summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/meta/WebCryptoAPI/generateKey
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 00:47:55 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 00:47:55 +0000
commit26a029d407be480d791972afb5975cf62c9360a6 (patch)
treef435a8308119effd964b339f76abb83a57c29483 /testing/web-platform/meta/WebCryptoAPI/generateKey
parentInitial commit. (diff)
downloadfirefox-26a029d407be480d791972afb5975cf62c9360a6.tar.xz
firefox-26a029d407be480d791972afb5975cf62c9360a6.zip
Adding upstream version 124.0.1.upstream/124.0.1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/meta/WebCryptoAPI/generateKey')
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini162
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini162
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini5
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini198
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini198
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini114
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini114
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini127
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini31
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini31
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini102
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini102
27 files changed, 1451 insertions, 0 deletions
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini
new file mode 100644
index 0000000000..c1d28527e5
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini
@@ -0,0 +1,7 @@
+[failures_AES-CTR.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[failures_AES-CTR.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini
new file mode 100644
index 0000000000..52e022b43f
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini
@@ -0,0 +1,7 @@
+[failures_AES-GCM.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[failures_AES-GCM.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini
new file mode 100644
index 0000000000..2fc5839c41
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini
@@ -0,0 +1,7 @@
+[failures_AES-KW.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[failures_AES-KW.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini
new file mode 100644
index 0000000000..e7a7a9a1a2
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini
@@ -0,0 +1,7 @@
+[failures_ECDH.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[failures_ECDH.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini
new file mode 100644
index 0000000000..c6104227ec
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini
@@ -0,0 +1,7 @@
+[failures_ECDSA.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[failures_ECDSA.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini
new file mode 100644
index 0000000000..e6e9903bc3
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini
@@ -0,0 +1,162 @@
+[failures_Ed25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed25519}, true, [\])]
+ expected: FAIL
+
+
+[failures_Ed25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed25519}, true, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini
new file mode 100644
index 0000000000..176963bdc3
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini
@@ -0,0 +1,162 @@
+[failures_Ed448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed448}, true, [\])]
+ expected: FAIL
+
+
+[failures_Ed448.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed448}, true, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini
new file mode 100644
index 0000000000..db363246fd
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini
@@ -0,0 +1,5 @@
+[failures_HMAC.https.any.worker.html]
+ expected:
+ if (processor == "x86") and (os == "win") and not debug: TIMEOUT
+
+[failures_HMAC.https.any.html]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini
new file mode 100644
index 0000000000..9cc9d4e55c
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini
@@ -0,0 +1,7 @@
+[failures_RSA-OAEP.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[failures_RSA-OAEP.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini
new file mode 100644
index 0000000000..df0d770ad4
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini
@@ -0,0 +1,7 @@
+[failures_RSA-PSS.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[failures_RSA-PSS.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini
new file mode 100644
index 0000000000..3225308e18
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini
@@ -0,0 +1,7 @@
+[failures_RSASSA-PKCS1-v1_5.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[failures_RSASSA-PKCS1-v1_5.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini
new file mode 100644
index 0000000000..f512be11d7
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini
@@ -0,0 +1,198 @@
+[failures_X25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X25519}, true, [\])]
+ expected: FAIL
+
+
+[failures_X25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X25519}, true, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini
new file mode 100644
index 0000000000..d107f088c9
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini
@@ -0,0 +1,198 @@
+[failures_X448.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X448}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X448}, true, [\])]
+ expected: FAIL
+
+
+[failures_X448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X448}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X448}, true, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini
new file mode 100644
index 0000000000..154517b671
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini
@@ -0,0 +1,7 @@
+[successes_AES-CBC.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_AES-CBC.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini
new file mode 100644
index 0000000000..077e3bc36b
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini
@@ -0,0 +1,7 @@
+[successes_AES-CTR.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_AES-CTR.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini
new file mode 100644
index 0000000000..ebf49847b2
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini
@@ -0,0 +1,7 @@
+[successes_AES-GCM.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_AES-GCM.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini
new file mode 100644
index 0000000000..f38ab81c97
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini
@@ -0,0 +1,7 @@
+[successes_AES-KW.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_AES-KW.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini
new file mode 100644
index 0000000000..52c399a706
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini
@@ -0,0 +1,7 @@
+[successes_ECDH.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_ECDH.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini
new file mode 100644
index 0000000000..851344cdd8
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini
@@ -0,0 +1,7 @@
+[successes_ECDSA.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_ECDSA.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini
new file mode 100644
index 0000000000..349f03a13c
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini
@@ -0,0 +1,114 @@
+[successes_Ed25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: ED25519}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+
+[successes_Ed25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: ED25519}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini
new file mode 100644
index 0000000000..e7d962950c
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini
@@ -0,0 +1,114 @@
+[successes_Ed448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: ED448}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+
+[successes_Ed448.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: ED448}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini
new file mode 100644
index 0000000000..7b674a7c6d
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini
@@ -0,0 +1,7 @@
+[successes_HMAC.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_HMAC.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini
new file mode 100644
index 0000000000..1853e2b6ff
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini
@@ -0,0 +1,127 @@
+[successes_RSA-OAEP.https.any.worker.html?111-120]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?141-150]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?151-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?51-60]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?31-40]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?21-30]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?61-70]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?81-90]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?71-80]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?101-110]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?41-50]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?1-10]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?91-100]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?131-140]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?11-20]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?121-130]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?11-20]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?141-150]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?131-140]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?1-10]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?61-70]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?21-30]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?31-40]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?151-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?71-80]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?81-90]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?101-110]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?41-50]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?91-100]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?111-120]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?51-60]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?121-130]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini
new file mode 100644
index 0000000000..12aa721b5c
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini
@@ -0,0 +1,31 @@
+[successes_RSA-PSS.https.any.worker.html?11-20]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.worker.html?1-10]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.worker.html?31-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.worker.html?21-30]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.html?1-10]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.html?21-30]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.html?11-20]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.html?31-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini
new file mode 100644
index 0000000000..6987fd4ac9
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini
@@ -0,0 +1,31 @@
+[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?11-20]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?1-10]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?31-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?21-30]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.html?21-30]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.html?1-10]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.html?11-20]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.html?31-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini
new file mode 100644
index 0000000000..caed7f3b6b
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini
@@ -0,0 +1,102 @@
+[successes_X25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+
+[successes_X25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini
new file mode 100644
index 0000000000..3ccabaf4e2
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini
@@ -0,0 +1,102 @@
+[successes_X448.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+
+[successes_X448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL