mirror of
https://github.com/servo/servo.git
synced 2025-08-10 07:55:33 +01:00
crypto: Begin SubtleCrypto implementation (#33628)
* Update IDLs and Bindings conf Signed-off-by: Daniel Adams <msub2official@gmail.com> * Add AES crate Signed-off-by: Daniel Adams <msub2official@gmail.com> * Implement DOM interfaces Signed-off-by: Daniel Adams <msub2official@gmail.com> * IDL tidy Signed-off-by: Daniel Adams <msub2official@gmail.com> * Remove deriveKey from inRealms for now until implemented Signed-off-by: Daniel Adams <msub2official@gmail.com> * Fix CryptoKey rustdoc comments Signed-off-by: Daniel Adams <msub2official@gmail.com> * Move string constants to top of file Signed-off-by: Daniel Adams <msub2official@gmail.com> * Use properly rooted CryptoKey Signed-off-by: Daniel Adams <msub2official@gmail.com> * Code clarity Signed-off-by: Daniel Adams <msub2official@gmail.com> * Rework NormalizedAlgorithm to not hold a DOMString Signed-off-by: Daniel Adams <msub2official@gmail.com> * Add Rustdoc for CryptoKey interface Signed-off-by: Daniel Adams <msub2official@gmail.com> * Move ignore mallocsizeof to rand crate, remove from crypto Signed-off-by: Daniel Adams <msub2official@gmail.com> * Update cargo lock Signed-off-by: Daniel Adams <msub2official@gmail.com> * Fix key handling, implement exportKey with JWK TODO Signed-off-by: Daniel Adams <msub2official@gmail.com> * Add missing spec link Signed-off-by: Daniel Adams <msub2official@gmail.com> * Use create_buffer_source, remove aes dep from libservo Signed-off-by: Daniel Adams <msub2official@gmail.com> * Fix crash when running in worker Signed-off-by: Daniel Adams <msub2official@gmail.com> * Update expectations Signed-off-by: Daniel Adams <msub2official@gmail.com> * fmt Signed-off-by: Daniel Adams <msub2official@gmail.com> * Move CryptoKey and SubtleCrypto behind pref for now Signed-off-by: Daniel Adams <msub2official@gmail.com> * Update expectations Signed-off-by: Daniel Adams <msub2official@gmail.com> * Readd timeout expectation Signed-off-by: Daniel Adams <msub2official@gmail.com> --------- Signed-off-by: Daniel Adams <msub2official@gmail.com>
This commit is contained in:
parent
66bc430b24
commit
fc0d4d8157
82 changed files with 39536 additions and 557 deletions
|
@ -1,5 +0,0 @@
|
|||
[failures_AES-CBC.https.any.worker.html]
|
||||
expected: ERROR
|
||||
|
||||
[failures_AES-CBC.https.any.html]
|
||||
expected: ERROR
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -1,5 +1,938 @@
|
|||
[failures_AES-KW.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 128, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 128, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 192, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 192, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 256, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 256, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_AES-KW.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 128, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 128, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 192, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 192, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 256, name: AES-KW}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({length: 256, name: AES-KW}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,578 @@
|
|||
[failures_ECDH.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-256}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-384}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_ECDH.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-256}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-384}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,470 @@
|
|||
[failures_ECDSA.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_ECDSA.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,158 @@
|
|||
[failures_Ed25519.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_Ed25519.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,158 @@
|
|||
[failures_Ed448.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: Ed448}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_Ed448.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: Ed448}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: Ed448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -1,5 +1,410 @@
|
|||
[failures_RSA-PSS.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_RSA-PSS.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,410 @@
|
|||
[failures_RSASSA-PKCS1-v1_5.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_RSASSA-PKCS1-v1_5.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,194 @@
|
|||
[failures_X25519.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: X25519}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_X25519.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: X25519}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X25519}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X25519}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,194 @@
|
|||
[failures_X448.https.any.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: X448}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[failures_X448.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Bad usages: generateKey({name: X448}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X448}, false, [\])]
|
||||
expected: FAIL
|
||||
|
||||
[Empty usages: generateKey({name: X448}, true, [\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,866 @@
|
|||
[successes_AES-CBC.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_AES-CBC.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, encrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, decrypt\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-cbc}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -1,5 +1,434 @@
|
|||
[successes_AES-KW.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_AES-KW.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 128, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 192, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey, wrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({length: 256, name: Aes-kw}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,434 @@
|
|||
[successes_ECDH.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_ECDH.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdh, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,326 @@
|
|||
[successes_ECDSA.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_ECDSA.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-256}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-384}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ecdsa, namedCurve: P-521}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,110 @@
|
|||
[successes_Ed25519.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ED25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_Ed25519.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ED25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,110 @@
|
|||
[successes_Ed448.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ED448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_Ed448.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: ED448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
|
File diff suppressed because it is too large
Load diff
File diff suppressed because it is too large
Load diff
|
@ -1,23 +1,230 @@
|
|||
[successes_RSA-PSS.https.any.worker.html?21-30]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.html?31-last]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.worker.html?31-last]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.html?1-10]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.html?21-30]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.html?11-20]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.worker.html?11-20]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSA-PSS.https.any.worker.html?1-10]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,23 +1,230 @@
|
|||
[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?11-20]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?1-10]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.html?1-10]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?31-last]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.html?11-20]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-V1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.html?31-last]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?21-30]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_RSASSA-PKCS1-v1_5.https.any.html?21-30]
|
||||
expected: ERROR
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,98 @@
|
|||
[successes_X25519.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: X25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_X25519.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: X25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
|
|
@ -1,5 +1,98 @@
|
|||
[successes_X448.https.any.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: X448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
|
||||
[successes_X448.https.any.worker.html]
|
||||
expected: ERROR
|
||||
[Success: generateKey({name: X448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
||||
[Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
|
||||
expected: FAIL
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue