OLD | NEW |
| (Empty) |
1 This is a testharness.js-based test. | |
2 Found 392 tests; 324 PASS, 68 FAIL, 0 TIMEOUT, 0 NOTRUN. | |
3 PASS Bad algorithm: generateKey(AES, false, [decrypt]) | |
4 PASS Bad algorithm: generateKey(AES, true, [decrypt]) | |
5 PASS Bad algorithm: generateKey(AES, RED, [decrypt]) | |
6 PASS Bad algorithm: generateKey(AES, 7, [decrypt]) | |
7 PASS Bad algorithm: generateKey(AES, false, [sign, decrypt]) | |
8 PASS Bad algorithm: generateKey(AES, true, [sign, decrypt]) | |
9 PASS Bad algorithm: generateKey(AES, RED, [sign, decrypt]) | |
10 PASS Bad algorithm: generateKey(AES, 7, [sign, decrypt]) | |
11 PASS Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt]) | |
12 PASS Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt]) | |
13 PASS Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt]) | |
14 PASS Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt]) | |
15 PASS Bad algorithm: generateKey(AES, false, [deriveBits, decrypt]) | |
16 PASS Bad algorithm: generateKey(AES, true, [deriveBits, decrypt]) | |
17 PASS Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt]) | |
18 PASS Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt]) | |
19 PASS Bad algorithm: generateKey(AES, false, [sign]) | |
20 PASS Bad algorithm: generateKey(AES, true, [sign]) | |
21 PASS Bad algorithm: generateKey(AES, RED, [sign]) | |
22 PASS Bad algorithm: generateKey(AES, 7, [sign]) | |
23 PASS Bad algorithm: generateKey(AES, false, [deriveBits, sign]) | |
24 PASS Bad algorithm: generateKey(AES, true, [deriveBits, sign]) | |
25 PASS Bad algorithm: generateKey(AES, RED, [deriveBits, sign]) | |
26 PASS Bad algorithm: generateKey(AES, 7, [deriveBits, sign]) | |
27 PASS Bad algorithm: generateKey(AES, false, [deriveBits]) | |
28 PASS Bad algorithm: generateKey(AES, true, [deriveBits]) | |
29 PASS Bad algorithm: generateKey(AES, RED, [deriveBits]) | |
30 PASS Bad algorithm: generateKey(AES, 7, [deriveBits]) | |
31 PASS Bad algorithm: generateKey(AES, false, []) | |
32 PASS Bad algorithm: generateKey(AES, true, []) | |
33 PASS Bad algorithm: generateKey(AES, RED, []) | |
34 PASS Bad algorithm: generateKey(AES, 7, []) | |
35 PASS Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt,
sign, deriveBits]) | |
36 PASS Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt,
sign, deriveBits]) | |
37 PASS Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, s
ign, deriveBits]) | |
38 PASS Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sig
n, deriveBits]) | |
39 PASS Bad algorithm: generateKey({name: AES}, false, [decrypt]) | |
40 PASS Bad algorithm: generateKey({name: AES}, true, [decrypt]) | |
41 PASS Bad algorithm: generateKey({name: AES}, RED, [decrypt]) | |
42 PASS Bad algorithm: generateKey({name: AES}, 7, [decrypt]) | |
43 PASS Bad algorithm: generateKey({name: AES}, false, [sign, decrypt]) | |
44 PASS Bad algorithm: generateKey({name: AES}, true, [sign, decrypt]) | |
45 PASS Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt]) | |
46 PASS Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt]) | |
47 PASS Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])
| |
48 PASS Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt]) | |
49 PASS Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt]) | |
50 PASS Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt]) | |
51 PASS Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt]) | |
52 PASS Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt]) | |
53 PASS Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt]) | |
54 PASS Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt]) | |
55 PASS Bad algorithm: generateKey({name: AES}, false, [sign]) | |
56 PASS Bad algorithm: generateKey({name: AES}, true, [sign]) | |
57 PASS Bad algorithm: generateKey({name: AES}, RED, [sign]) | |
58 PASS Bad algorithm: generateKey({name: AES}, 7, [sign]) | |
59 PASS Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign]) | |
60 PASS Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign]) | |
61 PASS Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign]) | |
62 PASS Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign]) | |
63 PASS Bad algorithm: generateKey({name: AES}, false, [deriveBits]) | |
64 PASS Bad algorithm: generateKey({name: AES}, true, [deriveBits]) | |
65 PASS Bad algorithm: generateKey({name: AES}, RED, [deriveBits]) | |
66 PASS Bad algorithm: generateKey({name: AES}, 7, [deriveBits]) | |
67 PASS Bad algorithm: generateKey({name: AES}, false, []) | |
68 PASS Bad algorithm: generateKey({name: AES}, true, []) | |
69 PASS Bad algorithm: generateKey({name: AES}, RED, []) | |
70 PASS Bad algorithm: generateKey({name: AES}, 7, []) | |
71 PASS Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits,
decrypt, sign, deriveBits]) | |
72 PASS Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, d
ecrypt, sign, deriveBits]) | |
73 PASS Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, de
crypt, sign, deriveBits]) | |
74 PASS Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decr
ypt, sign, deriveBits]) | |
75 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt]) | |
76 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt]) | |
77 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt]) | |
78 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt]) | |
79 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt]
) | |
80 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])
| |
81 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt]) | |
82 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt]) | |
83 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, si
gn, decrypt]) | |
84 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sig
n, decrypt]) | |
85 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign
, decrypt]) | |
86 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign,
decrypt]) | |
87 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, de
crypt]) | |
88 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, dec
rypt]) | |
89 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decr
ypt]) | |
90 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decryp
t]) | |
91 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [sign]) | |
92 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [sign]) | |
93 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign]) | |
94 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign]) | |
95 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, si
gn]) | |
96 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sig
n]) | |
97 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign
]) | |
98 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])
| |
99 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits]) | |
100 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits]) | |
101 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits]) | |
102 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits]) | |
