summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/meta/WebCryptoAPI
diff options
context:
space:
mode:
Diffstat (limited to 'testing/web-platform/meta/WebCryptoAPI')
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_bits.https.any.js.ini200
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_keys.https.any.js.ini168
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.js.ini114
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.js.ini60
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.https.any.js.ini6582
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.js.ini71
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/rsa_oaep.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini162
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini162
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini198
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini198
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini114
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini114
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini127
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini31
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini31
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini102
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini102
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/getRandomValues.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/historical.any.js.ini11
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/idlharness.https.any.js.ini8
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.https.any.js.ini290
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey.https.any.js.ini342
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed25519.https.any.js.ini1494
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed448.https.any.js.ini1494
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X25519.https.any.js.ini1302
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X448.https.any.js.ini1300
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/import_export/rsa_importKey.https.any.js.ini870
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/import_export/symmetric_importKey.https.any.js.ini582
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/randomUUID.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini74
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini162
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini7
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.any.js.ini7
54 files changed, 16640 insertions, 0 deletions
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_bits.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_bits.https.any.js.ini
new file mode 100644
index 0000000000..77134a0665
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_bits.https.any.js.ini
@@ -0,0 +1,200 @@
+[cfrg_curves_bits.https.any.html]
+ [X25519 good parameters]
+ expected: FAIL
+
+ [X25519 mixed case parameters]
+ expected: FAIL
+
+ [X25519 with null length]
+ expected: FAIL
+
+ [X25519 short result]
+ expected: FAIL
+
+ [X25519 non-multiple of 8 bits]
+ expected: FAIL
+
+ [X25519 mismatched algorithms]
+ expected: FAIL
+
+ [X25519 no deriveBits usage for base key]
+ expected: FAIL
+
+ [X25519 base key is not a private key]
+ expected: FAIL
+
+ [X25519 public property value is a private key]
+ expected: FAIL
+
+ [X25519 public property value is a secret key]
+ expected: FAIL
+
+ [X25519 asking for too many bits]
+ expected: FAIL
+
+ [X448 good parameters]
+ expected: FAIL
+
+ [X448 mixed case parameters]
+ expected: FAIL
+
+ [X448 with null length]
+ expected: FAIL
+
+ [X448 short result]
+ expected: FAIL
+
+ [X448 non-multiple of 8 bits]
+ expected: FAIL
+
+ [X448 mismatched algorithms]
+ expected: FAIL
+
+ [X448 no deriveBits usage for base key]
+ expected: FAIL
+
+ [X448 base key is not a private key]
+ expected: FAIL
+
+ [X448 public property value is a private key]
+ expected: FAIL
+
+ [X448 public property value is a secret key]
+ expected: FAIL
+
+ [X448 asking for too many bits]
+ expected: FAIL
+
+ [X25519 key derivation checks for all-zero value result with a key of order 0]
+ expected: FAIL
+
+ [X25519 key derivation checks for all-zero value result with a key of order 1]
+ expected: FAIL
+
+ [X25519 key derivation checks for all-zero value result with a key of order 8]
+ expected: FAIL
+
+ [X25519 key derivation checks for all-zero value result with a key of order p-1 (order 2)]
+ expected: FAIL
+
+ [X25519 key derivation checks for all-zero value result with a key of order p (=0, order 4)]
+ expected: FAIL
+
+ [X25519 key derivation checks for all-zero value result with a key of order p+1 (=1, order 1)]
+ expected: FAIL
+
+ [X448 key derivation checks for all-zero value result with a key of order 0]
+ expected: FAIL
+
+ [X448 key derivation checks for all-zero value result with a key of order 1]
+ expected: FAIL
+
+ [X448 key derivation checks for all-zero value result with a key of order p-1 (order 2)]
+ expected: FAIL
+
+ [X448 key derivation checks for all-zero value result with a key of order p (=0, order 4)]
+ expected: FAIL
+
+ [X448 key derivation checks for all-zero value result with a key of order p+1 (=1, order 1)]
+ expected: FAIL
+
+
+[cfrg_curves_bits.https.any.worker.html]
+ [X25519 good parameters]
+ expected: FAIL
+
+ [X25519 mixed case parameters]
+ expected: FAIL
+
+ [X25519 with null length]
+ expected: FAIL
+
+ [X25519 short result]
+ expected: FAIL
+
+ [X25519 non-multiple of 8 bits]
+ expected: FAIL
+
+ [X25519 mismatched algorithms]
+ expected: FAIL
+
+ [X25519 no deriveBits usage for base key]
+ expected: FAIL
+
+ [X25519 base key is not a private key]
+ expected: FAIL
+
+ [X25519 public property value is a private key]
+ expected: FAIL
+
+ [X25519 public property value is a secret key]
+ expected: FAIL
+
+ [X25519 asking for too many bits]
+ expected: FAIL
+
+ [X448 good parameters]
+ expected: FAIL
+
+ [X448 mixed case parameters]
+ expected: FAIL
+
+ [X448 with null length]
+ expected: FAIL
+
+ [X448 short result]
+ expected: FAIL
+
+ [X448 non-multiple of 8 bits]
+ expected: FAIL
+
+ [X448 mismatched algorithms]
+ expected: FAIL
+
+ [X448 no deriveBits usage for base key]
+ expected: FAIL
+
+ [X448 base key is not a private key]
+ expected: FAIL
+
+ [X448 public property value is a private key]
+ expected: FAIL
+
+ [X448 public property value is a secret key]
+ expected: FAIL
+
+ [X448 asking for too many bits]
+ expected: FAIL
+
+ [X25519 key derivation checks for all-zero value result with a key of order 0]
+ expected: FAIL
+
+ [X25519 key derivation checks for all-zero value result with a key of order 1]
+ expected: FAIL
+
+ [X25519 key derivation checks for all-zero value result with a key of order 8]
+ expected: FAIL
+
+ [X25519 key derivation checks for all-zero value result with a key of order p-1 (order 2)]
+ expected: FAIL
+
+ [X25519 key derivation checks for all-zero value result with a key of order p (=0, order 4)]
+ expected: FAIL
+
+ [X25519 key derivation checks for all-zero value result with a key of order p+1 (=1, order 1)]
+ expected: FAIL
+
+ [X448 key derivation checks for all-zero value result with a key of order 0]
+ expected: FAIL
+
+ [X448 key derivation checks for all-zero value result with a key of order 1]
+ expected: FAIL
+
+ [X448 key derivation checks for all-zero value result with a key of order p-1 (order 2)]
+ expected: FAIL
+
+ [X448 key derivation checks for all-zero value result with a key of order p (=0, order 4)]
+ expected: FAIL
+
+ [X448 key derivation checks for all-zero value result with a key of order p+1 (=1, order 1)]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_keys.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_keys.https.any.js.ini
new file mode 100644
index 0000000000..812473eeb2
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_keys.https.any.js.ini
@@ -0,0 +1,168 @@
+[cfrg_curves_keys.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [X25519 good parameters]
+ expected: FAIL
+
+ [X25519 mixed case parameters]
+ expected: FAIL
+
+ [X25519 mismatched algorithms]
+ expected: FAIL
+
+ [X25519 no deriveKey usage for base key]
+ expected: FAIL
+
+ [X25519 base key is not a private key]
+ expected: FAIL
+
+ [X25519 public property value is a private key]
+ expected: FAIL
+
+ [X25519 public property value is a secret key]
+ expected: FAIL
+
+ [X448 good parameters]
+ expected: FAIL
+
+ [X448 mixed case parameters]
+ expected: FAIL
+
+ [X448 mismatched algorithms]
+ expected: FAIL
+
+ [X448 no deriveKey usage for base key]
+ expected: FAIL
+
+ [X448 base key is not a private key]
+ expected: FAIL
+
+ [X448 public property value is a private key]
+ expected: FAIL
+
+ [X448 public property value is a secret key]
+ expected: FAIL
+
+ [X25519 deriveBits checks for all-zero value result with a key of order 0]
+ expected: FAIL
+
+ [X25519 deriveBits checks for all-zero value result with a key of order 1]
+ expected: FAIL
+
+ [X25519 deriveBits checks for all-zero value result with a key of order 8]
+ expected: FAIL
+
+ [X25519 deriveBits checks for all-zero value result with a key of order p-1 (order 2)]
+ expected: FAIL
+
+ [X25519 deriveBits checks for all-zero value result with a key of order p (=0, order 4)]
+ expected: FAIL
+
+ [X25519 deriveBits checks for all-zero value result with a key of order p+1 (=1, order 1)]
+ expected: FAIL
+
+ [X448 deriveBits checks for all-zero value result with a key of order 0]
+ expected: FAIL
+
+ [X448 deriveBits checks for all-zero value result with a key of order 1]
+ expected: FAIL
+
+ [X448 deriveBits checks for all-zero value result with a key of order p-1 (order 2)]
+ expected: FAIL
+
+ [X448 deriveBits checks for all-zero value result with a key of order p (=0, order 4)]
+ expected: FAIL
+
+ [X448 deriveBits checks for all-zero value result with a key of order p+1 (=1, order 1)]
+ expected: FAIL
+
+ [Key derivation using a X25519 generated keys.]
