OLD | NEW |
| (Empty) |
1 This is a testharness.js-based test. | |
2 Found 452 tests; 324 PASS, 128 FAIL, 0 TIMEOUT, 0 NOTRUN. | |
3 PASS Bad algorithm: generateKey(AES, false, [decrypt]) | |
4 PASS Bad algorithm: generateKey(AES, true, [decrypt]) | |
5 PASS Bad algorithm: generateKey(AES, RED, [decrypt]) | |
6 PASS Bad algorithm: generateKey(AES, 7, [decrypt]) | |
7 PASS Bad algorithm: generateKey(AES, false, [sign, decrypt]) | |
8 PASS Bad algorithm: generateKey(AES, true, [sign, decrypt]) | |
9 PASS Bad algorithm: generateKey(AES, RED, [sign, decrypt]) | |
10 PASS Bad algorithm: generateKey(AES, 7, [sign, decrypt]) | |
11 PASS Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt]) | |
12 PASS Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt]) | |
13 PASS Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt]) | |
14 PASS Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt]) | |
15 PASS Bad algorithm: generateKey(AES, false, [deriveBits, decrypt]) | |
16 PASS Bad algorithm: generateKey(AES, true, [deriveBits, decrypt]) | |
17 PASS Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt]) | |
18 PASS Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt]) | |
19 PASS Bad algorithm: generateKey(AES, false, [sign]) | |
20 PASS Bad algorithm: generateKey(AES, true, [sign]) | |
21 PASS Bad algorithm: generateKey(AES, RED, [sign]) | |
22 PASS Bad algorithm: generateKey(AES, 7, [sign]) | |
23 PASS Bad algorithm: generateKey(AES, false, [deriveBits, sign]) | |
24 PASS Bad algorithm: generateKey(AES, true, [deriveBits, sign]) | |
25 PASS Bad algorithm: generateKey(AES, RED, [deriveBits, sign]) | |
26 PASS Bad algorithm: generateKey(AES, 7, [deriveBits, sign]) | |
27 PASS Bad algorithm: generateKey(AES, false, [deriveBits]) | |
28 PASS Bad algorithm: generateKey(AES, true, [deriveBits]) | |
29 PASS Bad algorithm: generateKey(AES, RED, [deriveBits]) | |
30 PASS Bad algorithm: generateKey(AES, 7, [deriveBits]) | |
31 PASS Bad algorithm: generateKey(AES, false, []) | |
32 PASS Bad algorithm: generateKey(AES, true, []) | |
33 PASS Bad algorithm: generateKey(AES, RED, []) | |
34 PASS Bad algorithm: generateKey(AES, 7, []) | |
35 PASS Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt,
sign, deriveBits]) | |
36 PASS Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt,
sign, deriveBits]) | |
37 PASS Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, s
ign, deriveBits]) | |
38 PASS Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sig
n, deriveBits]) | |
39 PASS Bad algorithm: generateKey({name: AES}, false, [decrypt]) | |
40 PASS Bad algorithm: generateKey({name: AES}, true, [decrypt]) | |
41 PASS Bad algorithm: generateKey({name: AES}, RED, [decrypt]) | |
42 PASS Bad algorithm: generateKey({name: AES}, 7, [decrypt]) | |
43 PASS Bad algorithm: generateKey({name: AES}, false, [sign, decrypt]) | |
44 PASS Bad algorithm: generateKey({name: AES}, true, [sign, decrypt]) | |
45 PASS Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt]) | |
46 PASS Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt]) | |
47 PASS Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])
| |
48 PASS Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt]) | |
49 PASS Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt]) | |
50 PASS Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt]) | |
51 PASS Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt]) | |
52 PASS Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt]) | |
53 PASS Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt]) | |
54 PASS Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt]) | |
55 PASS Bad algorithm: generateKey({name: AES}, false, [sign]) | |
56 PASS Bad algorithm: generateKey({name: AES}, true, [sign]) | |
57 PASS Bad algorithm: generateKey({name: AES}, RED, [sign]) | |
58 PASS Bad algorithm: generateKey({name: AES}, 7, [sign]) | |
59 PASS Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign]) | |
60 PASS Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign]) | |
61 PASS Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign]) | |
62 PASS Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign]) | |
63 PASS Bad algorithm: generateKey({name: AES}, false, [deriveBits]) | |
64 PASS Bad algorithm: generateKey({name: AES}, true, [deriveBits]) | |
65 PASS Bad algorithm: generateKey({name: AES}, RED, [deriveBits]) | |
66 PASS Bad algorithm: generateKey({name: AES}, 7, [deriveBits]) | |
67 PASS Bad algorithm: generateKey({name: AES}, false, []) | |
68 PASS Bad algorithm: generateKey({name: AES}, true, []) | |
69 PASS Bad algorithm: generateKey({name: AES}, RED, []) | |
70 PASS Bad algorithm: generateKey({name: AES}, 7, []) | |
71 PASS Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits,
decrypt, sign, deriveBits]) | |
72 PASS Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, d
ecrypt, sign, deriveBits]) | |
73 PASS Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, de
crypt, sign, deriveBits]) | |
74 PASS Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decr
ypt, sign, deriveBits]) | |
75 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt]) | |
76 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt]) | |
77 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt]) | |
78 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt]) | |
79 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt]
) | |
80 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])
| |
81 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt]) | |
82 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt]) | |
83 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, si
gn, decrypt]) | |
84 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sig
n, decrypt]) | |
85 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign
, decrypt]) | |
86 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign,
decrypt]) | |
87 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, de
crypt]) | |
88 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, dec
rypt]) | |
89 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decr
ypt]) | |
90 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decryp
t]) | |
91 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [sign]) | |
92 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [sign]) | |
93 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign]) | |
94 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign]) | |
95 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, si
gn]) | |
96 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sig
n]) | |
97 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign
]) | |
98 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])
| |
99 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits]) | |
100 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits]) | |
101 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits]) | |
102 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits]) | |
103 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, []) | |
104 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, []) | |
105 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, []) | |
106 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, []) | |
107 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign,
deriveBits, decrypt, sign, deriveBits]) | |
108 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign,
deriveBits, decrypt, sign, deriveBits]) | |
109 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, d
eriveBits, decrypt, sign, deriveBits]) | |
110 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, der
iveBits, decrypt, sign, deriveBits]) | |
111 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])
| |
112 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt]) | |
113 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt]) | |
114 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt]) | |
115 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, dec
rypt]) | |
116 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decr
ypt]) | |
117 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decry
pt]) | |
118 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt
]) | |
119 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBit
s, sign, decrypt]) | |
120 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits
, sign, decrypt]) | |
121 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits,
sign, decrypt]) | |
122 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, s
ign, decrypt]) | |
123 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBit
s, decrypt]) | |
124 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits
, decrypt]) | |
125 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits,
decrypt]) | |
126 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, d
ecrypt]) | |
127 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign]) | |
128 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign]) | |
129 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign]) | |
130 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign]) | |
131 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBit
s, sign]) | |
132 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits
, sign]) | |
133 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits,
sign]) | |
134 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, s
ign]) | |
135 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBit
s]) | |
136 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits
]) | |
137 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits]
) | |
138 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits]) | |
139 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, []) | |
140 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, []) | |
141 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, []) | |
142 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, []) | |
143 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt,
sign, deriveBits, decrypt, sign, deriveBits]) | |
144 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, s
ign, deriveBits, decrypt, sign, deriveBits]) | |
145 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, si
gn, deriveBits, decrypt, sign, deriveBits]) | |
146 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign
, deriveBits, decrypt, sign, deriveBits]) | |
147 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt]) | |
148 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt]) | |
149 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt]) | |
150 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt]) | |
151 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decr
ypt]) | |
152 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decry
pt]) | |
153 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decryp
t]) | |
154 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt]
) | |
155 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits
, sign, decrypt]) | |
156 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits,
sign, decrypt]) | |
157 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits,
sign, decrypt]) | |
158 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, si
gn, decrypt]) | |
159 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits
, decrypt]) | |
160 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits,
decrypt]) | |
161 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits,
decrypt]) | |
162 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, de
crypt]) | |
163 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign]) | |
164 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign]) | |
165 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign]) | |
166 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign]) | |
167 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits
, sign]) | |
168 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits,
sign]) | |
169 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits,
sign]) | |
170 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, si
gn]) | |
171 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits
]) | |
172 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits]
) | |
173 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])
| |
174 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits]) | |
175 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, []) | |
176 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, []) | |
177 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, []) | |
178 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, []) | |
179 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, s
ign, deriveBits, decrypt, sign, deriveBits]) | |
180 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, si
gn, deriveBits, decrypt, sign, deriveBits]) | |
181 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sig
n, deriveBits, decrypt, sign, deriveBits]) | |
182 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign,
deriveBits, decrypt, sign, deriveBits]) | |
183 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt]) | |
184 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt]) | |
185 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt]) | |
186 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt]) | |
187 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])
| |
188 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt]) | |
189 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt]) | |
190 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt]) | |
191 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sig
n, decrypt]) | |
192 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign
, decrypt]) | |
193 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign,
decrypt]) | |
194 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, d
ecrypt]) | |
195 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, dec
rypt]) | |
196 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decr
ypt]) | |
197 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decry
pt]) | |
198 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt
]) | |
199 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign]) | |
200 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign]) | |
201 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign]) | |
202 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign]) | |
203 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sig
n]) | |
204 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign
]) | |
205 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign]
) | |
206 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign]) | |
207 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits]) | |
208 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits]) | |
209 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits]) | |
210 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits]) | |
211 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, []) | |
212 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, []) | |
213 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, []) | |
214 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, []) | |
215 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign,
deriveBits, decrypt, sign, deriveBits]) | |
216 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, d
eriveBits, decrypt, sign, deriveBits]) | |
217 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, de
riveBits, decrypt, sign, deriveBits]) | |
218 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deri
veBits, decrypt, sign, deriveBits]) | |
219 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | |
220 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | |
221 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | |
222 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | |
223 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | |
224 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | |
225 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | |
226 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | |
227 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | |
228 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | |
229 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | |
230 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | |
231 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | |
232 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | |
233 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | |
234 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | |
235 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | |
236 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | |
237 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | |
238 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | |
239 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | |
240 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | |
241 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | |
242 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | |
243 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | |
244 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | |
245 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | |
246 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | |
247 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | |
248 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | |
249 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | |
250 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | |
251 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt,
sign, deriveBits]) | |
252 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt,
sign, deriveBits]) | |
253 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, s
ign, deriveBits]) | |
254 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sig
n, deriveBits]) | |
255 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | |
256 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | |
257 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | |
258 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | |
259 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | |
260 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | |
261 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | |
262 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | |
263 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | |
264 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | |
265 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | |
266 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | |
267 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | |
268 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | |
269 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | |
270 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | |
271 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | |
272 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | |
273 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | |
274 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | |
275 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | |
276 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | |
277 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | |
278 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | |
279 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | |
280 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | |
281 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | |
282 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | |
283 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | |
284 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | |
285 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | |
286 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | |
287 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt,
sign, deriveBits]) | |
288 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt,
sign, deriveBits]) | |
289 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, s
ign, deriveBits]) | |
290 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sig
n, deriveBits]) | |
291 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt]) | |
292 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt]) | |
293 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt]) | |
294 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt]) | |
295 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decr
ypt]) | |
296 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decry
pt]) | |
297 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decryp
t]) | |
298 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt]
) | |
299 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits
, sign, decrypt]) | |
300 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits,
sign, decrypt]) | |
301 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits,
sign, decrypt]) | |
302 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, si
gn, decrypt]) | |
303 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits
, decrypt]) | |
304 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits,
decrypt]) | |
305 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits,
decrypt]) | |
306 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, de
crypt]) | |
307 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign]) | |
308 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign]) | |
309 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign]) | |
310 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign]) | |
311 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits
, sign]) | |
312 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits,
sign]) | |
313 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits,
sign]) | |
314 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, si
gn]) | |
315 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits
]) | |
316 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits]
) | |
317 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])
| |
318 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits]) | |
319 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, []) | |
320 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, []) | |
321 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, []) | |
322 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, []) | |
323 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, s
ign, deriveBits, decrypt, sign, deriveBits]) | |
324 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, si
gn, deriveBits, decrypt, sign, deriveBits]) | |
325 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sig
n, deriveBits, decrypt, sign, deriveBits]) | |
