Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(153)

Side by Side Diff: third_party/WebKit/LayoutTests/external/wpt/WebCryptoAPI/generateKey/test_failures_RSA-PSS-expected.txt

Issue 2838603002: Added [SecureContext] to the subtle attribute (Closed)
Patch Set: Added https version of idlharness test Created 3 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 This is a testharness.js-based test.
2 Found 392 tests; 324 PASS, 68 FAIL, 0 TIMEOUT, 0 NOTRUN.
3 PASS Bad algorithm: generateKey(AES, false, [decrypt])
4 PASS Bad algorithm: generateKey(AES, true, [decrypt])
5 PASS Bad algorithm: generateKey(AES, RED, [decrypt])
6 PASS Bad algorithm: generateKey(AES, 7, [decrypt])
7 PASS Bad algorithm: generateKey(AES, false, [sign, decrypt])
8 PASS Bad algorithm: generateKey(AES, true, [sign, decrypt])
9 PASS Bad algorithm: generateKey(AES, RED, [sign, decrypt])
10 PASS Bad algorithm: generateKey(AES, 7, [sign, decrypt])
11 PASS Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt])
12 PASS Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt])
13 PASS Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt])
14 PASS Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt])
15 PASS Bad algorithm: generateKey(AES, false, [deriveBits, decrypt])
16 PASS Bad algorithm: generateKey(AES, true, [deriveBits, decrypt])
17 PASS Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt])
18 PASS Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt])
19 PASS Bad algorithm: generateKey(AES, false, [sign])
20 PASS Bad algorithm: generateKey(AES, true, [sign])
21 PASS Bad algorithm: generateKey(AES, RED, [sign])
22 PASS Bad algorithm: generateKey(AES, 7, [sign])
23 PASS Bad algorithm: generateKey(AES, false, [deriveBits, sign])
24 PASS Bad algorithm: generateKey(AES, true, [deriveBits, sign])
25 PASS Bad algorithm: generateKey(AES, RED, [deriveBits, sign])
26 PASS Bad algorithm: generateKey(AES, 7, [deriveBits, sign])
27 PASS Bad algorithm: generateKey(AES, false, [deriveBits])
28 PASS Bad algorithm: generateKey(AES, true, [deriveBits])
29 PASS Bad algorithm: generateKey(AES, RED, [deriveBits])
30 PASS Bad algorithm: generateKey(AES, 7, [deriveBits])
31 PASS Bad algorithm: generateKey(AES, false, [])
32 PASS Bad algorithm: generateKey(AES, true, [])
33 PASS Bad algorithm: generateKey(AES, RED, [])
34 PASS Bad algorithm: generateKey(AES, 7, [])
35 PASS Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
36 PASS Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
37 PASS Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, s ign, deriveBits])
38 PASS Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sig n, deriveBits])
39 PASS Bad algorithm: generateKey({name: AES}, false, [decrypt])
40 PASS Bad algorithm: generateKey({name: AES}, true, [decrypt])
41 PASS Bad algorithm: generateKey({name: AES}, RED, [decrypt])
42 PASS Bad algorithm: generateKey({name: AES}, 7, [decrypt])
43 PASS Bad algorithm: generateKey({name: AES}, false, [sign, decrypt])
44 PASS Bad algorithm: generateKey({name: AES}, true, [sign, decrypt])
45 PASS Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt])
46 PASS Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt])
47 PASS Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])
48 PASS Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt])
49 PASS Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt])
50 PASS Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt])
51 PASS Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt])
52 PASS Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt])
53 PASS Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt])
54 PASS Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt])
55 PASS Bad algorithm: generateKey({name: AES}, false, [sign])
56 PASS Bad algorithm: generateKey({name: AES}, true, [sign])
57 PASS Bad algorithm: generateKey({name: AES}, RED, [sign])
58 PASS Bad algorithm: generateKey({name: AES}, 7, [sign])
59 PASS Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign])
60 PASS Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign])
61 PASS Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign])
62 PASS Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign])
63 PASS Bad algorithm: generateKey({name: AES}, false, [deriveBits])
64 PASS Bad algorithm: generateKey({name: AES}, true, [deriveBits])
65 PASS Bad algorithm: generateKey({name: AES}, RED, [deriveBits])
66 PASS Bad algorithm: generateKey({name: AES}, 7, [deriveBits])
67 PASS Bad algorithm: generateKey({name: AES}, false, [])
68 PASS Bad algorithm: generateKey({name: AES}, true, [])
69 PASS Bad algorithm: generateKey({name: AES}, RED, [])
70 PASS Bad algorithm: generateKey({name: AES}, 7, [])
71 PASS Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
72 PASS Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, d ecrypt, sign, deriveBits])
73 PASS Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, de crypt, sign, deriveBits])
74 PASS Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decr ypt, sign, deriveBits])
75 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt])
76 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt])
77 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt])
78 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt])
79 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt] )
80 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])
81 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt])
82 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt])
83 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, si gn, decrypt])
84 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sig n, decrypt])
85 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign , decrypt])
86 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt])
87 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, de crypt])
88 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, dec rypt])
89 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decr ypt])
90 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decryp t])
91 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [sign])
92 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [sign])
93 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign])
94 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign])
95 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, si gn])
96 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sig n])
97 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign ])
98 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])
99 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits])
100 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits])
101 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits])
102 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits])
103 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [])
104 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [])
105 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [])
106 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [])
107 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
108 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
109 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, d eriveBits, decrypt, sign, deriveBits])
110 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, der iveBits, decrypt, sign, deriveBits])
111 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])
112 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt])
113 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt])
114 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt])
115 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, dec rypt])
116 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decr ypt])
117 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decry pt])
118 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt ])
119 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBit s, sign, decrypt])
120 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits , sign, decrypt])
121 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt])
122 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, s ign, decrypt])
123 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBit s, decrypt])
124 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits , decrypt])
125 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt])
126 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, d ecrypt])
127 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign])
128 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign])
129 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign])
130 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign])
131 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBit s, sign])
132 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits , sign])
133 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign])
134 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, s ign])
135 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBit s])
136 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits ])
137 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits] )
138 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits])
139 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [])
140 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [])
141 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [])
142 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [])
143 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
144 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, s ign, deriveBits, decrypt, sign, deriveBits])
145 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, si gn, deriveBits, decrypt, sign, deriveBits])
146 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign , deriveBits, decrypt, sign, deriveBits])
147 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt])
148 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt])
149 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt])
150 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt])
151 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decr ypt])
152 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decry pt])
153 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decryp t])
154 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt] )
155 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits , sign, decrypt])
156 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt])
157 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt])
158 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, si gn, decrypt])