+ expected: FAIL
+
+ [Key derivation using a X448 generated keys.]
+ expected: FAIL
+
+
+[cfrg_curves_keys.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [X25519 good parameters]
+ expected: FAIL
+
+ [X25519 mixed case parameters]
+ expected: FAIL
+
+ [X25519 mismatched algorithms]
+ expected: FAIL
+
+ [X25519 no deriveKey usage for base key]
+ expected: FAIL
+
+ [X25519 base key is not a private key]
+ expected: FAIL
+
+ [X25519 public property value is a private key]
+ expected: FAIL
+
+ [X25519 public property value is a secret key]
+ expected: FAIL
+
+ [X448 good parameters]
+ expected: FAIL
+
+ [X448 mixed case parameters]
+ expected: FAIL
+
+ [X448 mismatched algorithms]
+ expected: FAIL
+
+ [X448 no deriveKey usage for base key]
+ expected: FAIL
+
+ [X448 base key is not a private key]
+ expected: FAIL
+
+ [X448 public property value is a private key]
+ expected: FAIL
+
+ [X448 public property value is a secret key]
+ expected: FAIL
+
+ [X25519 deriveBits checks for all-zero value result with a key of order 0]
+ expected: FAIL
+
+ [X25519 deriveBits checks for all-zero value result with a key of order 1]
+ expected: FAIL
+
+ [X25519 deriveBits checks for all-zero value result with a key of order 8]
+ expected: FAIL
+
+ [X25519 deriveBits checks for all-zero value result with a key of order p-1 (order 2)]
+ expected: FAIL
+
+ [X25519 deriveBits checks for all-zero value result with a key of order p (=0, order 4)]
+ expected: FAIL
+
+ [X25519 deriveBits checks for all-zero value result with a key of order p+1 (=1, order 1)]
+ expected: FAIL
+
+ [X448 deriveBits checks for all-zero value result with a key of order 0]
+ expected: FAIL
+
+ [X448 deriveBits checks for all-zero value result with a key of order 1]
+ expected: FAIL
+
+ [X448 deriveBits checks for all-zero value result with a key of order p-1 (order 2)]
+ expected: FAIL
+
+ [X448 deriveBits checks for all-zero value result with a key of order p (=0, order 4)]
+ expected: FAIL
+
+ [X448 deriveBits checks for all-zero value result with a key of order p+1 (=1, order 1)]
+ expected: FAIL
+
+ [Key derivation using a X25519 generated keys.]
+ expected: FAIL
+
+ [Key derivation using a X448 generated keys.]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.js.ini
new file mode 100644
index 0000000000..e6e8b4838e
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.js.ini
@@ -0,0 +1,114 @@
+[ecdh_bits.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [P-521 with null length]
+ expected: FAIL
+
+ [P-256 with null length]
+ expected: FAIL
+
+ [P-384 with null length]
+ expected: FAIL
+
+ [P-521 non-multiple of 8 bits]
+ expected: FAIL
+
+ [P-256 non-multiple of 8 bits]
+ expected: FAIL
+
+ [P-384 non-multiple of 8 bits]
+ expected: FAIL
+
+ [P-521 missing public curve]
+ expected: FAIL
+
+ [P-256 missing public curve]
+ expected: FAIL
+
+ [P-384 missing public curve]
+ expected: FAIL
+
+ [P-521 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-256 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-384 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-521 mismatched curves]
+ expected: FAIL
+
+ [P-256 mismatched curves]
+ expected: FAIL
+
+ [P-384 mismatched curves]
+ expected: FAIL
+
+ [P-521 asking for too many bits]
+ expected: FAIL
+
+ [P-256 asking for too many bits]
+ expected: FAIL
+
+ [P-384 asking for too many bits]
+ expected: FAIL
+
+
+[ecdh_bits.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [P-521 with null length]
+ expected: FAIL
+
+ [P-256 with null length]
+ expected: FAIL
+
+ [P-384 with null length]
+ expected: FAIL
+
+ [P-521 non-multiple of 8 bits]
+ expected: FAIL
+
+ [P-256 non-multiple of 8 bits]
+ expected: FAIL
+
+ [P-384 non-multiple of 8 bits]
+ expected: FAIL
+
+ [P-521 missing public curve]
+ expected: FAIL
+
+ [P-256 missing public curve]
+ expected: FAIL
+
+ [P-384 missing public curve]
+ expected: FAIL
+
+ [P-521 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-256 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-384 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-521 mismatched curves]
+ expected: FAIL
+
+ [P-256 mismatched curves]
+ expected: FAIL
+
+ [P-384 mismatched curves]
+ expected: FAIL
+
+ [P-521 asking for too many bits]
+ expected: FAIL
+
+ [P-256 asking for too many bits]
+ expected: FAIL
+
+ [P-384 asking for too many bits]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.js.ini
new file mode 100644
index 0000000000..77626e97ce
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.js.ini
@@ -0,0 +1,60 @@
+[ecdh_keys.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [P-521 missing public curve]
+ expected: FAIL
+
+ [P-256 missing public curve]
+ expected: FAIL
+
+ [P-384 missing public curve]
+ expected: FAIL
+
+ [P-521 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-256 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-384 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-521 mismatched curves]
+ expected: FAIL
+
+ [P-256 mismatched curves]
+ expected: FAIL
+
+ [P-384 mismatched curves]
+ expected: FAIL
+
+
+[ecdh_keys.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [P-521 missing public curve]
+ expected: FAIL
+
+ [P-256 missing public curve]
+ expected: FAIL
+
+ [P-384 missing public curve]
+ expected: FAIL
+
+ [P-521 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-256 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-384 public property of algorithm is not a CryptoKey]
+ expected: FAIL
+
+ [P-521 mismatched curves]
+ expected: FAIL
+
+ [P-256 mismatched curves]
+ expected: FAIL
+
+ [P-384 mismatched curves]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.https.any.js.ini
new file mode 100644
index 0000000000..64ea9238c4
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.https.any.js.ini
@@ -0,0 +1,6582 @@
+[hkdf.https.any.html?1001-2000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [short derivedKey, empty salt, SHA-1, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+
+[hkdf.https.any.html?3001-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+
+[hkdf.https.any.html?1-1000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [short derivedKey, normal salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+
+[hkdf.https.any.html?2001-3000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [long derivedKey, empty salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+
+[hkdf.https.any.worker.html?3001-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, empty salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+
+[hkdf.https.any.worker.html?1001-2000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [long derivedKey, normal salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-384, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with missing info]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-1, with normal info with missing salt]
+ expected: FAIL
+
+ [long derivedKey, normal salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-384, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+
+[hkdf.https.any.worker.html?1-1000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [short derivedKey, normal salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with normal info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-512, with empty info with missing salt]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [short derivedKey, normal salt, SHA-384, with empty info with missing info]
+ expected: FAIL
+
+ [short derivedKey, empty salt, SHA-384, with normal info with missing salt]
+ expected: FAIL
+
+
