| Index: third_party/WebKit/LayoutTests/external/wpt/WebCryptoAPI/generateKey/test_failures_AES-KW.https-expected.txt
|
| diff --git a/third_party/WebKit/LayoutTests/external/wpt/WebCryptoAPI/generateKey/test_failures_ECDSA-expected.txt b/third_party/WebKit/LayoutTests/external/wpt/WebCryptoAPI/generateKey/test_failures_AES-KW.https-expected.txt
|
| similarity index 65%
|
| rename from third_party/WebKit/LayoutTests/external/wpt/WebCryptoAPI/generateKey/test_failures_ECDSA-expected.txt
|
| rename to third_party/WebKit/LayoutTests/external/wpt/WebCryptoAPI/generateKey/test_failures_AES-KW.https-expected.txt
|
| index 22e30115ebf61c5b6f25c4bef474730d618ce741..78bf7a73456decd8e950a69de5b8be7fca60c7c2 100644
|
| --- a/third_party/WebKit/LayoutTests/external/wpt/WebCryptoAPI/generateKey/test_failures_ECDSA-expected.txt
|
| +++ b/third_party/WebKit/LayoutTests/external/wpt/WebCryptoAPI/generateKey/test_failures_AES-KW.https-expected.txt
|
| @@ -1,5 +1,4 @@
|
| This is a testharness.js-based test.
|
| -Found 418 tests; 340 PASS, 78 FAIL, 0 TIMEOUT, 0 NOTRUN.
|
| PASS Bad algorithm: generateKey(AES, false, [decrypt])
|
| PASS Bad algorithm: generateKey(AES, true, [decrypt])
|
| PASS Bad algorithm: generateKey(AES, RED, [decrypt])
|
| @@ -324,99 +323,161 @@ PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, s
|
| PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
| PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
| PASS Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits])
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, encrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, decrypt]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, wrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, unwrapKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveKey]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveBits]) assert_equals: Bad usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -PASS Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, false, [sign])
|
| -PASS Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, true, [sign])
|
| -PASS Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, false, [verify, sign])
|
| -PASS Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, true, [verify, sign])
|
| -PASS Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, false, [])
|
| -PASS Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, true, [])
|
| -PASS Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, false, [sign, verify, sign, sign, verify])
|
| -PASS Bad algorithm property: generateKey({name: ECDSA, namedCurve: P-512}, true, [sign, verify, sign, sign, verify])
|
| -PASS Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, false, [sign])
|
| -PASS Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, true, [sign])
|
| -PASS Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, false, [verify, sign])
|
| -PASS Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, true, [verify, sign])
|
| -PASS Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, false, [])
|
| -PASS Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, true, [])
|
| -PASS Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, false, [sign, verify, sign, sign, verify])
|
| -PASS Bad algorithm property: generateKey({name: ECDSA, namedCurve: Curve25519}, true, [sign, verify, sign, sign, verify])
|
| -FAIL Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, false, []) assert_equals: Empty usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, true, []) assert_equals: Empty usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, false, []) assert_equals: Empty usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, true, []) assert_equals: Empty usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, []) assert_equals: Empty usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| -FAIL Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, []) assert_equals: Empty usages not supported expected "SyntaxError" but got "NotSupportedError"
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [encrypt])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, encrypt])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, encrypt])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [decrypt])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, decrypt])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, decrypt])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [sign])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, sign])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, sign])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, sign])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [verify])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, verify])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, verify])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, verify])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveKey])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveKey])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveKey])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveBits])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveBits])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveBits])
|
| +PASS Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [encrypt])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, encrypt])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, encrypt])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [decrypt])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, decrypt])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, decrypt])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [sign])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, sign])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, sign])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, sign])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [verify])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, verify])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, verify])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, verify])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveKey])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveKey])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveKey])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveBits])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveBits])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveBits])
|
| +PASS Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [encrypt])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, encrypt])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, encrypt])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [decrypt])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, decrypt])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, decrypt])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [sign])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, sign])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, sign])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, sign])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [verify])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, verify])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, verify])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, verify])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveKey])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveKey])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveKey])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveBits])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveBits])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveBits])
|
| +PASS Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits])
|
| +PASS Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey, wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey, wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [])
|
| +PASS Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [])
|
| +PASS Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey, wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey, wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [])
|
| +PASS Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [])
|
| +PASS Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey, wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey, wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [])
|
| +PASS Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [])
|
| +PASS Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey, wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey, wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [])
|
| +PASS Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [])
|
| +PASS Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey, wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey, wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [])
|
| +PASS Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [])
|
| +PASS Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey, wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey, wrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [])
|
| +PASS Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [])
|
| +PASS Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey])
|
| +PASS Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey])
|
| +PASS Empty usages: generateKey({length: 128, name: AES-KW}, false, [])
|
| +PASS Empty usages: generateKey({length: 128, name: AES-KW}, true, [])
|
| +FAIL Empty usages: generateKey({length: 192, name: AES-KW}, false, []) assert_equals: Empty usages not supported expected "SyntaxError" but got "OperationError"
|
| +FAIL Empty usages: generateKey({length: 192, name: AES-KW}, true, []) assert_equals: Empty usages not supported expected "SyntaxError" but got "OperationError"
|
| +PASS Empty usages: generateKey({length: 256, name: AES-KW}, false, [])
|
| +PASS Empty usages: generateKey({length: 256, name: AES-KW}, true, [])
|
| Harness: the test ran to completion.
|
|
|
|
|