mirror of
https://github.com/servo/servo.git
synced 2025-06-06 16:45:39 +00:00
crypto: Begin SubtleCrypto implementation (#33628)
* Update IDLs and Bindings conf Signed-off-by: Daniel Adams <msub2official@gmail.com> * Add AES crate Signed-off-by: Daniel Adams <msub2official@gmail.com> * Implement DOM interfaces Signed-off-by: Daniel Adams <msub2official@gmail.com> * IDL tidy Signed-off-by: Daniel Adams <msub2official@gmail.com> * Remove deriveKey from inRealms for now until implemented Signed-off-by: Daniel Adams <msub2official@gmail.com> * Fix CryptoKey rustdoc comments Signed-off-by: Daniel Adams <msub2official@gmail.com> * Move string constants to top of file Signed-off-by: Daniel Adams <msub2official@gmail.com> * Use properly rooted CryptoKey Signed-off-by: Daniel Adams <msub2official@gmail.com> * Code clarity Signed-off-by: Daniel Adams <msub2official@gmail.com> * Rework NormalizedAlgorithm to not hold a DOMString Signed-off-by: Daniel Adams <msub2official@gmail.com> * Add Rustdoc for CryptoKey interface Signed-off-by: Daniel Adams <msub2official@gmail.com> * Move ignore mallocsizeof to rand crate, remove from crypto Signed-off-by: Daniel Adams <msub2official@gmail.com> * Update cargo lock Signed-off-by: Daniel Adams <msub2official@gmail.com> * Fix key handling, implement exportKey with JWK TODO Signed-off-by: Daniel Adams <msub2official@gmail.com> * Add missing spec link Signed-off-by: Daniel Adams <msub2official@gmail.com> * Use create_buffer_source, remove aes dep from libservo Signed-off-by: Daniel Adams <msub2official@gmail.com> * Fix crash when running in worker Signed-off-by: Daniel Adams <msub2official@gmail.com> * Update expectations Signed-off-by: Daniel Adams <msub2official@gmail.com> * fmt Signed-off-by: Daniel Adams <msub2official@gmail.com> * Move CryptoKey and SubtleCrypto behind pref for now Signed-off-by: Daniel Adams <msub2official@gmail.com> * Update expectations Signed-off-by: Daniel Adams <msub2official@gmail.com> * Readd timeout expectation Signed-off-by: Daniel Adams <msub2official@gmail.com> --------- Signed-off-by: Daniel Adams <msub2official@gmail.com>
This commit is contained in:
parent
66bc430b24
commit
fc0d4d8157
82 changed files with 39536 additions and 557 deletions
35
Cargo.lock
generated
35
Cargo.lock
generated
|
@ -48,6 +48,17 @@ version = "2.0.0"
|
|||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "512761e0bb2578dd7380c6baaa0f4ce03e84f95e960231d1dec8bf4d7d6e2627"
|
||||
|
||||
[[package]]
|
||||
name = "aes"
|
||||
version = "0.8.4"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "b169f7a6d4742236a0a00c541b845991d0ac43e546831af1249753ab4c3aa3a0"
|
||||
dependencies = [
|
||||
"cfg-if",
|
||||
"cipher",
|
||||
"cpufeatures",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "ahash"
|
||||
version = "0.8.11"
|
||||
|
@ -820,6 +831,16 @@ dependencies = [
|
|||
"half",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "cipher"
|
||||
version = "0.4.4"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "773f3b9af64447d2ce9850330c473515014aa235e6a783b02db81ff39e4a3dad"
|
||||
dependencies = [
|
||||
"crypto-common",
|
||||
"inout",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "clang-sys"
|
||||
version = "1.8.0"
|
||||
|
@ -3657,6 +3678,15 @@ dependencies = [
|
|||
"libc",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "inout"
|
||||
version = "0.1.3"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "a0c10553d664a4d0bcff9f4215d0aac67a639cc68ef660840afe309b807bc9f5"
|
||||
dependencies = [
|
||||
"generic-array",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "io-kit-sys"
|
||||
version = "0.4.1"
|
||||
|
@ -4052,7 +4082,7 @@ source = "registry+https://github.com/rust-lang/crates.io-index"
|
|||
checksum = "4979f22fdb869068da03c9f7528f8297c6fd2606bc3a4affe42e6a823fdb8da4"
|
||||
dependencies = [
|
||||
"cfg-if",
|
||||
"windows-targets 0.48.5",
|
||||
"windows-targets 0.52.6",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
|
@ -5854,6 +5884,7 @@ name = "script"
|
|||
version = "0.0.1"
|
||||
dependencies = [
|
||||
"accountable-refcell",
|
||||
"aes",
|
||||
"app_units",
|
||||
"arrayvec",
|
||||
"atomic_refcell",
|
||||
|
@ -6408,6 +6439,8 @@ name = "servo_rand"
|
|||
version = "0.0.1"
|
||||
dependencies = [
|
||||
"log",
|
||||
"malloc_size_of",
|
||||
"malloc_size_of_derive",
|
||||
"rand",
|
||||
"rand_core",
|
||||
"rand_isaac",
|
||||
|
|
|
@ -18,6 +18,7 @@ rust-version = "1.80.1"
|
|||
|
||||
[workspace.dependencies]
|
||||
accountable-refcell = "0.2.0"
|
||||
aes = { version = "0.8.4" }
|
||||
app_units = "0.7"
|
||||
arrayvec = "0.7"
|
||||
async-tungstenite = { version = "0.23", features = ["tokio-rustls-webpki-roots"] }
|
||||
|
|
|
@ -249,6 +249,11 @@ mod gen {
|
|||
#[serde(rename = "dom.compositionevent.enabled")]
|
||||
enabled: bool,
|
||||
},
|
||||
crypto: {
|
||||
subtle: {
|
||||
enabled: bool,
|
||||
}
|
||||
},
|
||||
custom_elements: {
|
||||
#[serde(rename = "dom.customelements.enabled")]
|
||||
enabled: bool,
|
||||
|
|
|
@ -13,6 +13,8 @@ path = "lib.rs"
|
|||
|
||||
[dependencies]
|
||||
log = { workspace = true }
|
||||
malloc_size_of = { workspace = true }
|
||||
malloc_size_of_derive = { workspace = true }
|
||||
rand = { workspace = true }
|
||||
rand_core = { workspace = true }
|
||||
rand_isaac = { workspace = true }
|
||||
|
|
|
@ -7,6 +7,7 @@ use std::rc::Rc;
|
|||
use std::sync::Mutex;
|
||||
|
||||
use log::trace;
|
||||
use malloc_size_of_derive::MallocSizeOf;
|
||||
/// A random number generator which shares one instance of an `OsRng`.
|
||||
///
|
||||
/// A problem with `OsRng`, which is inherited by `StdRng` and so
|
||||
|
@ -31,7 +32,9 @@ static OS_RNG: Mutex<OsRng> = Mutex::new(OsRng);
|
|||
const RESEED_THRESHOLD: u64 = 32_768;
|
||||
|
||||
// An in-memory RNG that only uses the shared file descriptor for seeding and reseeding.
|
||||
#[derive(MallocSizeOf)]
|
||||
pub struct ServoRng {
|
||||
#[ignore_malloc_size_of = "Defined in rand"]
|
||||
rng: ReseedingRng<IsaacCore, ServoReseeder>,
|
||||
}
|
||||
|
||||
|
|
|
@ -26,6 +26,7 @@ phf_shared = "0.11"
|
|||
serde_json = { workspace = true }
|
||||
|
||||
[dependencies]
|
||||
aes = { workspace = true }
|
||||
accountable-refcell = { workspace = true, optional = true }
|
||||
app_units = { workspace = true }
|
||||
arrayvec = { workspace = true }
|
||||
|
|
|
@ -218,4 +218,8 @@ DOMInterfaces = {
|
|||
'inRealms': ['RequestSession', 'SupportsSessionMode'],
|
||||
},
|
||||
|
||||
'SubtleCrypto': {
|
||||
'inRealms': ['GenerateKey', 'ExportKey']
|
||||
}
|
||||
|
||||
}
|
||||
|
|
|
@ -12,19 +12,20 @@ use uuid::Uuid;
|
|||
use crate::dom::bindings::cell::DomRefCell;
|
||||
use crate::dom::bindings::codegen::Bindings::CryptoBinding::CryptoMethods;
|
||||
use crate::dom::bindings::error::{Error, Fallible};
|
||||
use crate::dom::bindings::reflector::{reflect_dom_object, Reflector};
|
||||
use crate::dom::bindings::root::DomRoot;
|
||||
use crate::dom::bindings::reflector::{reflect_dom_object, DomObject, Reflector};
|
||||
use crate::dom::bindings::root::{DomRoot, MutNullableDom};
|
||||
use crate::dom::bindings::str::USVString;
|
||||
use crate::dom::globalscope::GlobalScope;
|
||||
use crate::dom::subtlecrypto::SubtleCrypto;
|
||||
use crate::script_runtime::JSContext;
|
||||
|
||||
// https://developer.mozilla.org/en-US/docs/Web/API/Crypto
|
||||
#[dom_struct]
|
||||
pub struct Crypto {
|
||||
reflector_: Reflector,
|
||||
#[ignore_malloc_size_of = "Defined in rand"]
|
||||
#[no_trace]
|
||||
rng: DomRefCell<ServoRng>,
|
||||
subtle: MutNullableDom<SubtleCrypto>,
|
||||
}
|
||||
|
||||
impl Crypto {
|
||||
|
@ -32,6 +33,7 @@ impl Crypto {
|
|||
Crypto {
|
||||
reflector_: Reflector::new(),
|
||||
rng: DomRefCell::new(ServoRng::default()),
|
||||
subtle: MutNullableDom::default(),
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -41,6 +43,11 @@ impl Crypto {
|
|||
}
|
||||
|
||||
impl CryptoMethods for Crypto {
|
||||
/// <https://w3c.github.io/webcrypto/#dfn-Crypto-attribute-subtle>
|
||||
fn Subtle(&self) -> DomRoot<SubtleCrypto> {
|
||||
self.subtle.or_init(|| SubtleCrypto::new(&self.global()))
|
||||
}
|
||||
|
||||
#[allow(unsafe_code)]
|
||||
// https://w3c.github.io/webcrypto/#Crypto-method-getRandomValues
|
||||
fn GetRandomValues(
|
||||
|
|
140
components/script/dom/cryptokey.rs
Normal file
140
components/script/dom/cryptokey.rs
Normal file
|
@ -0,0 +1,140 @@
|
|||
/* This Source Code Form is subject to the terms of the Mozilla Public
|
||||
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
* file, You can obtain one at https://mozilla.org/MPL/2.0/. */
|
||||
|
||||
use std::cell::Cell;
|
||||
use std::ptr::NonNull;
|
||||
|
||||
use dom_struct::dom_struct;
|
||||
use js::jsapi::{JSObject, Value};
|
||||
|
||||
use crate::dom::bindings::cell::DomRefCell;
|
||||
use crate::dom::bindings::codegen::Bindings::CryptoKeyBinding::{
|
||||
CryptoKeyMethods, KeyType, KeyUsage,
|
||||
};
|
||||
use crate::dom::bindings::codegen::Bindings::SubtleCryptoBinding::{AesKeyAlgorithm, KeyAlgorithm};
|
||||
use crate::dom::bindings::reflector::{reflect_dom_object, Reflector};
|
||||
use crate::dom::bindings::root::DomRoot;
|
||||
use crate::dom::bindings::str::DOMString;
|
||||
use crate::dom::globalscope::GlobalScope;
|
||||
use crate::js::conversions::ToJSValConvertible;
|
||||
use crate::script_runtime::JSContext;
|
||||
|
||||
/// The underlying cryptographic data this key represents
|
||||
#[allow(dead_code)]
|
||||
pub enum Handle {
|
||||
Aes128(Vec<u8>),
|
||||
Aes192(Vec<u8>),
|
||||
Aes256(Vec<u8>),
|
||||
}
|
||||
|
||||
/// <https://w3c.github.io/webcrypto/#cryptokey-interface>
|
||||
#[dom_struct]
|
||||
pub struct CryptoKey {
|
||||
reflector_: Reflector,
|
||||
key_type: KeyType,
|
||||
extractable: Cell<bool>,
|
||||
// This would normally be KeyAlgorithm but we cannot Send DOMString, which
|
||||
// is a member of Algorithm
|
||||
algorithm: DomRefCell<String>,
|
||||
usages: Vec<KeyUsage>,
|
||||
#[ignore_malloc_size_of = "Defined in external cryptography crates"]
|
||||
#[no_trace]
|
||||
handle: Handle,
|
||||
}
|
||||
|
||||
impl CryptoKey {
|
||||
fn new_inherited(
|
||||
key_type: KeyType,
|
||||
extractable: bool,
|
||||
algorithm: KeyAlgorithm,
|
||||
usages: Vec<KeyUsage>,
|
||||
handle: Handle,
|
||||
) -> CryptoKey {
|
||||
CryptoKey {
|
||||
reflector_: Reflector::new(),
|
||||
key_type,
|
||||
extractable: Cell::new(extractable),
|
||||
algorithm: DomRefCell::new(algorithm.name.to_string()),
|
||||
usages,
|
||||
handle,
|
||||
}
|
||||
}
|
||||
|
||||
pub fn new(
|
||||
global: &GlobalScope,
|
||||
key_type: KeyType,
|
||||
extractable: bool,
|
||||
algorithm: KeyAlgorithm,
|
||||
usages: Vec<KeyUsage>,
|
||||
handle: Handle,
|
||||
) -> DomRoot<CryptoKey> {
|
||||
reflect_dom_object(
|
||||
Box::new(CryptoKey::new_inherited(
|
||||
key_type,
|
||||
extractable,
|
||||
algorithm,
|
||||
usages,
|
||||
handle,
|
||||
)),
|
||||
global,
|
||||
)
|
||||
}
|
||||
|
||||
pub fn algorithm(&self) -> String {
|
||||
self.algorithm.borrow().to_string()
|
||||
}
|
||||
|
||||
pub fn handle(&self) -> &Handle {
|
||||
&self.handle
|
||||
}
|
||||
}
|
||||
|
||||
impl CryptoKeyMethods for CryptoKey {
|
||||
/// <https://w3c.github.io/webcrypto/#cryptokey-interface-members>
|
||||
fn Type(&self) -> KeyType {
|
||||
self.key_type.clone()
|
||||
}
|
||||
|
||||
/// <https://w3c.github.io/webcrypto/#cryptokey-interface-members>
|
||||
fn Extractable(&self) -> bool {
|
||||
self.extractable.get()
|
||||
}
|
||||
|
||||
#[allow(unsafe_code)]
|
||||
/// <https://w3c.github.io/webcrypto/#cryptokey-interface-members>
|
||||
fn Algorithm(&self, cx: JSContext) -> NonNull<JSObject> {
|
||||
let parent = KeyAlgorithm {
|
||||
name: DOMString::from_string(self.algorithm()),
|
||||
};
|
||||
let algorithm = match self.handle() {
|
||||
Handle::Aes128(_) => AesKeyAlgorithm {
|
||||
parent,
|
||||
length: 128,
|
||||
},
|
||||
Handle::Aes192(_) => AesKeyAlgorithm {
|
||||
parent,
|
||||
length: 192,
|
||||
},
|
||||
Handle::Aes256(_) => AesKeyAlgorithm {
|
||||
parent,
|
||||
length: 256,
|
||||
},
|
||||
};
|
||||
unsafe {
|
||||
rooted!(in(*cx) let mut alg: Value);
|
||||
algorithm.to_jsval(*cx, alg.handle_mut());
|
||||
NonNull::new(alg.to_object()).unwrap()
|
||||
}
|
||||
}
|
||||
|
||||
#[allow(unsafe_code)]
|
||||
/// <https://w3c.github.io/webcrypto/#cryptokey-interface-members>
|
||||
fn Usages(&self, cx: JSContext) -> NonNull<JSObject> {
|
||||
unsafe {
|
||||
rooted!(in(*cx) let mut usages: Value);
|
||||
self.usages.to_jsval(*cx, usages.handle_mut());
|
||||
NonNull::new(usages.to_object()).unwrap()
|
||||
}
|
||||
}
|
||||
}
|
|
@ -257,6 +257,7 @@ pub mod console;
|
|||
pub mod constantsourcenode;
|
||||
mod create;
|
||||
pub mod crypto;
|
||||
pub mod cryptokey;
|
||||
pub mod css;
|
||||
pub mod cssconditionrule;
|
||||
pub mod cssfontfacerule;
|
||||
|
@ -543,6 +544,7 @@ pub mod stylepropertymapreadonly;
|
|||
pub mod stylesheet;
|
||||
pub mod stylesheetlist;
|
||||
pub mod submitevent;
|
||||
pub mod subtlecrypto;
|
||||
pub mod svgelement;
|
||||
pub mod svggraphicselement;
|
||||
pub mod svgsvgelement;
|
||||
|
|
335
components/script/dom/subtlecrypto.rs
Normal file
335
components/script/dom/subtlecrypto.rs
Normal file
|
@ -0,0 +1,335 @@
|
|||
/* This Source Code Form is subject to the terms of the Mozilla Public
|
||||
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
* file, You can obtain one at https://mozilla.org/MPL/2.0/. */
|
||||
|
||||
use std::ptr;
|
||||
use std::rc::Rc;
|
||||
|
||||
use dom_struct::dom_struct;
|
||||
use js::conversions::ConversionResult;
|
||||
use js::jsapi::JSObject;
|
||||
use js::jsval::ObjectValue;
|
||||
use js::typedarray::ArrayBufferU8;
|
||||
use servo_rand::{RngCore, ServoRng};
|
||||
|
||||
use crate::dom::bindings::buffer_source::create_buffer_source;
|
||||
use crate::dom::bindings::cell::DomRefCell;
|
||||
use crate::dom::bindings::codegen::Bindings::CryptoKeyBinding::{
|
||||
CryptoKeyMethods, KeyType, KeyUsage,
|
||||
};
|
||||
use crate::dom::bindings::codegen::Bindings::SubtleCryptoBinding::{
|
||||
AesKeyGenParams, Algorithm, AlgorithmIdentifier, KeyAlgorithm, KeyFormat, SubtleCryptoMethods,
|
||||
};
|
||||
use crate::dom::bindings::error::Error;
|
||||
use crate::dom::bindings::inheritance::Castable;
|
||||
use crate::dom::bindings::refcounted::{Trusted, TrustedPromise};
|
||||
use crate::dom::bindings::reflector::{reflect_dom_object, DomObject, Reflector};
|
||||
use crate::dom::bindings::root::DomRoot;
|
||||
use crate::dom::bindings::str::DOMString;
|
||||
use crate::dom::cryptokey::{CryptoKey, Handle};
|
||||
use crate::dom::globalscope::GlobalScope;
|
||||
use crate::dom::promise::Promise;
|
||||
use crate::dom::window::Window;
|
||||
use crate::dom::workerglobalscope::WorkerGlobalScope;
|
||||
use crate::realms::InRealm;
|
||||
use crate::script_runtime::JSContext;
|
||||
use crate::task::TaskCanceller;
|
||||
use crate::task_source::dom_manipulation::DOMManipulationTaskSource;
|
||||
use crate::task_source::TaskSource;
|
||||
|
||||
// String constants for algorithms/curves
|
||||
const ALG_AES_CBC: &str = "AES-CBC";
|
||||
const ALG_AES_CTR: &str = "AES-CTR";
|
||||
const ALG_AES_GCM: &str = "AES-GCM";
|
||||
const ALG_AES_KW: &str = "AES-KW";
|
||||
const ALG_SHA1: &str = "SHA1";
|
||||
const ALG_SHA256: &str = "SHA256";
|
||||
const ALG_SHA384: &str = "SHA384";
|
||||
const ALG_SHA512: &str = "SHA512";
|
||||
const ALG_HMAC: &str = "HMAC";
|
||||
const ALG_HKDF: &str = "HKDF";
|
||||
const ALG_PBKDF2: &str = "PBKDF2";
|
||||
const ALG_RSASSA_PKCS1: &str = "RSASSA-PKCS1-v1_5";
|
||||
const ALG_RSA_OAEP: &str = "RSA-OAEP";
|
||||
const ALG_RSA_PSS: &str = "RSA-PSS";
|
||||
const ALG_ECDH: &str = "ECDH";
|
||||
const ALG_ECDSA: &str = "ECDSA";
|
||||
#[allow(dead_code)]
|
||||
static SUPPORTED_ALGORITHMS: &[&str] = &[
|
||||
ALG_AES_CBC,
|
||||
ALG_AES_CTR,
|
||||
ALG_AES_GCM,
|
||||
ALG_AES_KW,
|
||||
ALG_SHA1,
|
||||
ALG_SHA256,
|
||||
ALG_SHA384,
|
||||
ALG_SHA512,
|
||||
ALG_HMAC,
|
||||
ALG_HKDF,
|
||||
ALG_PBKDF2,
|
||||
ALG_RSASSA_PKCS1,
|
||||
ALG_RSA_OAEP,
|
||||
ALG_RSA_PSS,
|
||||
ALG_ECDH,
|
||||
ALG_ECDSA,
|
||||
];
|
||||
|
||||
const NAMED_CURVE_P256: &str = "P-256";
|
||||
const NAMED_CURVE_P384: &str = "P-384";
|
||||
const NAMED_CURVE_P521: &str = "P-521";
|
||||
#[allow(dead_code)]
|
||||
static SUPPORTED_CURVES: &[&str] = &[NAMED_CURVE_P256, NAMED_CURVE_P384, NAMED_CURVE_P521];
|
||||
|
||||
#[dom_struct]
|
||||
pub struct SubtleCrypto {
|
||||
reflector_: Reflector,
|
||||
#[no_trace]
|
||||
rng: DomRefCell<ServoRng>,
|
||||
}
|
||||
|
||||
impl SubtleCrypto {
|
||||
fn new_inherited() -> SubtleCrypto {
|
||||
SubtleCrypto {
|
||||
reflector_: Reflector::new(),
|
||||
rng: DomRefCell::new(ServoRng::default()),
|
||||
}
|
||||
}
|
||||
|
||||
pub(crate) fn new(global: &GlobalScope) -> DomRoot<SubtleCrypto> {
|
||||
reflect_dom_object(Box::new(SubtleCrypto::new_inherited()), global)
|
||||
}
|
||||
|
||||
fn task_source_with_canceller(&self) -> (DOMManipulationTaskSource, TaskCanceller) {
|
||||
if let Some(window) = self.global().downcast::<Window>() {
|
||||
window
|
||||
.task_manager()
|
||||
.dom_manipulation_task_source_with_canceller()
|
||||
} else if let Some(worker_global) = self.global().downcast::<WorkerGlobalScope>() {
|
||||
let task_source = worker_global.dom_manipulation_task_source();
|
||||
let canceller = worker_global.task_canceller();
|
||||
(task_source, canceller)
|
||||
} else {
|
||||
unreachable!("Couldn't downcast to Window or WorkerGlobalScope!");
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl SubtleCryptoMethods for SubtleCrypto {
|
||||
/// <https://w3c.github.io/webcrypto/#SubtleCrypto-method-generateKey>
|
||||
fn GenerateKey(
|
||||
&self,
|
||||
cx: JSContext,
|
||||
algorithm: AlgorithmIdentifier,
|
||||
extractable: bool,
|
||||
key_usages: Vec<KeyUsage>,
|
||||
comp: InRealm,
|
||||
) -> Rc<Promise> {
|
||||
let normalized_algorithm = normalize_algorithm(cx, algorithm, "generateKey");
|
||||
let promise = Promise::new_in_current_realm(comp);
|
||||
if let Err(e) = normalized_algorithm {
|
||||
promise.reject_error(e);
|
||||
return promise;
|
||||
}
|
||||
|
||||
let (task_source, canceller) = self.task_source_with_canceller();
|
||||
let this = Trusted::new(self);
|
||||
let trusted_promise = TrustedPromise::new(promise.clone());
|
||||
let alg = normalized_algorithm.clone();
|
||||
let _ = task_source.queue_with_canceller(
|
||||
task!(generate_key: move || {
|
||||
let subtle = this.root();
|
||||
let promise = trusted_promise.root();
|
||||
let key = match alg {
|
||||
Ok(NormalizedAlgorithm::AesKeyGenParams(key_gen_params)) => {
|
||||
subtle.generate_key_aes_cbc(key_usages, key_gen_params, extractable)
|
||||
},
|
||||
_ => Err(Error::NotSupported),
|
||||
};
|
||||
match key {
|
||||
Ok(key) => promise.resolve_native(&key),
|
||||
Err(e) => promise.reject_error(e),
|
||||
}
|
||||
}),
|
||||
&canceller,
|
||||
);
|
||||
|
||||
promise
|
||||
}
|
||||
|
||||
/// <https://w3c.github.io/webcrypto/#SubtleCrypto-method-exportKey>
|
||||
#[allow(unsafe_code)]
|
||||
fn ExportKey(&self, format: KeyFormat, key: &CryptoKey, comp: InRealm) -> Rc<Promise> {
|
||||
let promise = Promise::new_in_current_realm(comp);
|
||||
|
||||
let (task_source, canceller) = self.task_source_with_canceller();
|
||||
let this = Trusted::new(self);
|
||||
let trusted_key = Trusted::new(key);
|
||||
let trusted_promise = TrustedPromise::new(promise.clone());
|
||||
let _ = task_source.queue_with_canceller(
|
||||
task!(export_key: move || {
|
||||
let subtle = this.root();
|
||||
let promise = trusted_promise.root();
|
||||
let key = trusted_key.root();
|
||||
let alg_name = key.algorithm();
|
||||
if matches!(
|
||||
alg_name.as_str(), ALG_SHA1 | ALG_SHA256 | ALG_SHA384 | ALG_SHA512 | ALG_HKDF | ALG_PBKDF2
|
||||
) {
|
||||
promise.reject_error(Error::NotSupported);
|
||||
return;
|
||||
}
|
||||
if !key.Extractable() {
|
||||
promise.reject_error(Error::InvalidAccess);
|
||||
return;
|
||||
}
|
||||
let exported_key = match alg_name.as_str() {
|
||||
ALG_AES_CBC => subtle.export_key_aes_cbc(format, &*key),
|
||||
_ => Err(Error::NotSupported),
|
||||
};
|
||||
match exported_key {
|
||||
Ok(k) => {
|
||||
let cx = GlobalScope::get_cx();
|
||||
rooted!(in(*cx) let mut array_buffer_ptr = ptr::null_mut::<JSObject>());
|
||||
create_buffer_source::<ArrayBufferU8>(cx, &k, array_buffer_ptr.handle_mut())
|
||||
.expect("failed to create buffer source for exported key.");
|
||||
promise.resolve_native(&array_buffer_ptr.get())
|
||||
},
|
||||
Err(e) => promise.reject_error(e),
|
||||
}
|
||||
}),
|
||||
&canceller,
|
||||
);
|
||||
|
||||
promise
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Clone)]
|
||||
pub enum NormalizedAlgorithm {
|
||||
#[allow(dead_code)]
|
||||
Algorithm(SubtleAlgorithm),
|
||||
AesKeyGenParams(SubtleAesKeyGenParams),
|
||||
}
|
||||
|
||||
// These "subtle" structs are proxies for the codegen'd dicts which don't hold a DOMString
|
||||
// so they can be sent safely when running steps in parallel.
|
||||
|
||||
#[derive(Clone)]
|
||||
pub struct SubtleAlgorithm {
|
||||
#[allow(dead_code)]
|
||||
pub name: String,
|
||||
}
|
||||
|
||||
impl From<DOMString> for SubtleAlgorithm {
|
||||
fn from(name: DOMString) -> Self {
|
||||
SubtleAlgorithm {
|
||||
name: name.to_string(),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Clone)]
|
||||
pub struct SubtleAesKeyGenParams {
|
||||
#[allow(dead_code)]
|
||||
pub name: String,
|
||||
pub length: u16,
|
||||
}
|
||||
|
||||
impl From<AesKeyGenParams> for SubtleAesKeyGenParams {
|
||||
fn from(params: AesKeyGenParams) -> Self {
|
||||
SubtleAesKeyGenParams {
|
||||
name: params.parent.name.to_string(),
|
||||
length: params.length,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/// <https://w3c.github.io/webcrypto/#algorithm-normalization-normalize-an-algorithm>
|
||||
#[allow(unsafe_code)]
|
||||
fn normalize_algorithm(
|
||||
cx: JSContext,
|
||||
algorithm: AlgorithmIdentifier,
|
||||
operation: &str,
|
||||
) -> Result<NormalizedAlgorithm, Error> {
|
||||
match algorithm {
|
||||
AlgorithmIdentifier::String(name) => Ok(NormalizedAlgorithm::Algorithm(name.into())),
|
||||
AlgorithmIdentifier::Object(obj) => {
|
||||
rooted!(in(*cx) let value = ObjectValue(unsafe { *obj.get_unsafe() }));
|
||||
let Ok(ConversionResult::Success(algorithm)) = Algorithm::new(cx, value.handle())
|
||||
else {
|
||||
return Err(Error::Syntax);
|
||||
};
|
||||
match (algorithm.name.str().to_uppercase().as_str(), operation) {
|
||||
(ALG_AES_CBC, "generateKey") => {
|
||||
let params_result =
|
||||
AesKeyGenParams::new(cx, value.handle()).map_err(|_| Error::Operation)?;
|
||||
let ConversionResult::Success(params) = params_result else {
|
||||
return Err(Error::Syntax);
|
||||
};
|
||||
Ok(NormalizedAlgorithm::AesKeyGenParams(params.into()))
|
||||
},
|
||||
_ => return Err(Error::NotSupported),
|
||||
}
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
impl SubtleCrypto {
|
||||
/// <https://w3c.github.io/webcrypto/#aes-cbc-operations>
|
||||
fn generate_key_aes_cbc(
|
||||
&self,
|
||||
usages: Vec<KeyUsage>,
|
||||
key_gen_params: SubtleAesKeyGenParams,
|
||||
extractable: bool,
|
||||
) -> Result<DomRoot<CryptoKey>, Error> {
|
||||
if !matches!(key_gen_params.length, 128 | 192 | 256) {
|
||||
return Err(Error::Operation);
|
||||
}
|
||||
|
||||
if usages.iter().any(|usage| {
|
||||
!matches!(
|
||||
usage,
|
||||
KeyUsage::Encrypt | KeyUsage::Decrypt | KeyUsage::WrapKey | KeyUsage::UnwrapKey
|
||||
)
|
||||
}) || usages.is_empty()
|
||||
{
|
||||
return Err(Error::Syntax);
|
||||
}
|
||||
|
||||
let mut rand = Vec::new();
|
||||
rand.resize(key_gen_params.length as usize, 0);
|
||||
self.rng.borrow_mut().fill_bytes(&mut rand);
|
||||
let handle = match key_gen_params.length {
|
||||
128 => Handle::Aes128(rand),
|
||||
192 => Handle::Aes192(rand),
|
||||
256 => Handle::Aes256(rand),
|
||||
_ => return Err(Error::Operation),
|
||||
};
|
||||
|
||||
Ok(CryptoKey::new(
|
||||
&self.global(),
|
||||
KeyType::Secret,
|
||||
extractable,
|
||||
KeyAlgorithm {
|
||||
name: DOMString::from(ALG_AES_CBC),
|
||||
},
|
||||
usages,
|
||||
handle,
|
||||
))
|
||||
}
|
||||
|
||||
/// <https://w3c.github.io/webcrypto/#aes-cbc-operations>
|
||||
fn export_key_aes_cbc(&self, format: KeyFormat, key: &CryptoKey) -> Result<Vec<u8>, Error> {
|
||||
match format {
|
||||
KeyFormat::Raw => match key.handle() {
|
||||
Handle::Aes128(key) => Ok(key.as_slice().to_vec()),
|
||||
Handle::Aes192(key) => Ok(key.as_slice().to_vec()),
|
||||
Handle::Aes256(key) => Ok(key.as_slice().to_vec()),
|
||||
},
|
||||
KeyFormat::Jwk => {
|
||||
// TODO: Support jwk
|
||||
Err(Error::NotSupported)
|
||||
},
|
||||
_ => Err(Error::NotSupported),
|
||||
}
|
||||
}
|
||||
}
|
|
@ -17,7 +17,7 @@ WorkerGlobalScope includes GlobalCrypto;
|
|||
|
||||
[Exposed=(Window,Worker)]
|
||||
interface Crypto {
|
||||
//readonly attribute SubtleCrypto subtle;
|
||||
[SecureContext] readonly attribute SubtleCrypto subtle;
|
||||
[Throws]
|
||||
ArrayBufferView getRandomValues(ArrayBufferView array);
|
||||
|
||||
|
|
17
components/script/dom/webidls/CryptoKey.webidl
Normal file
17
components/script/dom/webidls/CryptoKey.webidl
Normal file
|
@ -0,0 +1,17 @@
|
|||
/* This Source Code Form is subject to the terms of the Mozilla Public
|
||||
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
* file, You can obtain one at https://mozilla.org/MPL/2.0/. */
|
||||
|
||||
// https://w3c.github.io/webcrypto/#cryptokey-interface
|
||||
|
||||
enum KeyType { "public", "private", "secret" };
|
||||
|
||||
enum KeyUsage { "encrypt", "decrypt", "sign", "verify", "deriveKey", "deriveBits", "wrapKey", "unwrapKey" };
|
||||
|
||||
[SecureContext, Exposed=(Window,Worker), Serializable, Pref="dom.crypto.subtle.enabled"]
|
||||
interface CryptoKey {
|
||||
readonly attribute KeyType type;
|
||||
readonly attribute boolean extractable;
|
||||
readonly attribute object algorithm;
|
||||
readonly attribute object usages;
|
||||
};
|
87
components/script/dom/webidls/SubtleCrypto.webidl
Normal file
87
components/script/dom/webidls/SubtleCrypto.webidl
Normal file
|
@ -0,0 +1,87 @@
|
|||
/* This Source Code Form is subject to the terms of the Mozilla Public
|
||||
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
* file, You can obtain one at https://mozilla.org/MPL/2.0/. */
|
||||
|
||||
// https://w3c.github.io/webcrypto/#subtlecrypto-interface
|
||||
|
||||
typedef (object or DOMString) AlgorithmIdentifier;
|
||||
|
||||
typedef AlgorithmIdentifier HashAlgorithmIdentifier;
|
||||
|
||||
dictionary Algorithm {
|
||||
required DOMString name;
|
||||
};
|
||||
|
||||
dictionary KeyAlgorithm {
|
||||
required DOMString name;
|
||||
};
|
||||
|
||||
enum KeyFormat { "raw", "spki", "pkcs8", "jwk" };
|
||||
|
||||
[SecureContext,Exposed=(Window,Worker),Pref="dom.crypto.subtle.enabled"]
|
||||
interface SubtleCrypto {
|
||||
// Promise<any> encrypt(AlgorithmIdentifier algorithm,
|
||||
// CryptoKey key,
|
||||
// BufferSource data);
|
||||
// Promise<any> decrypt(AlgorithmIdentifier algorithm,
|
||||
// CryptoKey key,
|
||||
// BufferSource data);
|
||||
// Promise<any> sign(AlgorithmIdentifier algorithm,
|
||||
// CryptoKey key,
|
||||
// BufferSource data);
|
||||
// Promise<any> verify(AlgorithmIdentifier algorithm,
|
||||
// CryptoKey key,
|
||||
// BufferSource signature,
|
||||
// BufferSource data);
|
||||
// Promise<any> digest(AlgorithmIdentifier algorithm,
|
||||
// BufferSource data);
|
||||
|
||||
Promise<any> generateKey(AlgorithmIdentifier algorithm,
|
||||
boolean extractable,
|
||||
sequence<KeyUsage> keyUsages );
|
||||
// Promise<any> deriveKey(AlgorithmIdentifier algorithm,
|
||||
// CryptoKey baseKey,
|
||||
// AlgorithmIdentifier derivedKeyType,
|
||||
// boolean extractable,
|
||||
// sequence<KeyUsage> keyUsages );
|
||||
// Promise<ArrayBuffer> deriveBits(AlgorithmIdentifier algorithm,
|
||||
// CryptoKey baseKey,
|
||||
// optional unsigned long? length = null);
|
||||
|
||||
// Promise<CryptoKey> importKey(KeyFormat format,
|
||||
// (BufferSource or JsonWebKey) keyData,
|
||||
// AlgorithmIdentifier algorithm,
|
||||
// boolean extractable,
|
||||
// sequence<KeyUsage> keyUsages );
|
||||
Promise<any> exportKey(KeyFormat format, CryptoKey key);
|
||||
|
||||
// Promise<any> wrapKey(KeyFormat format,
|
||||
// CryptoKey key,
|
||||
// CryptoKey wrappingKey,
|
||||
// AlgorithmIdentifier wrapAlgorithm);
|
||||
// Promise<CryptoKey> unwrapKey(KeyFormat format,
|
||||
// BufferSource wrappedKey,
|
||||
// CryptoKey unwrappingKey,
|
||||
// AlgorithmIdentifier unwrapAlgorithm,
|
||||
// AlgorithmIdentifier unwrappedKeyAlgorithm,
|
||||
// boolean extractable,
|
||||
// sequence<KeyUsage> keyUsages );
|
||||
};
|
||||
|
||||
// AES shared
|
||||
dictionary AesKeyAlgorithm : KeyAlgorithm {
|
||||
required unsigned short length;
|
||||
};
|
||||
|
||||
dictionary AesKeyGenParams : Algorithm {
|
||||
required [EnforceRange] unsigned short length;
|
||||
};
|
||||
|
||||
dictionary AesDerivedKeyParams : Algorithm {
|
||||
required [EnforceRange] unsigned short length;
|
||||
};
|
||||
|
||||
// AES_CBC
|
||||
dictionary AesCbcParams : Algorithm {
|
||||
required BufferSource iv;
|
||||
};
|
|
@ -7,6 +7,7 @@
|
|||
"dom.canvas_capture.enabled": false,
|
||||
"dom.canvas_text.enabled": true,
|
||||
"dom.compositionevent.enabled": false,
|
||||
"dom.crypto.subtle.enabled": false,
|
||||
"dom.customelements.enabled": true,
|
||||
"dom.document.dblclick_dist": 1,
|
||||
"dom.document.dblclick_timeout": 300,
|
||||
|
|
1
tests/wpt/meta-legacy-layout/WebCryptoAPI/__dir__.ini
vendored
Normal file
1
tests/wpt/meta-legacy-layout/WebCryptoAPI/__dir__.ini
vendored
Normal file
|
@ -0,0 +1 @@
|
|||
prefs: [dom.crypto.subtle.enabled: true]
|
|
@ -1,8 +1,5 @@
|
|||
[algorithm-discards-context.https.window.html]
|
||||
expected: TIMEOUT
|
||||
[Context is discarded in generateKey]
|
||||
expected: TIMEOUT
|
||||
|
||||
[Context is discarded in importKey]
|
||||
expected: TIMEOUT
|
||||
|
||||
|
|
|
@ -1,17 +0,0 @@
|
|||
[failures_AES-CBC.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_AES-CBC.https.any.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -1,17 +1,950 @@
|
|||
[failures_AES-KW.https.any.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 128, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 128, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 192, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 192, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 256, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 256, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_AES-KW.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 128, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 128, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 192, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 192, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 256, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 256, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,17 +1,590 @@
|
|||
[failures_ECDH.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-256}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-384}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_ECDH.https.any.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-256}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-384}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,17 +1,482 @@
|
|||
[failures_ECDSA.https.any.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_ECDSA.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,158 @@
|
|||
[failures_Ed25519.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_Ed25519.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,158 @@
|
|||
[failures_Ed448.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: Ed448}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_Ed448.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: Ed448}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -1,17 +1,422 @@
|
|||
[failures_RSA-PSS.https.any.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_RSA-PSS.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,17 +1,422 @@
|
|||
[failures_RSASSA-PKCS1-v1_5.https.any.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_RSASSA-PKCS1-v1_5.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() for Failures]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,194 @@
|
|||
[failures_X25519.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: X25519}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_X25519.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: X25519}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,194 @@
|
|||
[failures_X448.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: X448}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_X448.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: X448}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,17 +1,878 @@
|
|||
[successes_AES-CBC.https.any.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_AES-CBC.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -1,17 +1,446 @@
|
|||
[successes_AES-KW.https.any.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_AES-KW.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,17 +1,446 @@
|
|||
[successes_ECDH.https.any.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_ECDH.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,17 +1,338 @@
|
|||
[successes_ECDSA.https.any.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_ECDSA.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,110 @@
|
|||
[successes_Ed25519.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ED25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_Ed25519.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ED25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,110 @@
|
|||
[successes_Ed448.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ED448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_Ed448.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ED448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -1,71 +1,278 @@
|
|||
[successes_RSA-PSS.https.any.html?11-20]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.worker.html?11-20]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.html?31-last]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.html?1-10]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.worker.html?1-10]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.html?21-30]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.worker.html?31-last]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.worker.html?21-30]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,71 +1,278 @@
|
|||
[successes_RSASSA-PKCS1-v1_5.https.any.html?1-10]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.html?31-last]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?11-20]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.html?21-30]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?1-10]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?31-last]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.html?11-20]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?21-30]
|
||||
expected: ERROR
|
||||
[Untitled]
|
||||
expected: FAIL
|
||||
|
||||
[WebCryptoAPI: generateKey() Successful Calls]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,98 @@
|
|||
[successes_X25519.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: X25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_X25519.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: X25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,98 @@
|
|||
[successes_X448.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: X448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_X448.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: X448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -2,60 +2,6 @@
|
|||
[idlharness]
|
||||
expected: FAIL
|
||||
|
||||
[Crypto interface: attribute subtle]
|
||||
expected: FAIL
|
||||
|
||||
[Crypto interface: crypto must inherit property "subtle" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface object]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface object length]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface object name]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface prototype object]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface prototype object's "constructor" property]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface prototype object's @@unscopables property]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute type]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute extractable]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute algorithm]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute usages]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: existence and properties of interface object]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface object length]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface object name]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: existence and properties of interface prototype object]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: existence and properties of interface prototype object's "constructor" property]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: existence and properties of interface prototype object's @@unscopables property]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation encrypt(AlgorithmIdentifier, CryptoKey, BufferSource)]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -83,21 +29,12 @@
|
|||
[SubtleCrypto interface: operation importKey(KeyFormat, [object Object\],[object Object\], AlgorithmIdentifier, boolean, [object Object\])]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation exportKey(KeyFormat, CryptoKey)]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier)]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, [object Object\])]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto must be primary interface of crypto.subtle]
|
||||
expected: FAIL
|
||||
|
||||
[Stringification of crypto.subtle]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "encrypt(AlgorithmIdentifier, CryptoKey, BufferSource)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -152,12 +89,6 @@
|
|||
[SubtleCrypto interface: calling importKey(KeyFormat, [object Object\],[object Object\], AlgorithmIdentifier, boolean, [object Object\]) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "exportKey(KeyFormat, CryptoKey)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: calling exportKey(KeyFormat, CryptoKey) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -179,9 +110,6 @@
|
|||
[SubtleCrypto interface: crypto.subtle must inherit property "importKey(KeyFormat, (BufferSource or JsonWebKey), AlgorithmIdentifier, boolean, sequence<KeyUsage>)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "generateKey(AlgorithmIdentifier, boolean, sequence<KeyUsage>)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: calling importKey(KeyFormat, (BufferSource or JsonWebKey), AlgorithmIdentifier, boolean, sequence<KeyUsage>) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -191,9 +119,6 @@
|
|||
[SubtleCrypto interface: calling unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence<KeyUsage>) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation generateKey(AlgorithmIdentifier, boolean, sequence<KeyUsage>)]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, sequence<KeyUsage>)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -203,9 +128,6 @@
|
|||
[SubtleCrypto interface: calling deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, sequence<KeyUsage>) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: calling generateKey(AlgorithmIdentifier, boolean, sequence<KeyUsage>) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation deriveBits(AlgorithmIdentifier, CryptoKey, optional unsigned long?)]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -220,60 +142,6 @@
|
|||
[idlharness]
|
||||
expected: FAIL
|
||||
|
||||
[Crypto interface: attribute subtle]
|
||||
expected: FAIL
|
||||
|
||||
[Crypto interface: crypto must inherit property "subtle" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface object]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface object length]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface object name]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface prototype object]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface prototype object's "constructor" property]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface prototype object's @@unscopables property]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute type]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute extractable]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute algorithm]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute usages]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: existence and properties of interface object]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface object length]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface object name]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: existence and properties of interface prototype object]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: existence and properties of interface prototype object's "constructor" property]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: existence and properties of interface prototype object's @@unscopables property]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation encrypt(AlgorithmIdentifier, CryptoKey, BufferSource)]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -301,21 +169,12 @@
|
|||
[SubtleCrypto interface: operation importKey(KeyFormat, [object Object\],[object Object\], AlgorithmIdentifier, boolean, [object Object\])]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation exportKey(KeyFormat, CryptoKey)]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier)]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, [object Object\])]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto must be primary interface of crypto.subtle]
|
||||
expected: FAIL
|
||||
|
||||
[Stringification of crypto.subtle]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "encrypt(AlgorithmIdentifier, CryptoKey, BufferSource)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -370,12 +229,6 @@
|
|||
[SubtleCrypto interface: calling importKey(KeyFormat, [object Object\],[object Object\], AlgorithmIdentifier, boolean, [object Object\]) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "exportKey(KeyFormat, CryptoKey)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: calling exportKey(KeyFormat, CryptoKey) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -397,9 +250,6 @@
|
|||
[SubtleCrypto interface: crypto.subtle must inherit property "importKey(KeyFormat, (BufferSource or JsonWebKey), AlgorithmIdentifier, boolean, sequence<KeyUsage>)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "generateKey(AlgorithmIdentifier, boolean, sequence<KeyUsage>)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: calling importKey(KeyFormat, (BufferSource or JsonWebKey), AlgorithmIdentifier, boolean, sequence<KeyUsage>) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -409,9 +259,6 @@
|
|||
[SubtleCrypto interface: calling unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence<KeyUsage>) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation generateKey(AlgorithmIdentifier, boolean, sequence<KeyUsage>)]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, sequence<KeyUsage>)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -421,9 +268,6 @@
|
|||
[SubtleCrypto interface: calling deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, sequence<KeyUsage>) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: calling generateKey(AlgorithmIdentifier, boolean, sequence<KeyUsage>) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation deriveBits(AlgorithmIdentifier, CryptoKey, optional unsigned long?)]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,8 +0,0 @@
|
|||
[crypto-subtle-secure-context-available.https.sub.html]
|
||||
type: testharness
|
||||
[Secure context window has access to crypto.subtle]
|
||||
expected: FAIL
|
||||
|
||||
[Secure context worker has access to crypto.subtle]
|
||||
expected: FAIL
|
||||
|
|
@ -1,8 +1,14 @@
|
|||
[wrapKey_unwrapKey.https.any.html]
|
||||
[setup]
|
||||
[Can wrap and unwrap AES-CBC keys using raw and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[wrapKey_unwrapKey.https.any.worker.html]
|
||||
[setup]
|
||||
[Can wrap and unwrap AES-CBC keys using raw and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-CBC]
|
||||
expected: FAIL
|
||||
|
|
1
tests/wpt/meta/WebCryptoAPI/__dir__.ini
vendored
Normal file
1
tests/wpt/meta/WebCryptoAPI/__dir__.ini
vendored
Normal file
|
@ -0,0 +1 @@
|
|||
prefs: [dom.crypto.subtle.enabled: true]
|
|
@ -1,8 +1,5 @@
|
|||
[algorithm-discards-context.https.window.html]
|
||||
expected: TIMEOUT
|
||||
[Context is discarded in generateKey]
|
||||
expected: TIMEOUT
|
||||
|
||||
[Context is discarded in importKey]
|
||||
expected: TIMEOUT
|
||||
|
||||
|
|
|
@ -1,5 +0,0 @@
|
|||
[failures_AES-CBC.https.any.worker.html]
|
||||
expected: ERROR
|
||||
|
||||
[failures_AES-CBC.https.any.html]
|
||||
expected: ERROR
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -1,5 +1,938 @@
|
|||
[failures_AES-KW.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 128, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 128, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 192, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 192, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 256, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 256, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_AES-KW.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 128, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 128, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 192, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 192, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 256, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 256, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,578 @@
|
|||
[failures_ECDH.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-256}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-384}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_ECDH.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-256}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-384}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,470 @@
|
|||
[failures_ECDSA.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_ECDSA.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,158 @@
|
|||
[failures_Ed25519.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_Ed25519.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,158 @@
|
|||
[failures_Ed448.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: Ed448}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_Ed448.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: Ed448}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -1,5 +1,410 @@
|
|||
[failures_RSA-PSS.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_RSA-PSS.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,410 @@
|
|||
[failures_RSASSA-PKCS1-v1_5.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_RSASSA-PKCS1-v1_5.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,194 @@
|
|||
[failures_X25519.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: X25519}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_X25519.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: X25519}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,194 @@
|
|||
[failures_X448.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: X448}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_X448.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: X448}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,866 @@
|
|||
[successes_AES-CBC.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_AES-CBC.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -1,5 +1,434 @@
|
|||
[successes_AES-KW.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_AES-KW.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,434 @@
|
|||
[successes_ECDH.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_ECDH.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,326 @@
|
|||
[successes_ECDSA.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_ECDSA.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,110 @@
|
|||
[successes_Ed25519.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ED25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_Ed25519.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ED25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,110 @@
|
|||
[successes_Ed448.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ED448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_Ed448.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ED448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -1,23 +1,230 @@
|
|||
[successes_RSA-PSS.https.any.worker.html?21-30]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.html?31-last]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.worker.html?31-last]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.html?1-10]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.html?21-30]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.html?11-20]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.worker.html?11-20]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.worker.html?1-10]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,23 +1,230 @@
|
|||