+[hkdf.https.any.worker.html?2001-3000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with null length]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with missing info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with missing salt]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with normal info with missing salt]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with missing salt]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with normal info with missing info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with missing salt]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with null length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with empty info with missing info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with normal info with missing info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with missing salt]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-1, with empty info with missing info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with missing salt]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [long derivedKey, empty salt, SHA-256, with normal info with missing info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with 0 length]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
+ expected: FAIL
+
+ [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
+ expected: FAIL
+
+ [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-512, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-1, with normal info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-384, with empty info with null length]
+ expected: FAIL
+
+ [empty derivedKey, normal salt, SHA-256, with normal info with null length]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.js.ini
new file mode 100644
index 0000000000..0343227ec9
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.js.ini
@@ -0,0 +1,71 @@
+[pbkdf2.https.any.worker.html?4001-5000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.worker.html?1001-2000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.html?1-1000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.html?7001-8000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.worker.html?6001-7000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.worker.html?5001-6000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.html?1001-2000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.html?3001-4000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.html?4001-5000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.worker.html?2001-3000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.worker.html?3001-4000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.html?6001-7000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.html?5001-6000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.html?8001-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.worker.html?1-1000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.worker.html?8001-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.html?2001-3000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[pbkdf2.https.any.worker.html?7001-8000]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.any.js.ini
new file mode 100644
index 0000000000..61219c670f
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.any.js.ini
@@ -0,0 +1,7 @@
+[aes_ctr.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[aes_ctr.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.any.js.ini
new file mode 100644
index 0000000000..eb519b215d
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.any.js.ini
@@ -0,0 +1,7 @@
+[aes_gcm.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[aes_gcm.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/rsa_oaep.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/rsa_oaep.https.any.js.ini
new file mode 100644
index 0000000000..80bb338bc3
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/rsa_oaep.https.any.js.ini
@@ -0,0 +1,7 @@
+[rsa_oaep.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[rsa_oaep.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini
new file mode 100644
index 0000000000..c1d28527e5
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini
@@ -0,0 +1,7 @@
+[failures_AES-CTR.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[failures_AES-CTR.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini
new file mode 100644
index 0000000000..52e022b43f
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini
@@ -0,0 +1,7 @@
+[failures_AES-GCM.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[failures_AES-GCM.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini
new file mode 100644
index 0000000000..2fc5839c41
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini
@@ -0,0 +1,7 @@
+[failures_AES-KW.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[failures_AES-KW.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini
new file mode 100644
index 0000000000..e7a7a9a1a2
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini
@@ -0,0 +1,7 @@
+[failures_ECDH.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[failures_ECDH.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini
new file mode 100644
index 0000000000..c6104227ec
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini
@@ -0,0 +1,7 @@
+[failures_ECDSA.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[failures_ECDSA.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini
new file mode 100644
index 0000000000..e6e9903bc3
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini
@@ -0,0 +1,162 @@
+[failures_Ed25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed25519}, true, [\])]
+ expected: FAIL
+
+
+[failures_Ed25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed25519}, true, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini
new file mode 100644
index 0000000000..176963bdc3
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini
@@ -0,0 +1,162 @@
+[failures_Ed448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed448}, true, [\])]
+ expected: FAIL
+
+
+[failures_Ed448.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: Ed448}, true, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini
new file mode 100644
index 0000000000..e020fe4b59
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini
@@ -0,0 +1,7 @@
+[failures_HMAC.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[failures_HMAC.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini
new file mode 100644
index 0000000000..9cc9d4e55c
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini
@@ -0,0 +1,7 @@
+[failures_RSA-OAEP.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[failures_RSA-OAEP.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini
new file mode 100644
index 0000000000..df0d770ad4
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini
@@ -0,0 +1,7 @@
+[failures_RSA-PSS.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[failures_RSA-PSS.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini
new file mode 100644
index 0000000000..3225308e18
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini
@@ -0,0 +1,7 @@
+[failures_RSASSA-PKCS1-v1_5.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[failures_RSASSA-PKCS1-v1_5.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini
new file mode 100644
index 0000000000..f512be11d7
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini
@@ -0,0 +1,198 @@
+[failures_X25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X25519}, true, [\])]
+ expected: FAIL
+
+
+[failures_X25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X25519}, true, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini
new file mode 100644
index 0000000000..d107f088c9
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini
@@ -0,0 +1,198 @@
+[failures_X448.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X448}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X448}, true, [\])]
+ expected: FAIL
+
+
+[failures_X448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: generateKey({name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X448}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: generateKey({name: X448}, true, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini
new file mode 100644
index 0000000000..154517b671
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini
@@ -0,0 +1,7 @@
+[successes_AES-CBC.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_AES-CBC.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini
new file mode 100644
index 0000000000..077e3bc36b
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini
@@ -0,0 +1,7 @@
+[successes_AES-CTR.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_AES-CTR.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini
new file mode 100644
index 0000000000..ebf49847b2
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini
@@ -0,0 +1,7 @@
+[successes_AES-GCM.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_AES-GCM.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini
new file mode 100644
index 0000000000..f38ab81c97
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini
@@ -0,0 +1,7 @@
+[successes_AES-KW.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_AES-KW.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini
new file mode 100644
index 0000000000..52c399a706
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini
@@ -0,0 +1,7 @@
+[successes_ECDH.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_ECDH.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini
new file mode 100644
index 0000000000..851344cdd8
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini
@@ -0,0 +1,7 @@
+[successes_ECDSA.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_ECDSA.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini
new file mode 100644
index 0000000000..349f03a13c
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini
@@ -0,0 +1,114 @@
+[successes_Ed25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: ED25519}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+
+[successes_Ed25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: ED25519}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini
new file mode 100644
index 0000000000..e7d962950c
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini
@@ -0,0 +1,114 @@
+[successes_Ed448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: ED448}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+
+[successes_Ed448.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: ED448}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
+
+ [Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini
new file mode 100644
index 0000000000..7b674a7c6d
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini
@@ -0,0 +1,7 @@
+[successes_HMAC.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_HMAC.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini
new file mode 100644
index 0000000000..1853e2b6ff
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini
@@ -0,0 +1,127 @@
+[successes_RSA-OAEP.https.any.worker.html?111-120]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?141-150]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?151-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?51-60]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?31-40]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?21-30]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?61-70]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?81-90]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?71-80]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?101-110]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?41-50]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?1-10]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?91-100]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?131-140]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?11-20]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.worker.html?121-130]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?11-20]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?141-150]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?131-140]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?1-10]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?61-70]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?21-30]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?31-40]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?151-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?71-80]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?81-90]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?101-110]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?41-50]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?91-100]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?111-120]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?51-60]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-OAEP.https.any.html?121-130]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini
new file mode 100644
index 0000000000..12aa721b5c
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini
@@ -0,0 +1,31 @@
+[successes_RSA-PSS.https.any.worker.html?11-20]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.worker.html?1-10]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.worker.html?31-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.worker.html?21-30]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.html?1-10]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.html?21-30]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.html?11-20]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSA-PSS.https.any.html?31-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini
new file mode 100644
index 0000000000..6987fd4ac9
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini
@@ -0,0 +1,31 @@
+[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?11-20]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?1-10]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?31-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?21-30]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.html?21-30]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.html?1-10]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.html?11-20]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[successes_RSASSA-PKCS1-v1_5.https.any.html?31-last]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini
new file mode 100644
index 0000000000..caed7f3b6b
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini
@@ -0,0 +1,102 @@
+[successes_X25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+
+[successes_X25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini
new file mode 100644
index 0000000000..3ccabaf4e2
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini
@@ -0,0 +1,102 @@
+[successes_X448.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+
+[successes_X448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Success: generateKey({name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/getRandomValues.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/getRandomValues.any.js.ini
new file mode 100644
index 0000000000..db7b61eeac
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/getRandomValues.any.js.ini
@@ -0,0 +1,7 @@
+[getRandomValues.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[getRandomValues.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/historical.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/historical.any.js.ini
new file mode 100644
index 0000000000..2a986dea4f
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/historical.any.js.ini
@@ -0,0 +1,11 @@
+[historical.any.sharedworker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[historical.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[historical.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/idlharness.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/idlharness.https.any.js.ini
new file mode 100644
index 0000000000..07012b0ae8
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/idlharness.https.any.js.ini
@@ -0,0 +1,8 @@
+[idlharness.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+
+[idlharness.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.https.any.js.ini
new file mode 100644
index 0000000000..525c29f00f
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.https.any.js.ini
@@ -0,0 +1,290 @@
+[ec_importKey.https.any.html]
+ [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Empty Usages: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [\])]
+ expected: FAIL
+
+
+[ec_importKey.https.any.worker.html]
+ [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, true, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, false, [\])]
+ expected: PRECONDITION_FAILED
+
+ [Empty Usages: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-256}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-384}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDSA, namedCurve: P-521}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-256 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-256}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-384 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-384}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: P-521 bits (jwk, object(kty, crv, x, y, d), {name: ECDH, namedCurve: P-521}, false, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey.https.any.js.ini
new file mode 100644
index 0000000000..86e010e543
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey.https.any.js.ini
@@ -0,0 +1,342 @@
+[okp_importKey.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (spki, buffer(68), {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (spki, buffer(68), {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (raw, buffer(56), {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (raw, buffer(56), {name: X448}, false, [\])]
+ expected: FAIL
+
+
+[okp_importKey.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (spki, buffer(68), {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (spki, buffer(68), {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (raw, buffer(56), {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Good parameters: X448 bits (raw, buffer(56), {name: X448}, false, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed25519.https.any.js.ini
new file mode 100644
index 0000000000..1a94c74ec0
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed25519.https.any.js.ini
@@ -0,0 +1,1494 @@
+[okp_importKey_failures_Ed25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed25519}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed25519}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: Ed25519}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: Ed25519}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Empty usages: importKey(pkcs8, {name: Ed25519}, true, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(pkcs8, {name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(jwk(private), {name: Ed25519}, true, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(jwk(private), {name: Ed25519}, false, [\])]
+ expected: FAIL
+
+
+[okp_importKey_failures_Ed25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed25519}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed25519}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed25519}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: Ed25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: Ed25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: Ed25519}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: Ed25519}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Empty usages: importKey(pkcs8, {name: Ed25519}, true, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(pkcs8, {name: Ed25519}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(jwk(private), {name: Ed25519}, true, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(jwk(private), {name: Ed25519}, false, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed448.https.any.js.ini
new file mode 100644
index 0000000000..d03270a12c
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed448.https.any.js.ini
@@ -0,0 +1,1494 @@
+[okp_importKey_failures_Ed448.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: importKey(spki, {name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed448}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed448}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: Ed448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: Ed448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: Ed448}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: Ed448}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Empty usages: importKey(pkcs8, {name: Ed448}, true, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(pkcs8, {name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(jwk(private), {name: Ed448}, true, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(jwk(private), {name: Ed448}, false, [\])]
+ expected: FAIL
+
+
+[okp_importKey_failures_Ed448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: importKey(spki, {name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed448}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: Ed448}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, true, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: Ed448}, false, [verify, verify, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: Ed448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: Ed448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: Ed448}, true, [verify, verify\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: Ed448}, false, [verify, verify\])]
+ expected: FAIL
+
+ [Empty usages: importKey(pkcs8, {name: Ed448}, true, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(pkcs8, {name: Ed448}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(jwk(private), {name: Ed448}, true, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(jwk(private), {name: Ed448}, false, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X25519.https.any.js.ini
new file mode 100644
index 0000000000..11ce86b628
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X25519.https.any.js.ini
@@ -0,0 +1,1302 @@
+[okp_importKey_failures_X25519.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: importKey(spki, {name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(pkcs8, {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(pkcs8, {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(jwk(private), {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(jwk(private), {name: X25519}, false, [\])]
+ expected: FAIL
+
+
+[okp_importKey_failures_X25519.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: importKey(spki, {name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X25519}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(pkcs8, {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(pkcs8, {name: X25519}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(jwk(private), {name: X25519}, true, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(jwk(private), {name: X25519}, false, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X448.https.any.js.ini
new file mode 100644
index 0000000000..13b1170e2a
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X448.https.any.js.ini
@@ -0,0 +1,1300 @@
+[okp_importKey_failures_X448.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Bad usages: importKey(spki, {name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(pkcs8, {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(pkcs8, {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(jwk(private), {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(jwk(private), {name: X448}, false, [\])]
+ expected: FAIL
+
+
+[okp_importKey_failures_X448.https.any.worker.html]
+ [Bad usages: importKey(spki, {name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(spki, {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(spki, {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(jwk (public) , {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, true, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, false, [encrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, true, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, false, [decrypt\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, true, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, false, [sign\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, true, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, false, [verify\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, true, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, false, [wrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, true, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, false, [unwrapKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, true, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, true, [deriveBits\])]
+ expected: FAIL
+
+ [Bad usages: importKey(raw, {name: X448}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Bad key length: importKey(raw, {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(pkcs8, {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(pkcs8, {name: X448}, false, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(jwk(private), {name: X448}, true, [\])]
+ expected: FAIL
+
+ [Empty usages: importKey(jwk(private), {name: X448}, false, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/rsa_importKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/rsa_importKey.https.any.js.ini
new file mode 100644
index 0000000000..9214b483c5
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/import_export/rsa_importKey.https.any.js.ini
@@ -0,0 +1,870 @@
+[rsa_importKey.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+
+[rsa_importKey.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-OAEP}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSA-PSS}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 1024 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 2048 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-1, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-256, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-384, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (pkcs8, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 4096 bits (jwk, object(spki, pkcs8, jwk), {hash: SHA-512, name: RSASSA-PKCS1-v1_5}, false, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/symmetric_importKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/symmetric_importKey.https.any.js.ini
new file mode 100644
index 0000000000..1863716949
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/import_export/symmetric_importKey.https.any.js.ini
@@ -0,0 +1,582 @@
+[symmetric_importKey.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])]
+ expected: FAIL
+
+
+[symmetric_importKey.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey, deriveBits\])]
+ expected: FAIL
+
+ [Good parameters: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [deriveKey\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: A128CTR, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CTR}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: A192CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CTR}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CTR}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: A256CTR, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CTR}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: A128CBC, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-CBC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: A192CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-CBC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-CBC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: A256CBC, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-CBC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: A128GCM, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-GCM}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: A192GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-GCM}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-GCM}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: A256GCM, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-GCM}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: A128KW, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {name: AES-KW}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: A192KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {name: AES-KW}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, true, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: AES-KW}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: A256KW, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {name: AES-KW}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-1, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-1, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: HS1, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-1, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-256, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-256, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: HS256, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-256, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-384, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-384, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: HS384, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-384, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcY, kty: oct}, {hash: SHA-512, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {hash: SHA-512, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (jwk, {alg: HS512, k: AQIDBAUGBwgJCgsMDQ4PEBESExQVFhcYGRobHB0eHyA, kty: oct}, {hash: SHA-512, name: HMAC}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: HKDF}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 128 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 2: 3, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 192 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 3: 4, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])]
+ expected: FAIL
+
+ [Empty Usages: 256 bits (raw, {0: 1, 1: 2, 10: 11, 11: 12, 12: 13, 13: 14, 14: 15, 15: 16, 16: 17, 17: 18, 18: 19, 19: 20, 2: 3, 20: 21, 21: 22, 22: 23, 23: 24, 24: 25, 25: 26, 26: 27, 27: 28, 28: 29, 29: 30, 3: 4, 30: 31, 31: 32, 4: 5, 5: 6, 6: 7, 7: 8, 8: 9, 9: 10}, {name: PBKDF2}, false, [\])]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/randomUUID.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/randomUUID.https.any.js.ini
new file mode 100644
index 0000000000..283b12b2df
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/randomUUID.https.any.js.ini
@@ -0,0 +1,7 @@
+[randomUUID.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[randomUUID.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini
new file mode 100644
index 0000000000..82e2430519
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini
@@ -0,0 +1,74 @@
+[ecdsa.https.any.worker.html]
+ [ECDSA P-256 with SHA-1 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-256 with SHA-256 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-256 with SHA-384 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-256 with SHA-512 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-384 with SHA-1 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-384 with SHA-256 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-384 with SHA-384 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-384 with SHA-512 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-521 with SHA-1 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-521 with SHA-256 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-521 with SHA-384 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-521 with SHA-512 verification failure due to bad hash name]
+ expected: FAIL
+
+
+[ecdsa.https.any.html]
+ [ECDSA P-256 with SHA-1 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-256 with SHA-256 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-256 with SHA-384 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-256 with SHA-512 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-384 with SHA-1 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-384 with SHA-256 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-384 with SHA-384 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-384 with SHA-512 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-521 with SHA-1 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-521 with SHA-256 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-521 with SHA-384 verification failure due to bad hash name]
+ expected: FAIL
+
+ [ECDSA P-521 with SHA-512 verification failure due to bad hash name]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini
new file mode 100644
index 0000000000..d3ad2069a9
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini
@@ -0,0 +1,162 @@
+[eddsa.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [importVectorKeys step: EdDSA Ed25519 verification]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verification with altered signature after call]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification with altered signature after call]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 with altered data after call]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 with altered data after call]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 using privateKey to verify]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 using privateKey to verify]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 using publicKey to sign]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 using publicKey to sign]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 no verify usage]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 no verify usage]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 round trip]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 round trip]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verification failure due to altered signature]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification failure due to altered signature]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verification failure due to shortened signature]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification failure due to shortened signature]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verification failure due to altered data]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification failure due to altered data]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 signing with wrong algorithm name]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 signing with wrong algorithm name]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verifying with wrong algorithm name]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verifying with wrong algorithm name]
+ expected: FAIL
+
+ [Sign and verify using generated Ed25519 keys.]
+ expected: FAIL
+
+ [Sign and verify using generated Ed448 keys.]
+ expected: FAIL
+
+
+[eddsa.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+ [importVectorKeys step: EdDSA Ed25519 verification]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verification with altered signature after call]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification with altered signature after call]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 with altered data after call]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 with altered data after call]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 using privateKey to verify]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 using privateKey to verify]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 using publicKey to sign]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 using publicKey to sign]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 no verify usage]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 no verify usage]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 round trip]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 round trip]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verification failure due to altered signature]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification failure due to altered signature]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verification failure due to shortened signature]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification failure due to shortened signature]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verification failure due to altered data]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verification failure due to altered data]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 signing with wrong algorithm name]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 signing with wrong algorithm name]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed25519 verifying with wrong algorithm name]
+ expected: FAIL
+
+ [importVectorKeys step: EdDSA Ed448 verifying with wrong algorithm name]
+ expected: FAIL
+
+ [Sign and verify using generated Ed25519 keys.]
+ expected: FAIL
+
+ [Sign and verify using generated Ed448 keys.]
+ expected: FAIL
diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini
new file mode 100644
index 0000000000..030318f47d
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini
@@ -0,0 +1,7 @@
+[hmac.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[hmac.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini
new file mode 100644
index 0000000000..b4566ade12
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini
@@ -0,0 +1,7 @@
+[rsa_pkcs.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[rsa_pkcs.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini
new file mode 100644
index 0000000000..0b8a8bc8ea
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini
@@ -0,0 +1,7 @@
+[rsa_pss.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[rsa_pss.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
diff --git a/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.any.js.ini
new file mode 100644
index 0000000000..f01137ff3c
--- /dev/null
+++ b/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.any.js.ini
@@ -0,0 +1,7 @@
+[wrapKey_unwrapKey.https.any.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]
+
+[wrapKey_unwrapKey.https.any.worker.html]
+ expected:
+ if (os == "android") and fission: [OK, TIMEOUT]