326 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign,
deriveBits, decrypt, sign, deriveBits]) | |
327 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [encr
ypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "No
tSupportedError" | |
328 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but g
ot "NotSupportedError" | |
329 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, sign, encrypt]) assert_equals: Bad usages not supported expected "SyntaxErro
r" but got "NotSupportedError" | |
330 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
331 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, verify, sign, verify, encrypt]) assert_equals: Bad usages not supported expect
ed "SyntaxError" but got "NotSupportedError" | |
332 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [decr
ypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "No
tSupportedError" | |
333 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but g
ot "NotSupportedError" | |
334 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, sign, decrypt]) assert_equals: Bad usages not supported expected "SyntaxErro
r" but got "NotSupportedError" | |
335 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
336 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, verify, sign, verify, decrypt]) assert_equals: Bad usages not supported expect
ed "SyntaxError" but got "NotSupportedError" | |
337 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [wrap
Key]) assert_equals: Bad usages not supported expected "SyntaxError" but got "No
tSupportedError" | |
338 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but g
ot "NotSupportedError" | |
339 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, sign, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxErro
r" but got "NotSupportedError" | |
340 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
341 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, verify, sign, verify, wrapKey]) assert_equals: Bad usages not supported expect
ed "SyntaxError" but got "NotSupportedError" | |
342 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [unwr
apKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
343 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
344 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, sign, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
345 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
346 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, verify, sign, verify, unwrapKey]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
347 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [deri
veKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
348 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
349 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, sign, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
350 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
351 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, verify, sign, verify, deriveKey]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
352 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [deri
veBits]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
353 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError" bu
t got "NotSupportedError" | |
354 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, sign, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxE
rror" but got "NotSupportedError" | |
355 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
356 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, verify, sign, verify, deriveBits]) assert_equals: Bad usages not supported exp
ected "SyntaxError" but got "NotSupportedError" | |
357 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [en
crypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
358 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
359 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, sign, encrypt]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
360 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
361 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, verify, sign, verify, encrypt]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
362 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [de
crypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
363 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
364 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, sign, decrypt]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
365 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
366 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, verify, sign, verify, decrypt]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
367 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [wr
apKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
368 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
369 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, sign, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
370 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
371 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, verify, sign, verify, wrapKey]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
372 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [un
wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
373 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
374 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, sign, unwrapKey]) assert_equals: Bad usages not supported expected "Syntax
Error" but got "NotSupportedError" | |
375 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
376 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, verify, sign, verify, unwrapKey]) assert_equals: Bad usages not supported ex
pected "SyntaxError" but got "NotSupportedError" | |
377 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [de
riveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
378 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
379 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, sign, deriveKey]) assert_equals: Bad usages not supported expected "Syntax
Error" but got "NotSupportedError" | |
380 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
381 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, verify, sign, verify, deriveKey]) assert_equals: Bad usages not supported ex
pected "SyntaxError" but got "NotSupportedError" | |
382 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [de
riveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but go
t "NotSupportedError" | |
383 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
384 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, sign, deriveBits]) assert_equals: Bad usages not supported expected "Synta
xError" but got "NotSupportedError" | |
385 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError
" but got "NotSupportedError" | |
386 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, verify, sign, verify, deriveBits]) assert_equals: Bad usages not supported e
xpected "SyntaxError" but got "NotSupportedError" | |
387 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [en
crypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
388 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
389 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, sign, encrypt]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
390 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
391 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, verify, sign, verify, encrypt]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
392 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [de
crypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
393 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
394 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, sign, decrypt]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
395 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
396 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, verify, sign, verify, decrypt]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
397 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [wr
apKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
398 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
399 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, sign, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
400 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
401 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, verify, sign, verify, wrapKey]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
402 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [un
wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
403 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
404 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, sign, unwrapKey]) assert_equals: Bad usages not supported expected "Syntax
Error" but got "NotSupportedError" | |
405 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
406 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, verify, sign, verify, unwrapKey]) assert_equals: Bad usages not supported ex
pected "SyntaxError" but got "NotSupportedError" | |
407 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [de
riveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
408 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
409 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, sign, deriveKey]) assert_equals: Bad usages not supported expected "Syntax
Error" but got "NotSupportedError" | |
410 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
411 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, verify, sign, verify, deriveKey]) assert_equals: Bad usages not supported ex
pected "SyntaxError" but got "NotSupportedError" | |
412 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [de
riveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but go
t "NotSupportedError" | |
413 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
414 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, sign, deriveBits]) assert_equals: Bad usages not supported expected "Synta
xError" but got "NotSupportedError" | |
415 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError
" but got "NotSupportedError" | |
416 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, verify, sign, verify, deriveBits]) assert_equals: Bad usages not supported e
xpected "SyntaxError" but got "NotSupportedError" | |
417 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [en
crypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
418 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
419 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, sign, encrypt]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
420 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
421 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, verify, sign, verify, encrypt]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
422 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [de
crypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
423 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
424 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, sign, decrypt]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
425 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
426 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, verify, sign, verify, decrypt]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
427 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [wr
apKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
428 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
429 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, sign, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
430 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
431 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, verify, sign, verify, wrapKey]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
432 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [un
wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
433 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
434 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, sign, unwrapKey]) assert_equals: Bad usages not supported expected "Syntax
Error" but got "NotSupportedError" | |
435 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
436 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, verify, sign, verify, unwrapKey]) assert_equals: Bad usages not supported ex
pected "SyntaxError" but got "NotSupportedError" | |
437 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [de
riveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
438 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
439 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, sign, deriveKey]) assert_equals: Bad usages not supported expected "Syntax
Error" but got "NotSupportedError" | |
440 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
441 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, verify, sign, verify, deriveKey]) assert_equals: Bad usages not supported ex
pected "SyntaxError" but got "NotSupportedError" | |
442 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [de
riveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but go
t "NotSupportedError" | |
443 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
444 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, sign, deriveBits]) assert_equals: Bad usages not supported expected "Synta
xError" but got "NotSupportedError" | |
445 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError
" but got "NotSupportedError" | |
446 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, verify, sign, verify, deriveBits]) assert_equals: Bad usages not supported e
xpected "SyntaxError" but got "NotSupportedError" | |
447 FAIL Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, []
) assert_equals: Empty usages not supported expected "SyntaxError" but got "NotS
upportedError" | |
448 FAIL Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [])
assert_equals: Empty usages not supported expected "SyntaxError" but got "NotSu
pportedError" | |
449 FAIL Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, false,
[]) assert_equals: Empty usages not supported expected "SyntaxError" but got "No
tSupportedError" | |
450 FAIL Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [
]) assert_equals: Empty usages not supported expected "SyntaxError" but got "Not
SupportedError" | |
451 FAIL Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, false,
[]) assert_equals: Empty usages not supported expected "SyntaxError" but got "No
tSupportedError" | |
452 FAIL Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [
]) assert_equals: Empty usages not supported expected "SyntaxError" but got "Not
SupportedError" | |
453 FAIL Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, false,
[]) assert_equals: Empty usages not supported expected "SyntaxError" but got "No
tSupportedError" | |
454 FAIL Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [
]) assert_equals: Empty usages not supported expected "SyntaxError" but got "Not
SupportedError" | |
455 Harness: the test ran to completion. | |
456 | |
OLD | NEW |