159 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits , decrypt])
160 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt])
161 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt])
162 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, de crypt])
163 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign])
164 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign])
165 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign])
166 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign])
167 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits , sign])
168 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign])
169 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign])
170 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, si gn])
171 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits ])
172 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits] )
173 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])
174 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits])
175 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [])
176 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [])
177 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [])
178 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [])
179 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, s ign, deriveBits, decrypt, sign, deriveBits])
180 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, si gn, deriveBits, decrypt, sign, deriveBits])
181 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sig n, deriveBits, decrypt, sign, deriveBits])
182 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
183 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt])
184 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt])
185 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt])
186 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt])
187 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])
188 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt])
189 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt])
190 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt])
191 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sig n, decrypt])
192 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign , decrypt])
193 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt])
194 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, d ecrypt])
195 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, dec rypt])
196 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decr ypt])
197 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decry pt])
198 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt ])
199 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign])
200 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign])
201 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign])
202 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign])
203 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sig n])
204 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign ])
205 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign] )
206 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign])
207 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits])
208 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits])
209 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits])
210 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits])
211 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [])
212 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [])
213 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [])
214 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [])
215 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
216 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, d eriveBits, decrypt, sign, deriveBits])
217 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, de riveBits, decrypt, sign, deriveBits])
218 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deri veBits, decrypt, sign, deriveBits])
219 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])
220 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])
221 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])
222 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])
223 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])
224 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])
225 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])
226 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])
227 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])
228 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])
229 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])
230 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])
231 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])
232 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])
233 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])
234 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])
235 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])
236 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])
237 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])
238 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])
239 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])
240 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])
241 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])
242 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])
243 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])
244 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])
245 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])
246 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])
247 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])
248 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])
249 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])
250 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])
251 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
252 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
253 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, s ign, deriveBits])
254 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sig n, deriveBits])
255 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt])
256 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt])
257 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt])
258 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt])
259 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt])
260 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt])
261 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt])
262 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt])
263 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt])
264 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt])
265 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt])
266 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt])
267 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt])
268 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt])
269 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt])
270 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt])
271 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign])
272 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign])
273 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign])
274 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign])
275 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign])
276 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign])
277 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign])
278 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign])
279 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits])
280 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits])
281 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits])
282 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits])
283 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [])
284 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [])
285 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [])
286 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [])
287 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
288 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
289 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, s ign, deriveBits])
290 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sig n, deriveBits])
291 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt])
292 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt])
293 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt])
294 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt])
295 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decr ypt])
296 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decry pt])
297 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decryp t])
298 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt] )
299 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits , sign, decrypt])
300 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt])
301 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt])
302 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, si gn, decrypt])
303 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits , decrypt])
304 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt])
305 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt])
306 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, de crypt])
307 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign])
308 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign])
309 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign])
310 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign])
311 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits , sign])
312 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign])
313 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign])
314 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, si gn])
315 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits ])
316 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits] )
317 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])
318 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits])
319 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [])
320 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [])
321 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [])
322 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [])
323 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, s ign, deriveBits, decrypt, sign, deriveBits])
324 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, si gn, deriveBits, decrypt, sign, deriveBits])
325 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sig n, deriveBits, decrypt, sign, deriveBits])
326 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
327 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt]) assert_equals: Bad usages n ot supported expected "SyntaxError" but got "NotSupportedError"
328 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt]) assert_equals: Bad us ages not supported expected "SyntaxError" but got "NotSupportedError"
329 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt]) assert_equals : Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
330 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, enc rypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "N otSupportedError"
331 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) assert_equals: Bad usages n ot supported expected "SyntaxError" but got "NotSupportedError"
332 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) assert_equals: Bad us ages not supported expected "SyntaxError" but got "NotSupportedError"
333 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt]) assert_equals : Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
334 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, dec rypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "N otSupportedError"
335 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey]) assert_equals: Bad usages n ot supported expected "SyntaxError" but got "NotSupportedError"
336 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey]) assert_equals: Bad us ages not supported expected "SyntaxError" but got "NotSupportedError"
337 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey]) assert_equals : Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
338 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wra pKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "N otSupportedError"
339 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
340 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
341 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey]) assert_equa ls: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
342 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unw rapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
343 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
344 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
345 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey]) assert_equa ls: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
346 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, der iveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
347 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) assert_equals: Bad usage s not supported expected "SyntaxError" but got "NotSupportedError"
348 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
349 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits]) assert_equ als: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
350 FAIL Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, p ublicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, der iveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
351 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
352 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
353 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt]) assert_equa ls: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
354 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, e ncrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
355 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
356 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
357 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt]) assert_equa ls: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
358 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, d ecrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
359 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
360 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
361 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey]) assert_equa ls: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
362 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, w rapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
363 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey]) assert_equals: Bad usag es not supported expected "SyntaxError" but got "NotSupportedError"
364 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey]) assert_equals: Ba d usages not supported expected "SyntaxError" but got "NotSupportedError"
365 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey]) assert_eq uals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError "
366 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, u nwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but go t "NotSupportedError"
367 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey]) assert_equals: Bad usag es not supported expected "SyntaxError" but got "NotSupportedError"
368 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey]) assert_equals: Ba d usages not supported expected "SyntaxError" but got "NotSupportedError"
369 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey]) assert_eq uals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError "
370 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, d eriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but go t "NotSupportedError"
371 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) assert_equals: Bad usa ges not supported expected "SyntaxError" but got "NotSupportedError"
372 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits]) assert_equals: B ad usages not supported expected "SyntaxError" but got "NotSupportedError"
373 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits]) assert_e quals: Bad usages not supported expected "SyntaxError" but got "NotSupportedErro r"
374 FAIL Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, d eriveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but g ot "NotSupportedError"
375 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na me: RSA-PSS, publicExponent: {0: 1}}, false, [sign]) assert_equals: Bad algorith m property not supported expected "OperationError" but got "NotSupportedError"
376 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na me: RSA-PSS, publicExponent: {0: 1}}, true, [sign]) assert_equals: Bad algorithm property not supported expected "OperationError" but got "NotSupportedError"
377 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na me: RSA-PSS, publicExponent: {0: 1}}, false, [verify, sign]) assert_equals: Bad algorithm property not supported expected "OperationError" but got "NotSupported Error"
378 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na me: RSA-PSS, publicExponent: {0: 1}}, true, [verify, sign]) assert_equals: Bad a lgorithm property not supported expected "OperationError" but got "NotSupportedE rror"
379 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na me: RSA-PSS, publicExponent: {0: 1}}, false, []) assert_equals: Bad algorithm pr operty not supported expected "OperationError" but got "NotSupportedError"
380 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na me: RSA-PSS, publicExponent: {0: 1}}, true, []) assert_equals: Bad algorithm pro perty not supported expected "OperationError" but got "NotSupportedError"
381 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na me: RSA-PSS, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify]) assert_equals: Bad algorithm property not supported expected "OperationError" b ut got "NotSupportedError"
382 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na me: RSA-PSS, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify]) assert_equals: Bad algorithm property not supported expected "OperationError" bu t got "NotSupportedError"
383 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na me: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign]) assert_equals: Bad algorithm property not supported expected "OperationError" but got "NotSuppo rtedError"
384 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na me: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign]) assert_equals: B ad algorithm property not supported expected "OperationError" but got "NotSuppor tedError"
385 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na me: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign]) assert_ equals: Bad algorithm property not supported expected "OperationError" but got " NotSupportedError"
386 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na me: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign]) assert_e quals: Bad algorithm property not supported expected "OperationError" but got "N otSupportedError"
387 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na me: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, []) assert_equals: Bad algorithm property not supported expected "OperationError" but got "NotSupported Error"
388 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na me: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, []) assert_equals: Bad a lgorithm property not supported expected "OperationError" but got "NotSupportedE rror"
389 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na me: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, si gn, verify]) assert_equals: Bad algorithm property not supported expected "Opera tionError" but got "NotSupportedError"
390 FAIL Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, na me: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sig n, verify]) assert_equals: Bad algorithm property not supported expected "Operat ionError" but got "NotSupportedError"
391 FAIL Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) assert_equals: Empty usages not supported expected "SyntaxError" but got "NotSupportedError"
392 FAIL Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) assert_equals: Empty usages not supported expected "SyntaxError" but got "NotSupportedError"
393 FAIL Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PS S, publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) assert_equals: Empty usages n ot supported expected "SyntaxError" but got "NotSupportedError"
394 FAIL Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PS S, publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) assert_equals: Empty usages no t supported expected "SyntaxError" but got "NotSupportedError"
395 Harness: the test ran to completion.
396
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698