key without decrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key without decrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 128-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 128-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 192-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 192-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 256-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 256-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
|
|
||||||
[aes_ctr.https.any.html]
|
|
||||||
[importKey step: AES-CTR 128-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key with altered plaintext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key with altered plaintext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key with altered plaintext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 128-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 192-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 256-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 128-bit key with altered ciphertext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 192-bit key with altered ciphertext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 256-bit key with altered ciphertext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key without encrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key without encrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key without encrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key without decrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key without decrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key without decrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 128-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 128-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 192-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 192-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 256-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 256-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -1,112 +1,4 @@
|
||||||
[symmetric_importKey.https.any.worker.html]
|
[symmetric_importKey.https.any.worker.html]
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt\])]
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -593,42 +485,6 @@
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])]
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])]
|
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -791,42 +647,6 @@
|
||||||
[Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])]
|
[Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -991,114 +811,6 @@
|
||||||
|
|
||||||
|
|
||||||
[symmetric_importKey.https.any.html]
|
[symmetric_importKey.https.any.html]
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt\])]
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -1585,42 +1297,6 @@
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])]
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])]
|
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -1783,42 +1459,6 @@
|
||||||
[Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])]
|
[Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -14,6 +14,51 @@
|
||||||
[Can unwrap AES-CBC non-extractable keys using jwk and AES-CBC]
|
[Can unwrap AES-CBC non-extractable keys using jwk and AES-CBC]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys using raw and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can unwrap AES-CTR non-extractable keys using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CBC keys using raw and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CBC keys using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can unwrap AES-CBC non-extractable keys using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys using raw and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys using jwk and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can unwrap AES-CTR non-extractable keys using jwk and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[wrapKey_unwrapKey.https.any.worker.html]
|
[wrapKey_unwrapKey.https.any.worker.html]
|
||||||
[Can wrap and unwrap AES-CBC keys using raw and AES-CBC]
|
[Can wrap and unwrap AES-CBC keys using raw and AES-CBC]
|
||||||
|
@ -30,3 +75,48 @@
|
||||||
|
|
||||||
[Can unwrap AES-CBC non-extractable keys using jwk and AES-CBC]
|
[Can unwrap AES-CBC non-extractable keys using jwk and AES-CBC]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys using raw and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can unwrap AES-CTR non-extractable keys using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CBC keys using raw and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CBC keys using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can unwrap AES-CBC non-extractable keys using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys using raw and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys using jwk and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can unwrap AES-CTR non-extractable keys using jwk and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -1,20 +0,0 @@
|
||||||
[aes_cbc.https.any.worker.html]
|
|
||||||
[AES-CBC 128-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[AES-CBC 192-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[AES-CBC 256-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
|
|
||||||
[aes_cbc.https.any.html]
|
|
||||||
[AES-CBC 128-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[AES-CBC 192-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[AES-CBC 256-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
|
@ -1,200 +0,0 @@
|
||||||
[aes_ctr.https.any.html]
|
|
||||||
[importKey step: AES-CTR 128-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key with altered plaintext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key with altered plaintext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key with altered plaintext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 128-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 192-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 256-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 128-bit key with altered ciphertext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 192-bit key with altered ciphertext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 256-bit key with altered ciphertext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key without encrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key without encrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key without encrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key without decrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key without decrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key without decrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 128-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 128-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 192-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 192-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 256-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 256-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
|
|
||||||
[aes_ctr.https.any.worker.html]
|
|
||||||
[importKey step: AES-CTR 128-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key with altered plaintext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key with altered plaintext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key with altered plaintext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 128-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 192-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 256-bit key]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 128-bit key with altered ciphertext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 192-bit key with altered ciphertext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step for decryption: AES-CTR 256-bit key with altered ciphertext]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key without encrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key without encrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key without encrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key with mismatched key and algorithm]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key without decrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key without decrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key without decrypt usage]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 128-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 192-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: AES-CTR 256-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 128-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 128-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 192-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 192-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 256-bit key, 0-bit counter]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[importKey step: decryption AES-CTR 256-bit key, 129-bit counter]
|
|
||||||
expected: FAIL
|
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -1,112 +1,4 @@
|
||||||
[symmetric_importKey.https.any.html]
|
[symmetric_importKey.https.any.html]
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt\])]
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -593,42 +485,6 @@
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])]
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])]
|
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -791,42 +647,6 @@
|
||||||
[Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])]
|
[Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -991,114 +811,6 @@
|
||||||
|
|
||||||
|
|
||||||
[symmetric_importKey.https.any.worker.html]
|
[symmetric_importKey.https.any.worker.html]
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt, encrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt\])]
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -1585,42 +1297,6 @@
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])]
|
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])]
|
[Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -1783,42 +1459,6 @@
|
||||||
[Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])]
|
[Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [encrypt, decrypt, encrypt, decrypt\])]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
[Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [encrypt, decrypt, encrypt, decrypt\])]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -14,6 +14,51 @@
|
||||||
[Can unwrap AES-CBC non-extractable keys using jwk and AES-CBC]
|
[Can unwrap AES-CBC non-extractable keys using jwk and AES-CBC]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys using raw and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can unwrap AES-CTR non-extractable keys using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CBC keys using raw and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CBC keys using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can unwrap AES-CBC non-extractable keys using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys using raw and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys using jwk and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can unwrap AES-CTR non-extractable keys using jwk and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
||||||
[wrapKey_unwrapKey.https.any.worker.html]
|
[wrapKey_unwrapKey.https.any.worker.html]
|
||||||
[Can wrap and unwrap AES-CBC keys using raw and AES-CBC]
|
[Can wrap and unwrap AES-CBC keys using raw and AES-CBC]
|
||||||
|
@ -30,3 +75,48 @@
|
||||||
|
|
||||||
[Can unwrap AES-CBC non-extractable keys using jwk and AES-CBC]
|
[Can unwrap AES-CBC non-extractable keys using jwk and AES-CBC]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys using raw and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can unwrap AES-CTR non-extractable keys using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CBC keys using raw and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CBC keys using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CBC keys as non-extractable using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can unwrap AES-CBC non-extractable keys using jwk and AES-CTR]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys using raw and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys as non-extractable using raw and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys using jwk and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can wrap and unwrap AES-CTR keys as non-extractable using jwk and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Can unwrap AES-CTR non-extractable keys using jwk and AES-CBC]
|
||||||
|
expected: FAIL
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue