diff options
Diffstat (limited to 'testing/web-platform/meta/WebCryptoAPI')
54 files changed, 16640 insertions, 0 deletions
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_bits.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_bits.https.any.js.ini new file mode 100644 index 0000000000..77134a0665 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_bits.https.any.js.ini @@ -0,0 +1,200 @@ +[cfrg_curves_bits.https.any.html] + [X25519 good parameters] + expected: FAIL + + [X25519 mixed case parameters] + expected: FAIL + + [X25519 with null length] + expected: FAIL + + [X25519 short result] + expected: FAIL + + [X25519 non-multiple of 8 bits] + expected: FAIL + + [X25519 mismatched algorithms] + expected: FAIL + + [X25519 no deriveBits usage for base key] + expected: FAIL + + [X25519 base key is not a private key] + expected: FAIL + + [X25519 public property value is a private key] + expected: FAIL + + [X25519 public property value is a secret key] + expected: FAIL + + [X25519 asking for too many bits] + expected: FAIL + + [X448 good parameters] + expected: FAIL + + [X448 mixed case parameters] + expected: FAIL + + [X448 with null length] + expected: FAIL + + [X448 short result] + expected: FAIL + + [X448 non-multiple of 8 bits] + expected: FAIL + + [X448 mismatched algorithms] + expected: FAIL + + [X448 no deriveBits usage for base key] + expected: FAIL + + [X448 base key is not a private key] + expected: FAIL + + [X448 public property value is a private key] + expected: FAIL + + [X448 public property value is a secret key] + expected: FAIL + + [X448 asking for too many bits] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order 0] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order 1] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order 8] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order p-1 (order 2)] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order p (=0, order 4)] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order p+1 (=1, order 1)] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order 0] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order 1] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order p-1 (order 2)] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order p (=0, order 4)] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order p+1 (=1, order 1)] + expected: FAIL + + +[cfrg_curves_bits.https.any.worker.html] + [X25519 good parameters] + expected: FAIL + + [X25519 mixed case parameters] + expected: FAIL + + [X25519 with null length] + expected: FAIL + + [X25519 short result] + expected: FAIL + + [X25519 non-multiple of 8 bits] + expected: FAIL + + [X25519 mismatched algorithms] + expected: FAIL + + [X25519 no deriveBits usage for base key] + expected: FAIL + + [X25519 base key is not a private key] + expected: FAIL + + [X25519 public property value is a private key] + expected: FAIL + + [X25519 public property value is a secret key] + expected: FAIL + + [X25519 asking for too many bits] + expected: FAIL + + [X448 good parameters] + expected: FAIL + + [X448 mixed case parameters] + expected: FAIL + + [X448 with null length] + expected: FAIL + + [X448 short result] + expected: FAIL + + [X448 non-multiple of 8 bits] + expected: FAIL + + [X448 mismatched algorithms] + expected: FAIL + + [X448 no deriveBits usage for base key] + expected: FAIL + + [X448 base key is not a private key] + expected: FAIL + + [X448 public property value is a private key] + expected: FAIL + + [X448 public property value is a secret key] + expected: FAIL + + [X448 asking for too many bits] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order 0] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order 1] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order 8] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order p-1 (order 2)] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order p (=0, order 4)] + expected: FAIL + + [X25519 key derivation checks for all-zero value result with a key of order p+1 (=1, order 1)] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order 0] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order 1] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order p-1 (order 2)] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order p (=0, order 4)] + expected: FAIL + + [X448 key derivation checks for all-zero value result with a key of order p+1 (=1, order 1)] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_keys.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_keys.https.any.js.ini new file mode 100644 index 0000000000..812473eeb2 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_keys.https.any.js.ini @@ -0,0 +1,168 @@ +[cfrg_curves_keys.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [X25519 good parameters] + expected: FAIL + + [X25519 mixed case parameters] + expected: FAIL + + [X25519 mismatched algorithms] + expected: FAIL + + [X25519 no deriveKey usage for base key] + expected: FAIL + + [X25519 base key is not a private key] + expected: FAIL + + [X25519 public property value is a private key] + expected: FAIL + + [X25519 public property value is a secret key] + expected: FAIL + + [X448 good parameters] + expected: FAIL + + [X448 mixed case parameters] + expected: FAIL + + [X448 mismatched algorithms] + expected: FAIL + + [X448 no deriveKey usage for base key] + expected: FAIL + + [X448 base key is not a private key] + expected: FAIL + + [X448 public property value is a private key] + expected: FAIL + + [X448 public property value is a secret key] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order 0] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order 1] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order 8] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order p-1 (order 2)] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order p (=0, order 4)] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order p+1 (=1, order 1)] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order 0] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order 1] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order p-1 (order 2)] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order p (=0, order 4)] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order p+1 (=1, order 1)] + expected: FAIL + + [Key derivation using a X25519 generated keys.] + expected: FAIL + + [Key derivation using a X448 generated keys.] + expected: FAIL + + +[cfrg_curves_keys.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [X25519 good parameters] + expected: FAIL + + [X25519 mixed case parameters] + expected: FAIL + + [X25519 mismatched algorithms] + expected: FAIL + + [X25519 no deriveKey usage for base key] + expected: FAIL + + [X25519 base key is not a private key] + expected: FAIL + + [X25519 public property value is a private key] + expected: FAIL + + [X25519 public property value is a secret key] + expected: FAIL + + [X448 good parameters] + expected: FAIL + + [X448 mixed case parameters] + expected: FAIL + + [X448 mismatched algorithms] + expected: FAIL + + [X448 no deriveKey usage for base key] + expected: FAIL + + [X448 base key is not a private key] + expected: FAIL + + [X448 public property value is a private key] + expected: FAIL + + [X448 public property value is a secret key] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order 0] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order 1] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order 8] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order p-1 (order 2)] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order p (=0, order 4)] + expected: FAIL + + [X25519 deriveBits checks for all-zero value result with a key of order p+1 (=1, order 1)] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order 0] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order 1] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order p-1 (order 2)] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order p (=0, order 4)] + expected: FAIL + + [X448 deriveBits checks for all-zero value result with a key of order p+1 (=1, order 1)] + expected: FAIL + + [Key derivation using a X25519 generated keys.] + expected: FAIL + + [Key derivation using a X448 generated keys.] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.js.ini new file mode 100644 index 0000000000..e6e8b4838e --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.js.ini @@ -0,0 +1,114 @@ +[ecdh_bits.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [P-521 with null length] + expected: FAIL + + [P-256 with null length] + expected: FAIL + + [P-384 with null length] + expected: FAIL + + [P-521 non-multiple of 8 bits] + expected: FAIL + + [P-256 non-multiple of 8 bits] + expected: FAIL + + [P-384 non-multiple of 8 bits] + expected: FAIL + + [P-521 missing public curve] + expected: FAIL + + [P-256 missing public curve] + expected: FAIL + + [P-384 missing public curve] + expected: FAIL + + [P-521 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-256 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-384 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-521 mismatched curves] + expected: FAIL + + [P-256 mismatched curves] + expected: FAIL + + [P-384 mismatched curves] + expected: FAIL + + [P-521 asking for too many bits] + expected: FAIL + + [P-256 asking for too many bits] + expected: FAIL + + [P-384 asking for too many bits] + expected: FAIL + + +[ecdh_bits.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [P-521 with null length] + expected: FAIL + + [P-256 with null length] + expected: FAIL + + [P-384 with null length] + expected: FAIL + + [P-521 non-multiple of 8 bits] + expected: FAIL + + [P-256 non-multiple of 8 bits] + expected: FAIL + + [P-384 non-multiple of 8 bits] + expected: FAIL + + [P-521 missing public curve] + expected: FAIL + + [P-256 missing public curve] + expected: FAIL + + [P-384 missing public curve] + expected: FAIL + + [P-521 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-256 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-384 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-521 mismatched curves] + expected: FAIL + + [P-256 mismatched curves] + expected: FAIL + + [P-384 mismatched curves] + expected: FAIL + + [P-521 asking for too many bits] + expected: FAIL + + [P-256 asking for too many bits] + expected: FAIL + + [P-384 asking for too many bits] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.js.ini new file mode 100644 index 0000000000..77626e97ce --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.js.ini @@ -0,0 +1,60 @@ +[ecdh_keys.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [P-521 missing public curve] + expected: FAIL + + [P-256 missing public curve] + expected: FAIL + + [P-384 missing public curve] + expected: FAIL + + [P-521 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-256 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-384 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-521 mismatched curves] + expected: FAIL + + [P-256 mismatched curves] + expected: FAIL + + [P-384 mismatched curves] + expected: FAIL + + +[ecdh_keys.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [P-521 missing public curve] + expected: FAIL + + [P-256 missing public curve] + expected: FAIL + + [P-384 missing public curve] + expected: FAIL + + [P-521 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-256 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-384 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-521 mismatched curves] + expected: FAIL + + [P-256 mismatched curves] + expected: FAIL + + [P-384 mismatched curves] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.https.any.js.ini new file mode 100644 index 0000000000..64ea9238c4 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.https.any.js.ini @@ -0,0 +1,6582 @@ +[hkdf.https.any.html?1001-2000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [short derivedKey, empty salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + +[hkdf.https.any.html?3001-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with null length] + expected: FAIL + + +[hkdf.https.any.html?1-1000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [short derivedKey, normal salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with 0 length] + expected: FAIL + + +[hkdf.https.any.html?2001-3000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [long derivedKey, empty salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with null length] + expected: FAIL + + +[hkdf.https.any.worker.html?3001-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with null length] + expected: FAIL + + +[hkdf.https.any.worker.html?1001-2000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [long derivedKey, normal salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + +[hkdf.https.any.worker.html?1-1000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [short derivedKey, normal salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with missing salt] + expected: FAIL + + +[hkdf.https.any.worker.html?2001-3000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with null length] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with missing info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with missing info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with null length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with null length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with missing info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with missing info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with null length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with missing info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with null length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with missing info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with null length] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.js.ini new file mode 100644 index 0000000000..0343227ec9 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.js.ini @@ -0,0 +1,71 @@ +[pbkdf2.https.any.worker.html?4001-5000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.worker.html?1001-2000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.html?1-1000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.html?7001-8000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.worker.html?6001-7000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.worker.html?5001-6000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.html?1001-2000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.html?3001-4000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.html?4001-5000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.worker.html?2001-3000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.worker.html?3001-4000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.html?6001-7000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.html?5001-6000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.html?8001-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.worker.html?1-1000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.worker.html?8001-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.html?2001-3000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.worker.html?7001-8000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.any.js.ini new file mode 100644 index 0000000000..61219c670f --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.any.js.ini @@ -0,0 +1,7 @@ +[aes_ctr.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[aes_ctr.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.any.js.ini new file mode 100644 index 0000000000..eb519b215d --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.any.js.ini @@ -0,0 +1,7 @@ +[aes_gcm.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[aes_gcm.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/rsa_oaep.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/rsa_oaep.https.any.js.ini new file mode 100644 index 0000000000..80bb338bc3 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/rsa_oaep.https.any.js.ini @@ -0,0 +1,7 @@ +[rsa_oaep.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[rsa_oaep.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini new file mode 100644 index 0000000000..c1d28527e5 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini @@ -0,0 +1,7 @@ +[failures_AES-CTR.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[failures_AES-CTR.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini new file mode 100644 index 0000000000..52e022b43f --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini @@ -0,0 +1,7 @@ +[failures_AES-GCM.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[failures_AES-GCM.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini new file mode 100644 index 0000000000..2fc5839c41 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini @@ -0,0 +1,7 @@ +[failures_AES-KW.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[failures_AES-KW.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini new file mode 100644 index 0000000000..e7a7a9a1a2 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini @@ -0,0 +1,7 @@ +[failures_ECDH.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[failures_ECDH.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini new file mode 100644 index 0000000000..c6104227ec --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini @@ -0,0 +1,7 @@ +[failures_ECDSA.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[failures_ECDSA.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini new file mode 100644 index 0000000000..e6e9903bc3 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini @@ -0,0 +1,162 @@ +[failures_Ed25519.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed25519}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed25519}, true, [\])] + expected: FAIL + + +[failures_Ed25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed25519}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed25519}, true, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini new file mode 100644 index 0000000000..176963bdc3 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini @@ -0,0 +1,162 @@ +[failures_Ed448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed448}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed448}, true, [\])] + expected: FAIL + + +[failures_Ed448.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed448}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed448}, true, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini new file mode 100644 index 0000000000..e020fe4b59 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini @@ -0,0 +1,7 @@ +[failures_HMAC.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[failures_HMAC.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini new file mode 100644 index 0000000000..9cc9d4e55c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini @@ -0,0 +1,7 @@ +[failures_RSA-OAEP.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[failures_RSA-OAEP.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini new file mode 100644 index 0000000000..df0d770ad4 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini @@ -0,0 +1,7 @@ +[failures_RSA-PSS.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[failures_RSA-PSS.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini new file mode 100644 index 0000000000..3225308e18 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini @@ -0,0 +1,7 @@ +[failures_RSASSA-PKCS1-v1_5.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[failures_RSASSA-PKCS1-v1_5.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini new file mode 100644 index 0000000000..f512be11d7 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini @@ -0,0 +1,198 @@ +[failures_X25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({name: X25519}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: X25519}, true, [\])] + expected: FAIL + + +[failures_X25519.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({name: X25519}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: X25519}, true, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini new file mode 100644 index 0000000000..d107f088c9 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini @@ -0,0 +1,198 @@ +[failures_X448.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({name: X448}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: X448}, true, [\])] + expected: FAIL + + +[failures_X448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({name: X448}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: X448}, true, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini new file mode 100644 index 0000000000..154517b671 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini @@ -0,0 +1,7 @@ +[successes_AES-CBC.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_AES-CBC.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini new file mode 100644 index 0000000000..077e3bc36b --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini @@ -0,0 +1,7 @@ +[successes_AES-CTR.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_AES-CTR.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini new file mode 100644 index 0000000000..ebf49847b2 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini @@ -0,0 +1,7 @@ +[successes_AES-GCM.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_AES-GCM.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini new file mode 100644 index 0000000000..f38ab81c97 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini @@ -0,0 +1,7 @@ +[successes_AES-KW.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_AES-KW.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini new file mode 100644 index 0000000000..52c399a706 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini @@ -0,0 +1,7 @@ +[successes_ECDH.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_ECDH.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini new file mode 100644 index 0000000000..851344cdd8 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini @@ -0,0 +1,7 @@ +[successes_ECDSA.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_ECDSA.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini new file mode 100644 index 0000000000..349f03a13c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini @@ -0,0 +1,114 @@ +[successes_Ed25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: ED25519}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + +[successes_Ed25519.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: ED25519}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini new file mode 100644 index 0000000000..e7d962950c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini @@ -0,0 +1,114 @@ +[successes_Ed448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: ED448}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed448}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + +[successes_Ed448.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: ED448}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed448}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini new file mode 100644 index 0000000000..7b674a7c6d --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini @@ -0,0 +1,7 @@ +[successes_HMAC.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_HMAC.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini new file mode 100644 index 0000000000..1853e2b6ff --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini @@ -0,0 +1,127 @@ +[successes_RSA-OAEP.https.any.worker.html?111-120] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?141-150] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?151-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?51-60] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?31-40] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?21-30] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?61-70] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?81-90] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?71-80] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?101-110] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?41-50] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?1-10] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?91-100] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?131-140] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?11-20] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.worker.html?121-130] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?11-20] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?141-150] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?131-140] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?1-10] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?61-70] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?21-30] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?31-40] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?151-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?71-80] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?81-90] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?101-110] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?41-50] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?91-100] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?111-120] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?51-60] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?121-130] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini new file mode 100644 index 0000000000..12aa721b5c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini @@ -0,0 +1,31 @@ +[successes_RSA-PSS.https.any.worker.html?11-20] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.worker.html?1-10] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.worker.html?31-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.worker.html?21-30] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.html?1-10] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.html?21-30] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.html?11-20] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.html?31-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini new file mode 100644 index 0000000000..6987fd4ac9 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini @@ -0,0 +1,31 @@ +[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?11-20] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?1-10] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?31-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?21-30] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.html?21-30] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.html?1-10] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.html?11-20] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.html?31-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini new file mode 100644 index 0000000000..caed7f3b6b --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini @@ -0,0 +1,102 @@ +[successes_X25519.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + +[successes_X25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini new file mode 100644 index 0000000000..3ccabaf4e2 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini @@ -0,0 +1,102 @@ +[successes_X448.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: X448}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + +[successes_X448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: X448}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/getRandomValues.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/getRandomValues.any.js.ini new file mode 100644 index 0000000000..db7b61eeac --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/getRandomValues.any.js.ini @@ -0,0 +1,7 @@ +[getRandomValues.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[getRandomValues.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/historical.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/historical.any.js.ini new file mode 100644 index 0000000000..2a986dea4f --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/historical.any.js.ini @@ -0,0 +1,11 @@ +[historical.any.sharedworker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[historical.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[historical.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/idlharness.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/idlharness.https.any.js.ini new file mode 100644 index 0000000000..07012b0ae8 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/idlharness.https.any.js.ini @@ -0,0 +1,8 @@ +[idlharness.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + + +[idlharness.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.https.any.js.ini new file mode 100644 index 0000000000..525c29f00f --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.https.any.js.ini @@ -0,0 +1,290 @@ +[ec_importKey.https.any.html] + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: PRECONDITION_FAILED + + [Empty Usages: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Empty Usages: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Empty Usages: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Empty Usages: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Empty Usages: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Empty Usages: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Empty Usages: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Empty Usages: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Empty Usages: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Empty Usages: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Empty Usages: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Empty Usages: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Empty Usages: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Empty Usages: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Empty Usages: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Empty Usages: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Empty Usages: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Empty Usages: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Empty Usages: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Empty Usages: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Empty Usages: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Empty Usages: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Empty Usages: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Empty Usages: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: FAIL + + +[ec_importKey.https.any.worker.html] + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: PRECONDITION_FAILED + + [Empty Usages: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Empty Usages: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Empty Usages: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Empty Usages: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Empty Usages: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Empty Usages: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Empty Usages: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Empty Usages: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Empty Usages: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Empty Usages: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Empty Usages: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Empty Usages: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Empty Usages: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Empty Usages: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: FAIL + + [Empty Usages: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Empty Usages: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: FAIL + + [Empty Usages: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Empty Usages: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: FAIL + + [Empty Usages: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Empty Usages: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: FAIL + + [Empty Usages: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Empty Usages: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: FAIL + + [Empty Usages: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: FAIL + + [Empty Usages: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey.https.any.js.ini new file mode 100644 index 0000000000..86e010e543 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey.https.any.js.ini @@ -0,0 +1,342 @@ +[okp_importKey.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, true, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, true, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, false, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, false, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, true, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, true, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, false, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, false, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, true, [\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, true, [\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, false, [\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, false, [\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (spki, buffer(68), {name: X448}, true, [\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, true, [\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (spki, buffer(68), {name: X448}, false, [\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, false, [\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, true, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, false, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, true, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, false, [\])] + expected: FAIL + + [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, true, [\])] + expected: FAIL + + [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, false, [\])] + expected: FAIL + + [Good parameters: X448 bits (raw, buffer(56), {name: X448}, true, [\])] + expected: FAIL + + [Good parameters: X448 bits (raw, buffer(56), {name: X448}, false, [\])] + expected: FAIL + + +[okp_importKey.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, true, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, true, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, false, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, false, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, true, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, true, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, false, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, false, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, true, [\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, true, [\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, false, [\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, false, [\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (spki, buffer(68), {name: X448}, true, [\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, true, [\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (spki, buffer(68), {name: X448}, false, [\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, false, [\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, true, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, false, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, true, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, false, [\])] + expected: FAIL + + [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, true, [\])] + expected: FAIL + + [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, false, [\])] + expected: FAIL + + [Good parameters: X448 bits (raw, buffer(56), {name: X448}, true, [\])] + expected: FAIL + + [Good parameters: X448 bits (raw, buffer(56), {name: X448}, false, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed25519.https.any.js.ini new file mode 100644 index 0000000000..1a94c74ec0 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed25519.https.any.js.ini @@ -0,0 +1,1494 @@ +[okp_importKey_failures_Ed25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: importKey(spki, {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Empty usages: importKey(pkcs8, {name: Ed25519}, true, [\])] + expected: FAIL + + [Empty usages: importKey(pkcs8, {name: Ed25519}, false, [\])] + expected: FAIL + + [Empty usages: importKey(jwk(private), {name: Ed25519}, true, [\])] + expected: FAIL + + [Empty usages: importKey(jwk(private), {name: Ed25519}, false, [\])] + expected: FAIL + + +[okp_importKey_failures_Ed25519.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: importKey(spki, {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Empty usages: importKey(pkcs8, {name: Ed25519}, true, [\])] + expected: FAIL + + [Empty usages: importKey(pkcs8, {name: Ed25519}, false, [\])] + expected: FAIL + + [Empty usages: importKey(jwk(private), {name: Ed25519}, true, [\])] + expected: FAIL + + [Empty usages: importKey(jwk(private), {name: Ed25519}, false, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed448.https.any.js.ini new file mode 100644 index 0000000000..d03270a12c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed448.https.any.js.ini @@ -0,0 +1,1494 @@ +[okp_importKey_failures_Ed448.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: importKey(spki, {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, false, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify, verify\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed448}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed448}, false, [verify, verify\])] + expected: FAIL + + [Empty usages: importKey(pkcs8, {name: Ed448}, true, [\])] + expected: FAIL + + [Empty usages: importKey(pkcs8, {name: Ed448}, false, [\])] + expected: FAIL + + [Empty usages: importKey(jwk(private), {name: Ed448}, true, [\])] + expected: FAIL + + [Empty usages: importKey(jwk(private), {name: Ed448}, false, [\])] + expected: FAIL + + +[okp_importKey_failures_Ed448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: importKey(spki, {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, false, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify, verify\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed448}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: Ed448}, false, [verify, verify\])] + expected: FAIL + + [Empty usages: importKey(pkcs8, {name: Ed448}, true, [\])] + expected: FAIL + + [Empty usages: importKey(pkcs8, {name: Ed448}, false, [\])] + expected: FAIL + + [Empty usages: importKey(jwk(private), {name: Ed448}, true, [\])] + expected: FAIL + + [Empty usages: importKey(jwk(private), {name: Ed448}, false, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X25519.https.any.js.ini new file mode 100644 index 0000000000..11ce86b628 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X25519.https.any.js.ini @@ -0,0 +1,1302 @@ +[okp_importKey_failures_X25519.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: importKey(spki, {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X25519}, true, [\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X25519}, false, [\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X25519}, true, [\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X25519}, false, [\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, true, [\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, false, [\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: X25519}, true, [\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: X25519}, false, [\])] + expected: FAIL + + [Empty usages: importKey(pkcs8, {name: X25519}, true, [\])] + expected: FAIL + + [Empty usages: importKey(pkcs8, {name: X25519}, false, [\])] + expected: FAIL + + [Empty usages: importKey(jwk(private), {name: X25519}, true, [\])] + expected: FAIL + + [Empty usages: importKey(jwk(private), {name: X25519}, false, [\])] + expected: FAIL + + +[okp_importKey_failures_X25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: importKey(spki, {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X25519}, true, [\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X25519}, false, [\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X25519}, true, [\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X25519}, false, [\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, true, [\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, false, [\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: X25519}, true, [\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: X25519}, false, [\])] + expected: FAIL + + [Empty usages: importKey(pkcs8, {name: X25519}, true, [\])] + expected: FAIL + + [Empty usages: importKey(pkcs8, {name: X25519}, false, [\])] + expected: FAIL + + [Empty usages: importKey(jwk(private), {name: X25519}, true, [\])] + expected: FAIL + + [Empty usages: importKey(jwk(private), {name: X25519}, false, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X448.https.any.js.ini new file mode 100644 index 0000000000..13b1170e2a --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X448.https.any.js.ini @@ -0,0 +1,1300 @@ +[okp_importKey_failures_X448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: importKey(spki, {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X448}, true, [\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X448}, false, [\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X448}, true, [\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X448}, false, [\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, true, [\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, false, [\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: X448}, true, [\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: X448}, false, [\])] + expected: FAIL + + [Empty usages: importKey(pkcs8, {name: X448}, true, [\])] + expected: FAIL + + [Empty usages: importKey(pkcs8, {name: X448}, false, [\])] + expected: FAIL + + [Empty usages: importKey(jwk(private), {name: X448}, true, [\])] + expected: FAIL + + [Empty usages: importKey(jwk(private), {name: X448}, false, [\])] + expected: FAIL + + +[okp_importKey_failures_X448.https.any.worker.html] + [Bad usages: importKey(spki, {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X448}, true, [\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X448}, false, [\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X448}, true, [\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X448}, false, [\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, true, [\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, false, [\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(raw, {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: X448}, true, [\])] + expected: FAIL + + [Bad key length: importKey(raw, {name: X448}, false, [\])] + expected: FAIL + + [Empty usages: importKey(pkcs8, {name: X448}, true, [\])] + expected: FAIL + + [Empty usages: importKey(pkcs8, {name: X448}, false, [\])] + expected: FAIL + + [Empty usages: importKey(jwk(private), {name: X448}, true, [\])] + expected: FAIL + + [Empty usages: importKey(jwk(private), {name: X448}, false, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/rsa_importKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/rsa_importKey.https.any.js.ini new file mode 100644 index 0000000000..9214b483c5 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/import_export/rsa_importKey.https.any.js.ini @@ -0,0 +1,870 @@ +[rsa_importKey.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + +[rsa_importKey.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL + + [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/symmetric_importKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/symmetric_importKey.https.any.js.ini new file mode 100644 index 0000000000..1863716949 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/import_export/symmetric_importKey.https.any.js.ini @@ -0,0 +1,582 @@ +[symmetric_importKey.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])] + expected: FAIL + + +[symmetric_importKey.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])] + expected: FAIL + + [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [\])] + expected: FAIL + + [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])] + expected: FAIL + + [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])] + expected: FAIL + + [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/randomUUID.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/randomUUID.https.any.js.ini new file mode 100644 index 0000000000..283b12b2df --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/randomUUID.https.any.js.ini @@ -0,0 +1,7 @@ +[randomUUID.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[randomUUID.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini new file mode 100644 index 0000000000..82e2430519 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini @@ -0,0 +1,74 @@ +[ecdsa.https.any.worker.html] + [ECDSA P-256 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + +[ecdsa.https.any.html] + [ECDSA P-256 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-512 verification failure due to bad hash name] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini new file mode 100644 index 0000000000..d3ad2069a9 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini @@ -0,0 +1,162 @@ +[eddsa.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [importVectorKeys step: EdDSA Ed25519 verification] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 with altered data after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 with altered data after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 no verify usage] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 no verify usage] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 round trip] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 round trip] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to altered data] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to altered data] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verifying with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verifying with wrong algorithm name] + expected: FAIL + + [Sign and verify using generated Ed25519 keys.] + expected: FAIL + + [Sign and verify using generated Ed448 keys.] + expected: FAIL + + +[eddsa.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [importVectorKeys step: EdDSA Ed25519 verification] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 with altered data after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 with altered data after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 no verify usage] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 no verify usage] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 round trip] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 round trip] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to altered data] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to altered data] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verifying with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verifying with wrong algorithm name] + expected: FAIL + + [Sign and verify using generated Ed25519 keys.] + expected: FAIL + + [Sign and verify using generated Ed448 keys.] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini new file mode 100644 index 0000000000..030318f47d --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini @@ -0,0 +1,7 @@ +[hmac.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[hmac.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini new file mode 100644 index 0000000000..b4566ade12 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini @@ -0,0 +1,7 @@ +[rsa_pkcs.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[rsa_pkcs.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini new file mode 100644 index 0000000000..0b8a8bc8ea --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini @@ -0,0 +1,7 @@ +[rsa_pss.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[rsa_pss.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.any.js.ini new file mode 100644 index 0000000000..f01137ff3c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.any.js.ini @@ -0,0 +1,7 @@ +[wrapKey_unwrapKey.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[wrapKey_unwrapKey.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] |