103 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, []) | |
104 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, []) | |
105 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, []) | |
106 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, []) | |
107 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign,
deriveBits, decrypt, sign, deriveBits]) | |
108 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign,
deriveBits, decrypt, sign, deriveBits]) | |
109 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, d
eriveBits, decrypt, sign, deriveBits]) | |
110 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, der
iveBits, decrypt, sign, deriveBits]) | |
111 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])
| |
112 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt]) | |
113 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt]) | |
114 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt]) | |
115 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, dec
rypt]) | |
116 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decr
ypt]) | |
117 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decry
pt]) | |
118 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt
]) | |
119 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBit
s, sign, decrypt]) | |
120 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits
, sign, decrypt]) | |
121 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits,
sign, decrypt]) | |
122 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, s
ign, decrypt]) | |
123 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBit
s, decrypt]) | |
124 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits
, decrypt]) | |
125 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits,
decrypt]) | |
126 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, d
ecrypt]) | |
127 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign]) | |
128 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign]) | |
129 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign]) | |
130 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign]) | |
131 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBit
s, sign]) | |
132 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits
, sign]) | |
133 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits,
sign]) | |
134 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, s
ign]) | |
135 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBit
s]) | |
136 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits
]) | |
137 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits]
) | |
138 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits]) | |
139 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, []) | |
140 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, []) | |
141 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, []) | |
142 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, []) | |
143 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt,
sign, deriveBits, decrypt, sign, deriveBits]) | |
144 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, s
ign, deriveBits, decrypt, sign, deriveBits]) | |
145 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, si
gn, deriveBits, decrypt, sign, deriveBits]) | |
146 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign
, deriveBits, decrypt, sign, deriveBits]) | |
147 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt]) | |
148 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt]) | |
149 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt]) | |
150 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt]) | |
151 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decr
ypt]) | |
152 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decry
pt]) | |
153 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decryp
t]) | |
154 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt]
) | |
155 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits
, sign, decrypt]) | |
156 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits,
sign, decrypt]) | |
157 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits,
sign, decrypt]) | |
158 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, si
gn, decrypt]) | |
159 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits
, decrypt]) | |
160 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits,
decrypt]) | |
161 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits,
decrypt]) | |
162 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, de
crypt]) | |
163 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign]) | |
164 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign]) | |
165 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign]) | |
166 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign]) | |
167 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits
, sign]) | |
168 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits,
sign]) | |
169 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits,
sign]) | |
170 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, si
gn]) | |
171 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits
]) | |
172 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits]
) | |
173 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])
| |
174 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits]) | |
175 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, []) | |
176 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, []) | |
177 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, []) | |
178 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, []) | |
179 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, s
ign, deriveBits, decrypt, sign, deriveBits]) | |
180 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, si
gn, deriveBits, decrypt, sign, deriveBits]) | |
181 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sig
n, deriveBits, decrypt, sign, deriveBits]) | |
182 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign,
deriveBits, decrypt, sign, deriveBits]) | |
183 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt]) | |
184 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt]) | |
185 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt]) | |
186 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt]) | |
187 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])
| |
188 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt]) | |
189 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt]) | |
190 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt]) | |
191 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sig
n, decrypt]) | |
192 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign
, decrypt]) | |
193 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign,
decrypt]) | |
194 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, d
ecrypt]) | |
195 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, dec
rypt]) | |
196 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decr
ypt]) | |
197 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decry
pt]) | |
198 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt
]) | |
199 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign]) | |
200 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign]) | |
201 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign]) | |
202 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign]) | |
203 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sig
n]) | |
204 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign
]) | |
205 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign]
) | |
206 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign]) | |
207 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits]) | |
208 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits]) | |
209 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits]) | |
210 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits]) | |
211 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, []) | |
212 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, []) | |
213 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, []) | |
214 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, []) | |
215 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign,
deriveBits, decrypt, sign, deriveBits]) | |
216 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, d
eriveBits, decrypt, sign, deriveBits]) | |
217 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, de
riveBits, decrypt, sign, deriveBits]) | |
218 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deri
veBits, decrypt, sign, deriveBits]) | |
219 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | |
220 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | |
221 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | |
222 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | |
223 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | |
224 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | |
225 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | |
226 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | |
227 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | |
228 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | |
229 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | |
230 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | |
231 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | |
232 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | |
233 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | |
234 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | |
235 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | |
236 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | |
237 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | |
238 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | |
239 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | |
240 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | |
241 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | |
242 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | |
243 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | |
244 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | |
245 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | |
246 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | |
247 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | |
248 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | |
249 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | |
250 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | |
251 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt,
sign, deriveBits]) | |
252 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt,
sign, deriveBits]) | |
253 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, s
ign, deriveBits]) | |
254 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sig
n, deriveBits]) | |
255 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | |
256 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | |
257 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | |
258 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | |
259 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | |
260 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | |
261 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | |
262 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | |
263 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | |
264 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | |
265 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | |
266 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | |
267 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | |
268 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | |
269 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | |
270 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | |
271 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | |
272 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | |
273 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | |
274 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | |
275 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | |
276 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | |
277 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | |
278 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | |
279 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | |
280 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | |
281 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | |
282 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | |
283 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | |
284 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | |
285 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | |
286 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | |
287 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt,
sign, deriveBits]) | |
288 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt,
sign, deriveBits]) | |
289 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, s
ign, deriveBits]) | |
290 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sig
n, deriveBits]) | |
291 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt]) | |
292 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt]) | |
293 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt]) | |
294 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt]) | |
295 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decr
ypt]) | |
296 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decry
pt]) | |
297 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decryp
t]) | |
298 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt]
) | |
299 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits
, sign, decrypt]) | |
300 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits,
sign, decrypt]) | |
301 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits,
sign, decrypt]) | |
302 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, si
gn, decrypt]) | |
303 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits
, decrypt]) | |
304 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits,
decrypt]) | |
305 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits,
decrypt]) | |
306 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, de
crypt]) | |
307 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign]) | |
308 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign]) | |
309 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign]) | |
310 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign]) | |
311 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits
, sign]) | |
312 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits,
sign]) | |
313 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits,
sign]) | |
314 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, si
gn]) | |
315 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits
]) | |
316 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits]
) | |
317 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])
| |
318 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits]) | |
319 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, []) | |
320 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, []) | |
321 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, []) | |
322 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, []) | |
323 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, s
ign, deriveBits, decrypt, sign, deriveBits]) | |
324 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, si
gn, deriveBits, decrypt, sign, deriveBits]) | |
325 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sig
n, deriveBits, decrypt, sign, deriveBits]) | |
326 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign,
deriveBits, decrypt, sign, deriveBits]) | |
327 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt]) assert_equals: Bad usages n
ot supported expected "SyntaxError" but got "NotSupportedError" | |
328 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt]) assert_equals: Bad us
ages not supported expected "SyntaxError" but got "NotSupportedError" | |
329 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt]) assert_equals
: Bad usages not supported expected "SyntaxError" but got "NotSupportedError" | |
330 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, enc
rypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "N
otSupportedError" | |
331 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) assert_equals: Bad usages n
ot supported expected "SyntaxError" but got "NotSupportedError" | |
332 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) assert_equals: Bad us
ages not supported expected "SyntaxError" but got "NotSupportedError" | |
333 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt]) assert_equals
: Bad usages not supported expected "SyntaxError" but got "NotSupportedError" | |
334 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, dec
rypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "N
otSupportedError" | |
335 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey]) assert_equals: Bad usages n
ot supported expected "SyntaxError" but got "NotSupportedError" | |
336 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey]) assert_equals: Bad us
ages not supported expected "SyntaxError" but got "NotSupportedError" | |
337 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey]) assert_equals
: Bad usages not supported expected "SyntaxError" but got "NotSupportedError" | |
338 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wra
pKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "N
otSupportedError" | |
339 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey]) assert_equals: Bad usages
not supported expected "SyntaxError" but got "NotSupportedError" | |
340 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey]) assert_equals: Bad
usages not supported expected "SyntaxError" but got "NotSupportedError" | |
341 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey]) assert_equa
ls: Bad usages not supported expected "SyntaxError" but got "NotSupportedError" | |
342 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unw
rapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
343 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey]) assert_equals: Bad usages
not supported expected "SyntaxError" but got "NotSupportedError" | |
344 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey]) assert_equals: Bad
usages not supported expected "SyntaxError" but got "NotSupportedError" | |
345 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey]) assert_equa
ls: Bad usages not supported expected "SyntaxError" but got "NotSupportedError" | |
346 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, der
iveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
347 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) assert_equals: Bad usage
s not supported expected "SyntaxError" but got "NotSupportedError" | |
348 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits]) assert_equals: Bad
usages not supported expected "SyntaxError" but got "NotSupportedError" | |
349 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits]) assert_equ
als: Bad usages not supported expected "SyntaxError" but got "NotSupportedError" | |
350 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p
ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, der
iveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
351 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt]) assert_equals: Bad usages
not supported expected "SyntaxError" but got "NotSupportedError" | |
352 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt]) assert_equals: Bad
usages not supported expected "SyntaxError" but got "NotSupportedError" | |
353 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt]) assert_equa
ls: Bad usages not supported expected "SyntaxError" but got "NotSupportedError" | |
354 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, e
ncrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
355 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) assert_equals: Bad usages
not supported expected "SyntaxError" but got "NotSupportedError" | |
356 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) assert_equals: Bad
usages not supported expected "SyntaxError" but got "NotSupportedError" | |
357 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt]) assert_equa
ls: Bad usages not supported expected "SyntaxError" but got "NotSupportedError" | |
358 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, d
ecrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