[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?11-20]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?1-10]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.html?1-10]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?31-last]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.html?11-20]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.html?31-last]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?21-30]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.html?21-30]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,98 @@
|
|||
[successes_X25519.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: X25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_X25519.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: X25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,98 @@
|
|||
[successes_X448.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: X448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_X448.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: X448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,58 +1,4 @@
|
|||
[idlharness.https.any.worker.html]
|
||||
[Crypto interface: attribute subtle]
|
||||
expected: FAIL
|
||||
|
||||
[Crypto interface: crypto must inherit property "subtle" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface object]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface object length]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface object name]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface prototype object]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface prototype object's "constructor" property]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface prototype object's @@unscopables property]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute type]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute extractable]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute algorithm]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute usages]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: existence and properties of interface object]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface object length]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface object name]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: existence and properties of interface prototype object]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: existence and properties of interface prototype object's "constructor" property]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: existence and properties of interface prototype object's @@unscopables property]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation encrypt(AlgorithmIdentifier, CryptoKey, BufferSource)]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -68,9 +14,6 @@
|
|||
[SubtleCrypto interface: operation digest(AlgorithmIdentifier, BufferSource)]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation generateKey(AlgorithmIdentifier, boolean, sequence<KeyUsage>)]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, sequence<KeyUsage>)]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -80,21 +23,12 @@
|
|||
[SubtleCrypto interface: operation importKey(KeyFormat, (BufferSource or JsonWebKey), AlgorithmIdentifier, boolean, sequence<KeyUsage>)]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation exportKey(KeyFormat, CryptoKey)]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier)]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence<KeyUsage>)]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto must be primary interface of crypto.subtle]
|
||||
expected: FAIL
|
||||
|
||||
[Stringification of crypto.subtle]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "encrypt(AlgorithmIdentifier, CryptoKey, BufferSource)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -125,12 +59,6 @@
|
|||
[SubtleCrypto interface: calling digest(AlgorithmIdentifier, BufferSource) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "generateKey(AlgorithmIdentifier, boolean, sequence<KeyUsage>)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: calling generateKey(AlgorithmIdentifier, boolean, sequence<KeyUsage>) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, sequence<KeyUsage>)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -149,12 +77,6 @@
|
|||
[SubtleCrypto interface: calling importKey(KeyFormat, (BufferSource or JsonWebKey), AlgorithmIdentifier, boolean, sequence<KeyUsage>) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "exportKey(KeyFormat, CryptoKey)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: calling exportKey(KeyFormat, CryptoKey) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -178,60 +100,6 @@
|
|||
|
||||
|
||||
[idlharness.https.any.html]
|
||||
[Crypto interface: attribute subtle]
|
||||
expected: FAIL
|
||||
|
||||
[Crypto interface: crypto must inherit property "subtle" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface object]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface object length]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface object name]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface prototype object]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface prototype object's "constructor" property]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: existence and properties of interface prototype object's @@unscopables property]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute type]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute extractable]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute algorithm]
|
||||
expected: FAIL
|
||||
|
||||
[CryptoKey interface: attribute usages]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: existence and properties of interface object]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface object length]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface object name]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: existence and properties of interface prototype object]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: existence and properties of interface prototype object's "constructor" property]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: existence and properties of interface prototype object's @@unscopables property]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation encrypt(AlgorithmIdentifier, CryptoKey, BufferSource)]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -247,9 +115,6 @@
|
|||
[SubtleCrypto interface: operation digest(AlgorithmIdentifier, BufferSource)]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation generateKey(AlgorithmIdentifier, boolean, sequence<KeyUsage>)]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, sequence<KeyUsage>)]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -259,21 +124,12 @@
|
|||
[SubtleCrypto interface: operation importKey(KeyFormat, (BufferSource or JsonWebKey), AlgorithmIdentifier, boolean, sequence<KeyUsage>)]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation exportKey(KeyFormat, CryptoKey)]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier)]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: operation unwrapKey(KeyFormat, BufferSource, CryptoKey, AlgorithmIdentifier, AlgorithmIdentifier, boolean, sequence<KeyUsage>)]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto must be primary interface of crypto.subtle]
|
||||
expected: FAIL
|
||||
|
||||
[Stringification of crypto.subtle]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "encrypt(AlgorithmIdentifier, CryptoKey, BufferSource)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -304,12 +160,6 @@
|
|||
[SubtleCrypto interface: calling digest(AlgorithmIdentifier, BufferSource) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "generateKey(AlgorithmIdentifier, boolean, sequence<KeyUsage>)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: calling generateKey(AlgorithmIdentifier, boolean, sequence<KeyUsage>) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "deriveKey(AlgorithmIdentifier, CryptoKey, AlgorithmIdentifier, boolean, sequence<KeyUsage>)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -328,12 +178,6 @@
|
|||
[SubtleCrypto interface: calling importKey(KeyFormat, (BufferSource or JsonWebKey), AlgorithmIdentifier, boolean, sequence<KeyUsage>) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "exportKey(KeyFormat, CryptoKey)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: calling exportKey(KeyFormat, CryptoKey) on crypto.subtle with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
[SubtleCrypto interface: crypto.subtle must inherit property "wrapKey(KeyFormat, CryptoKey, CryptoKey, AlgorithmIdentifier)" with the proper type]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,6 +0,0 @@
|
|||
[crypto-subtle-secure-context-available.https.sub.html]
|
||||
[Secure context window has access to crypto.subtle]
|
||||
expected: FAIL
|
||||
|
||||
[Secure context worker has access to crypto.subtle]
|
||||
expected: FAIL
|
|
@ -1,8 +1,14 @@
|
|||
[wrapKey_unwrapKey.https.any.html]
|
||||
[setup]
|
||||
[Can wrap and unwrap AES-CBC keys using raw and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[wrapKey_unwrapKey.https.any.worker.html]
|
||||
[setup]
|
||||
[Can wrap and unwrap AES-CBC keys using raw and AES-CBC]
|
||||
expected: FAIL
|
||||
|
||||
[Can wrap and unwrap AES-CBC keys as non-extractable using raw and AES-CBC]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
[postMessage_CryptoKey_insecure.sub.html]
|
||||
expected: TIMEOUT
|
||||
[insecure context should not receive an object for secure contexts only]
|
||||
expected: TIMEOUT
|
||||
expected: FAIL
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue