diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 09:22:09 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 09:22:09 +0000 |
commit | 43a97878ce14b72f0981164f87f2e35e14151312 (patch) | |
tree | 620249daf56c0258faa40cbdcf9cfba06de2a846 /testing/web-platform/meta/WebCryptoAPI | |
parent | Initial commit. (diff) | |
download | firefox-43a97878ce14b72f0981164f87f2e35e14151312.tar.xz firefox-43a97878ce14b72f0981164f87f2e35e14151312.zip |
Adding upstream version 110.0.1.upstream/110.0.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/meta/WebCryptoAPI')
55 files changed, 13579 insertions, 0 deletions
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_bits.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_bits.https.any.js.ini new file mode 100644 index 0000000000..5bdf5da8da --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_bits.https.any.js.ini @@ -0,0 +1,134 @@ +[cfrg_curves_bits.https.any.html] + [X25519 good parameters] + expected: FAIL + + [X25519 mixed case parameters] + expected: FAIL + + [X25519 with null length] + expected: FAIL + + [X25519 short result] + expected: FAIL + + [X25519 non-multiple of 8 bits] + expected: FAIL + + [X25519 mismatched algorithms] + expected: FAIL + + [X25519 no deriveBits usage for base key] + expected: FAIL + + [X25519 base key is not a private key] + expected: FAIL + + [X25519 public property value is a private key] + expected: FAIL + + [X25519 public property value is a secret key] + expected: FAIL + + [X25519 asking for too many bits] + expected: FAIL + + [X448 good parameters] + expected: FAIL + + [X448 mixed case parameters] + expected: FAIL + + [X448 with null length] + expected: FAIL + + [X448 short result] + expected: FAIL + + [X448 non-multiple of 8 bits] + expected: FAIL + + [X448 mismatched algorithms] + expected: FAIL + + [X448 no deriveBits usage for base key] + expected: FAIL + + [X448 base key is not a private key] + expected: FAIL + + [X448 public property value is a private key] + expected: FAIL + + [X448 public property value is a secret key] + expected: FAIL + + [X448 asking for too many bits] + expected: FAIL + + +[cfrg_curves_bits.https.any.worker.html] + [X25519 good parameters] + expected: FAIL + + [X25519 mixed case parameters] + expected: FAIL + + [X25519 with null length] + expected: FAIL + + [X25519 short result] + expected: FAIL + + [X25519 non-multiple of 8 bits] + expected: FAIL + + [X25519 mismatched algorithms] + expected: FAIL + + [X25519 no deriveBits usage for base key] + expected: FAIL + + [X25519 base key is not a private key] + expected: FAIL + + [X25519 public property value is a private key] + expected: FAIL + + [X25519 public property value is a secret key] + expected: FAIL + + [X25519 asking for too many bits] + expected: FAIL + + [X448 good parameters] + expected: FAIL + + [X448 mixed case parameters] + expected: FAIL + + [X448 with null length] + expected: FAIL + + [X448 short result] + expected: FAIL + + [X448 non-multiple of 8 bits] + expected: FAIL + + [X448 mismatched algorithms] + expected: FAIL + + [X448 no deriveBits usage for base key] + expected: FAIL + + [X448 base key is not a private key] + expected: FAIL + + [X448 public property value is a private key] + expected: FAIL + + [X448 public property value is a secret key] + expected: FAIL + + [X448 asking for too many bits] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_keys.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_keys.https.any.js.ini new file mode 100644 index 0000000000..8656ad9277 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/cfrg_curves_keys.https.any.js.ini @@ -0,0 +1,90 @@ +[cfrg_curves_keys.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [X25519 good parameters] + expected: FAIL + + [X25519 mixed case parameters] + expected: FAIL + + [X25519 mismatched algorithms] + expected: FAIL + + [X25519 no deriveKey usage for base key] + expected: FAIL + + [X25519 base key is not a private key] + expected: FAIL + + [X25519 public property value is a private key] + expected: FAIL + + [X25519 public property value is a secret key] + expected: FAIL + + [X448 good parameters] + expected: FAIL + + [X448 mixed case parameters] + expected: FAIL + + [X448 mismatched algorithms] + expected: FAIL + + [X448 no deriveKey usage for base key] + expected: FAIL + + [X448 base key is not a private key] + expected: FAIL + + [X448 public property value is a private key] + expected: FAIL + + [X448 public property value is a secret key] + expected: FAIL + + +[cfrg_curves_keys.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [X25519 good parameters] + expected: FAIL + + [X25519 mixed case parameters] + expected: FAIL + + [X25519 mismatched algorithms] + expected: FAIL + + [X25519 no deriveKey usage for base key] + expected: FAIL + + [X25519 base key is not a private key] + expected: FAIL + + [X25519 public property value is a private key] + expected: FAIL + + [X25519 public property value is a secret key] + expected: FAIL + + [X448 good parameters] + expected: FAIL + + [X448 mixed case parameters] + expected: FAIL + + [X448 mismatched algorithms] + expected: FAIL + + [X448 no deriveKey usage for base key] + expected: FAIL + + [X448 base key is not a private key] + expected: FAIL + + [X448 public property value is a private key] + expected: FAIL + + [X448 public property value is a secret key] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.js.ini new file mode 100644 index 0000000000..e6e8b4838e --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.https.any.js.ini @@ -0,0 +1,114 @@ +[ecdh_bits.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [P-521 with null length] + expected: FAIL + + [P-256 with null length] + expected: FAIL + + [P-384 with null length] + expected: FAIL + + [P-521 non-multiple of 8 bits] + expected: FAIL + + [P-256 non-multiple of 8 bits] + expected: FAIL + + [P-384 non-multiple of 8 bits] + expected: FAIL + + [P-521 missing public curve] + expected: FAIL + + [P-256 missing public curve] + expected: FAIL + + [P-384 missing public curve] + expected: FAIL + + [P-521 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-256 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-384 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-521 mismatched curves] + expected: FAIL + + [P-256 mismatched curves] + expected: FAIL + + [P-384 mismatched curves] + expected: FAIL + + [P-521 asking for too many bits] + expected: FAIL + + [P-256 asking for too many bits] + expected: FAIL + + [P-384 asking for too many bits] + expected: FAIL + + +[ecdh_bits.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [P-521 with null length] + expected: FAIL + + [P-256 with null length] + expected: FAIL + + [P-384 with null length] + expected: FAIL + + [P-521 non-multiple of 8 bits] + expected: FAIL + + [P-256 non-multiple of 8 bits] + expected: FAIL + + [P-384 non-multiple of 8 bits] + expected: FAIL + + [P-521 missing public curve] + expected: FAIL + + [P-256 missing public curve] + expected: FAIL + + [P-384 missing public curve] + expected: FAIL + + [P-521 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-256 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-384 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-521 mismatched curves] + expected: FAIL + + [P-256 mismatched curves] + expected: FAIL + + [P-384 mismatched curves] + expected: FAIL + + [P-521 asking for too many bits] + expected: FAIL + + [P-256 asking for too many bits] + expected: FAIL + + [P-384 asking for too many bits] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.js.ini new file mode 100644 index 0000000000..77626e97ce --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.https.any.js.ini @@ -0,0 +1,60 @@ +[ecdh_keys.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [P-521 missing public curve] + expected: FAIL + + [P-256 missing public curve] + expected: FAIL + + [P-384 missing public curve] + expected: FAIL + + [P-521 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-256 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-384 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-521 mismatched curves] + expected: FAIL + + [P-256 mismatched curves] + expected: FAIL + + [P-384 mismatched curves] + expected: FAIL + + +[ecdh_keys.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [P-521 missing public curve] + expected: FAIL + + [P-256 missing public curve] + expected: FAIL + + [P-384 missing public curve] + expected: FAIL + + [P-521 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-256 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-384 public property of algorithm is not a CryptoKey] + expected: FAIL + + [P-521 mismatched curves] + expected: FAIL + + [P-256 mismatched curves] + expected: FAIL + + [P-384 mismatched curves] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.https.any.js.ini new file mode 100644 index 0000000000..64ea9238c4 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.https.any.js.ini @@ -0,0 +1,6582 @@ +[hkdf.https.any.html?1001-2000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [short derivedKey, empty salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + +[hkdf.https.any.html?3001-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with null length] + expected: FAIL + + +[hkdf.https.any.html?1-1000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [short derivedKey, normal salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with 0 length] + expected: FAIL + + +[hkdf.https.any.html?2001-3000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [long derivedKey, empty salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with null length] + expected: FAIL + + +[hkdf.https.any.worker.html?3001-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with normal info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with normal info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-1, with empty info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with normal info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-512, with empty info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-256, with empty info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with empty info with null length] + expected: FAIL + + [empty derivedKey, empty salt, SHA-384, with normal info with null length] + expected: FAIL + + +[hkdf.https.any.worker.html?1001-2000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [long derivedKey, normal salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with normal info with null length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-384, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with normal info with missing info] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with missing info] + expected: FAIL + + [long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [long derivedKey, normal salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [long derivedKey, normal salt, SHA-512, with normal info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + +[hkdf.https.any.worker.html?1-1000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [short derivedKey, normal salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with missing info] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with empty info with null length] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-1, with normal info with null length] + expected: FAIL + + [short derivedKey, empty salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [short derivedKey, normal salt, SHA-384, with empty info with missing info] + expected: FAIL + + [short derivedKey, empty salt, SHA-384, with normal info with missing salt] + expected: FAIL + + +[hkdf.https.any.worker.html?2001-3000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with null length] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with missing info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with missing salt] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with missing salt] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with missing salt] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with missing info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with missing salt] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with null length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with null length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with empty info with missing info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with normal info with missing info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with missing salt] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with null length] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with empty info with null length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [long derivedKey, empty salt, SHA-1, with empty info with missing info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with missing salt] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with 0 length] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [long derivedKey, empty salt, SHA-512, with normal info with null length] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [long derivedKey, empty salt, SHA-256, with normal info with missing info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with 0 length] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info] + expected: FAIL + + [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512] + expected: FAIL + + [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage] + expected: FAIL + + [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info] + expected: FAIL + + [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info] + expected: FAIL + + [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with empty info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-512, with normal info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with normal info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with empty info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-1, with normal info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-384, with empty info with null length] + expected: FAIL + + [empty derivedKey, normal salt, SHA-256, with normal info with null length] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.js.ini new file mode 100644 index 0000000000..0343227ec9 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.https.any.js.ini @@ -0,0 +1,71 @@ +[pbkdf2.https.any.worker.html?4001-5000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.worker.html?1001-2000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.html?1-1000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.html?7001-8000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.worker.html?6001-7000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.worker.html?5001-6000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.html?1001-2000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.html?3001-4000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.html?4001-5000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.worker.html?2001-3000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.worker.html?3001-4000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.html?6001-7000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.html?5001-6000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.html?8001-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.worker.html?1-1000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.worker.html?8001-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.html?2001-3000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[pbkdf2.https.any.worker.html?7001-8000] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.any.js.ini new file mode 100644 index 0000000000..61219c670f --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_ctr.https.any.js.ini @@ -0,0 +1,7 @@ +[aes_ctr.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[aes_ctr.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.any.js.ini new file mode 100644 index 0000000000..eb519b215d --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.https.any.js.ini @@ -0,0 +1,7 @@ +[aes_gcm.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[aes_gcm.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/rsa_oaep.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/rsa_oaep.https.any.js.ini new file mode 100644 index 0000000000..80bb338bc3 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/rsa_oaep.https.any.js.ini @@ -0,0 +1,7 @@ +[rsa_oaep.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[rsa_oaep.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.https.any.js.ini new file mode 100644 index 0000000000..b111d17818 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.https.any.js.ini @@ -0,0 +1,2 @@ +[failures_AES-CBC.https.any.worker.html] + expected: ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini new file mode 100644 index 0000000000..a9cfe36431 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.https.any.js.ini @@ -0,0 +1,8 @@ +[failures_AES-CTR.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_AES-CTR.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini new file mode 100644 index 0000000000..c4d448df14 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.https.any.js.ini @@ -0,0 +1,8 @@ +[failures_AES-GCM.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_AES-GCM.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini new file mode 100644 index 0000000000..16b793476a --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.https.any.js.ini @@ -0,0 +1,8 @@ +[failures_AES-KW.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_AES-KW.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini new file mode 100644 index 0000000000..fabdc0a3eb --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.https.any.js.ini @@ -0,0 +1,8 @@ +[failures_ECDH.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_ECDH.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini new file mode 100644 index 0000000000..04d4f618b3 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.https.any.js.ini @@ -0,0 +1,8 @@ +[failures_ECDSA.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_ECDSA.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini new file mode 100644 index 0000000000..2778d7434f --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed25519.https.any.js.ini @@ -0,0 +1,85 @@ +[failures_Ed25519.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_Ed25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed25519}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed25519}, true, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini new file mode 100644 index 0000000000..8941a9ed9c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_Ed448.https.any.js.ini @@ -0,0 +1,86 @@ +[failures_Ed448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveKey\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [verify, sign, deriveBits\])] + expected: FAIL + + [Bad usages: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify, deriveBits\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed448}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: Ed448}, true, [\])] + expected: FAIL + + +[failures_Ed448.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini new file mode 100644 index 0000000000..e55b53a962 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.https.any.js.ini @@ -0,0 +1,8 @@ +[failures_HMAC.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_HMAC.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini new file mode 100644 index 0000000000..f982a3bf10 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.https.any.js.ini @@ -0,0 +1,8 @@ +[failures_RSA-OAEP.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_RSA-OAEP.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini new file mode 100644 index 0000000000..436da8dc0c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.https.any.js.ini @@ -0,0 +1,8 @@ +[failures_RSA-PSS.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_RSA-PSS.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini new file mode 100644 index 0000000000..b39364a70b --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.https.any.js.ini @@ -0,0 +1,8 @@ +[failures_RSASSA-PKCS1-v1_5.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_RSASSA-PKCS1-v1_5.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini new file mode 100644 index 0000000000..e376ff05c3 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X25519.https.any.js.ini @@ -0,0 +1,104 @@ +[failures_X25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({name: X25519}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: X25519}, true, [\])] + expected: FAIL + + +[failures_X25519.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini new file mode 100644 index 0000000000..2b307ee49e --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_X448.https.any.js.ini @@ -0,0 +1,103 @@ +[failures_X448.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[failures_X448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: generateKey({name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Empty usages: generateKey({name: X448}, false, [\])] + expected: FAIL + + [Empty usages: generateKey({name: X448}, true, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini new file mode 100644 index 0000000000..91a523f00f --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.https.any.js.ini @@ -0,0 +1,8 @@ +[successes_AES-CBC.