| OLD | NEW |
| (Empty) |
| 1 This is a testharness.js-based test. | |
| 2 Found 452 tests; 324 PASS, 128 FAIL, 0 TIMEOUT, 0 NOTRUN. | |
| 3 PASS Bad algorithm: generateKey(AES, false, [decrypt]) | |
| 4 PASS Bad algorithm: generateKey(AES, true, [decrypt]) | |
| 5 PASS Bad algorithm: generateKey(AES, RED, [decrypt]) | |
| 6 PASS Bad algorithm: generateKey(AES, 7, [decrypt]) | |
| 7 PASS Bad algorithm: generateKey(AES, false, [sign, decrypt]) | |
| 8 PASS Bad algorithm: generateKey(AES, true, [sign, decrypt]) | |
| 9 PASS Bad algorithm: generateKey(AES, RED, [sign, decrypt]) | |
| 10 PASS Bad algorithm: generateKey(AES, 7, [sign, decrypt]) | |
| 11 PASS Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt]) | |
| 12 PASS Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt]) | |
| 13 PASS Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt]) | |
| 14 PASS Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt]) | |
| 15 PASS Bad algorithm: generateKey(AES, false, [deriveBits, decrypt]) | |
| 16 PASS Bad algorithm: generateKey(AES, true, [deriveBits, decrypt]) | |
| 17 PASS Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt]) | |
| 18 PASS Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt]) | |
| 19 PASS Bad algorithm: generateKey(AES, false, [sign]) | |
| 20 PASS Bad algorithm: generateKey(AES, true, [sign]) | |
| 21 PASS Bad algorithm: generateKey(AES, RED, [sign]) | |
| 22 PASS Bad algorithm: generateKey(AES, 7, [sign]) | |
| 23 PASS Bad algorithm: generateKey(AES, false, [deriveBits, sign]) | |
| 24 PASS Bad algorithm: generateKey(AES, true, [deriveBits, sign]) | |
| 25 PASS Bad algorithm: generateKey(AES, RED, [deriveBits, sign]) | |
| 26 PASS Bad algorithm: generateKey(AES, 7, [deriveBits, sign]) | |
| 27 PASS Bad algorithm: generateKey(AES, false, [deriveBits]) | |
| 28 PASS Bad algorithm: generateKey(AES, true, [deriveBits]) | |
| 29 PASS Bad algorithm: generateKey(AES, RED, [deriveBits]) | |
| 30 PASS Bad algorithm: generateKey(AES, 7, [deriveBits]) | |
| 31 PASS Bad algorithm: generateKey(AES, false, []) | |
| 32 PASS Bad algorithm: generateKey(AES, true, []) | |
| 33 PASS Bad algorithm: generateKey(AES, RED, []) | |
| 34 PASS Bad algorithm: generateKey(AES, 7, []) | |
| 35 PASS Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt,
sign, deriveBits]) | |
| 36 PASS Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt,
sign, deriveBits]) | |
| 37 PASS Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, s
ign, deriveBits]) | |
| 38 PASS Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sig
n, deriveBits]) | |
| 39 PASS Bad algorithm: generateKey({name: AES}, false, [decrypt]) | |
| 40 PASS Bad algorithm: generateKey({name: AES}, true, [decrypt]) | |
| 41 PASS Bad algorithm: generateKey({name: AES}, RED, [decrypt]) | |
| 42 PASS Bad algorithm: generateKey({name: AES}, 7, [decrypt]) | |
| 43 PASS Bad algorithm: generateKey({name: AES}, false, [sign, decrypt]) | |
| 44 PASS Bad algorithm: generateKey({name: AES}, true, [sign, decrypt]) | |
| 45 PASS Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt]) | |
| 46 PASS Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt]) | |
| 47 PASS Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt])
| |
| 48 PASS Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt]) | |
| 49 PASS Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt]) | |
| 50 PASS Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt]) | |
| 51 PASS Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt]) | |
| 52 PASS Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt]) | |
| 53 PASS Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt]) | |
| 54 PASS Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt]) | |
| 55 PASS Bad algorithm: generateKey({name: AES}, false, [sign]) | |
| 56 PASS Bad algorithm: generateKey({name: AES}, true, [sign]) | |
| 57 PASS Bad algorithm: generateKey({name: AES}, RED, [sign]) | |
| 58 PASS Bad algorithm: generateKey({name: AES}, 7, [sign]) | |
| 59 PASS Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign]) | |
| 60 PASS Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign]) | |
| 61 PASS Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign]) | |
| 62 PASS Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign]) | |
| 63 PASS Bad algorithm: generateKey({name: AES}, false, [deriveBits]) | |
| 64 PASS Bad algorithm: generateKey({name: AES}, true, [deriveBits]) | |
| 65 PASS Bad algorithm: generateKey({name: AES}, RED, [deriveBits]) | |
| 66 PASS Bad algorithm: generateKey({name: AES}, 7, [deriveBits]) | |
| 67 PASS Bad algorithm: generateKey({name: AES}, false, []) | |
| 68 PASS Bad algorithm: generateKey({name: AES}, true, []) | |
| 69 PASS Bad algorithm: generateKey({name: AES}, RED, []) | |
| 70 PASS Bad algorithm: generateKey({name: AES}, 7, []) | |
| 71 PASS Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits,
decrypt, sign, deriveBits]) | |
| 72 PASS Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, d
ecrypt, sign, deriveBits]) | |
| 73 PASS Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, de
crypt, sign, deriveBits]) | |
| 74 PASS Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decr
ypt, sign, deriveBits]) | |
| 75 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt]) | |
| 76 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt]) | |
| 77 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt]) | |
| 78 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt]) | |
| 79 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt]
) | |
| 80 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt])
| |
| 81 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt]) | |
| 82 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt]) | |
| 83 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, si
gn, decrypt]) | |
| 84 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sig
n, decrypt]) | |
| 85 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign
, decrypt]) | |
| 86 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign,
decrypt]) | |
| 87 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, de
crypt]) | |
| 88 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, dec
rypt]) | |
| 89 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decr
ypt]) | |
| 90 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decryp
t]) | |
| 91 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [sign]) | |
| 92 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [sign]) | |
| 93 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign]) | |
| 94 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign]) | |
| 95 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, si
gn]) | |
| 96 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sig
n]) | |
| 97 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign
]) | |
| 98 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign])
| |
| 99 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits]) | |
| 100 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits]) | |
| 101 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits]) | |
| 102 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits]) | |
| 103 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, []) | |
| 104 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, []) | |
| 105 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, []) | |
| 106 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, []) | |
| 107 PASS Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign,
deriveBits, decrypt, sign, deriveBits]) | |
| 108 PASS Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign,
deriveBits, decrypt, sign, deriveBits]) | |
| 109 PASS Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, d
eriveBits, decrypt, sign, deriveBits]) | |
| 110 PASS Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, der
iveBits, decrypt, sign, deriveBits]) | |
| 111 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt])
| |
| 112 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt]) | |
| 113 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt]) | |
| 114 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt]) | |
| 115 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, dec
rypt]) | |
| 116 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decr
ypt]) | |
| 117 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decry
pt]) | |
| 118 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt
]) | |
| 119 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBit
s, sign, decrypt]) | |
| 120 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits
, sign, decrypt]) | |
| 121 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits,
sign, decrypt]) | |
| 122 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, s
ign, decrypt]) | |
| 123 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBit
s, decrypt]) | |
| 124 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits
, decrypt]) | |
| 125 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits,
decrypt]) | |
| 126 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, d
ecrypt]) | |
| 127 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign]) | |
| 128 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign]) | |
| 129 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign]) | |
| 130 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign]) | |
| 131 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBit
s, sign]) | |
| 132 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits
, sign]) | |
| 133 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits,
sign]) | |
| 134 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, s
ign]) | |
| 135 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBit
s]) | |
| 136 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits
]) | |
| 137 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits]
) | |
| 138 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits]) | |
| 139 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, []) | |
| 140 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, []) | |
| 141 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, []) | |
| 142 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, []) | |
| 143 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt,
sign, deriveBits, decrypt, sign, deriveBits]) | |
| 144 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, s
ign, deriveBits, decrypt, sign, deriveBits]) | |
| 145 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, si
gn, deriveBits, decrypt, sign, deriveBits]) | |
| 146 PASS Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign
, deriveBits, decrypt, sign, deriveBits]) | |
| 147 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt]) | |
| 148 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt]) | |
| 149 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt]) | |
| 150 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt]) | |
| 151 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decr
ypt]) | |
| 152 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decry
pt]) | |
| 153 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decryp
t]) | |
| 154 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt]
) | |
| 155 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits
, sign, decrypt]) | |
| 156 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits,
sign, decrypt]) | |
| 157 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits,
sign, decrypt]) | |
| 158 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, si
gn, decrypt]) | |
| 159 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits
, decrypt]) | |
| 160 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits,
decrypt]) | |
| 161 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits,
decrypt]) | |
| 162 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, de
crypt]) | |
| 163 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign]) | |
| 164 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign]) | |
| 165 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign]) | |
| 166 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign]) | |
| 167 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits
, sign]) | |
| 168 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits,
sign]) | |
| 169 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits,
sign]) | |
| 170 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, si
gn]) | |
| 171 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits
]) | |
| 172 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits]
) | |
| 173 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits])
| |
| 174 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits]) | |
| 175 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, []) | |
| 176 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, []) | |
| 177 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, []) | |
| 178 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, []) | |
| 179 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, s
ign, deriveBits, decrypt, sign, deriveBits]) | |
| 180 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, si
gn, deriveBits, decrypt, sign, deriveBits]) | |
| 181 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sig
n, deriveBits, decrypt, sign, deriveBits]) | |
| 182 PASS Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign,
deriveBits, decrypt, sign, deriveBits]) | |
| 183 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt]) | |
| 184 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt]) | |
| 185 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt]) | |
| 186 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt]) | |
| 187 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt])
| |
| 188 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt]) | |
| 189 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt]) | |
| 190 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt]) | |
| 191 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sig
n, decrypt]) | |
| 192 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign
, decrypt]) | |
| 193 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign,
decrypt]) | |
| 194 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, d
ecrypt]) | |
| 195 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, dec
rypt]) | |
| 196 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decr
ypt]) | |
| 197 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decry
pt]) | |
| 198 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt
]) | |
| 199 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign]) | |
| 200 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign]) | |
| 201 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign]) | |
| 202 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign]) | |
| 203 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sig
n]) | |
| 204 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign
]) | |
| 205 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign]
) | |
| 206 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign]) | |
| 207 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits]) | |
| 208 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits]) | |
| 209 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits]) | |
| 210 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits]) | |
| 211 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, []) | |
| 212 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, []) | |
| 213 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, []) | |
| 214 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, []) | |
| 215 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign,
deriveBits, decrypt, sign, deriveBits]) | |
| 216 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, d