359 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey]) assert_equals: Bad usages
not supported expected "SyntaxError" but got "NotSupportedError" | |
360 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey]) assert_equals: Bad
usages not supported expected "SyntaxError" but got "NotSupportedError" | |
361 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey]) assert_equa
ls: Bad usages not supported expected "SyntaxError" but got "NotSupportedError" | |
362 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, w
rapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
363 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey]) assert_equals: Bad usag
es not supported expected "SyntaxError" but got "NotSupportedError" | |
364 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey]) assert_equals: Ba
d usages not supported expected "SyntaxError" but got "NotSupportedError" | |
365 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey]) assert_eq
uals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError
" | |
366 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, u
nwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but go
t "NotSupportedError" | |
367 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey]) assert_equals: Bad usag
es not supported expected "SyntaxError" but got "NotSupportedError" | |
368 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey]) assert_equals: Ba
d usages not supported expected "SyntaxError" but got "NotSupportedError" | |
369 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey]) assert_eq
uals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError
" | |
370 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, d
eriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but go
t "NotSupportedError" | |
371 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) assert_equals: Bad usa
ges not supported expected "SyntaxError" but got "NotSupportedError" | |
372 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits]) assert_equals: B
ad usages not supported expected "SyntaxError" but got "NotSupportedError" | |
373 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits]) assert_e
quals: Bad usages not supported expected "SyntaxError" but got "NotSupportedErro
r" | |
374 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, d
eriveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but g
ot "NotSupportedError" | |
375 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na
me: RSA-PSS, publicExponent: {0: 1}}, false, [sign]) assert_equals: Bad algorith
m property not supported expected "OperationError" but got "NotSupportedError" | |
376 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na
me: RSA-PSS, publicExponent: {0: 1}}, true, [sign]) assert_equals: Bad algorithm
property not supported expected "OperationError" but got "NotSupportedError" | |
377 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na
me: RSA-PSS, publicExponent: {0: 1}}, false, [verify, sign]) assert_equals: Bad
algorithm property not supported expected "OperationError" but got "NotSupported
Error" | |
378 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na
me: RSA-PSS, publicExponent: {0: 1}}, true, [verify, sign]) assert_equals: Bad a
lgorithm property not supported expected "OperationError" but got "NotSupportedE
rror" | |
379 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na
me: RSA-PSS, publicExponent: {0: 1}}, false, []) assert_equals: Bad algorithm pr
operty not supported expected "OperationError" but got "NotSupportedError" | |
380 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na
me: RSA-PSS, publicExponent: {0: 1}}, true, []) assert_equals: Bad algorithm pro
perty not supported expected "OperationError" but got "NotSupportedError" | |
381 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na
me: RSA-PSS, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify])
assert_equals: Bad algorithm property not supported expected "OperationError" b
ut got "NotSupportedError" | |
382 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na
me: RSA-PSS, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify])
assert_equals: Bad algorithm property not supported expected "OperationError" bu
t got "NotSupportedError" | |
383 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na
me: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign]) assert_equals:
Bad algorithm property not supported expected "OperationError" but got "NotSuppo
rtedError" | |
384 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na
me: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign]) assert_equals: B
ad algorithm property not supported expected "OperationError" but got "NotSuppor
tedError" | |
385 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na
me: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign]) assert_
equals: Bad algorithm property not supported expected "OperationError" but got "
NotSupportedError" | |
386 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na
me: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign]) assert_e
quals: Bad algorithm property not supported expected "OperationError" but got "N
otSupportedError" | |
387 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na
me: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, []) assert_equals: Bad
algorithm property not supported expected "OperationError" but got "NotSupported
Error" | |
388 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na
me: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, []) assert_equals: Bad a
lgorithm property not supported expected "OperationError" but got "NotSupportedE
rror" | |
389 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na
me: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, si
gn, verify]) assert_equals: Bad algorithm property not supported expected "Opera
tionError" but got "NotSupportedError" | |
390 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na
me: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sig
n, verify]) assert_equals: Bad algorithm property not supported expected "Operat
ionError" but got "NotSupportedError" | |
391 FAIL Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) assert_equals: Empty usages not
supported expected "SyntaxError" but got "NotSupportedError" | |
392 FAIL Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) assert_equals: Empty usages not
supported expected "SyntaxError" but got "NotSupportedError" | |
393 FAIL Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PS
S, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) assert_equals: Empty usages n
ot supported expected "SyntaxError" but got "NotSupportedError" | |
394 FAIL Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PS
S, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) assert_equals: Empty usages no
t supported expected "SyntaxError" but got "NotSupportedError" | |
395 Harness: the test ran to completion. | |
396 | |
OLD | NEW |