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_AES-CBC.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini new file mode 100644 index 0000000000..399972f3fd --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.https.any.js.ini @@ -0,0 +1,8 @@ +[successes_AES-CTR.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_AES-CTR.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini new file mode 100644 index 0000000000..0fdb35351c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.https.any.js.ini @@ -0,0 +1,8 @@ +[successes_AES-GCM.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_AES-GCM.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini new file mode 100644 index 0000000000..813b2e309d --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.https.any.js.ini @@ -0,0 +1,8 @@ +[successes_AES-KW.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_AES-KW.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini new file mode 100644 index 0000000000..4be8cda7fa --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.https.any.js.ini @@ -0,0 +1,8 @@ +[successes_ECDH.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_ECDH.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini new file mode 100644 index 0000000000..71add4fc60 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.https.any.js.ini @@ -0,0 +1,8 @@ +[successes_ECDSA.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_ECDSA.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini new file mode 100644 index 0000000000..ad20709733 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed25519.https.any.js.ini @@ -0,0 +1,62 @@ +[successes_Ed25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: ED25519}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ED25519}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed25519}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed25519}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + +[successes_Ed25519.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini new file mode 100644 index 0000000000..77b604dcd1 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_Ed448.https.any.js.ini @@ -0,0 +1,62 @@ +[successes_Ed448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: ED448}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ED448}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ED448}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed448}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: ed448}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: ed448}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, false, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, true, [sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, false, [sign, verify, sign, sign, verify\])] + expected: FAIL + + [Success: generateKey({name: Ed448}, true, [sign, verify, sign, sign, verify\])] + expected: FAIL + + +[successes_Ed448.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini new file mode 100644 index 0000000000..255c9f33ac --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.https.any.js.ini @@ -0,0 +1,8 @@ +[successes_HMAC.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_HMAC.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini new file mode 100644 index 0000000000..490ddd3fec --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.https.any.js.ini @@ -0,0 +1,143 @@ +[successes_RSA-OAEP.https.any.worker.html?111-120] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?141-150] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?151-last] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?51-60] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?31-40] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?21-30] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?61-70] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?81-90] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?71-80] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?101-110] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?41-50] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?1-10] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?91-100] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?131-140] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?11-20] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.worker.html?121-130] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-OAEP.https.any.html?11-20] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?141-150] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?131-140] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?1-10] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?61-70] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?21-30] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?31-40] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?151-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?71-80] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?81-90] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?101-110] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?41-50] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?91-100] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?111-120] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?51-60] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-OAEP.https.any.html?121-130] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini new file mode 100644 index 0000000000..3cfa96844b --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.https.any.js.ini @@ -0,0 +1,35 @@ +[successes_RSA-PSS.https.any.worker.html?11-20] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-PSS.https.any.worker.html?1-10] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-PSS.https.any.worker.html?31-last] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-PSS.https.any.worker.html?21-30] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSA-PSS.https.any.html?1-10] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.html?21-30] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.html?11-20] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSA-PSS.https.any.html?31-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini new file mode 100644 index 0000000000..ba8df85738 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.https.any.js.ini @@ -0,0 +1,35 @@ +[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?11-20] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?1-10] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?31-last] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSASSA-PKCS1-v1_5.https.any.worker.html?21-30] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_RSASSA-PKCS1-v1_5.https.any.html?21-30] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.html?1-10] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.html?11-20] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[successes_RSASSA-PKCS1-v1_5.https.any.html?31-last] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini new file mode 100644 index 0000000000..7659d99ecf --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X25519.https.any.js.ini @@ -0,0 +1,55 @@ +[successes_X25519.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_X25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini new file mode 100644 index 0000000000..decd31f20a --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_X448.https.any.js.ini @@ -0,0 +1,55 @@ +[successes_X448.https.any.worker.html] + expected: + if (os == "android") and fission: [ERROR, TIMEOUT] + ERROR + +[successes_X448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Success: generateKey({name: X448}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: X448}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Success: generateKey({name: x448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/getRandomValues.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/getRandomValues.any.js.ini new file mode 100644 index 0000000000..a1afdabc46 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/getRandomValues.any.js.ini @@ -0,0 +1,5 @@ +[getRandomValues.any.worker.html] + +[getRandomValues.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/historical.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/historical.any.js.ini new file mode 100644 index 0000000000..2a986dea4f --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/historical.any.js.ini @@ -0,0 +1,11 @@ +[historical.any.sharedworker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[historical.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[historical.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/idlharness.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/idlharness.https.any.js.ini new file mode 100644 index 0000000000..8db67d0eb8 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/idlharness.https.any.js.ini @@ -0,0 +1,37 @@ +[idlharness.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [CryptoKey interface: existence and properties of interface object] + expected: FAIL + + [CryptoKey interface object length] + expected: FAIL + + [CryptoKey interface object name] + expected: FAIL + + [CryptoKey interface: existence and properties of interface prototype object] + expected: FAIL + + [CryptoKey interface: existence and properties of interface prototype object's "constructor" property] + expected: FAIL + + [CryptoKey interface: existence and properties of interface prototype object's @@unscopables property] + expected: FAIL + + [CryptoKey interface: attribute type] + expected: FAIL + + [CryptoKey interface: attribute extractable] + expected: FAIL + + [CryptoKey interface: attribute algorithm] + expected: FAIL + + [CryptoKey interface: attribute usages] + expected: FAIL + + +[idlharness.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.https.any.js.ini new file mode 100644 index 0000000000..b3bfbca66b --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.https.any.js.ini @@ -0,0 +1,146 @@ +[ec_importKey.https.any.html] + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: PRECONDITION_FAILED + + +[ec_importKey.https.any.worker.html] + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDSA, namedCurve: P-256}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDSA, namedCurve: P-384}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDSA, namedCurve: P-521}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (spki, buffer(59, compressed), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-256 bits (raw, buffer(33, compressed), {name: ECDH, namedCurve: P-256}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (spki, buffer(72, compressed), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-384 bits (raw, buffer(49, compressed), {name: ECDH, namedCurve: P-384}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, true, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (spki, buffer(90, compressed), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: PRECONDITION_FAILED + + [Good parameters: P-521 bits (raw, buffer(67, compressed), {name: ECDH, namedCurve: P-521}, false, [\])] + expected: PRECONDITION_FAILED diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey.https.any.js.ini new file mode 100644 index 0000000000..86e010e543 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey.https.any.js.ini @@ -0,0 +1,342 @@ +[okp_importKey.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, true, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, true, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, false, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, false, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, true, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, true, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, false, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, false, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, true, [\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, true, [\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, false, [\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, false, [\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (spki, buffer(68), {name: X448}, true, [\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, true, [\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (spki, buffer(68), {name: X448}, false, [\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, false, [\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, true, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, false, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, true, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, false, [\])] + expected: FAIL + + [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, true, [\])] + expected: FAIL + + [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, false, [\])] + expected: FAIL + + [Good parameters: X448 bits (raw, buffer(56), {name: X448}, true, [\])] + expected: FAIL + + [Good parameters: X448 bits (raw, buffer(56), {name: X448}, false, [\])] + expected: FAIL + + +[okp_importKey.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, true, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, true, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed25519 bits (spki, buffer(44), {name: Ed25519}, false, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(kty, crv, x), {name: Ed25519}, false, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (pkcs8, buffer(48), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Good parameters: Ed25519 bits (jwk, object(crv, d, x, kty), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, true, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, true, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (spki, buffer(69), {name: Ed448}, false, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(kty, crv, x), {name: Ed448}, false, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (pkcs8, buffer(73), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Good parameters: Ed448 bits (jwk, object(crv, d, x, kty), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, true, [\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, true, [\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X25519 bits (spki, buffer(44), {name: X25519}, false, [\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(kty, crv, x), {name: X25519}, false, [\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X25519 bits (pkcs8, buffer(48), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: X25519 bits (jwk, object(crv, d, x, kty), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (spki, buffer(68), {name: X448}, true, [\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, true, [\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (spki, buffer(68), {name: X448}, false, [\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(kty, crv, x), {name: X448}, false, [\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Good parameters: X448 bits (pkcs8, buffer(72), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: X448 bits (jwk, object(crv, d, x, kty), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, true, [\])] + expected: FAIL + + [Good parameters: Ed25519 bits (raw, buffer(32), {name: Ed25519}, false, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, true, [\])] + expected: FAIL + + [Good parameters: Ed448 bits (raw, buffer(57), {name: Ed448}, false, [\])] + expected: FAIL + + [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, true, [\])] + expected: FAIL + + [Good parameters: X25519 bits (raw, buffer(32), {name: X25519}, false, [\])] + expected: FAIL + + [Good parameters: X448 bits (raw, buffer(56), {name: X448}, true, [\])] + expected: FAIL + + [Good parameters: X448 bits (raw, buffer(56), {name: X448}, false, [\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed25519.https.any.js.ini new file mode 100644 index 0000000000..598d658107 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed25519.https.any.js.ini @@ -0,0 +1,1194 @@ +[okp_importKey_failures_Ed25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: importKey(spki, {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + +[okp_importKey_failures_Ed25519.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: importKey(spki, {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed25519}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed25519}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed25519}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed25519}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, true, [verify, verify\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: Ed25519}, false, [verify, verify\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed25519}, true, [sign, sign\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed448.https.any.js.ini new file mode 100644 index 0000000000..b6ce289455 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_Ed448.https.any.js.ini @@ -0,0 +1,1194 @@ +[okp_importKey_failures_Ed448.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: importKey(spki, {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, false, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify, verify\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + +[okp_importKey_failures_Ed448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: importKey(spki, {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: Ed448}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: Ed448}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, true, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: Ed448}, false, [sign, sign, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, true, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: Ed448}, false, [verify, verify, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: Ed448}, false, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, true, [verify, verify\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: Ed448}, false, [verify, verify\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk(private), {name: Ed448}, false, [sign, sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: Ed448}, true, [sign, sign\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X25519.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X25519.https.any.js.ini new file mode 100644 index 0000000000..a33c5d83d8 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X25519.https.any.js.ini @@ -0,0 +1,1170 @@ +[okp_importKey_failures_X25519.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: importKey(spki, {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X25519}, true, [\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X25519}, false, [\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X25519}, true, [\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X25519}, false, [\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, true, [\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, false, [\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + +[okp_importKey_failures_X25519.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: importKey(spki, {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X25519}, true, [\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X25519}, false, [\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X25519}, true, [\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X25519}, false, [\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X25519}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, true, [\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X25519}, false, [\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveBits\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X25519}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X448.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X448.https.any.js.ini new file mode 100644 index 0000000000..d9e605511d --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/import_export/okp_importKey_failures_X448.https.any.js.ini @@ -0,0 +1,1168 @@ +[okp_importKey_failures_X448.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Bad usages: importKey(spki, {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X448}, true, [\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X448}, false, [\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X448}, true, [\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X448}, false, [\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, true, [\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, false, [\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + +[okp_importKey_failures_X448.https.any.worker.html] + [Bad usages: importKey(spki, {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(spki, {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, sign\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, verify\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [encrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [decrypt\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [sign\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [verify\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [wrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [unwrapKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad usages: importKey(jwk (public) , {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X448}, true, [\])] + expected: FAIL + + [Bad key length: importKey(spki, {name: X448}, false, [\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(pkcs8, {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X448}, true, [\])] + expected: FAIL + + [Bad key length: importKey(jwk (public) , {name: X448}, false, [\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'x' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits, deriveKey\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'kty' parameter: importKey(jwk(private), {name: X448}, false, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, true, [\])] + expected: FAIL + + [Missing JWK 'crv' parameter: importKey(jwk (public) , {name: X448}, false, [\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits, deriveKey\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveBits\])] + expected: FAIL + + [Invalid key pair: importKey(jwk(private), {name: X448}, true, [deriveKey, deriveBits, deriveKey, deriveBits\])] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/rsa_importKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/rsa_importKey.https.any.js.ini new file mode 100644 index 0000000000..adb369e47f --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/import_export/rsa_importKey.https.any.js.ini @@ -0,0 +1,7 @@ +[rsa_importKey.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[rsa_importKey.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/symmetric_importKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/symmetric_importKey.https.any.js.ini new file mode 100644 index 0000000000..adf7e4347c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/import_export/symmetric_importKey.https.any.js.ini @@ -0,0 +1,7 @@ +[symmetric_importKey.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[symmetric_importKey.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/randomUUID.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/randomUUID.https.any.js.ini new file mode 100644 index 0000000000..283b12b2df --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/randomUUID.https.any.js.ini @@ -0,0 +1,7 @@ +[randomUUID.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[randomUUID.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini new file mode 100644 index 0000000000..82e2430519 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.https.any.js.ini @@ -0,0 +1,74 @@ +[ecdsa.https.any.worker.html] + [ECDSA P-256 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + +[ecdsa.https.any.html] + [ECDSA P-256 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-256 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-384 with SHA-512 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-1 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-256 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-384 verification failure due to bad hash name] + expected: FAIL + + [ECDSA P-521 with SHA-512 verification failure due to bad hash name] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini new file mode 100644 index 0000000000..d3ad2069a9 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/eddsa.https.any.js.ini @@ -0,0 +1,162 @@ +[eddsa.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [importVectorKeys step: EdDSA Ed25519 verification] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 with altered data after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 with altered data after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 no verify usage] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 no verify usage] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 round trip] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 round trip] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to altered data] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to altered data] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verifying with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verifying with wrong algorithm name] + expected: FAIL + + [Sign and verify using generated Ed25519 keys.] + expected: FAIL + + [Sign and verify using generated Ed448 keys.] + expected: FAIL + + +[eddsa.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [importVectorKeys step: EdDSA Ed25519 verification] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification with altered signature after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 with altered data after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 with altered data after call] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 using privateKey to verify] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 using publicKey to sign] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 no verify usage] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 no verify usage] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 round trip] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 round trip] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to altered signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to shortened signature] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verification failure due to altered data] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verification failure due to altered data] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 signing with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed25519 verifying with wrong algorithm name] + expected: FAIL + + [importVectorKeys step: EdDSA Ed448 verifying with wrong algorithm name] + expected: FAIL + + [Sign and verify using generated Ed25519 keys.] + expected: FAIL + + [Sign and verify using generated Ed448 keys.] + expected: FAIL diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini new file mode 100644 index 0000000000..030318f47d --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/hmac.https.any.js.ini @@ -0,0 +1,7 @@ +[hmac.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[hmac.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini new file mode 100644 index 0000000000..b4566ade12 --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pkcs.https.any.js.ini @@ -0,0 +1,7 @@ +[rsa_pkcs.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[rsa_pkcs.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini new file mode 100644 index 0000000000..0b8a8bc8ea --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/sign_verify/rsa_pss.https.any.js.ini @@ -0,0 +1,7 @@ +[rsa_pss.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[rsa_pss.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.any.js.ini b/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.any.js.ini new file mode 100644 index 0000000000..f01137ff3c --- /dev/null +++ b/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.https.any.js.ini @@ -0,0 +1,7 @@ +[wrapKey_unwrapKey.https.any.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + +[wrapKey_unwrapKey.https.any.worker.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] |