eriveBits, decrypt, sign, deriveBits]) | |
| 217 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, de
riveBits, decrypt, sign, deriveBits]) | |
| 218 PASS Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deri
veBits, decrypt, sign, deriveBits]) | |
| 219 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | |
| 220 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | |
| 221 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | |
| 222 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | |
| 223 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | |
| 224 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | |
| 225 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | |
| 226 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | |
| 227 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | |
| 228 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | |
| 229 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | |
| 230 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | |
| 231 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | |
| 232 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | |
| 233 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | |
| 234 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | |
| 235 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | |
| 236 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | |
| 237 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | |
| 238 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | |
| 239 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | |
| 240 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | |
| 241 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | |
| 242 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | |
| 243 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | |
| 244 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | |
| 245 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | |
| 246 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | |
| 247 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | |
| 248 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | |
| 249 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | |
| 250 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | |
| 251 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt,
sign, deriveBits]) | |
| 252 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt,
sign, deriveBits]) | |
| 253 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, s
ign, deriveBits]) | |
| 254 PASS Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sig
n, deriveBits]) | |
| 255 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt]) | |
| 256 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt]) | |
| 257 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt]) | |
| 258 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt]) | |
| 259 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt]) | |
| 260 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt]) | |
| 261 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt]) | |
| 262 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt]) | |
| 263 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt]) | |
| 264 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt]) | |
| 265 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt]) | |
| 266 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt]) | |
| 267 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt]) | |
| 268 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt]) | |
| 269 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt]) | |
| 270 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt]) | |
| 271 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign]) | |
| 272 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign]) | |
| 273 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign]) | |
| 274 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign]) | |
| 275 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign]) | |
| 276 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign]) | |
| 277 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign]) | |
| 278 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign]) | |
| 279 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits]) | |
| 280 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits]) | |
| 281 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits]) | |
| 282 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits]) | |
| 283 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, []) | |
| 284 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, []) | |
| 285 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, []) | |
| 286 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, []) | |
| 287 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt,
sign, deriveBits]) | |
| 288 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt,
sign, deriveBits]) | |
| 289 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, s
ign, deriveBits]) | |
| 290 PASS Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS,
publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sig
n, deriveBits]) | |
| 291 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt]) | |
| 292 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt]) | |
| 293 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt]) | |
| 294 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt]) | |
| 295 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decr
ypt]) | |
| 296 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decry
pt]) | |
| 297 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decryp
t]) | |
| 298 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt]
) | |
| 299 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits
, sign, decrypt]) | |
| 300 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits,
sign, decrypt]) | |
| 301 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits,
sign, decrypt]) | |
| 302 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, si
gn, decrypt]) | |
| 303 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits
, decrypt]) | |
| 304 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits,
decrypt]) | |
| 305 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits,
decrypt]) | |
| 306 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, de
crypt]) | |
| 307 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign]) | |
| 308 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign]) | |
| 309 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign]) | |
| 310 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign]) | |
| 311 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits
, sign]) | |
| 312 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits,
sign]) | |
| 313 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits,
sign]) | |
| 314 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, si
gn]) | |
| 315 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits
]) | |
| 316 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits]
) | |
| 317 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits])
| |
| 318 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits]) | |
| 319 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, []) | |
| 320 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, []) | |
| 321 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, []) | |
| 322 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, []) | |
| 323 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, s
ign, deriveBits, decrypt, sign, deriveBits]) | |
| 324 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, si
gn, deriveBits, decrypt, sign, deriveBits]) | |
| 325 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sig
n, deriveBits, decrypt, sign, deriveBits]) | |
| 326 PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign,
deriveBits, decrypt, sign, deriveBits]) | |
| 327 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [encr
ypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "No
tSupportedError" | |
| 328 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but g
ot "NotSupportedError" | |
| 329 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, sign, encrypt]) assert_equals: Bad usages not supported expected "SyntaxErro
r" but got "NotSupportedError" | |
| 330 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
| 331 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, verify, sign, verify, encrypt]) assert_equals: Bad usages not supported expect
ed "SyntaxError" but got "NotSupportedError" | |
| 332 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [decr
ypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "No
tSupportedError" | |
| 333 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but g
ot "NotSupportedError" | |
| 334 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, sign, decrypt]) assert_equals: Bad usages not supported expected "SyntaxErro
r" but got "NotSupportedError" | |
| 335 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
| 336 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, verify, sign, verify, decrypt]) assert_equals: Bad usages not supported expect
ed "SyntaxError" but got "NotSupportedError" | |
| 337 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [wrap
Key]) assert_equals: Bad usages not supported expected "SyntaxError" but got "No
tSupportedError" | |
| 338 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but g
ot "NotSupportedError" | |
| 339 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, sign, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxErro
r" but got "NotSupportedError" | |
| 340 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
| 341 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, verify, sign, verify, wrapKey]) assert_equals: Bad usages not supported expect
ed "SyntaxError" but got "NotSupportedError" | |
| 342 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [unwr
apKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
| 343 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
| 344 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, sign, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
| 345 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
| 346 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, verify, sign, verify, unwrapKey]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
| 347 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [deri
veKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
| 348 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
| 349 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, sign, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
| 350 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
| 351 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, verify, sign, verify, deriveKey]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
| 352 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [deri
veBits]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
| 353 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError" bu
t got "NotSupportedError" | |
| 354 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, sign, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxE
rror" but got "NotSupportedError" | |
| 355 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [veri
fy, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
| 356 FAIL Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign
, verify, sign, verify, deriveBits]) assert_equals: Bad usages not supported exp
ected "SyntaxError" but got "NotSupportedError" | |
| 357 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [en
crypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
| 358 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
| 359 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, sign, encrypt]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
| 360 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
| 361 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, verify, sign, verify, encrypt]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
| 362 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [de
crypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
| 363 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
| 364 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, sign, decrypt]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
| 365 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
| 366 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, verify, sign, verify, decrypt]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
| 367 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [wr
apKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
| 368 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
| 369 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, sign, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
| 370 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
| 371 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, verify, sign, verify, wrapKey]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
| 372 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [un
wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
| 373 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
| 374 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, sign, unwrapKey]) assert_equals: Bad usages not supported expected "Syntax
Error" but got "NotSupportedError" | |
| 375 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
| 376 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, verify, sign, verify, unwrapKey]) assert_equals: Bad usages not supported ex
pected "SyntaxError" but got "NotSupportedError" | |
| 377 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [de
riveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
| 378 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
| 379 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, sign, deriveKey]) assert_equals: Bad usages not supported expected "Syntax
Error" but got "NotSupportedError" | |
| 380 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
| 381 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, verify, sign, verify, deriveKey]) assert_equals: Bad usages not supported ex
pected "SyntaxError" but got "NotSupportedError" | |
| 382 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [de
riveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but go
t "NotSupportedError" | |
| 383 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
| 384 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, sign, deriveBits]) assert_equals: Bad usages not supported expected "Synta
xError" but got "NotSupportedError" | |
| 385 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [ve
rify, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError
" but got "NotSupportedError" | |
| 386 FAIL Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [si
gn, verify, sign, verify, deriveBits]) assert_equals: Bad usages not supported e
xpected "SyntaxError" but got "NotSupportedError" | |
| 387 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [en
crypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
| 388 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
| 389 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, sign, encrypt]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
| 390 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
| 391 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, verify, sign, verify, encrypt]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
| 392 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [de
crypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
| 393 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
| 394 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, sign, decrypt]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
| 395 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
| 396 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, verify, sign, verify, decrypt]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
| 397 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [wr
apKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
| 398 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
| 399 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, sign, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
| 400 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
| 401 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, verify, sign, verify, wrapKey]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
| 402 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [un
wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
| 403 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
| 404 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, sign, unwrapKey]) assert_equals: Bad usages not supported expected "Syntax
Error" but got "NotSupportedError" | |
| 405 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
| 406 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, verify, sign, verify, unwrapKey]) assert_equals: Bad usages not supported ex
pected "SyntaxError" but got "NotSupportedError" | |
| 407 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [de
riveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
| 408 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
| 409 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, sign, deriveKey]) assert_equals: Bad usages not supported expected "Syntax
Error" but got "NotSupportedError" | |
| 410 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
| 411 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, verify, sign, verify, deriveKey]) assert_equals: Bad usages not supported ex
pected "SyntaxError" but got "NotSupportedError" | |
| 412 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [de
riveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but go
t "NotSupportedError" | |
| 413 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
| 414 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, sign, deriveBits]) assert_equals: Bad usages not supported expected "Synta
xError" but got "NotSupportedError" | |
| 415 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [ve
rify, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError
" but got "NotSupportedError" | |
| 416 FAIL Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [si
gn, verify, sign, verify, deriveBits]) assert_equals: Bad usages not supported e
xpected "SyntaxError" but got "NotSupportedError" | |
| 417 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [en
crypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
| 418 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
| 419 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, sign, encrypt]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
| 420 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
| 421 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, verify, sign, verify, encrypt]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
| 422 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [de
crypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
| 423 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
| 424 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, sign, decrypt]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
| 425 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
| 426 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, verify, sign, verify, decrypt]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
| 427 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [wr
apKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "
NotSupportedError" | |
| 428 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but
got "NotSupportedError" | |
| 429 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, sign, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxEr
ror" but got "NotSupportedError" | |
| 430 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
| 431 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, verify, sign, verify, wrapKey]) assert_equals: Bad usages not supported expe
cted "SyntaxError" but got "NotSupportedError" | |
| 432 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [un
wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
| 433 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
| 434 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, sign, unwrapKey]) assert_equals: Bad usages not supported expected "Syntax
Error" but got "NotSupportedError" | |
| 435 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
| 436 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, verify, sign, verify, unwrapKey]) assert_equals: Bad usages not supported ex
pected "SyntaxError" but got "NotSupportedError" | |
| 437 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [de
riveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got
"NotSupportedError" | |
| 438 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" b
ut got "NotSupportedError" | |
| 439 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, sign, deriveKey]) assert_equals: Bad usages not supported expected "Syntax
Error" but got "NotSupportedError" | |
| 440 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
| 441 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, verify, sign, verify, deriveKey]) assert_equals: Bad usages not supported ex
pected "SyntaxError" but got "NotSupportedError" | |
| 442 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [de
riveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but go
t "NotSupportedError" | |
| 443 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError"
but got "NotSupportedError" | |
| 444 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, sign, deriveBits]) assert_equals: Bad usages not supported expected "Synta
xError" but got "NotSupportedError" | |
| 445 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [ve
rify, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError
" but got "NotSupportedError" | |
| 446 FAIL Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [si
gn, verify, sign, verify, deriveBits]) assert_equals: Bad usages not supported e
xpected "SyntaxError" but got "NotSupportedError" | |
| 447 FAIL Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, []
) assert_equals: Empty usages not supported expected "SyntaxError" but got "NotS
upportedError" | |
| 448 FAIL Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [])
assert_equals: Empty usages not supported expected "SyntaxError" but got "NotSu
pportedError" | |
| 449 FAIL Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, false,
[]) assert_equals: Empty usages not supported expected "SyntaxError" but got "No
tSupportedError" | |
| 450 FAIL Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [
]) assert_equals: Empty usages not supported expected "SyntaxError" but got "Not
SupportedError" | |
| 451 FAIL Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, false,
[]) assert_equals: Empty usages not supported expected "SyntaxError" but got "No
tSupportedError" | |
| 452 FAIL Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [
]) assert_equals: Empty usages not supported expected "SyntaxError" but got "Not
SupportedError" | |
| 453 FAIL Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, false,
[]) assert_equals: Empty usages not supported expected "SyntaxError" but got "No
tSupportedError" | |
| 454 FAIL Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [
]) assert_equals: Empty usages not supported expected "SyntaxError" but got "Not
SupportedError" | |
| 455 Harness: the test ran to completion. | |
| 456 | |
| OLD | NEW |